Three rules for visitor data privacy and protection

Residential Security Handbook 2022: SMART Living Access Control & Identity Management, Residential Estate (Industry), Products & Solutions

Since Covid-19 hit our shores in early 2020, it brought a sea of data breaches, one crashing wave after another. From Experian to Lightstone and now TransUnion, personal data is under siege from all sides.

What can your business do to protect visitors’ information? ATG Digital gives insight into the triad of visitor data protection.

“When people do business with your company, they trust you with their information,” says ATG’s Ariel Flax. “Your responsibility for their privacy should extend to anyone who submits their personal information when they check in at the gate or reception.”

According to Flax, visitor data can be targeted by criminals or competitors. Good privacy practices aren’t just a courtesy but a legal requirement since POPIA came into effect in July last year.

Rule 1: Only collect what you need

Collecting critical data only at check-in saves visitors time and mitigates risks. “Your guests love the swift experience and feel safer on your premises,” says Flax. Visitors immediately get annoyed when they have to answer too many questions.

As per POPI Act regulations, Flax advises businesses to only collect what is necessary for the purpose of access control security on-site.

Rule 2: Encrypt personal information at reception

“If you’re still using handwritten registration books, ditch it,” cautions Flax. “Our most recent survey revealed that over 60% of visitors peep at who’s checked in ahead of them – that’s 60% too many.”

Names, cellphone numbers and ID numbers should not be exposed at any time. Electronic devices can be locked, encrypted and wiped remotely in the event of theft.

Rule 3: Write data protection into your company DNA

Security and governance go hand in hand, yet many companies fall short by assigning the responsibility of visitor data to either physical security or IT.

Firewalls, IPS and IDS go a long way, but Flax says, “It’s everyone’s responsibility to know and enact the security policy. Employee training against social engineering (phishing), network and physical perimeter protection must be enforced daily.”

These days, a cellphone number and a name are enough for unscrupulous hackers. In line with POPIA, have a policy that defines the process of collecting data, securely storing it, and deleting it as soon as it is no longer necessary. You’ll need a shredder if you have paper records.

Digital visitor management software like ATG Digital’s At the Gate and At Reception immediately encrypts data and uploads it to the cloud. Records are not stored on the device and cannot be accessed by security guards, receptionists or anyone else who may handle the device.

Consider ears too

While most companies are primarily concerned with prying eyes (and long fingers), Flax raises an interesting point about keeping sensitive information out of earshot.

“Discussions in meeting rooms and offices also need protection,” she says. “Assess the acoustics of your offices and meeting rooms. Consider investing in some soundproofing if need be. You can make a policy not to discuss the personal data of visitors/patients/partners in common areas of the office.

“The point of [data] entry can be the very point where sensitive information leaves. If you’re asking visitors for information on arrival, guard it the same way you would any other data on your network,” concludes Flax.



Integration relieves PoPIA pressure

Privacy laws apply to everyone, sectional title and community schemes included. That’s the word from Human Settlements Minister, Mmamoloko Kubayi, following a recent parliamentary Q&A.;

Despite the deadline for compliance on 30 June 2021, Kubayi had to reiterate this year that the regulations of the Protection of Personal Information Act (POPIA) apply to community housing schemes as well.

“Accordingly, all entities need to invest in the resources they have identified to ensure that the principles of POPIA are upheld,” said Kubayi, referring to the eight principles governing the collection, storing and processing of personal information belonging to members of community schemes.

Leading access control and visitor management firm, ATG Digital, has spent considerable time working with the POPIA-expert Michalsons Law Firm to create a fully POPIA-compliant access control solution for complexes and residential estates.

In its latest bid to further alleviate pressures on facilities and security managers, ATG Digital has announced that its flagship product, At The Gate, is available as an add-on to the EstateMate community management app.

The app facilitates secure communication between body corporates, managing agents, as well as owners and residents of community schemes. It acts as a central management hub and, together with At The Gate access control, makes it easier to enforce POPIA policies.

“Only information vital for the purpose set out in the scheme’s POPIA policy is collected at the gate. All the information is encrypted and securely stored, and is only accessible by authorised personnel,” explains ATG Digital’s Arial Flax.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Risks of fire safety in residential environments
Fire & Safety Residential Estate (Industry)
ASP Fire is highlighting the significant fire risks in residential environments and stressing the importance of proactive fire-safety management at the household level.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.