Systems and Procedures
A Division of The Corporate Controller's Office
IN

Procedure SY2001 - University Access: Clearances, Keys and Access Devices; Authorization, Issuance, and Fees

University Policy & Public Safety

Policy Steward facilitating procedure: Assistant Vice President- Police & Public Safety

Table of Contents:


GENERAL:

Policy AD68 - University Access Policy, has been established “to protect the safety, security, privacy and property of the University, and of individuals assigned to use University facilities, by controlling access to such facilities.“ As used in this procedure, the term "University access" refers to the process involving the issuance and control of clearances, keys and other access devices which allow access to / within a facility owned, leased, and/or under the control of The Pennsylvania State University.

NOTE: Keys other than those defined herein (such as equipment locks, desk, computer or cabinet keys, etc.) are not covered under this procedure. These devices fall under locally established guidelines.

This procedure applies to all facilities owned, leased by, and/or under the control of The Pennsylvania State University, excluding Hershey Medical Center, the College of Medicine, and the Pennsylvania College of Technology. Protocol for residence and food service facilities access, including student rooms and apartments in University residence facilities, will be governed by the "Housing and Food Services Policies and Procedures for Key/Card Access," and as stated in the Terms, Conditions and Regulations of the Housing and Food Service Contract or Lease.

Enforcement of Policy AD68 and this procedure is the responsibility of the University Police and Public Safety. This procedure will be implemented through an Access Coordinator in each college, department or area (at University Park), and at each campus.

Any exceptions or variances from this procedure must be approved by Deputy Director of Operations-University Police and the Director of Physical Security, in conjunction with the appropriate Budget Executive.

This procedure provides guidance on the responsibilities and the controls necessary to administer all aspects of University access control in accordance with AD68.

DEFINITIONS

The following definitions are pertinent to University access, as discussed in this procedure and its related policies and forms:

PROCEDURE:

ESTABLISHMENT / AUTHORIZATION OF THE ACCESS COORDINATOR POSITION

General

An Access Coordinator must be a full-time staff member. To effectively perform their duties, it is essential that they become knowledgeable of pertinent University policies and procedures, as well as the programs and personnel at their campus, college, department or area, particularly as these details pertain to “access” to their area of jurisdiction. The goal is to ensure that keys, access devices and/or clearances are issued to individuals only for the areas to which these individuals are authorized to enter.

Area managers/supervisors and employees will be responsible for working with the Access Coordinator to request access and changes to access, when needed. It is the responsibility of the Access Coordinator to maintain systematic and effective control of all keys, access devices and/or clearances for the rooms and/or buildings under their jurisdiction.

NOTE: While job profile descriptions may vary throughout the University, the “role” of an Access Coordinator shall be applicable to those positions whose responsibilities include duties described in Policy AD68 and this procedure. As such, those individuals are bound to perform their duties within the parameters of policy AD68 and this procedure. These duties may include (but are not limited to) recordkeeping, coordination, and oversight duties.

Authorization

Each Budget Executive or Budget Administrator shall appoint an Access Coordinator for the campus, college, department or area, as appropriate, via the completion of an Access Coordinator Authorization Form. Once properly completed and forwarded to the University Access Controller, the Access Coordinator may commence with their duties, as specified below.

DUTIES OF THE ACCESS COORDINATOR

Establishing and Recording Departmental Key and ACD Inventories (Individual Keys, ACD's)

Keys

Keys already on hand must be recorded for proper accountability and control (see “Recording Inventory,” below). New keys, when needed, will be obtained using the Key Management System (KMS, at University Park) or through the appropriate University Approved Locksmith (at campus locations), then recorded.

ACD's

Access Coordinators may request to maintain a supply of access credential devices (“ACD's,” such as key cards, fobs or tags) for issue upon proper authorization. Such requests are to be made through the University Access Controller.

Storage

Any Access Coordinator that maintains a supply of keys and/or ACD's for issuance shall secure and maintain them in a lockable cabinet. Inventory supplies should be kept to a minimum. Any issuance from this supply, permanent or temporary, must be documented in the perpetual key/access device inventory system being maintained.

Recording Inventory

Recording Inventory- It is the responsibility of the Access Coordinator to promptly record all key/ACD activity (inventory being held, issuance dates, return dates, names and pertinent information) into their perpetual inventory system (database, excel spreadsheet, manual system). A perpetual inventory record may be used.

