Ergonomic design delivers practical benefits

Access & Identity Management Handbook 2017 Access Control & Identity Management

As early as the 18th century, the workplace has been studied as it relates to the worker. Fast forward to the 21st century and the principle is still being studied, but now under the broader name of ergonomics.

The word ergonomics originates from the Greek word ergos (work) and nomos (natural laws). In an ergonomic workplace, tasks and tools are designed to fit individual capabilities and limitations so people can do their jobs with greater comfort and convenience, and without being injured. More broadly, ergonomics can be applied to optimise larger systems like resource management, work design, human-machine interfaces, etc. within the organisation (hence the term ‘organisational ergonomics’ from http://ergonomics.about.com/od/M-R/g/Organizational_Ergonomics.htm).

When Morse Watchmans was first making its way into the security industry with an automated key control and management system, ergonomics was fundamental to its design. We studied how people of all shapes and sizes would use the device to make sure the display was properly positioned for correct viewing; that actual key access was swift and unencumbered; and when two or more cabinets were installed that the door openings were uniform.

These particular findings, along with a multitude of other tests and studies, were used to develop a key control system that encompasses four main principles of ergonomic design; those being safety, ease of use, productivity/performance and aesthetics. Following are the benefits of smart key control systems that align with these ergonomic design principles.

Safety

It goes without saying, but misplaced keys and lost assets can compromise the safety of the individual. To this end, a vandal-resistant cabinet design helps security personnel ensure that important keys are safe from unauthorised access, while stainless steel locking rings add to key security by deterring tampering. The design is complemented by an on-board alarm system that will sound if the cabinet itself is tampered with or if incorrect codes are repeatedly entered.

Access to the cabinets and to individual keys is controlled at all times, and every key is accounted for. When networked, a firewall and AES256 encryption technology for data exchanged between the cabinet and the server help protect the system and the organisation’s assets.

Ease of use

On the physical level, security key cabinets are designed to offer the flexibility needed for installation at almost any height that allows for the user to easily reach the cabinet and interact with it. A slanted console provides a natural viewing angle and makes it easier to swipe a card or use fingerprint identification to access the key cabinet. Once the cabinet is opened, the requested key location is illuminated so the user can easily identify it. Both larger touch screens and audio prompts help make the interaction faster and more convenient and can help improve productivity.

Productivity/performance

Keys are attached to a fob that features an identification microchip and a stainless steel locking ring. The security key fob fits into a cabinet key slot and, critically, automatically records all access activity. No more time spent manually recording key activity. The recorded data lets authorised users more easily determine who has keys out and when they are scheduled to be returned; meanwhile, instant e-mail or text alerts reduce the burden on management even further, letting them know an overdue key or when it has been returned. And of course, key inventory systems with integrated tracking can help prevent lost keys and reduce vulnerabilities – not to mention wasted time and user frustration.

Aesthetics

The aesthetically pleasing key cabinet with its visual display of organised key placement is far more appealing than a messy box of keys. Cabinets are designed for horizontal or vertical placement and multiple units can be precisely installed to maintain a professional appearance. System maintenance is also considered in the design, which allows servicing of the unit to be accomplished with minimal disruption and/or disassembly.

These and other benefits of key inventory systems are cumulative, helping make life easier for users, while also supporting the company’s activities and reducing the risk of losses. All of this is welcome news for the business itself – who says good design can’t support good economics?

For more information, contact Morse Watchmans, +1 203 264 4949, [email protected], www.morsewatchmans.com.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.