12.07.2015 Views

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

What is a Tag?In CyberAudit-Web, a tag is a free-form way to classify People and Locks. Tags help organizePeople and Locks into logical categories by providing an unlimited number of ways to describethem. There is no "wrong" choice for how to use them. Instead of belonging to one "group,"People and Locks may have any number of tags.Here are some examples how tags may be used.ABC EnterprisesUses people tags to organize their employees by department. The departments are Accounting, Engineering,Human Resources, Maintenance, Marketing, Production, and Support. Employees of each department havea set of locks they must be able to open.ABC creates lock tags to group CyberLocks for access. Finally, using the Access Matrix, ABC grants eachpeople tag access to each of the groups of CyberLocks it requires."Maintenance" is a lock tag. It tags CyberLocks needed to do the Maintenance functions at ABC. The"Maintenance" tag also includes some locks that are tagged with Production and Human Resources becauseall three departments require common access to some locks.Gail Ash, as supervisor of Marketing and Support, is tagged with both "Marketing" and "Support" people tags.This allows her to access both "Marketing" and "Support" tagged CyberLocks. And Norman Cooper, normallytagged with Production, temporarily gets the "Maintenance" tag when Eric Montoya, the regular Maintenanceemployee, goes on vacation.Green Construction CompanyEmploys electricians, plumbers, carpenters, and other specialists. Each employee serves a role in theconstruction process. Green uses CyberLocks to help them maintain control on their supply of raw materials.They use people tags to classify their employees by the role they play in the company. They use lock tags toidentify the CyberLocks each employee group must access.When Green adds a new electrician, Kashif Saleem, they simply tag his record with the "Electrician" peopletag. When they issue him a CyberKey, it will automatically be programmed to open the locks that electriciansat Green Construction need to open.Wilson VendingUses CyberLocks on their vending machines to prevent key duplication and to maintain an audit trail ofactivity for each vending machine asset. Most key holders are either route drivers or service technicians.Wilson uses lock tags to identify the assets and CyberLocks on each route. Then they use people tags toidentify the drivers that will service each route.The service technicians must be able to open a broader group of locks. Wilson again uses lock tags, thistime to identify the assets that fall into each service area. As a result, each asset (CyberLock) gets two tags;

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!