NOTE: Keys and/or ACD's for leased properties are managed through the Division of Facilities Resources and Planning, Temporary issuances are handled by the Work Reception Center. These requests are not processed through the University Police / University Access Controller.

Processing Access, Key and ACD Requests

General

The Access Coordinator will ensure that clearances, keys, and/or ACD's are issued to individuals only for areas to which they have a justifiable need to access. This applies to ALL employee classifications (new hires or existing employees), as well as all non-employees. Requests for clearances, keys and/or ACD's must be made via the process discussed below. No clearance, key or ACD will be issued prior to this process being completed. At no time may an access request bypass the Access Coordinator (or Designee).

Access Coordinators shall utilize current building floor plans and Door Schedules so they may determine the correct level of clearance/key/ACD to issue, and to provide direction on changes to Key and Access Schedules. This information is available/obtainable via the Facilities Information System and selecting “Interactive Blockplan Map,” or by contacting a Facilities Information System staff person.

Requesting Access Using the Facility Access Authorization Request

Access Requests WITHIN the Requestor's Home Administrative Area

Requests for access must be made via completion of a Facility Access Authorization Request form. Such requests are submitted by a “Sponsor,” typically a supervisor or project manager, who is requesting access to a building and/or room on behalf of an employee or a non-employee, as applicable.

The employee or non-employee (as applicable) will be required to agree, as part of this process, to abide by the terms of policy AD68 before access will part of this process, to abide by the terms of policy AD68 before access will be granted. If the employee/non-employee will not agree to abide by policy AD68, access will not be granted.

The Sponsor and Next Level Supervisor (when applicable), will affirm that they concur with the request and have advised the Requestor of policy AD68 by their signature(s) in the “AD68 Advisement Statement” area of the Facility Access Authorization Request.

All properly completed and agreed-upon requests for employees/non-employees will then be routed to the Access Coordinator for review and approval. Additional questions pertaining to the access request may be asked by the Access Coordinator, as necessary. If there are questions about the justification of the request, the Access Coordinator has the right to consult the Sponsor as well as the University Access Controller before approving or rejecting the request.

If, upon review, the request is acceptable, the Access Coordinator will sign and date the form, affirming that they have reviewed the details of the access request and they concur with the request for access. Additionally, they will determine the “type” of access needed, and check the appropriate boxes on the form.

If the request for access is rejected, the Access Coordinator will note the reason on the Facility Access Authorization Request Form and return a copy of the rejected form to the Requestor/Requesting Area. If explanation is lengthy, the Access Coordinator should record the information on the back of the form.

Access Requests OUTSIDE the Requestor's Home Administrative Area

All processing will occur as described above, except:

For access requests that are outside the Requestor's home area, the Requestor's Home Area Access Coordinator must contact the Access Coordinator of the facility to which access is being requested for permission to access the facility. The discussion and decision to grant access (or not grant) must be substantiated through the exchange of a confirming email between the requesting department's Access Coordinator and the Access Coordinator of the facility to which access is being requested. Once granted and confirmed, the requesting department's Access Coordinator will sign and date, affirming that they have reviewed the details of the access request and access permission has been authorized. Additionally, the “type” of access granted will be substantiated by checking the appropriate boxes on the form.

If permission is not granted, the form will be retained as evidence of the decision. Copies of the confirming or denial emails (as applicable) must be retained by the both Access Coordinators involved for proper audit trail.

Issuance of Keys / Activation of ACD's

Approved requests which require the issuance of keys can often be filled from the Access Coordinator’s on-hand supply. However, if circumstances warrant that a new key be made/issued, keys will be requested as specified in “New Key Requests.”

ACD's- Approved requests which require the activation of an ACD (for access to specific areas) will occur via entry of the requestor’s information into the C-CURE System by the Access Coordinator.

Whether approved, non-temporary requests are filled from on-hand inventory, handled as a new key request, or require ACD activation, the Requestor must complete the process as specified below in “Final Processing for All Access Requests” before keys are issued/ACD's are activated.

New Key Requests

At University Park

the unit’s Access Coordinator (or authorized designee) must login into OPP’s Key Management System. The Access Coordinator will complete the request and submit for processing, as specified in “OPP Lock Shop Processing (University Park).”

At Non-University Park Locations

The unit’s Access Coordinator (or authorized designee) will process new key requests as specified in “University-Approved Locksmith Processing (For Non-University Park Locations),“ below.

