top of page

Security Begins with Key Control

The purpose of a Key Management Policy is to help protect the life, property, and security of the facility and all its occupants. 

minute key.png
key me menards.JPG

"Do Not Duplicate" Keys

  Many common keys carry warnings such as "Do Not Duplicate" or "Restricted", but these words have no impact in preventing unauthorized key duplication. Box retailer kiosks and KeyMe apps allow anyone in possession of a key to your facility to have them duplicated without your knowledge or authorizaiton. 

 We offer a variety of different types of patented protected keys such as Assa, Medeco and Schlage Primus.

Only facility-approved locksmiths shall be permitted to cut keys and authorized agents of the facility are allowed to request keys.  


Key System Design

  Planning who has access to what area of a building requires careful consideration. Balancing building security while balancing personal convenience.

  Ultimately factoring in Maximum Security and Maximum Convenience. 

Levels of keying.JPG

  Think of it as levels of authority in an organization. All systems should have a structure like that of a corporate organizational chart. 

 Typically, these would be departments, buildings or geographic areas. 


2-Level System

  The simplest master key system has two levels of keying and is considered the lowest level of master keying. The less powerful keys at the bottom are called change keys. Each one operates only one lock or one group of keyed-alike locks. The more powerful key at the top is called the master key. 


Russell Security has the knowledge and experience to offer solutions to help you implement a new master key system, or expand an existing one.


Give us a call today to see how we can help you protect the life, property, and security of your facility and all its occupants!

bottom of page