Creating the district ID database

Issue 8 2021 Agriculture (Industry), Security Services & Risk Management


Laurence Palmer.

The idea to perform in-depth risk assessments of a selected region, as discussed in the previous article, is critical. Once this has been completed, it should be considered essential to register and capture the personal details of every person that is resident or works in the selected region. Capture this information onto a central database that is secure, has off site back-ups and live access to the data by all authorised persons.

As a general guideline, all farmers and other role players should, whenever they interact with unknown or even known persons, take their photograph for the record. Keep this safe with all other details noted, i.e. purpose of visit, what was discussed and any related notes. Not only may this be vital information in the event of an investigation, but it serves as a psychological deterrent to the subject intent on breaking the law in future.

Communicate with all key role players and key individuals to obtain their support and buy-in for the project. In a situation such as this, it is very beneficial to link the critical outcomes to safety for all. The local communities and unions are far more receptive to safety considerations than to security.

Communicate further with the support services, i.e. SA Police, Metro Police, civil authorities, established security companies, businesses, local chiefs and indunas, union bosses, farm labour, domestic staff, the farmers and their families. Follow up on any possible financial support sources. Indicate a budget and estimate costs to conduct a pilot project as anticipated.

The following actions are required

1. All farmers in the region need to agree to the project. If some are excluded, the whole project is in jeopardy.

2. All persons living on the property will need to be identified by RSA ID book or card, passport or permanent residence permit.

3. The information will then be input onto the database and the person will be issued with a photo-ID card that is unique to the farm or property they are connected to and where they are employed or live.

4. All participants will be given an orientation period to explain to them the reasons for the issuing of the card and how they are expected to use it.

5. Each principal owner/occupier must have a computer in some form or other that can receive the software program and communicate with the database. Each member of the project will also be able to communicate with each other through an integrated messaging system.

Operational procedures

Every person will be required to submit the required information to set up the database and be issued with a photo-ID card, such as their full names as per their RSA ID, employer name and physical address, residential physical address, family rural details as applicable, cell number, next of kin details and vehicle details as applicable.

Furthermore, each person will be required to carry the ID card on their person at all times while within the region and present it on request by any person with a vested interest in the region, such as the SAPS, Metro Police, etc.

The principals are expected to keep the database up to date by capturing all and any changes in status of a person, incidents, dismissal or new employees, in fact anything that may be of effect and could assist to make the system viable.

Additional considerations

These are considerations that would have been mentioned in the risk assessment and will probably already be tabled.

1. A rapid mobile reaction unit that can respond to incidents.

2. The use of drones to gather information and identify activity.

3. All vehicles to be fitted with GPS tracker units.

4. Remote alarm and panic buttons that are carried by all vulnerable persons.

5. Weapons training: how, when and if to use them.

6. First aid trauma training and response.

7. The handling of cash and wages on the farm or business premises.

8. The principal member must have a camera and photograph all persons encountered during his/her daily operations on the property.

9. The principal member must enter into a written contract with each staff member.

10. There needs to be a mindset of reconciliation amongst the farmers towards their workers, to solve disputes at the lowest level before they escalate into a farm-wide or community conflict.

For more information, contact Laurence Palmer, +27 73 954 4450, unicornnlpconsulting@gmail.com

Reference was made in the development of this article to a research paper from UNISA’s School of Criminal Justice.

This article is the opinion of the author and is based on the latest information available and his previous and current efforts to prevent farm attacks.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Obituary: Steven James Meyer
January 1957 - January 2022

Technews Publishing News
It is with deep sadness and shock that we announce the sudden death of SA Instrumentation & Control Editor, Steven Meyer. Steven joined Technews in October 2007 in the position of Deputy Editor. His ...

Read more...
From the editor's desk: In the cyber trenches
Technews Publishing News
Hi-Tech Security Solutions is proud to launch its first Smart Cybersecurity Handbook, a publication aimed at making sense of the complex world of cyber risks.

Read more...
The worst of times
Technews Publishing Editor's Choice
Cyber resilience in terms of people, processes and technology is where it’s at when it comes to prevailing in a world beset with cybercriminals.

Read more...
Providing real-time visibility
Technews Publishing Editor's Choice
Comprehensive visibility is critical, but not always attainable without the support of a managed service provider dedicated to monitoring and securing your cyber environment around the clock.

Read more...
Getting the basics right
Technews Publishing Editor's Choice
Cybersecurity is like any other discipline, you can’t start at the top, you need to get the basics right. Hi-Tech Security Solutions asks how to best do this.

Read more...
Ransomware doesn’t take holidays
Technews Publishing Cyber Security
Cybereason has published a global study of 1200+ security professionals at organisations that have previously suffered a successful ransomware attack on a holiday or weekend, titled Organizations at risk: Ransomware attackers don’t take holidays.

Read more...
The state of the distribution market
ESDA (Electronic Security Distributors Association Bosch Building Technologies Dark Horse Distribution Elvey Security Technologies Regal Distributors SA G4S Secure Solutions SA Editor's Choice Security Services & Risk Management
The distribution industry has evolved over the years and its current challenges simply mean another change is in the wind, for those who can take the next step.

Read more...
Training that delivers
Technews Publishing Leaderware ESDA (Electronic Security Distributors Association BTC Training Africa Editor's Choice Security Services & Risk Management Conferences & Events Training & Education
Hi-Tech Security Solutions hosted a virtual conversation to address the challenges and solutions related to effective and measurable training and education in the security industry.

Read more...
The importance of traceable records
Technews Publishing Editor's Choice Security Services & Risk Management
Traceable records streamline performance management, training, evidence records and reduce fraud, corruption and criminal activities.

Read more...
From the editor's desk: An end and a beginning
Technews Publishing News
      Welcome to the final regular issue of Hi-Tech Security Solutions for 2021. In some ways this year has flown by, but in others it has been a never-ending slog. There are few people I know who are sad ...

Read more...