Final Processing for All Access Requests

Acceptance/ Recordkeeping

Once approved, and prior to receiving the appropriate access device from the requesting department's Access Coordinator, the Requestor must sign and date the “Acceptance” area of the Facility Access Authorization Request Form. In signing the form, the Requestor affirms and agrees to the following:

  1. they have been advised of policy AD68;
  2. are aware of their responsibilities in receiving access; and
  3. by accepting key(s) and/or ACD(s) from the Access Coordinator, agree to comply in full with the terms specified on the form and all related University policies.

Once signed, the Access Coordinator will issue the access devices requested to the Requestor, along with a signed copy of the form. A signed copy of the form will also be issued to the Requestor’s Supervisor. The Access Coordinator must retain the signed, original copy of the form for their records. For access requests OUTSIDE the Requestors home area, a signed copy of the form will be forwarded to the Access Coordinator of the facility being accessed.

Access Changes / Key Returns

In accordance with Policy AD68, when an individual’s access requirements change, the individual will be required to notify their area Access Coordinator and make the appropriate changes, including the return of their keys/ACD's, and/or changes to their access credential clearances, as applicable. These circumstances can include, but are not limited to: (1) access changes in their current area of employment (2) leaving the University (see “When Leaving University Employment”), or (3) accepting employment in a different area of the University. Lost keys/ACD's will be reported to the University Access Controller as specified in “Handling of Lost Keys/ACD's.” Recovery costs will be charged to an individual's department for each lost or unreturned key (including keys to leased properties) and/or access credential devices issued by the University. In addition, recoring costs may also be charged as defined in this procedure. When returned, the Access Coordinator will perform a spot audit of all keys that have been assigned to that individual and update their inventory records in a timely manner. Any discrepancies will be handled per “Handling of Lost Keys/ ACD's.”

Issuing Additional Keys/ACD's

If at any time it becomes necessary for the employee to be issued additional keys or ACD's, a new Facility Access Authorization Request Form must be submitted through the proper channels, as described in “Processing Access, Key and ACD Requests“.

Temporary Issuance of Facility Entrance Keys

An Access Coordinator may issue a Facility Entrance Key to an individual on a temporary basis for a building not equipped with electronic card access, if they determine that an individual needs access to that building after the hours that the building would normally be open. Such issuances must be requested and processed by completing a Facility Access Authorization Request, checking the “Temporary” box and the applicable start and ending dates, along with all other appropriate information requested on the form.

It is the responsibility of the issuing Access Coordinator, on a monthly basis, to audit those keys that are held as temporary. Temporarily-assigned keys may not be issued for periods of longer than 120 days, or until a permanent device can be requested and issued, whichever is the shorter time period.

NOTE: A temporary key cannot be issued to a contractor or outside vendors for use; these groups must go through the proper Project Manager or Department as described in “Access Requests for Contractors and Outside Vendors.”

Handling of Lost Keys/ACD's

Reporting

All lost keys/ACD's must be reported immediately by the key/ACD holder to the Access Coordinator. The Access Coordinator will, in turn, report lost keys/ACD's to the University Police along with a confirming email to the University Access Controller. If the Access Coordinator is unavailable for any reason (e.g., nights, weekends, vacations, holidays), the key/ACD holder must notify the University Police instead. However, the key/ACD holder should follow up with their Access Coordinator when business hours resume, so that the appropriate corrective action can be taken, as specified below.

Temporary Issuance

On a temporary basis, a temporary key/ACD may be issued by completing a Facility Access Authorization Request, checking the “Temporary” box and the applicable start and ending dates, along with all other appropriate information requested on the form. This issuance will be noted accordingly in inventory records maintained by the Access Coordinator.

It is the responsibility of the issuing Access Coordinator, on a monthly basis, to audit those keys that are held as temporary. Temporarily-assigned keys may not be issued for periods of longer than 120 days, or until a permanent device c an be requested and issued, whichever is the shorter time period.

Replacement

If a key/ACD is determined to be “unrecoverable,” the Access Coordinator and key/ACD holder will follow the steps previously described in the “Processing Access, Keys and ACD Requests“ section of this procedure to obtain a replacement key/ACD.

Security Assessment

The Access Coordinator, University Access Controller and responsible budget executive will assess the vulnerability of area(s) compromised by the lost key/ACD to determine the corrective measures needed to restore appropriate access control to the affected area(s).

