Practical Connection Assignment Conduct some research and develop a Physical Security Plan for a new IT Company Located at in the Capital of the US S

Practical Connection Assignment
Conduct some research and develop a Physical Security Plan for a new IT Company Located at in the Capital of the US State which you live. Include a street location in that capital and the crime statistics of that area as your background. This IT provides IT services for city, county, state and federal governments. Ensure that you understand and detail the various levels of security required to provide all those various levels of services. Normal business hours exist 6:00 am – 6:00pm, Mondays – Fridays with some ad hoc weekend work and late evening work. There are custodians during the normal business hours and an intense cleaning crew in the evenings from 7:00 – 11:00pm. The building has a private parking garage that is open 24 – 7.
Use all the information from chapter 1 – 18 to impact and enhance your plan. Provide all specifications for material/technology used. There is no page number set. In this scenario, you are a professional Physical Security “Expert”. Your plan should reflect this. APA format is mandatory. Do not simply copy the template and example that I have provided you. These documents are provided to provide simple guidance and to stimulate ideas.
Any SafeAssignmatch 40% or greater will result in a grade reduction.
Name your file “SecurityPlan-LastName”, i.e. SecurityPlan-Barnes.

Physical Security Plan Template

Don't use plagiarized sources. Get Your Custom Assignment on
Practical Connection Assignment Conduct some research and develop a Physical Security Plan for a new IT Company Located at in the Capital of the US S
From as Little as $13/Page

Map Reference

Copy No.___________

Issuing Agency

Place of Issue

Date of Issue

Physical Security Plan

1. Purpose. State the plans purpose.
2. Responsibilities. List the people who are responsible for physical security and what their specific responsibilities are related to the physical security of the installation or facility.
3. Policies.

A. Area Security. Define the areas, buildings, and other structures considered critical and establish priorities for their protection.

B. CATEGORY I (Maximum Level Security). This level of security is required for an area containing a security interest or defense resources. Its compromise or loss would have an immediate effect on the defense potential or capability of the United States.

CATEGORY I (maximum-level security)

BLDG #

PROTECTION

CATEGORY II (Advanced Level Security). This level of security is required for an area containing a security interest or defense potential or capability of the United States. The total security effort for these areas should provide a high probability of detection and assessment or prevention of unauthorized penetration or approach to the items protected.

CATEGORY II (advanced-level security)

BLDG #

PROTECTION

CATEGORY III (Intermediate Level Security). This level of security is required for an area containing pilferable material or sensitive items that have an attraction for the intruder in addition to monetary value. These areas may contain equipment necessary for the continual functioning of the activities, but not necessarily a part of the immediate or near-term mission or defense capability. These areas should be provided physical protection through isolation, barrier systems, IDS-CCTV, and access control or a combination of these. The total security effort for these areas should provide a reasonable probability of detection and assessment or prevention of unauthorized penetration, approach, or removal of the items protected.

CATEGORY III (intermediate-level security)

BLDG #

PROTECTION

CATEGORY IV X (Basic Level Security). This level of security is established to protect pilferable items or for the principle purpose of providing administrative control, safety, or a buffer area of security restriction for areas of higher security category. The items within the area are essential to continue base operations and should be afforded additional security or consideration during increased FPCONs.

CATEGORY IV (basic-level security)

BLDG #

PROTECTION

CATEGORY V (basic-level security)

BLDG #

PROTECTION

CATEGORY VI (basic-level security)

BLDG #

PROTECTION

CATEGORY VII (basic-level security)

BLDG #

PROTECTION

CATEGORY VIII (basic-level security)

BLDG #

PROTECTION

CATEGORY IX (basic-level security)

BLDG #

PROTECTION

CATEGORY X (basic-level security)

BLDG #

PROTECTION

4. Access Control Measures. Define and establish restrictions on access and movement into critical areas. Categorize restrictions as to personnel, materials, and vehicles.
A. Personnel access

1) Establish controls pertinent to each area or structure
a. Authority for access

b. Criteria for access
i. Unit personnel

ii. Visitors

iii. Maintenance personnel

iv. Contractor personnel

v. National guard

vi. Emergency response teams (police, fire, ambulance, and so forth)

2) Identification and control

a. Description of the system to be used in each area. If a badge system is used, a complete description covering all aspects should be used in disseminating requirements for identification and control of personnel conducting business on the installation.

b. Application of the system:
i. Unit personnel

ii. Visitors to restricted areas

iii. Visitors to administrative areas

iv. Vendors, tradesman, and so forth

v. Contractor personnel

vi. Maintenance or support personnel

vii. Fail-safe procedures during power outages
B. Material control
1) Incoming

a. Requirements for admission of material and supplies

b. Search and inspection of material for possible sabotage hazards

c. Special controls on delivery of supplies or personal shipments in restricted areas

2) Outgoing

a. Documentation required.

b. Controls
c. Classified shipment not involving nuclear/chemical material.

