Security Simplified

New UConn Medical Arts & Research Building has effective security technology

FOR its new Medical Arts & Research Building, the University of Connecticut standardized on a security system by using a simplified approach that combines after-hours electronic perimeter access control with interior mechanical locking. By effectively managing the access to the building itself, a less-complicated keying system that still provides the desired level of security can be used inside.

New Facility Combines Related Services
The UConn Health Center is situated on a 162-acre campus in Farmington, Conn., and encompasses 35 buildings totaling more than 2 million square feet. The newest building on campus is the recently opened Medical Arts & Research Building, a 99,000 square foot, four-story structure that focuses on musculoskeletal research and outpatient surgery.

Its first floor includes rehabilitation services, physical therapy and a diagnostic imaging suite, as well as building infrastructure such as HVAC and electrical services. Occupying the second floor is a joint venture with an outside provider that provides same-day surgery and ancillary support. The third floor incorporates clinical space for orthopedics, rheumatology, neurology and osteoporosis programs. Doctors who perform same-day surgery have offices there, including their academic offices, as part of the teaching hospital. The fourth floor houses the Department of Orthopedics and includes academic and research facilities.

Gathering all these entities under a single roof helps minimize the time doctors spend between seeing patients, performing surgery and doing office and laboratory work.

Electronic Access Control Secures the Building
Although the facility is open to the public during normal hours of operation, access at other times is governed by proximity cards. The card readers operate electrified exit devices, which provide safe emergency egress and access control after hours. During normal hours of operation, the concealed vertical rod devices are retracted or "dogged down" electrically.

One benefit of the card access system is that it provides an audit trail record of everyone who enters the building.

"If Dr. Joe Smith opens a fourth floor door at 1:04 a.m. on Saturday morning, it will show up on the audit trail," said locksmith Bruce McPherson.

This provides both accountability and traceability if any problems occur.

Everest Primus cylinders are used to provide higher security for key overrides on exterior doors, as well as several interior doors equipped with Schlage CM and PRO series electronic access controls.

"Without my signature," McPherson said, "no one gets a key blank to cut a key for an exterior door, so that keeps unauthorized people out of the building. I know that if I've cut six keys to a door, those are the only six that exist."

He points out that only the health center's police and fire departments have keys for the exterior doors, while all other authorized users have cards that provide an audit trail.

Schlage PRO series manually programmable locks are used on some interior doors to rooms, such as the locker rooms and janitor closets, that need to be readily accessible, but where traffic still needs to be controlled. The PRO series locks are standalone, microprocessor-based, battery-powered locks that make it easy to add new access codes and delete old ones in seconds via the keypad. In these cases, they eliminate the need to provide keys to authorized personnel.

Instead of hard wiring for some interior locations, such as laboratories, computer-managed Schlage CM locks are installed. These standalone locks are easy to install without hard wiring and do not require power supplies or controllers. They are easy to program with a PDA or laptop computer, and they use the same credentials as the exterior doors.

Keying Interior Doors for Security
With the exterior secured and audit trail information captured, it is easy to find out who was in the building at a particular time. This minimizes the need for strict access control measures within most of the building, yet the facility also maintains effective key control to prevent unauthorized duplication.

Most of the interior doors are protected by mortise locks. Interchangeable cores make it easy to change locks whenever necessary.

"It's a D-restricted keyway, not the standard Everest, so you have to be a registered facility to order key blanks," Mc Pherson said. "It gives us the ability to control how many keys are out there."

Simplifying, Standardizing
McPherson said that although his title is "locksmith," he does not function in a similar manner as locksmiths at most facilities. Instead of reporting to facilities management, he works for the health center's Public Safety Division. While most locksmiths handle exit devices, door closers and other forms of door hardware, he only handles devices that take a key, both conventional and electronic.

In addition, he develops and maintains the keying schedules for the entire health center and also administrates the databases for the card access systems. Along with this, he is responsible for maintaining the hardware and much of the software associated with the card access, intrusion detection, infant protection and CCTV systems, and he is actively involved in the design of new systems, from both a hardware standpoint and how the system will be used and integrated with existing systems.

When he joined UConn in 1999, McPherson said, the low-bid process had resulted in a lack of standardization between the 35 buildings that make up the health center. Credentials, software programs and hardware often varied from building to building. He said he has reduced access controls to three systems and is working to standardize further, using proximity cards. The new building uses the Ingersoll-Rand's LockLink access control management software, which manages the CM series locks.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.