Key control is important for all businesses — especially those in
the multifamily industry.
The threat of an employee stealing and using tenant keys to commit burglary is real. An apartment complex in Boston realized this when it experienced a series of burglaries where there was no sign of forced entry, indicating someone had used keys to access the units. It's essential for you, as a property owner, to tightly secure keys and uphold staff accountability by recording key transactions.
The threat of an employee stealing and using tenant keys to commit burglary is real. An apartment complex in Boston realized this when it experienced a series of burglaries where there was no sign of forced entry, indicating someone had used keys to access the units. It's essential for you, as a property owner, to tightly secure keys and uphold staff accountability by recording key transactions.
The first decision you have to make is whether to collect this
data actively or passively.
What's the Difference?
Active Data Collection
Active
data collection relies on users to manually record information such as key tag
numbers, dates, times and reasons for checking out keys or to swipe a key tag
through a reader after removing it from a lock box.
This method of data collection is most often used with manual key control methods such as pegboards or with electronic key boxes that don't automatically record user transactions from the instant the key is taken to the moment it's returned.
This method of data collection is most often used with manual key control methods such as pegboards or with electronic key boxes that don't automatically record user transactions from the instant the key is taken to the moment it's returned.
Passive Data Collection
Passive data collection doesn't require users to remember to
manually enter any transaction information. Instead, transaction information is
collected automatically the instant a key is removed from the system so users
don't have to manually write it down, enter it into a spreadsheet or scan a key
tag.
Automated key control systems use passive data collection to
record user information, date, time and reasons for checking out a key (e.g.,
during an apartment showing or maintenance call). Another perk of this type of
data collection is that it provides a 100 percent verifiable audit trail of the
information, so it enforces employee accountability.
Why Passive Data
Collection Is More Secure
When it comes to security, the word "passive" has a negative
connotation. In terms of recording key control data, however, passively
collecting data is crucial for protecting yourself from liability risks.
Active Data Collection
In a perfect world, your staff would always take the time to
accurately record when they check out or return keys. Unfortunately, human
error is inevitable (even well-meaning, trustworthy employees make mistakes).
In the event that one of your employees decides to use a key for a prohibited
activity, active data collection leaves your key control protocol vulnerable to
manipulation.
A key can be taken from a lockbox or pegboard, duplicated and
returned within a matter of minutes. If a person removes a key without signing
it out and subsequently returns it before anyone notices it's missing, the key
security for the unit to which the key belongs has been compromised. Even if
you use computerized lock boxes that require users to enter a PIN or swipe a
card, keep in mind that transaction details won't be recorded unless the user
scans the key tag or enters the key tag number into the system.
Without any recorded key transaction details, the security breach
will likely go unreported until a resident or their property is harmed. Because
the landlord is responsible for following key control best practices to protect
residents, active data collection can create liability risks for the property
owner.
Passive Data Collection
Passive data collection virtually eliminates the risk of
inaccurate records because users aren't required to manually input information
or scan a key tag. By relying on passive data collection, you'll be able to
easily keep a real-time verifiable audit trail of which users checked out or returned
keys and the date, time and reason they did so. Data can't be forged or altered
by users, so you'll automatically have tighter and more accurate key security
than if you were using a manual process.
Passive data collection reduces the risk that keys will fall into
the wrong hands. Electronic key systems that rely on passive data collection
authenticates users by having them scan a fingerprint, enter a unique password,
scan a key card or provide a combination of these authentication methods. Some
systems also allow you to create access levels for
authorized users. In the event that a user attempts to remove a key they're not
authorized to use, the system can instantly notify you by text or email.
We think the choice is pretty clear for property owners, because,
most importantly, passive data collection enforces a necessity that active data
collection doesn't: accountability. For more tips on how to secure your
property, check out our white paper.
No comments:
Post a Comment