3) Nuclear/chemical material

a. Controls on movement of warheads/chemicals on the installation.

b. Controls on shipments or movement of training warheads/chemicals.

c. Controls on pickup or delivery of warheads/chemicals outside the installation
C. Vehicle control
1) Policy on search of military and POVs. (See component Access Control regulation for search procedures.)

2) Parking regulations

3) Controls for entrance into restricted and administrative areas

a. Military vehicles

b. Privately Owned Vehicles (POVs)

c. Emergency vehicles

d. Vehicle registration

5. Security aids. Indicate the manner in which the following security aids will be implemented on the installation.
A. Protective barriers

1) Definition
2) Fences

3) Clear zones

4) Signs
a. Types

b. Posting

5) Gates
a. Location in perimeter

b. Hours of operation

c. Security requirements

d. Lock security

e. Barrier plan for each gate

B. Protective lighting system
1) Use and control

2) Inspection

3) Action taken in case of commercial power failure

4) Action taken in case of failure of alternate power source
C. Emergency lighting system
1) Stationary
2) Portable

D. IDSs

1) Security classification

2) Inspection

3) Use and monitoring

4) Actions to be taken in case of alarm conditions

5) Maintenance

6) Alarm logs or registers

7) Tamper-proof provisions

8) Monitor panel locations

E. Communications
1) Locations

2) Use

3) Tests

4) Authentication procedures
F. Security forces. General instructions that would apply to all security force personnel (fixed and mobile). Detailed instructions such as special orders and SOP information should be attached as annexes. Security force facets include:
1) Composition and organization of the force.

2) Tour of duty.

3) Essential posts and routes.

4) Weapons and equipment.

5) Training.

6) Use of MWD teams.

7) Method of challenging with signs and countersigns.

8) Alert forces:
a. Composition

b. Mission

c. Weapons and equipment

d. Location

e. Deployment concept
G. Contingency plans. Required actions in response to various emergency situations. Detailed plans for situations (counterterrorism, bomb threats, hostage negotiations, disaster, fire, and so forth) should be attached as annexes.
1) Individual actions.

2) Alert force actions.

3) Security force actions.

H. Use of air surveillance.

I. Coordinating instructions. Matters that require coordination with other military and civil agencies such as:

1) Adjacent installations or units

2) State and local agencies
a. Local county/city police

b. Sheriff’s Office

c. State Police (Troops A, B, etc.)

3) Federal Agencies
a. Federal Bureau of Investigation

b. U.S. Marshal

c. U.S. Forestry Service

d. Drug Enforcement Administration

e. Immigration and Naturalization Service

4) Similar host country agencies
NOTE: The coordination/interaction allows for an exchange of intelligence information on security measures being used, contingency plans, and any other information to enhance local security. On an installation, the host activity shall assume responsibility for coordinating physical security efforts of all tenants, regardless of the components represented, as outlined in the support agreements and the host-activity security plan. Applicable provisions shall be included in, or be an appendix to, the support agreement. A formal agreement will contain definite assignment of physical security responsibility for the items stored. The agreement should address:

Maximum quantities to be stored

Physical safeguards to be used
Frequency of and responsibility for physical inventories or reconciliations

Reporting of losses for investigation

Lock and key control
The unit that has overall responsibility
NOTE: Procedures for authorization and identification of individuals to receipt for and physically take custody of XXXX (installation/unit/facility name) property. The purpose of such coordination is protection in depth. Authority, jurisdiction, and responsibility must be set forth in a manner that ensures protection and avoids duplication of effort.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX A. REFERENCES

This annex provides a list of DoD or Component-specific directives, regulations, instructions, manuals, etc. that apply to the physical security of the installation or facility.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX B. INSTALLATION THREAT STATEMENT

