Understanding The 20+ Lock Functions

Author: Brian Rhodes, Published on Mar 27, 2018

While locks can look the same, they may operate in significantly different ways. To make understanding them simpler, widely adopted industry standards define a range of over 20 different lock functions. Understanding them is vital in picking the locks for a job, or else security vulnerabilities or dangers to life/safety can result.

In this note, we look at these crucial codes, and several key points in working with and understanding lock functions:

  • Which Codes Describes Functions Based On Locks Type
  • Why Lock Functions Are Important To Access Control
  • A Chart Of 20+ Lock Functions Defined
  • The Three Most Common Commercial Lock Functions
  • Classroom Functions In Detail
  • How Functions Are Typically Specified

Standardizing Lock Functions

The 'function' or mechanical behavior of a lock, especially a mortise or cylindrical lever lock, should be specified for an opening. These are classified into more than 20 types, using codes developed by door hardware group BHMA.

The relevant standard defining locks functions depends on the type of lock it is:

  • ANSI/BHMA A156.2: Applies to Cylindrical (Bored) Pre-Assembled Locks and Latches
  • ANSI/BHMA A156.13: Applies to Mortise Locks and Latches

An easy example of different functions in everyday use can be seen when comparing Restroom (Privacy Function) locks (F76/F02 or F19) and Storage Closet (Storeroom Function) locks (F86/F07).

Using the standard function definitions, bathroom locks include the provision to lock from the inside, preserving the privacy of occupants. However, this same feature is applied to storage closets, simply due to the potential of accidentally locking the door shut and preventing access from the outside, trapping children or potentially incapacitated people inside.

Electronic Access Relevance

The integration and behavior of mechanical locksets are important to preserve in electronic access, per Building Occupancy Codes and Access Control Life/Safety Codes. Failing to understand how underlying hardware operates may result in the improper/illegal use of electronic hardware.

For example, if a mortise lock includes a separate deadbolt, an accompanying electric strike may need to be upsized to include more that one latch, or more than one strike may be required. Likewise, if a lock is an E2161/F18 Deadlock function, it is kept locked unless key unlocked from the outside, and simply using a maglock is not enough to release the door when access unlocks it, potentially killing or injure people trying to escape.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

20+ Function Codes

These properties of locks are identified by codes, and there are over 20 different functions available.

Before codes were implemented, functions were defined via common labels like 'Passage Functions, or 'Privacy Locks'. However regional and manufacturer variations of those labels are common, and simply identifying these locks by common labels does not guarantee the exact function will be ordered, so using the alphanumeric code is important for clarity.

The ANSI/BHMA Function codes are:

Common Commercial Lock Functions

These are three of the most common applications, and their corresponding lock functions, for security integrators:

  • Office Doors: Most office workers want to lock their doors after hours. The F82/F04 function lets an employee push a button on the back of the lock when they leave, pull the door shut to lock it, and ensure it can only be unlocked by key when unattended.
  • Server Rooms: For higher security applications, the addition of a deadbolt is useful. The F88/F09 "Entrance" function allows for an additional deadbolt to be thrown by keyed locking from the outside of the door, when IT leaves a main closet. However, when personnel are inside the room, the lever functions like a "Privacy" lock allowing free egress.
  • Break Room: The F75/F01 "Passage" function is ideal for areas using doors for environmental isolations (noise/HVAC) but do not necessarily want them lockable. Areas like Break Rooms are common access, and "Passage" locks assure they are not inadvertently or maliciously locked from use.

Other applications, for example, a medical storage closet, F86 is a likely choice because the door is locked all the time and can only be opened by a key. The door automatically locks when the door is shut, which is ideal for securing a closet filled with valuable items. Code F86 also specifies a cylindrical lockset, although if the door was prepped for a mortise lockset, code F07 would provide the same features.

Not All Functions Code Compliant

Certain occupancies outlaw some functions - E2141/F16 "Double Keyed Deadbolt" cannot be used in most group occupancies, while others strictly define required use of others - F93/F15 only on Hotel/Motel doors.

Classroom Functions In Detail

Code F84/F05 is informally called 'Classroom Function', as they are designed to be installed in schools as a potential protection against active shooters or intruders.

These locks always allow occupants out of a classroom regardless if the door is locked or not. However, in order to lock the door, a key must be used on the outside of the room. This orientation has caused some concern in the wake of school shootings because they expose the teacher or class to danger in order to lock the door. Of note, doors lockable from the inside are F82/F04 Office Function locks.

This explains why some products marketed as 'classroom locks' do not specify F84/F05 code compliance because they can be locked from inside the class. While this potentially may be a safer function, it does not meet the formal 'Classroom Function' definition, and special attention is needed to clarify actual operation.

Function Specification Callout

Most commercial-grade hardware makes finding lock function easy - generally, this is listed on cutsheets, and different product SKUs have different functions, even if the base hardware series is the same. Take this example from Schlage:

Finding the right function is straightforward and many distributors will ask you for this information if you do not include it. Getting the right function ordered is important because it is difficult or impossible to change this attribute in the field.

Most residential and light-grade commercial hardware does not specify any function code, and is simply sold as an 'office lock' or 'bathroom lock'. These products are configured in only the most common functions and may not be compliant with codes or specifications as a result.

[Note: This guide was originally published in 2013, but substantially expanded and updated in 2018.]

3 reports cite this report:

Top 5 Biggest Access Control Problems 2016 on Oct 06, 2016
New IPVM survey data reveals integrator's top 5 problems with electronic access control: High Cost Complex Doors and Hardware Lowball...
Classroom Closer Lock Illegal on Oct 28, 2014
Keeping classrooms locked against intruders is one the most urgent security priorities today. With terrible active shooting events in schools in...
Top 5 Access Control Problems on Jul 21, 2014
Here's what integrators say are their 5 top problems with electronic access control: High cost End-user knowledge Lowball Competition Complex...
Comments (8) : PRO Members only. Login. or Join.

Related Reports

Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Genetec Clearance Face Detection / Redaction Test on May 14, 2018
Privacy regulations such as GDPR (EU Public Privacy), HIPAA (US Medical Privacy), and FERPA (US Student Privacy) are driving video surveillance...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
March Networks Targets Cannabis Market on May 10, 2018
Will the next March Networks customer appreciation event be held a steakhouse or at a Taco Bell at 2 am? Can March sell the types of systems to the...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...
JCI / Tyco VideoEdge NVR Profile on May 03, 2018
JCI (formerly Tyco) is one of the largest players in the global security industry, both as a manufacturer and an integrator. The company's most...

Most Recent Industry Reports

Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...
Dahua 12MP Fisheye Camera Tested (NK8BR4) on May 16, 2018
Continuing our coverage of 12MP sensor fisheye cameras, we bought and tested the Dahua NK8BR4, examining: Default vs. Optimized...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact