Back to Operations
Operations
E-commerce & Retail
Updated March 2026

Key & Access Management — E-commerce & Retail Edition

A controlled process for issuing, tracking, and recovering physical keys and electronic access credentials to maintain premises security and accountability.

Purpose

To prevent unauthorized access to the premises by maintaining strict control over all physical keys and electronic access credentials, with a clear audit trail of who holds what access at all times.

Scope

Covers all physical keys, access cards, key fobs, alarm codes, and electronic access credentials for the premises. Does not cover IT system passwords or digital application access, which are managed under the IT & Systems SOP.

Prerequisites

  • Master key register documenting all locks and keys in the premises
  • Electronic access control system configured and operational
  • Key safe or lockbox for secure key storage
  • Key and access policy approved and communicated to all staff
Compliance Note

Includes Australian Consumer Law (ACL) compliance features, GST calculations, and product safety record management.

Step-by-Step Procedure

1

Maintain the Key and Access Register

Keep the master register of all keys and access credentials current, documenting every key or credential, who holds it, when it was issued, and its purpose.

  • 1.1Review the key register monthly to verify all entries are current
  • 1.2Update the register for any lock changes, new keys cut, or credentials created
  • 1.3Cross-reference with the staff list to identify any ex-employees still listed
Facilities Manager
15-20 minutes monthly
Key Register, Access Control System
2

Process New Key or Access Requests

When a new key or access credential is needed, verify the request is authorized, determine the appropriate access level, and obtain approval before issuing.

  • 2.1Receive the access request from the staff member or their manager
  • 2.2Verify the request is appropriate for the person's role
  • 2.3Obtain written approval from the designated authority
Facilities Manager
5-10 minutes
Access Request Form, Communication Tool
3

Issue the Key or Access Credential

Provide the approved key or credential to the staff member, record the issuance in the register, and have the recipient acknowledge receipt.

  • 3.1Cut a new key or program the access credential as required
  • 3.2Record the issuance in the key register with date and recipient details
  • 3.3Have the recipient sign an acknowledgment of receipt and responsibility
  • 3.4Remind the recipient of the key and access policy requirements
Facilities Manager
10-15 minutes
Key Register, Access Control System
4

Manage Temporary Access

For temporary workers, contractors, or short-term needs, issue temporary credentials with defined expiry dates and monitor their return.

  • 4.1Issue temporary credentials with a clear expiry date
  • 4.2Log the temporary issuance in the register
  • 4.3Set a reminder for the return date
  • 4.4Follow up immediately if the credential is not returned on time
Facilities Manager
5-10 minutes
Access Control System, Calendar Tool
Tips
  • Temporary credentials should automatically deactivate on the expiry date if using an electronic system
5

Recover Keys and Credentials on Departure

When a staff member leaves the organization, collect all keys and access credentials as part of the exit process and deactivate their electronic access.

  • 5.1Review the key register for all items issued to the departing staff member
  • 5.2Collect all physical keys and access cards during the exit team sync
  • 5.3Deactivate their electronic access credentials in the system immediately
  • 5.4Update the key register to reflect the return
Facilities Manager
10-15 minutes
Key Register, Access Control System
6

Handle Lost or Stolen Keys

When a key or credential is reported lost or stolen, assess the security risk, deactivate the credential if electronic, and determine whether locks need to be changed.

  • 6.1Record the loss in the key register with full details
  • 6.2Deactivate the lost electronic credential immediately
  • 6.3Assess whether the lost key poses a security risk requiring lock changes
  • 6.4If lock changes are needed, schedule them urgently and reissue keys
Facilities Manager
15-30 minutes plus any lock change time
Key Register, Access Control System
Tips
  • Err on the side of caution — if in doubt, change the locks
7

Conduct Periodic Access Audits

Regularly audit who has access to the premises and verify that access levels remain appropriate for each person's current role.

  • 7.1Compare the key register against the current staff list
  • 7.2Review electronic access logs for unusual patterns
  • 7.3Revoke access for anyone who no longer needs it
Facilities Manager
30-45 minutes quarterly
Access Control System, Key Register, Spreadsheet
8

Report on Access Management

Compile a periodic report on key and access management activities including issuances, returns, losses, and audit findings for management review.

  • 8.1Summarize all key and access transactions for the period
  • 8.2Report any security incidents related to access
  • 8.3Highlight any audit findings or recommendations
Facilities Manager
15-20 minutes
Spreadsheet, Communication Tool

Quality Checkpoints

Key register reviewed and verified monthly
All departing staff have keys and credentials recovered before final day
Lost key incidents assessed and resolved within 24 hours
Quarterly access audit completed and findings addressed

Common Mistakes to Avoid

Failing to collect keys from departing employees, leaving the premises vulnerable
Not changing locks after a key loss, assuming the risk is low
Issuing master keys or high-level access without proper authorization
Not setting expiry dates on temporary access credentials

Expected Outcomes

Key Recovery Rate

Percentage of keys and credentials recovered from departing staff, targeting 100%.

Unauthorized Access Incidents

Number of unauthorized access incidents per year, targeting zero.

Access Audit Compliance

Percentage of quarterly access audits completed on time with all findings resolved, targeting 100%.

Frequently Asked Questions

What should I do if I find an unattended key or access card?

Turn it in to the Facilities Manager or reception immediately. Do not attempt to use it or return it to the person you think it belongs to, as the register must be updated properly.

Can I lend my key or access card to a colleague?

No. Keys and access credentials are issued to individuals and must not be shared. If a colleague needs access, they should submit a formal access request.

How quickly should locks be changed after a key is lost?

Electronic credentials should be deactivated immediately. For physical keys, a risk assessment should be completed within 4 hours, and lock changes, if required, should be completed within 24-48 hours.

Who authorizes master key issuance?

Master keys require approval from the Operations Manager or General Manager. They should only be issued to senior staff with a documented business need.

Want this customised for YOUR business?

We'll tailor every step to your exact operations, tools, and team structure.