Note: This is article is not a primer for key control policies and procedures. 

I don’t proclaim to be an expert on key control policies or procedures but I have created a few from scratch. Maybe that has taught me just enough to be dangerous. Be that as it may, I’m not going to teach you how to draft a key control policy. I’m going to show you how to reference other key control policies to help you craft your own key control policy. If you already have a key control policy you can still utilize this information to evaluate your key control program by comparing it to what your peers are doing.

Key Control Policy Resources

The first resource is ASSA ABLOY’s Key Control Guide: Developing & Managing Key Control Policies and Procedures. According to it’s introduction it “represents hundreds of years of best practices developed and observed by providing the world’s finest key systems.” The Key Control Guide contains a sample key control policy and a sample key request form. It also contains specific application guidelines for areas such as educational K-12, healthcare, colleges and universities, and general office buildings. Whether drafting or updating a key control policy, you can learn a lot from ASSA ABLOY’s Key Control Guide.

The second resource is actually multiple. One of the most important characteristics of an effective key control policy is that it is readily available to those who are required to adhere to it. This is usually accomplished by making key control policies available online, such as on a college/universities’ website. There are dozens of these key control policies available online. Simply search “key control policy” or “key control procedures” followed by either a pdf or .doc file type extension. For example, use the search phrase “key control policy pdf”. Here are a few results of that search string:

Key control policies aren’t the only key control resource available to you. You can also reference other key/credential request forms:

I utilized other key control policies when I wrote my first for an institution; it was invaluable. Whether writing your first, or 3rd, or just seeing how it compares to your peers, publicly available key control policies are great resources.