This annex provides current intelligence pertaining to terrorist, criminal, civil disturbance, and other threats to the security of personnel and property at the installation or facility.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX C. Terrorist Counteraction Plan

This annex provides the immediate response by the local community and installation collectively, in the event of a terrorist attack. This is normally a joint document, which allocates critical resources, and outlines each agency duties and responsibilities. Additionally, routine exercises are performed to for readiness and evaluation.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX D. BOMB THREAT PLAN

This annex provides a bomb threat plan, including as a minimum, guidance for:

Control of the operation

Evacuation

Search

Finding the bomb or suspected bomb

Disposal

Detonation and damage control

Control of publicity

After-action report

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX E. INSTALLATION CLOSURE PLAN

This annex addresses an installation closure plan, which identifies contingency road closings and restriction of movement within specific areas of the installation. The inclusion of this annex must be coordinated with local and state law enforcement activities.

NOTE: Typically the PSP is coordinated with federal agencies which support the installation. However, signed agreements normally are in the form of Memorandums of Agreement or Understanding.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX F. NATURAL DISASTER PLAN

This annex is comprised of a natural-disaster plan that has been coordinated with natural disaster plans of local jurisdictions. At a minimum, the natural disaster plan should provide guidance for:
Control of the operation

Evacuation
Communications

Control of publicity

An after-action report

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX G. CIVIL DISTURBANCE PLAN

This annex consists of the civil disturbance plan and is formulated by the commander based on local threats. (For example, commanders of chemical facilities should anticipate the need to develop crowd control procedures to handle anti-chemical demonstrations.)

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX H. WORK-STOPPAGE PLAN

This annex identifies a work-stoppage plan. This is a requirement for conducting a physical security survey to determine the impact of a decrease in the installations work force. A work-stoppage plan includes additional physical security considerations regarding the activity involved (such as modified or alternate staffing considerations) and the area directly surrounding critical infrastructures and critical assets. This annex should include provisions for increased access and entry controls measures if the situation warrants.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX I. RESOURCE PLAN

This annex addresses a resource plan to meet the minimum essential physical security needs (equipment, money, and personnel, etc.) for the installation or activity.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX J. COMMUNICATION PLAN

This annex identifies all the specific communication systems or networks used at the installation and the infrastructure to support command and control. Typically system configurations, and geographical location of significant equipment is identified in detail. The communications plan should address all communication requirements such as; encryption, line monitoring, shared networks, wireless, cellular, mobile radio, loss of communication, call signs, brevity codes, and routine maintenance actions.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX K. Intrusion Detection Systems (IDS)

This annex outlines procedures and policies for the effective and economical operation of government owned Intrusion Detection System (IDS) on the installation. This annex normally include test and certification plans, maintenance, alarm rates (false/nuisance), emergency contacts, types of sensors, accessing and arming structures.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX L. High Risk Personnel (HRP) Security

This annex outlines procedures for providing minimal level security for HRP residing and working on the installation or facility and for visiting dignitaries. HRP are those who are more likely to be terrorist or criminal targets because of their grade, assignment, symbolic value, vulnerabilities, location, or specific threat.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX M. Motor Pool Security

This annex outlines how motor pools will be protected including rules for Privately Owned Vehicle (POV) storage, fuel tankers, and contractor vehicles.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX N. CONTINGENCY PLANS

This annex identifies a contingency plan to be used in situations where the commander determines an increase in physical security measures and procedures are necessary. In most instances, it will be necessary to increase security for AA&E and other sensitive property, assets, and facilities during periods of natural disasters, natural emergencies, or increased threat from terrorists or criminal elements. Other contingencies that may require an increase in physical security measures and procedures include hostage negotiations, protective services, and special reaction teams. These provisions should be designed for early detection of an attempted intrusion, theft, or interruption of normal security conditions.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX O, POST ORDERS

This annex outlines the post orders that establish roles and responsibilities at individual posts at an installation or activity.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX P, DESIGNATED RESTRICTED AREAS

This annex includes a listing of all designated restricted/controlled areas on the installation or facility.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX Q, INSTALLATION MISSION ESSENTIAL OR VULNERABLE AREAS (MEVAs)

This annex includes a list of all mission essential vulnerable areas (MEVAs) on the installation or facility.

