Creating the district ID database

Issue 8 2021 Agriculture (Industry), Security Services & Risk Management


Laurence Palmer.

The idea to perform in-depth risk assessments of a selected region, as discussed in the previous article, is critical. Once this has been completed, it should be considered essential to register and capture the personal details of every person that is resident or works in the selected region. Capture this information onto a central database that is secure, has off site back-ups and live access to the data by all authorised persons.

As a general guideline, all farmers and other role players should, whenever they interact with unknown or even known persons, take their photograph for the record. Keep this safe with all other details noted, i.e. purpose of visit, what was discussed and any related notes. Not only may this be vital information in the event of an investigation, but it serves as a psychological deterrent to the subject intent on breaking the law in future.

Communicate with all key role players and key individuals to obtain their support and buy-in for the project. In a situation such as this, it is very beneficial to link the critical outcomes to safety for all. The local communities and unions are far more receptive to safety considerations than to security.

Communicate further with the support services, i.e. SA Police, Metro Police, civil authorities, established security companies, businesses, local chiefs and indunas, union bosses, farm labour, domestic staff, the farmers and their families. Follow up on any possible financial support sources. Indicate a budget and estimate costs to conduct a pilot project as anticipated.

The following actions are required

1. All farmers in the region need to agree to the project. If some are excluded, the whole project is in jeopardy.

2. All persons living on the property will need to be identified by RSA ID book or card, passport or permanent residence permit.

3. The information will then be input onto the database and the person will be issued with a photo-ID card that is unique to the farm or property they are connected to and where they are employed or live.

4. All participants will be given an orientation period to explain to them the reasons for the issuing of the card and how they are expected to use it.

5. Each principal owner/occupier must have a computer in some form or other that can receive the software program and communicate with the database. Each member of the project will also be able to communicate with each other through an integrated messaging system.

Operational procedures

Every person will be required to submit the required information to set up the database and be issued with a photo-ID card, such as their full names as per their RSA ID, employer name and physical address, residential physical address, family rural details as applicable, cell number, next of kin details and vehicle details as applicable.

Furthermore, each person will be required to carry the ID card on their person at all times while within the region and present it on request by any person with a vested interest in the region, such as the SAPS, Metro Police, etc.

The principals are expected to keep the database up to date by capturing all and any changes in status of a person, incidents, dismissal or new employees, in fact anything that may be of effect and could assist to make the system viable.

Additional considerations

These are considerations that would have been mentioned in the risk assessment and will probably already be tabled.

1. A rapid mobile reaction unit that can respond to incidents.

2. The use of drones to gather information and identify activity.

3. All vehicles to be fitted with GPS tracker units.

4. Remote alarm and panic buttons that are carried by all vulnerable persons.

5. Weapons training: how, when and if to use them.

6. First aid trauma training and response.

7. The handling of cash and wages on the farm or business premises.

8. The principal member must have a camera and photograph all persons encountered during his/her daily operations on the property.

9. The principal member must enter into a written contract with each staff member.

10. There needs to be a mindset of reconciliation amongst the farmers towards their workers, to solve disputes at the lowest level before they escalate into a farm-wide or community conflict.

For more information, contact Laurence Palmer, +27 73 954 4450, unicornnlpconsulting@gmail.com

Reference was made in the development of this article to a research paper from UNISA’s School of Criminal Justice.

This article is the opinion of the author and is based on the latest information available and his previous and current efforts to prevent farm attacks.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.