Integrating access with OHS and operations

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

Occupational Health and Safety (OHS) controls have become as important as security controls when it comes to the control of access to a facility or restricted environments. Many clients today need to check and manage statutory accreditations and competency prerequisites prior to allowing personnel and visitors onto their premises or work areas.

Some of these requirements include legislative, HR, health and safety, and accreditation or competency (training and induction) prerequisites. This data is generally managed by the HR department and the security or access control systems merely block or unblock the user’s access manually from time to time when notified that the user’s ‘certification’ is valid or has expired.

Veracitech develops and deploys plug-ins on the Babylon platform for various active client applications; one such application is the Veracitech Babylon Certifications solution.

The plug-in comprises access control and automation, incorporating the certifications prerequisites listed above. These certifications can be defined and managed either directly in the Veracitech Babylon Certifications application or can be integrated with existing HR or other databases.

Various certifications and competencies can be defined in the system, which can then control access to certain areas based on whether the person requesting access meets corporate requirements and vetting. For example:

• Access can be determined by the security level/profile as well as if the user has a valid medical check-up or has been certified in a certain skill required for access to a specific area.

• Before allowing anyone to start a truck or machinery on a plant, the system may first check to ensure the individual’s licence is up to date and that they underwent a breathalyser test that morning before granting access to the truck or machinery.

Feedback to the user and an explanation for Access Denied can also be displayed on the Veracitech interactive touch display modules at the access points. These are fully integrated and managed from the Veracitech Babylon Certifications application.

Babylon Key & Locker Management

Many industrial clients use smart key and locker management systems, such the TRAKA system from ASSA ABLOY to manage who has access to certain keys. Again, here the client traditionally has to control the key management as a separate, standalone system from their access control, security or HR/OHS systems. With intelligent key systems, keys are available 24/7 to authorised staff only, and usage can be managed.

Veracitech has partnered with Traka and is the only authorised system integration partner on the Babylon platform for Traka systems. Veracitech again developed a plug-in for the Babylon platform, the Veracitech Babylon Key & Locker Management solution.

In this solution, high-level database integration with the Traka backend allows key and locker users to be managed seamlessly in the Babylon user database. Access level definitions ensure that full control and management of key and locker rights is centrally administered from the Babylon environment only. Through this high-level Babylon/Traka integration, the client can now incorporate access controls with key/locker controls, and even combine this with the certifications solution mentioned above.

• Access can be allowed / denied based on keys returned: e.g., users can be prevented from leaving the site without returning keys.

• Access rights to keys can be based on not just the key profile, but also the validity of the user’s certifications (users can only withdraw a vehicle or machine key if they have the prerequisite certification status, such as a valid driver’s or operator’s licence on record, or have passed the breathalyser test within the last hour, etc.).

• With the access automation features of XMP-Babylon, one can also control key or locker rights not just by access profile and certification prerequisites, but also by live status processing in the system. For example, a user can only withdraw a key if his manager is badged in and present at the time, or a user can only withdraw a key based on previously areas accessed (or not accessed) within a pre-set period.

• Key and locker alarms and events will also be reported and managed in the XMP-Babylon Alarm and Even Handling, alerting the administrator when keys are not returned on time etc.

There are numerous other applications and integrations Veracitech has developed on the Babylon. All told, Veracitech offers the design, installation, configuration and custom development and integration of multiple security and operational systems into the Babylon platform, which will allow clients to more efficiently manage their operations, even distributed operations, reliably from a central source. Veracitech is a bespoke system engineering house and direct authorised OEM partner for Autec XMP-Babylon systems. The company currently has a client list that includes companies like Anglo Platinum, De Beers, Petra Diamonds, Namdeb, Debmarine, Gemfields, South32, DTI, Transnet and others, including clients in Namibia, Botswana and Mozambique.

For more information, contact Veracitech, +27 11 888 7251, [email protected], www.veracitech.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...