Map Reference

Copy No.___________

Issuing Headquarters

Place of Issue

Date of Issue

ANNEX R, Maps of THE INSTALLATION OR FACILITY

This annex includes the maps and map keys for the installation or facility.

GLOSSARY

This annex spells out any acronyms used in this physical security plan.

CHECK LIST WHEN YOU RECEIVE A BOMB THREAT

Time and Date Reported___________________________________________

How Reported___________________________________________________

Exact Words of Caller_____________________________________________

Questions to Ask:

1. When is bomb going to explode? __________________________________

2. Where is bomb right now? _______________________________________

3. What kind of bomb is it? _________________________________________

4. What does it look like? __________________________________________

5. Why did you place the bomb?_____________________________________

6. From where are you calling? _____________________________________

7. Description of Callers Voice: _____________________________________

Male ___Female ___Young ____Middle Age _____Old _______Accent ______

Tone of Voice ____________________________________________________

Background Noise ________________________________________________

Is Voice Familiar _________? If so, who did it sound like? ________________

Other characteristics ______________________________________________

Time Caller Hung Up ________ Remarks _________________________

Immediately notify your supervisor, then the police desk sergeant. Keep this list with you.

FOR TRAINING PURPOSES ONLY

Center for Development of Security Excellence

February 2013
1 of 1

FOR TRAINING PURPOSES ONLY

Center for Development of Security Excellence

February 2013
25 of 25 Example Security Plan

Section 1

PURPOSE:
This Security Plan constitutes the “Standard Operating Procedures” relating to physical, cyber, and
procedural security for all (Utility) hydro projects. It contains a comprehensive overview of the
(Utility)’s security program, and in some sections, makes reference to other relevant plans and
procedures. Security personnel, operators, and selected hydro personnel shall be familiar with the
information and procedures associated with this Security Plan.

Distribution: A copy of this plan shall reside in each of the following locations:

> Headquarters Security Operations Center
> Hydro Project Control Rooms
> Systems Operations Center
> Emergency Action Plan Manager
> Plant Managers
> General Counsel (Legal)
> Chief Risk Officer

Revision Date: April 29, 2010

Section 2

SITE MAPS:
These site maps reveal the restricted areas of each hydro project, as well as the physical security
layouts that protect such areas. The measures listed below are incorporated into the security layouts,
and shall be utilized to control and enforce access to the restricted areas:

Guard posts (with barriers and “Tiger Teeth”) – located at each access point
Placement of fencing, locked gates, barricades, and signage
Placement of signage and buoy lines – upstream and downstream of dam
Electronic Access – Identification/access badges issued to employees and approved

contractors. Doors and barrier arms can be activated by: 1) employee displaying access
badge, or 2) operated by on-site guard, or 3) operated remotely from Security Operations
Center.

“Hydro Access Request” – screening process for contractors and visitors
Security camera monitoring – 1) Security staff (Security Operations Center), 2) control room

operators, 3) Systems Operations Center personnel, 4) Regional dispatch center for
law enforcement and fire services, and 5) the State Patrol.

Intrusion alarm monitoring – 1) Alarm Central (contracted monitoring agency), 2) Security staff
(Security Operations Center)

Contracted guards — inspection patrols
Law enforcement – observation patrols

Section 3

HYDRO

PROJECT Critical
Physical Dam Related
Assets

E
xt

e
rn

a
l a

cc
e
ss

P
h
ys

ic
a
l S

e
cu

ri
ty

D
e
te

ct
io

n

D
e
la

y

R
e
sp

o
n
se

R
e
sp

o
n
se

T
im

e

A
ss

e
ss

m
e
n
t
(e

xt
e
rn

a
l)

A
ss

e
ss

m
e
n
t
(i
n
te

rn
a
l)

S
e
cu

ri
ty

A
ss

e
ss

m
e
n
t

S
e
cu

ri
ty

P
la

n

C
yb

e
r

S
e
cu

ri
ty

Dam (Structure)

Spill Gates/Controls

Intake Units

Transformers

Powerhouse

Generator Floor

Control Room

Switchyard

Transmission

Abutments

Fishway Structure
Penetrations

Irrigation Structure
Penetrations

Recreation Structure
Penetration

Visitor Center

Maintenance Galleries

Domestic Water

HazMat storage

CPME

CDP&R

Section 4

SECURITY SYSTEMS:

The (Utility) utilizes a number of security systems designed to help fulfill its security
mission. These systems complement the policies, procedures, and measures that form
the (Utility)’s robust security program.

