It’s Electrifying

College fine tunes security from keys to electrified locks

Tarrant County College is the sixth largest college or university in the state of Texas offering two-year degrees that lead to careers or transfers to four-year institutions. Founded in 1965, it has expanded from a single campus to an institution that soon will encompass six facilities serving more than 50,000 students including computer laboratories and other technical facilities that contain high-value items. For example, the nursing school includes state-of-theart operating rooms and $200,000 mannequins on which students can practice.

This college has followed a path of continuous improvement to manage access control and other security issues at its five campuses located throughout the Fort Worth area. Whether upgrading its key system or implementing electrified locks, Tarrant County College is committed to providing the best solutions by testing all products before deploying them throughout the district.

Beginning with a Key System Upgrade

A few years ago, Tarrant County College knew its growth had outpaced its existing key system. The key manufacturer advised that an entirely new system was needed to handle the college’s more than 10,000 doors. This led to a broader investigation of solutions.

As a result, the college selected a key system with a large format, interchangeable core system that is patent-protected until 2024. Patent-protected keyways prevent unauthorized duplication, and key blanks can only be obtained from the manufacturer when authorized by the customer, in this case, the college. Even during renovation or new building projects, contractors are provided with construction cores. Once the project is completed, the interchangeable cores make it easy to secure the building.

Although electrified locks and card readers are used throughout Tarrant County campuses, mechanical keys still play an important role in the access control plan. Keys are used extensively on non-critical interior doors as well as over-ride for the electrified locks when necessary. To provide physical control of the keys used by maintenance staff, the college uses a cabinet that sends management an e-mail alert if a key is not returned when due.

“We have one of these on every campus,” said Bob McCleary, electronic access control systems manager. “We put the master keys at the top and sets for the maintenance staff below. It keeps track of the keys that are checked out electronically.”

McCleary said that the key system is structured so the police department needs only two keys to access any of the college’s buildings. One handles all the northern campuses while the other controls the southern campuses. Although access to most of the buildings is normally controlled by card access, the electrified locks can be opened by key override. In the event of a lockdown, for example, this would ensure that the police could always enter the building.

Upgrading Electrified Access Control

While the college has used electrified access control for several years, it is expanding and upgrading its system. McCleary uses electrified mortise locks or electrified exit devices to secure all access-controlled doors. The college has about 1,400 card readers that control the electrified locks. These are now being replaced with multi-technology card readers. All new installations are using these readers, as well.

The readers are capable of interfacing with proximity, smart and most other credentials, providing flexibility for future changes or upgrades. They use an open architecture platform designed to work with industry standards and common access control system interfaces. In addition, their single-gang styling and easy-to-connect wiring harness simplifies installation.

To monitor this system, McCleary receives online data in his office that shows the status of every card reader.

“You can see when they are online and locked or unlocked, the name of the door and whether it is open or closed,” McCleary said.

Doors automatically unlock at a specified time for classes but can be locked remotely in case of emergency.

Many of the entries controlled by card readers and electrified locks incorporate a camera that lets a staff member verify visitor’s identities before unlocking remotely. Other cameras are located throughout the various campuses. According to McCleary, one benefit is that in the event of a threat, they could tell if the perpetrator was inside or outside of a building, and decide which doors needed to be locked down.

In addition, a recent acquisition of the former Bell Helicopter building at the Fort Worth Alliance airport has created a sixth campus that will allow the college to move and expand its aircraft mechanic courses there. McCleary said that the building will incorporate 50 to 60 multitechnology card readers and wireless electronic locks when the move is completed. This is the college’s first use of wireless locks.

Electrified locking in combination with a high-security key system provides the security this college needs to protect both people and property.

“We try to make the students and faculty feel more secure and confident that we have control of the situation, whatever it is,” McCleary said. “We limit faculty cards to the areas where they need access, so only the police have access to every door.”

Other Solutions

Other hardware and security solutions include exit devices, door closers and Ives hinges. The exit devices that are used on all required access-controlled doors incorporate a new latch-bolt design, providing greater strength and durability. McCleary said that he prefers exit devices that have a four-bolt mounting because this provides a higher level of strength and security over narrow stile devices.

Many of the exit devices incorporate special features selected to meet Tarrant County College’s specifications. For instance, all new exit device installations and replacements include a quiet exit latch option. Quiet operation is especially important in areas such as auditoriums, classrooms and libraries, where the noise of a conventional latch could be disturbing. Many applications also call for a special dogging option, which allows them to be dogged by key as well as electronically in the event of power failure or other situation (because the main body contains the electronics, the lock cylinder is located in the center case.)

Another solution that works well for this college is a keyed removable mullion for double doors. McCleary said that he prefers this approach over vertical rod exit devices to achieve security and feels it requires less maintenance.

“If someone needs to move a piano into a building, we just have a maintenance worker unlock and remove the mullion, then put it back in a few minutes,” McCleary said.

Comprehensive specifications ensure that the best solutions are applied consistently throughout this college system.

“We have been told by our architects that ours are one of the best specs ever written,” McCleary said. “They are so detailed that whoever bids our jobs won’t have any problems if they follow them.”

Typically, McCleary tests a new product in a high-traffic location before including it in the specifications. Although the standards are tight, there are enough qualified distributors in the area that can supply the desired products to achieve competitive bidding; however, they must ensure that they have the qualified personnel necessary to provide installation as well as service.

This article originally appeared in the November 2014 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3