Associated Cost Recovery

Recovery costs will be charged to an individual's department for each lost or unreturned key (including keys to leased properties) and/or access credential devices issued by the University.

Likewise, If it is determined through the security assessment process that new cores must be installed or access devices must be replaced/reprogrammed, such actions will be undertaken with the recovery costs being charged to the department.

If the area Budget Executive/Budget Administrator so chooses, recovery costs may be passed on to the key/ACD holder.

Leased Properties- The same regulations apply to keys/ACD's issued for leased properties, as specified above.

Key Processing for OPP Personnel

During the orientation process for new OPP trades persons, the individual will be issued the requested keys by the WRC at OPP, in accordance with this procedure and normal OPP standards for new hires.

Key Issuance

Any OPP trades person that has a need to carry more than 15 keys on a ring shall be issued these keys on an approved Key Ring. These keys will be inventoried and listed as a ‘ring’ and a number associated with that ring on the appropriate section of their Facility Access Authorization Request. Any keys that are subsequently removed or added will be reported to their Supervisor and recorded with the WRC. The ring will be the responsibility of the trades person to whom it is assigned to. If shared, the ring will be checked in each night prior to sharing, and the receiving trades person will be responsible for the keys assigned to that ring. Any discrepancies, to include missing keys, evidence of tampering with the sealed ring, etc. must be immediately reported to the supervisor and this information passed on to the WRC.

In the event that any key(s) or key ring is transferred from one individual to another, processing will occur as discussed in “Transfer/Reissue of Keys Between Individuals“.

Transfer/Reissue of Keys Between Individuals

There are situations when a key(s) or key ring must be transferred from one individual to another. Regardless of reason or department involved, whenever the status of an individual changes and the keys are to be re-issued, the area supervisor and Access Coordinator will be responsible for insuring that the proper paperwork is processed and approved in a timely manner. Keys/key rings will be handled in accordance with the following procedure:

In the event that any keys are missing or extra keys are discovered during this process, they will be handled in accordance with “Handling of Lost Keys / ACD's.”

LABELING OF KEYS

Per Policy AD68, “All keys subject to this policy shall be labeled with a unique identifier stamped onto the key. The University Key Management System (or equivalent key management system at non-University Park locations) will be used to maintain a record of each key created and identified to its key holder by this unique identifier. No additional key labeling or tagging of any kind is permitted, unless authorized by the University Access Controller.

REQUESTS FOR GRAND MASTER / BUILDING MASTER / FACILITY PERIMETER KEYS

Grand Master Keys

A Grand Master key may only be requested under exceptional circumstances, by written justification from the Budget Executive to the University Access Controller. Such justification will identify the person to whom the Grand Master key will be issued and the basis for need of such access. If approved by the University Access Controller, the Budget Executive and the area Access Coordinator will be notified. The Access Coordinator will then process the appropriate key request via the Key Management System, as specified in “New Key Requests.”

Building Master Keys

Building Master Keys may only be requested by written justification from the Budget Executive to the University Access Controller. Such justification will identify the person to whom the Building Master key will be issued and the basis for need of such access. If approved by the University Access Controller, the Budget Executive and area Access Coordinators will be notified. The Access Coordinator will then process the appropriate key request via the Key Management System, as specified in “New Key Requests.”

Facility Perimeter Keys

These keys are only kept in the possession of the Work Reception Center at OPP and the University Police, and will not be issued.

At University Park, the only areas authorized to keep an inventory of unassigned Grand Master, Building Master, or Facility Perimeter keys will be the Work Reception Center and the University Police.

At non-University Park locations, the Director of Business Services (DBS) shall act as the University Access Controller for the purpose of approving requests for these types of keys. The DBS shall also determine where and how to secure these keys.

OPP LOCK SHOP PROCESSING (UNIVERSITY PARK)

General

In accordance with Policy AD68, “…key cutting or duplications shall be performed only by a University-approved locksmith,” as defined in the “Definitions” section of this procedure.

Key Cutting

After the appropriate authorizations have been obtained as discussed in “New Key Requests,” Lock Shop employees will cut the approved key(s). Each key will be marked with a unique identifier, as specified in policy AD68.

Delivery of Completed Keys

All key deliveries will be handled as described below:

For all OPP staff and trade persons- all new keys, whether temporary or permanent issue, will be delivered to the Work Reception Center (WRC) to be distributed per WRC procedures.