The (Utility)’s security systems include:

1. Fencing & Gates

Fencing is the first layer of security at all of our Hydro projects,
Transmission/Distribution points, and (Utility) facilities. The (Utility) has standardized
on 8-foot fencing, using tension wire in lieu of bars, placing fence barbs up, and
securing the bottom of the fencing below grade. Access points/gates are secured
through one of the following methods: Manually opened and secured with a heavy
duty (Utility) approved pad lock, electronically accessed with card credential, or
electronically accessed with remote gate fob. All perimeters and access points are
monitored 24/7 by CCTV or contracted security guards.

2. Exterior Lighting

Exterior lighting has been strategically placed throughout the (Utility) to emphasize
and highlight perimeters, gate and Guard Post access points, entry points into
buildings, and areas of interest. Lighting can be activated by motion or photo-cell.
Exterior lighting serves as a deterrent, as well as to aid in monitoring of the (Utility)’s
CCTV system.

3. CCTV

The (Utility) has deployed over 100 CCTV cameras throughout the county. These
cameras have Pan/Tilt/Zoom (PTZ) capabilities, and are strategically placed
throughout the projects. Via our unique Fiber Optic infrastructure, these camera
signals are sent back centrally to the (Utility)’s headquarters office where they are
recorded 24/7. From this central point, Security has the ability to monitor and control
all cameras. In addition, Security shares control and monitoring of these cameras
with the Hydro projects, System Operations (Dispatch), Engineering staff, as well as
three local law enforcement agencies and Regional Dispatch Center. This CCTV
system is monitored 24/7.

4. Electronic Access Control

The (Utility) utilizes a comprehensive Electronic Access Control system, which has
been installed throughout the projects and facilities. These card access points
secure doors to buildings, access gates, and barrier arms. Through this technology,
Security is able to effectively track and control access. Each employee and
contractor is required to wear an identification/access badge which is individually
tailored for specific access. The (Utility) has also installed a CIP-specific Electronic
Access Control system which ensures restricted access to Critical Cyber Asset
areas. These Electronic Access Control systems are monitored 24/7.

5. Intrusion alarms

Intrusion alarms are utilized throughout the (Utility). These alarms serve two
important functions:

Provide 24/7 monitoring in remote locations where staff is not always present.
Installed in all CIP-designated spaces.

The alarm sensors include door/window contacts, motion detection, and glass break.
These Intrusion alarm systems are monitored 24/7.

6. Security Guards

The (Utility) contracts the services of a private security company. Guards are
stationed at the Hydro Projects. Additionally, “patrol” guards are assigned to conduct
security checks of the (Utility)’s properties — including the hydro projects.

7. Law Enforcement Support

The (Utility) has developed strong partnerships with the local law enforcement
agencies. These agencies support the (Utility)’s security mission through
collaborative training & exercises, observation patrols, response to incidents, and
proactive meetings.

(UTILITY) Closed Circuit Television (CCTV)

CCTV cameras, controls and monitoring have been upgraded and expanded to
increase critical infrastructure protection and to:

Provide enhanced security and safety at (Utility) facilities;
Provide operational viewing of (Utility) projects;
Provide safety alerts or response to a major event.
Provide emergency responders with video coverage (where available) of

critical incidents.

Use of (Utility) CCTV is appropriate for security, safety, operational and/or
emergency responses.

Use of (Utility) CCTV is not appropriate for monitoring or assessing employee
productivity.

Use of (Utility) CCTV is not appropriate for monitoring, without cause, the
legitimate behavior or personal conduct of an individual or group of
individuals.

