Toledo Museum Of Art Uses KeyWatcher System

With a collection of more than 30,000 works of art and 2010 attendance surpassing 430,000 the Toledo Museum of Art is a thriving cultural and educational center for northwest Ohio.

To help protect the visitors, staff and treasures, the museum has deployed a comprehensive security system that integrates policies, procedures, personnel and hardware, including the Morse Watchmans key control and management system.

“Security is as important as the curatorial function in an art museum and key control plays a significant role in our day to day security operations,” said Tim Szczepanski, chief of protective services for the Toledo Museum of Art. “The KeyWatcher system enables us to tighten our security procedures because of its ease of use and its tracking and reporting capabilities.”

In addition to regular employees, the museum is also home to a number of temporary staff including interns, scholars and researchers, all of whom might need access to non-public areas.

To accommodate these needs, Szczepanski’s department can easily program the KeyWatcher system to allow selected individuals to access a key from the key cabinet.

The authorization can be established for a defined period or for certain recurring times or days, and can be integrated with the building’s card access system. Permission levels can be set for each user code, ranging from a basic level to the highest authorization level which allows complete access to all functions.
 
“The convenience and flexibility of the system lets us control who has keys or access to the keys,” Szczepanski said. “For example, when programmed into the system, the researcher who needs to be in a staff-only area after hours or the intern who needs access to a certain space can do so by simply entering their PIN code to open the cabinet and retrieve the key. Security doesn’t have to come and open the door for them and we have a record of all access activity.”

The KeyWatcher system automatically records all transactions, including user, date and time of checkout and return.

At any time, the museum’s Protective Services department can view who currently has which keys out and for what area, or who has had keys out, for what areas and when. Szczepanski added that the tracking function has also resolved the problem of employees forgetting to return keys and the problem of lost keys.

“The tracking functions allow us to regularly remind staff who neglect to return keys,” he said. “After one or two reminders, the problem usually goes away. In fact, since we have had the KeyWatcher system we have not lost one set of keys.”

The custom programmed activity reports, available through Morse Watchmans KeyPro software, also help to keep Protective Services informed and better able to identify unusual activity. Key movement is traced by time, date and user code, and audit reports track keys in use, overdue keys and inconsistent key usage. In addition, the built-in scheduler allows Protective Services to program the system to automatically download all data to a secure PC within the department.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3