Location access automated

August 2014 Access Control & Identity Management

Have you ever come into a building and before you even enter, you are presented with a large book, a pen or been asked for your personal identity document or driver’s licence? Have you ever asked yourself how protected that ID/registration information is?

In a world where safety is a growing concern and personal information is shared relatively openly with strangers, many questions may arise with regards to the protection of that information. Through the implementation of regulatory measures such as the Protection of Personal Information, or POPI, bill in South Africa; more awareness is being created and importance being placed into the protection of individual personal data. From an organisational perspective, the implementation of secure risk management processes is imperative in assisting in the management of internal and external risk possibilities.

From a security technology viewpoint, access control can be focused on with regards to assisting in the management of risk associated with the entry and exit into, and out of buildings. Innovations such as the Electronic Visitor Identity Management (EVIM) system have been introduced into the South African market to minimise risk associated with hosting individuals within places such as complexes, office buildings, special events etc. This system is designed to work in conjunction with an organisation’s current access control protocols such as readers etc.

The EVIM is essentially designed to capture visitor information in a streamlined and secure manner and presents a few benefits in assisting in the surveillance of entry and exit point security in any property. The system allows for the accurate capturing of visitor name and surnames, the correct recording of vehicle registration details and the verification of every entry and exit date and time. Furthermore, this system allows for the protection of visitor information from guards and other visitors by restricting their ability to access this data. The information captured is only available to authorised members of the premises being visited. The data is securely stored for future reference and the streamlined processing of information when visitors are entering a particular site helps improve the visitor experience.

EVIM system’s compliance with POPI provides peace of mind for all stakeholders involved. The visitor can rest assured that his/her personal information is protected; and the organisation/premises owner can safely guarantee visitors that they are not only protected by the law but also by the building/organisation’s additional security systems.

Security is increasingly becoming an integrated value-chain entity where collaborative relationships within, and outside the security industry are growing in importance. The involvement and support of key stakeholders such as government, by passing safety laws, and security professionals is imperative in the creation of a strong overall health, safety and risk management business model within South Africa.

For more information contact Elvey Security Technologies, +27 (0) 11 401 6700, [email protected], www.elvey.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...