General Information:
(Utility) cameras are viewed, controlled and/or recorded at:

1. 911 Regional Dispatch Center 24/7
(only the cameras being actually viewed on ‘s three monitors)

2. State Patrol Regional Dispatch Office 24/7
(only the cameras being actually viewed on WSP’s three monitors)

3. Hydro project control rooms (Operators) 24/7
4. County Emergency Management Office

(only the cameras being actually viewed on CCEM’s monitor)

5. (UTILITY) Security Offices 24/7 / 3rd floor Comm Room (HQ)
(Utility) Cameras may be viewed and controlled, but not recorded, at:

6. (UTILITY) System Operation Control (Dispatch) 24/7 and Back-Up
Control Center

7. Distribution Crew Dispatch Office (HQ)
8. Hydro Plant Operations Offices (5th floor)
9. Visitor Center, Deputy Station, CM Conf Room

10. Engineering Services Conference Room
11. Fleet Services / T&D Operations / Tech Shop
12. HQ Operations Exec Office

Section 5

MAINTENANCE & TESTING:
The (Utility)’s security systems and equipment shall be properly maintained and tested in order to
ensure its continuous and effective operation.

Maintenance is performed in accordance with the manufacturer’s recommendations and
guidance.

Whenever feasible, Maximo (computer program) is used to schedule and track routine
maintenance.

Routine maintenance is performed by a trained group of (Utility) employees who possess the
necessary levels of mechanical and technical competence. These individuals are substantially
assigned to one of the following work areas: Maintenance Department, Technician Shop,
Facilities Department, and Security Division.

Reference: The Security Division maintains a separate, comprehensive plan in accordance
with NERC Standard CIP-006-2, Physical Security Program for the Protection of Critical
Cyber Assets. Maintenance and testing (R8) is described in this plan.

The (Utility)’s Maintenance and Testing Program is consistent with FERC guidelines.

Section 6

(Utility) Issued Keys:

Purpose

This policy is to be used as a reference when issuing keys within the (Utility). It will also
explain our policy for returning keys, reporting lost or stolen keys, the use of unauthorized
duplicate keys and loaned keys.

The key system will be entered into the computer-based Key Control Program for on-going
maintenance and will be maintained by the Key Administrator. The Facilities Department
will program cores and cut keys, and the Key Administrator will issue keys.

1. Issuing Authority – Keys will be authorized in writing for issuance to employees of the
(Utility) by one of the following individuals:

a) General Manager

b) Executive Managers or their designees

c) Department Directors or their designees

If keys are requested from one Business Group that would access another Business
Group, written approval will be required from Directors of each unit.

All approvals will be routed through the Key Administrator. Only in an emergency will a
key be issued by Building Maintenance Foreman without the Key Administrator’s prior
knowledge, and it will require the approval of a Department Director. When a key is
issued under these circumstances, the Building Maintenance Foreman will notify the
Key Administrator as soon as possible.

2. Who is authorized to have specific keys – Access will be given only to areas where need
can be demonstrated.

3. Keys will not be loaned and should not be left unattended – All keys issued on a
“permanent” basis should be retained in the possession of the person to whom issued.
Keys may not be transferred directly from one employee to another. Avoid the practice
of leaving keys on desks, counter tops, etc, or loaning to others.

4. Lost/Stolen Keys – Any person losing a key must report the loss to his or her
superintendent/supervisor immediately, who will then report the loss to the Key
Administrator. The Security Department along with the Facilities Department will
make a determination as to whether the system has been compromised and if a core
change is necessary. If a core change is required, that expense will be borne by the
department that misplaced the key.

5. Examples of Estimated Core Change Costs

a) $2,500 – To re-key the substation master

(Utility) Keys are valuable and should be safeguarded accordingly. Changing keys/cores
includes labor, travel time, and materials and requires rescheduling of resources.

6. Duplicated keys – It is against (Utility) policy to duplicate keys.

KEY CHECK-OUT PROCEDURES

To maintain consistency and provide predictability, specific checkout procedures shall be
followed:

1. Temporary key checkout – Temporary key checkout shall be for a period of 24 hours or
less. Any authorized individual will be permitted to check out a key on a temporary
basis. The Department Director or his designee shall grant authorization in writing. The
individual receiving a temporary key shall provide photo identification at the time of key
checkout, upon request. Keys checked out on a temporary basis shall be returned within
the 24-hour period. If the individual needs the key for a longer period of time, the key will
be checked in and subsequently checked out again.

2. Temporary-loan keys – Vendors and contractors may be authorized to have temporary-
loan keys. A Department Director or his designee may authorize in writing the use of
temporary loan keys only through the use of the attached temporary-loan key
authorization form. Vendors/Contractors will acknowledge all keys received and report
all lost or stolen keys immediately. Vendor/Contractor will return all keys within five days
of termination of work. If keys are not returned within five day