For All Other Requests- The below procedures are used in conjunction with the proper paperwork and approvals for key issues:

  1. Key(s) will be cut by the OPP Lock Shop.
  2. Key(s) placed in envelope – Access Coordinator’s name is placed on the envelope.
  3. A copy of the Workorder is attached to the key envelope and placed in secure storage container in the OPP Mail Room.
  4. The Courier service picks up keys from OPP Mail Room and delivers to the applicable Access Coordinator (or Designee).
  5. The Workorder will be signed/dated by the Access Coordinator (or Designee), certifying that the key(s) have been received.
    1. If Access Coordinator (or Designee) is not available- If the Access Coordinator (or Designee) is unavailable to accept delivery, the Courier will leave an Attempted Delivery Notice (See Exhibit "A") containing instructions to call Delivery Services to reschedule delivery. Undeliverable keys are returned to the OPP Mail Room secure container for storage until next delivery attempt.
NOTE: A second delivery attempt will be made. If the second attempt is not successful, the keys will be delivered to the Work Reception Center. The Access Coordinator (or Designee) must contact the Work Reception Center directly to arrange for key pick-up at the Office of Physical Plant.
  1. Upon successful delivery, the signed/dated Workorder will be returned to Office of Physical Security, 118 OPP Building via campus mail for file retention.
NOTE: Grand Master and all other security sensitive keys will NOT be delivered. Instead, such keys must be picked-up by the Access Coordinator (or Designee) and signed for at the Work Reception Center. The Access Coordinator (or Designee) will call the WRC directly and schedule the appointment.

UNIVERSITY-APPROVED LOCKSMITH PROCESSING (FOR NON-UNIVERSITY PARK LOCATIONS)

In accordance with AD68, only a University-approved locksmith, as defined in the “Definitions” section of this procedure, may perform core changes, core moves, key cutting or duplications for a non-University Park location. For sound control of this process, the following guidelines must be observed :

HANDLING OF KEY-CORE CHANGES

In accordance with policy AD68, “Any core changes, core moves, key cutting or duplications shall be performed only by a University-approved locksmith….”

University Park:

Key-Core changes will be processed through the OPP Lock Shop in the same manner as previously described for the cutting of keys (see “OPP Lock Shop Processing”). Access Coordinators will identify, collect and record all keys forced out of service due to the requested key-core changes. These keys must then be returned to the University Access Controller for destruction.

Commonwealth Campuses:

Key core changes will be processed through the campus Office of Physical Plant or the Department that is responsible for locksmith work at that campus location. See “University-Approved Locksmith Processing (for Non-University Park Locations), above.

All Housing & Food Service (UP) Key-Core Changes

will be handled in accordance with the "Housing and Food Services Policies and Procedures for Key/Card Access," and as stated in the Terms, Conditions and Regulations of the Housing and Food Service Contract or Lease.

Leased Properties

Requests for key-core changes are handled through the Division of Facilities Resources and Planning.

Contractor/Construction Key Cores

ACCESS REQUESTS FOR CONTRACTORS AND OUTSIDE VENDORS

Daily Use

To insure the integrity of facility access as well as the safety and security of the University employees and students, contractors and vendors must follow the process specified below:

Extended Issuance

REVIEWS

Quarterly, each Access Coordinator will review the status of the University keys/ACD's issued to verify that the device holders remain currently affiliated with the department which approved keys/ACD's issued. If a key/access device holder is no longer affiliated with that department, the Access Coordinator will notify the holder and applicable department official, and recover the keys/ACD's. If the keys/ACD's cannot be recovered, the appropriate avenues of collection of replacement/re-coring fee will be instituted in accordance the replacement fee mandates established in University policy AD68 and applicable sections of this procedure.

WHEN LEAVING UNIVERSITY EMPLOYMENT

If an individual’s access changes are as a result of leaving University employment, the employee should comply with applicable parameter of policies HR55, HR102 and AD68 as they prepare to leave the University.

In accordance with policy HR55, “the faculty or staff member shall return all University-issued items including…..keys.”

