get started? Answer: before starting, you should have some
training. Contact YOUR Systems Manager to obtain the proper privileges
and training.
access the manual?
Answer: Just below the banner you will see a number of links
listed horizontally. The first link is "Main Menu", the second is
"My Preferences" and the third is "System Manual". Single click on
the "System Manual" link and the program will take you to our website
where the manual is stored. The manual is constantly being refined,
modified and enhanced to provide information in a manner consistent with
the content of the program and newly added features.
get my USERS logged in.
Answer: when the program firs starts,
it prompts for USER ID and Password. The USER ID is always the entire
email address of the user (i.e.
jdoeks@mail.ukb.edu) The Password is chosen by the user or assigned
by the Systems Administrator. The password may be changed at anytime by
the user. Additionally, the Systems Manager may send you your password
from the PEOPLE portion of the program.
move around within the program.
Answer: by single clicking on
links within the program. Because you are in a web-accessed database,
SINGLE CLICKS are used...instead of double-clicking.
add a person to the Personnel Group.
Answer: Adding individuals to a group is
typically a Systems Managers function. Start by
clicking on the People link in the main menu bar. Search for the
person from the search screen (the last four individuals you accessed
will also be shown in a submenu bar for more rapid information
recovery). Click on the person you want to work with. Now
click on the Access Group link; and you will be able to add or delete
access from this screen.
issue a key.
Answer: start by clicking on the Key
Issue item in the left hand column of this page.
setup another Key Issue location.
Answer: Start by clicking
on the Multiple Key Issue item in the left hand column of this page.
NOTE: each site is licensed independently, you may need to purchase
additional licenses.
create a NEW key.
Answer: Start by clicking on the Lockshop
item in the left hand column of this page. You may create individual
keys, or create entire masterkey systems from the Lockshop section of the
program.
delete a key.
Answer: Keys
(or more precisely, a Key ID or Blindcode) may not be deleted from your
system once they are entered. If you have made a typo, simply edit
the information and correct your error.
create a NEW
Masterkey System.
Answer: Start by clicking on
the KeyNET link in the main menu bar of the browser. You may create
entire masterkey systems from the KeyNET sub menu bar by clicking on the
MK Create link.
(Batch Generation)
section of the program. Follow the field information provided to
create the type of masterkey system you need.
find out to whom a key is issued?
Answer: Start by clicking on the KeyNET
link in the main menu bar. Search for the blindcode or KeyID that
is stamped on the key, and click search. Click on the blue
blindcode that shown on your screen. Now, click on inventory, and
a list of all keys created under this blindcode or KeyID will be
displayed. The person to whom the key is issued will be listed on
the same line with the sequence number or the issue number.
find out who has
keys issued by Department? Answer:
Start by going to Key Search. Select the area called “Find Keys by
Location”. Set the records to display to “ALL”. Select the
Department you want the display for from the drop-down menu.
Select TRACE.
use the email in KeyNET?
Answer: Simply click on a "Notify" or individual email link and
KeyNET will initialized an email via your default email program in your
browser. The initialization is made to the "default email" program
which is associated with the browser on accessing computer. There is
no email system in KeyNET. Most viruses and worms are obtained
through email programs so that is not available from the KeyNET
proprietary server. Instead, KeyNET will initialize an email from
inside the program.
Where can I find
... ?
an example of a Key Control Policy?
There are many Key Control policies posted on the
internet. Spectrum Group recommends caution and due
diligence when creating a Key Control Policy. For your convenience
we have posted a copy of a Key Control Policy we found on the internet.
It is simple, straight forward and easy to follow. Spectrum Group
makes no recommendations as to its applicability, completeness, accuracy
or thoroughness. But, we do provide it as a good starting point or
boiler plate for developing you own Key Control Policy. Click
here
to view the Graduate Centers Key Control Policy.
Back
to Top
Why doesn't ... ?
Back
to Top
Who is ... ?
Back
to Top
What
is ...
Back
to Top