Linking HR and security

Issue 3 2021 Access Control & Identity Management

When companies implement employee-screening programmes, the task is often left to the human resources department and the rest of the company rolls their eyes at the red tape often involved in this process. The employee screening policy is implemented to ensure the risk of the company is managed and fraudsters do not enter the workplace, but the results of the vetting are not often linked to other areas in the business.

One of the effective ways of bringing security and HR together would be to link the employee screening programme to the access control system of the organisation.

The initial process would be to ensure that nobody is employed in a company, on a permanent or contract basis, unless the relevant level of employee screening has been conducted on the individual. Once the person has received the letter of appointment and has permission to work on a site, there needs to be a method of communication to the security department to allow that individual access to the site.

All organisations should have regular reviews of access control and screening of employees and again, a process would need to be put in place where these systems ‘talk’ to each other. Once there have been breaches of the access control policy, the HR department needs to be informed and the reason for that is perhaps some red flag that needs to be raised regarding the integrity or motive of the employee. Likewise, when staff are re-screened and any areas of risk are identified, this should be brought to the attention of the security department.

Another area that is often overlooked and could be one of the greatest risks in the conversation between the two departments of the business is the departing employee. How often do we hear the story of an ex-employee gaining access to the company, either physically or electronically and when the investigation is done there has been a total breakdown in communication between the various departments in a company.

Departments within any organisation need to talk to each other more to mitigate risk.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cloud-based or on-premises access control
Salto Systems Africa Access Control & Identity Management Products
Choosing between cloud-based and on-premises access control solutions can be a difficult decision, however, the best solution for your organisation, property, or building type will depend on a range of factors.

Read more...
Improved security health check tool
Gallagher Access Control & Identity Management Products
Gallagher Security has streamlined its free Security Health Check tool, making it easier than ever to protect against potential system risks and improve business efficiencies.

Read more...
Suprema showcases integrated security solutions
Suprema Access Control & Identity Management Products
Apart from being an access terminal that supports multiple credentials such as facial recognition, RFID, mobile and QR codes, the BioStation 3 also supports VoIP Intercom and real-time video monitoring features to make it a truly multi-functional reader.

Read more...
Local electronic locks
Access Control & Identity Management
YeboTech is an electronics manufacturing company, founded in 2005, which designs, markets and sells an electronic key and locking systems, aimed at replacing all conventional mechanical locks.

Read more...
Selecting the correct access control system
Enkulu Technologies Access Control & Identity Management
Frazer Matchett, Managing Director of Enkulu Technologies, suggests the right questions to ask when selecting an access control solution; not just the access system, but the integrated solution that fits your requirements.

Read more...
Integrated guarding services
XtraVision Integrated Solutions Access Control & Identity Management Industrial (Industry)
XtraVision offers a few tips on how to go about planning and setting up an integrated approach to sustainable and successful security services, from the initial risk assessment to the technology and people required.

Read more...
Paxton secures multi-tenant office in Cape Town
Paxton Integrated Solutions Access Control & Identity Management Products
Cecilia Square in Paarl, Cape Town is an office building from where several businesses operate. The multi-tenant site has recently undergone a full refurbishment, including a complete upgrade of its security system for access control.

Read more...
AI face recognition OEM module
Suprema News Access Control & Identity Management Products
Suprema AI, a company specialized in artificial intelligence–based integrated security solutions, recently launched its high-performance face recognition OEM module called ‘Q-Face Pro’ in response to the growing need for contactless security solutions.

Read more...
Can artificial intelligence manage people better than people?
iFacts Security Services & Risk Management
Artificial intelligence tools are advancing, and they’re advancing fast. Across all industries and positions, AI tools are muscling in and managing to successfully do pieces of our jobs.

Read more...
KWAL raises a glass to security upgrade
Turnstar Systems Access Control & Identity Management Products
The Kenya Wine Agencies Limited (KWAL) was in need of an integrated security upgrade. This is where Turnstar came into the picture to provide a solution that would keep KWAL secure and efficient.

Read more...