Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Library Key and Access Procedures

The Library Online Access Request Form

These key and access procedures are intended for all partner organizations and employees of the Valley Library. These procedures are made publicly accessible.

...

In order to ensure proper security of the building, it is possible that locks may have to be replaced if keys to those areas are lost.  The employee who signs for these keys takes on the responsibility for maintaining control of them, and may be held liable for the costs associated with re-keying those locks which the key opened.  The relevant university policy for this rule is the Campus Facilities and Grounds Manual, policy 007-13: Building Key Control.

The act of loaning or transferring keys to another individual is prohibited.  Keys are intended for individual use. It is the responsibility of the individual to maintain their key, and to turn it in to the Building Manager when their position changes or they are no longer working in the Valley Library.  Requests for keys can only be approved by the University Librarian or her designee.

...

2.       Once all responsible parties have signed the access request form, the Building Manager will:

...

4.       It is the employee’s responsibility to go to the key shop and ID center to get their key and ID.  The employee will receive a notification from the key shop when their keys are ready.

...

An employee might need a new key for a variety of reasons – they might change offices or change responsibilities.  Either way, it is the supervisor’s responsibility to initiate an access request form for the employee.  The Building Manager will notify the employee receiving the key when their request has been approved and they will receive an e-mail from the key shop when their new keys are ready to be picked up.  The employee will turn in their key at the time they pick up their new key. If no key is being turned in, then that will be annotated on the access request form.

...