Morse Watchmans Blog

Key Control in a Gaming Environment

Fernando Pires September 29, 2010
Fernando Pires

Casinos are in the business of gambling, but the one thing they do not gamble on is security. Gaming enterprises are a showpiece for state of the art security and surveillance technology, ranging from high tech megapixel cameras to analytic software to access and man-trap control systems. The same attention to detail and level of sophisticated technology is also evident in securing mechanical keys, access cards and other valuable items with the use of key control and management systems.

Gaming regulations dictate how tables, count rooms and other high risk areas are required to be monitored and secured. To further enhance these strict measures, security management can add key control systems to secure and restrict access to keys that are used to open cash drawers or cabinets used for storing chips, game cards, dice and other items.

Key control and key management systems are ideal for providing this added layer of security for a number of reasons. First, keys placed in a key control cabinet are secured with special, tamper-proof stainless steel key locking ringsfor additional security and functionality. Different colors of the fobs allow the keys to be organized by group and illuminated key slots also make the process of finding and returning keys faster and easier.

Second, keys stored in a computerized key bank or cabinet can be accessed only by authorized individuals with an approved user code, an access identification card or a pre-registered biometric fingerprint. Security management can establish permission levels for every user and when the system is connected to the network, management can immediately make any necessary changes.

Knowing who took which key and when is also fundamental to a key control strategy. This audit trail provides critical data of every user who accesses the system and at any time security management can view who has keys out or who has had keys out and when. Systems can even be programmed to send e-mail alerts when keys are not returned on schedule. The additional use of software can provide more complete activity reports or sort the data based on defined criteria for more comprehensive analysis and control.

Topics: Blog