Controlling visitor access on mines

October 2018 Mining (Industry), Access Control & Identity Management, Products & Solutions

Visitors to mining facilities, quarries and processing plants need to be carefully screened to ensure that their entry into the premises is valid. Concurrently, their identity needs to be verified to ensure that they are indeed the person they claim to be. By not confirming these two elements, mining operations are opening themselves up to potential security risks.

According to ExcellentID’s Riaan van den Berg, a best practice visitor management system should form part of the whole security equation, which includes deterrence, obstruction, identification, detection and response. “By being able to accurately identify people entering one’s property, there is an automatic deterrent to illegal entry. Furthermore, verifiable identification assists with detection.”

By instituting a visitor management system, on-site and remote security teams are able to determine who is on the premises at all times and to keep an accurate record of who visited whom and when. “In addition to providing heightened security, this is also helpful from an occupational health and safety perspective, since it is able provide management with critical information regarding people on site in the event of an emergency,” adds Van den Berg.

One way of ensuring that only visitors with verifiable identification are permitted to enter mining facilities is the scanning of drivers’ licences using proven 2D barcode scanning technology.

The machine readable component (barcode) of the South African driver’s licence (SADL) contains the visible information displayed on the card, with the exception of the fingerprint image and the driver’s signature image. The driver’s photograph, as reflected on the front of the card, is embedded in the 2D barcode and all data is encrypted. In order to decrypt the data string, a decryption algorithm is used by solution providers.

The latest-generation eSkan SADL 2D barcode scanner from EXID incorporates cutting-edge OEM barcode engine technology from Honeywell. Available with an LED-based aimer, the N6600 series integrates Adaptus 6.0 technology for unparalleled 1D and 2D scanning performance. The scanner quickly and accurately reads barcodes and OCR fonts with motion tolerance, even for hard-to-read codes like the SADL barcode.

“Since the data contained in the SADL 2D barcode is captured by the Department of Home Affairs (DHA) it is considered to be valid and verifiable. By a simple process of deduction, one can then assume that any data that is captured by a reputable SADL 2D barcode reader from the SADL barcode is both valid and verifiable,” Van den Berg points out.

For more information contact ExcellentID, 086 107 7776, [email protected], www.exid.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Electrical fire safety in lithium-ion battery rooms
Fire & Safety Residential Estate (Industry) Products & Solutions
Pratliperl is a non-combustible, ultra-lightweight aggregate that can be mixed with cement and applied as a plaster or screed to walls, floors, and ceilings. When applied at just 30 mm thickness, it delivers a two-hour fire rating.

Read more...
The first choice for electric fence management
Stafix Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
In South Africa, over 500 housing estates use JVA Perimeter Patrol, making it a widely used Electric Fence Management providing seamless integration with alarms, CCTV, VMS, access control and control room third-party software.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.