Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
slider Clemson 1

Clemson consolodates, updates access control

University unifies fragmented access systems, moves away from prox

CampusIDNews Staff   ||   Dec 15, 2017  ||   ,

At Clemson University, the TigerOne card office’s latest endeavor is creating a new access control system, a pursuit that began in 2012. Steve Robbins, the Executive Director of the TigerOne card office, and Matthew Tegen, the Director of Systems for the TigerOne card office, presented their project and discussed what they wanted to accomplish, the current status of their project, and what they have learned so far.

During a presentation given at NACCU 2017, the pair discussed the highlights and major components of the project at Clemson.

One of the goals of the project was combining four different access systems that have in place for over twenty years: Picture Perfect, Secure Perfect, Von Duprin, and Onity. Having multiple systems in place simultaneously presented certain security and safety risks, and all four systems leveraged either magnetic stripe or prox technology. “Safety is the driver – everything else takes a backseat to that. Safety is the justification for everything,” Tegen says.

Having multiple systems presented safety issues. For example, if the police have access to two or three systems and don’t have access to the fourth system, it can be a potential public safety threat if authorities can't quickly access a building.

Manual data entry posed another risk. Two of the systems, Von Duprin and Onity, leveraged the comparably less secure magnetic stripe, while Picture Perfect and Secure Perfect leverage prox. Clemson was also seeking to remove outdated systems and move toward card encryption to prevent copying. Picture Perfect was no longer receiving security updates and the IT department didn’t feel comfortable using it.

One of the first steps in the security overhaul was to determine the stakeholders in the project. One of the major stakeholders are building security coordinators.

At Clemson, each building is assigned a building security coordinator who in turn has control over cardholder groups, sets schedules on doors, controls buildings' security systems, and decides who receives access privileges. Department system administrators, the departments, students, and faculty, were also crucial stakeholders.

Determining project goals

Once Robbins and Tegen finished defining what their project was in their project charter, they needed to create an outline and requirements for it. For this, the steering committee helped identify members for a project team that included a total of twenty people from the campus police department, academics, IT, facilities and the financial department.

“We tried to turn over every stone there was of key stakeholders and identify the essential areas that needed to be represented,” Robbins says.

Together, they created the details for the requirements of their access control system, developed a policy for the access control system, and made budget projections.

Pages: 1 2

Subscribe to our weekly newsletter

RECENT ARTICLES

Tatiana Tomley, Secanda video interview
May 21, 26 / , ,

Inside SECANDA’s approach to modern campus identity and mobile access

In this episode of CampusIDNews Chats, Tatiana Tomley, Marketing and Business Development Manager for SECANDA, discusses the company’s expansion into North America and explains how its flexible campus identity platform supports both traditional cards and mobile credentials. Building a flexible approach to campus identity Tomley explains that while SECANDA may be newer to the US […]
Warning message from hackers to Canvas users
May 19, 26 / ,

Student ID numbers exposed in Canvas cyberattack

Canvas, a learning management system used by schools and universities worldwide, fell victim to a major cyberattack that disrupted access for millions of students during finals week. Students and educators across North America suddenly found themselves unable to access assignments, exams, grades, and course communication at one of the busiest times of the semester. The […]
illustration of hand holding phone

Your Campus Went Mobile. Now What?

The first wave of mobile credential adoption is behind many institutions. Mobile IDs are live, students are tapping their phones at residence hall doors, and card offices are fielding fewer walk-ins during orientation. But for many campuses, that progress has stalled at the door. The broader campus ecosystem – dining, recreation, printing, events, administrative systems […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Great inverview on the Public Key Open Credential (PKOC) standard with ELATEC's Jason Ouellette, Chairman of the Board for the @PSIAlliance.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2026 CampusIDNews. All rights reserved.