Management of PPE allocation made simple

Issue 7 2020 Editor's Choice

Of all the roadblocks and challenges COVID‐19 has introduced us to over the past few months, one of the tasks organisations have to manage is the issuing of PPE (personal protective equipment) to its staff. The new rules say that companies can have people returning to work, but those companies must ensure a safe workplace, which means making the appropriate PPE available to staff.

Some of these rules would require companies to have hand sanitiser available all over the workplace, and to ensure that masks are worn – and issued. The problem often arises that staff may be issued with PPE, a mask, coveralls, eye protection and gloves for example, and then forget to bring it with them the next day.

They will then ask for another set of PPE to be issued – or possibly just stock up on PPE for other reasons.

While one or two extra masks are not a big issue, where specialised PPE is issued regularly or when hundreds or thousands of people have to use PPE, such as at a university, the costs can quickly soar.

While the costs will vary depending on the supplier and quantities purchased, an indication of the costs per week per employee or contractor are:

• Cloth mask: R25 per mask.

• Coveralls: R286,20 per coverall.

• Mask respirator: R37,80 per mask.

• Eye protection: R100,44 each.

• Gowns: R113,40 each.

This is a problem the University of the Western Cape experienced and it turned to Powell Tronics, the company that provides the university’s access control solutions, to see if they could come up with a solution. Powell Tronics developed its Personal Protective Equipment Manager (PPEM) that runs on mobile devices and is integrated into the university’s access control system. Now that it is running successfully at the university, Powell Tronics is offering the same solution to anyone that requires it, and it does not need to be integrated into an access control system.

How it works

The PPEM solution is available in Basic and Advanced versions. The Basic version is integrated with Impro access control solutions. When somebody comes to collect their appropriate PPE, their employee number is typed into the mobile app (running on an Android device). If they are a registered member of staff or a student, their image appears on the screen as an additional security check.

The person is then issued the PPE and the time, date and location is noted in the database. If the same individual tries to obtain another set of PPE before the appropriate time for a new set – which the organisation can set – or at a different location, the app will notify the user that stock has been issued to that person and they are not eligible to receive more yet.


Different employees might require more or less PPE depending on their jobs. This can also be set in the system, allowing people to receive their equipment at different times. Reports can also be generated when required to show how many PPEs were issued, where they were issued and to whom they were issued. This useful data can also be used by the institution as verification that PPE was indeed issued to all staff and contractors, for example.

The advanced version

The advanced version has been expanded to allow for more use‐cases. It will work with Impro’s Access Portal, but is also integrated with Microsoft’s Active Directory – which means that you don’t necessarily need an access control system. In this instance it will check with the organisation’s Active Directory database to check if the person is registered.

Additionally, it allows the issuer to capture an image of the person if no picture exists in the database. It can also scan the person’s ID barcode, eliminating the requirement to input the employee number. Naturally, the employee number can be used instead of the ID barcode.

Additionally, the PPEM can operate as a stand‐alone application, keeping its own database to record the issuance of PPE. Companies can also add custom logos on the Android app and the web‐based management pages.

An additional report will also be available to management that highlights who was supposed to collect their PPE, but has not done so. This can be enhanced by sending an SMS to people who have not collected their kit.

The Android app can be installed on the devices Powell Tronics supplies for PT-PPE or issues for its visitor management and other solutions, or on any Android phone the customer chooses.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.