Creating the district ID database

Issue 8 2021 Agriculture (Industry), Security Services & Risk Management


Laurence Palmer.

The idea to perform in-depth risk assessments of a selected region, as discussed in the previous article, is critical. Once this has been completed, it should be considered essential to register and capture the personal details of every person that is resident or works in the selected region. Capture this information onto a central database that is secure, has off site back-ups and live access to the data by all authorised persons.

As a general guideline, all farmers and other role players should, whenever they interact with unknown or even known persons, take their photograph for the record. Keep this safe with all other details noted, i.e. purpose of visit, what was discussed and any related notes. Not only may this be vital information in the event of an investigation, but it serves as a psychological deterrent to the subject intent on breaking the law in future.

Communicate with all key role players and key individuals to obtain their support and buy-in for the project. In a situation such as this, it is very beneficial to link the critical outcomes to safety for all. The local communities and unions are far more receptive to safety considerations than to security.

Communicate further with the support services, i.e. SA Police, Metro Police, civil authorities, established security companies, businesses, local chiefs and indunas, union bosses, farm labour, domestic staff, the farmers and their families. Follow up on any possible financial support sources. Indicate a budget and estimate costs to conduct a pilot project as anticipated.

The following actions are required

1. All farmers in the region need to agree to the project. If some are excluded, the whole project is in jeopardy.

2. All persons living on the property will need to be identified by RSA ID book or card, passport or permanent residence permit.

3. The information will then be input onto the database and the person will be issued with a photo-ID card that is unique to the farm or property they are connected to and where they are employed or live.

4. All participants will be given an orientation period to explain to them the reasons for the issuing of the card and how they are expected to use it.

5. Each principal owner/occupier must have a computer in some form or other that can receive the software program and communicate with the database. Each member of the project will also be able to communicate with each other through an integrated messaging system.

Operational procedures

Every person will be required to submit the required information to set up the database and be issued with a photo-ID card, such as their full names as per their RSA ID, employer name and physical address, residential physical address, family rural details as applicable, cell number, next of kin details and vehicle details as applicable.

Furthermore, each person will be required to carry the ID card on their person at all times while within the region and present it on request by any person with a vested interest in the region, such as the SAPS, Metro Police, etc.

The principals are expected to keep the database up to date by capturing all and any changes in status of a person, incidents, dismissal or new employees, in fact anything that may be of effect and could assist to make the system viable.

Additional considerations

These are considerations that would have been mentioned in the risk assessment and will probably already be tabled.

1. A rapid mobile reaction unit that can respond to incidents.

2. The use of drones to gather information and identify activity.

3. All vehicles to be fitted with GPS tracker units.

4. Remote alarm and panic buttons that are carried by all vulnerable persons.

5. Weapons training: how, when and if to use them.

6. First aid trauma training and response.

7. The handling of cash and wages on the farm or business premises.

8. The principal member must have a camera and photograph all persons encountered during his/her daily operations on the property.

9. The principal member must enter into a written contract with each staff member.

10. There needs to be a mindset of reconciliation amongst the farmers towards their workers, to solve disputes at the lowest level before they escalate into a farm-wide or community conflict.

For more information, contact Laurence Palmer, +27 73 954 4450, [email protected]

Reference was made in the development of this article to a research paper from UNISA’s School of Criminal Justice.

This article is the opinion of the author and is based on the latest information available and his previous and current efforts to prevent farm attacks.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) News & Events Associations
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
Local is a lekker challenge
Secutel Technologies Technews Publishing AI & Data Analytics
There are a number of companies focused on producing solutions locally, primarily in the software arena, but we still have hardware producers churning out products, many doing business locally and internationally.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
From the editor's desk: What’s a trillion between friends?
Technews Publishing News & Events
Back in the bad old days of 2015, some (who didn’t want to take the blame for coming up with that number) estimated the amount of money lost to corruption by the South African government to be around ...

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...