Likewise, policy HR102 "establishes University expectations for processing separations and transfers of covered individuals. The intent of the policy is to ensure that all University property is retrieved and that access to University facilities and systems is appropriately restricted at the time of the separation or transfer of a covered individual……"

Additionally, policy AD68 states that “the individual will be required to notify their area Access Coordinator and make the appropriate changes, including the return of their keys/ACD's, and/or changes to their access credential clearances, as applicable. These circumstances can include, but are not limited to: (1) access changes in their current area of employment (2) leaving the University, or (3) accepting employment in a different area of the University. Lost keys/ACD's will be reported to the University Access Controller….. Recovery costs will be charged to an individual's department for each lost or unreturned key (including keys to leased properties) and/or access credential devices issued by the University. In addition, recoring costs may also be charged…..

For additional questions to ensure complete and appropriate compliance, the departing employee should consult their supervisor, Human Resources Representative or area Financial Officer.

AUDITS OF KEY/ACD INVENTORIES

Annually, Access Coordinators are required to perform a review of their inventory and generate a report stating their findings. Upon completion, this report must be forwarded to the University Access Controller and the responsible Budget Executive or Budget Administrator.

Using their inventory records/system, the Access Coordinator will generate a report of ALL keys/ACD's that are under their control. Keys/ACD's that are not physically in the Access Coordinator’s lockable cabinet are considered “issued” and should have an Facility Access Authorization Request or equivalent documentation (depending on the time frame when access was granted), to substantiate their issuance.

The Access Coordinator will compare/verify this inventory record to the physical inventory on hand. They will sign and date the inventory record, affirming that an audit was performed, and that all inventory was accounted for as documented. Any discrepancies must be noted, researched, and explained in their report. Any keys/ACD's not accounted for at the time of the audit must be reported as lost, stolen or unreturned (as applicable).

Action on any discrepancies reported will be decided upon by the University Access Controller.

Changes In Access Coordinator- Any time that a new Access Coordinator is assigned, a review of the current inventory information will be performed by the outgoing Access Coordinator, the incoming Access Coordinator and an Office of Physical Security representative. This will insure that all of the information and keys are accounted for, and allow any questions to be answered at the time of the transition. All keys/ACD's assigned to the outgoing Access Coordinator shall then be reassigned to the new Access Coordinator.

University Access Controller / Physical Security Audit- a random audit of a department’s key/ACD inventory records may be held at any time by the University Access Controller or an Office of Physical Security representative to insure that both inventory and the security of keys and ACD's are being properly maintained.

AUDITS OF CLEARANCES

Annually, each Access Coordinator will review their departmental database to insure that each of the clearance authorizations under their purview is current.

If discrepancies are discovered, the Access Coordinator will remove those clearances found not to be current and, if possible, notify the individuals via email that they have been removed.

RECORD RETENTION, DISPOSITION AND DESTRUCTION:

Record retention must be managed in accordance with Policy AD35 - University Archives and Records Management, and records schedules approved by the Records Management Advisory Committee, Office of General Counsel, and Office of the President. These retention requirements are the University's retention criteria, either derived or based upon federal, state, and local statute or regulations, industry standards, and business needs. Retention beyond recommended time periods require justifiable reasons and warrant review by the Records Management Officer or designee. All documents must be maintained in such a manner so as to provide ease of access for review, and to provide a suitable audit trail for all transactions.

Upon expiration of a stated period of time, documents must be discarded and/or destroyed, unless permission is granted by Records Management Officer or designee to retain the records. Archival records created more than 20 years prior to the current date must be reviewed before destruction. Units should also contact the University Archivist before discarding any document which may be of permanent or historical value to the University. To safeguard the privacy of individuals, documents that contain salary information, personally identifiable information (PII), or student records must also be shredded. See Policy AD53 - Privacy Policy and AD22 - Health Insurance Portability and Accountability Act for additional information regarding privacy and the protection of an individual's personal information. For documents that must be shredded, departments may arrange for Blue Bag service by contacting the Blue/White Shredding Program of the Office of Physical Plant. Exceptions to the practice are as follows:

Additional questions may be directed to the University Archivist or the Records Management Officer.

EXHIBITS:

CONTACT INFORMATION:

For questions, additional detail, or to request changes to this procedure, please contact the ENTER THE INFORMATION AS IT PERTAINS TO FURTHER INFORMATION. For those procedures maintained by their respective area, their contact information would be included so end-users know whom to contact with questions.

CROSS REFERENCES:


Procedure Status:

Date Approved: 03/25/14

Most recent changes:

Revision History (and effective dates:)