unscrupulous individuals, or may simply be negligent in maintaining their security, allowing visitors to steal them. 13. Implement proper lock change pro- cedures and follow them to the letter. Many systems have suffered great loss that could easily have been reduced or avoided by sim- ply responding quickly to potentially lost or stolen keys. They have suffered an incident while holding meetings “to determine the level of risk” before rekeying an area. The key issue policy should require the prompt reporting of lost or stolen keys, with potential penalties for delayed compliance. Yes, we all want to correct our own mis- takes and find everything we lose, and “know” that we will find them as soon as they are reported missing. The problem is, someone else could find them first and an incident could occur. Keys that are able to operate a wide area of locks might even need to be reported 24 hours a day if they turn up missing. There may be a need for an emergency re-keying. Sufficient key charges should be charged to defray costs of replacement keys and re- keying when costs are appropriate. How- ever, there must be sufficient exceptions to the billing of costs to encourage proper reporting of lost keys. Keys that are not reported “to save money in case I find it” are an open line of attack against the institution, and can end up cost- ing the institution far more than it would have cost it to eat the costs of re-keying. Each opening should be evaluated as to the reasonableness of key issue beyond a particular point. In other words, how many of a particular key having been issued is too many and indicates a need to re-assess the situation. The key management policies should be clearly written to be understood easily even by those for whom the language they were written in is not their native language, or translated copies should be made avail- able. The cost of doing so is bound to be less than the costs of non-compliance due to misunderstanding. If your key policies limit the keys to actual need, keep the systems as small as possible and issue keys at the lowest possible level to accomplish the task (even if it means car- rying a few keys), then the cost of replace- ment should already have been budgeted and should not be a factor. 14. Budget for the mechanical life cycle of the system. Master key systems are me- chanical devices, and like all mechanical devices, have a life cycle that is somewhat predictable, based upon your procedures for the various stages, from implementation, to adjustment, to maintenance, to repair and RECOGNIZED THROUGHOUT THE INDUSTRY THE FRAMON FRA2 AS THE MOST ACCURATE & DURABLE CODE MACHINE AVAILABLE Accuracy That alone is probably the best way to describe the Framon #2 Code Machine. When you choose the #2, you enable yourself to originate almost any cylinder key in use today. Plus, it’s less expensive than almost any other code machine. Here are just a few of the keys you’ll be able to cut with the #2: • Standard Cylinder • Letterbox Keys • Domestic Automotive • Safety Deposit Box Keys • Foreign Automotive • Motorcycle Keys • Padlock Keys • Interchangeable Core • High Security Keys Originates keys accurate to one- half thousandth of an inch (.0005”, about the thickness of a hair). A perfect key every time! Straight-In Feed A perpendicular cut at the root of the key. The flat of the cut will always be the same depth from the left side of the cut to the right. Rugged & Durable Made from heat treated aluminum and steel. Spacing and depth movements take place on pairs of steel pins and screws. There are no small gears to strip out and no plastic parts to wear out. Framon Manufacturing Company, Inc | framon.com | [email protected] | 909 W Washington Ave, Alpena MI 49707 Distributed Nationally By: HATA, Incorporated ph. 989.354.5623 | fax. 989.354.4238 Genericode Included Contact your Framon distributor for more information on the #2 or any of our great products! ph. 866.888.4282 | fax. 866.299.4282 WWW.ALOA.ORG JANUARY 2015 KEYNOTES 49