classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Keeping guarding personnel on mines safe
October 2018, Mining (Industry), Security Services & Risk Management, Products

They patrol your property in the dead of the night, often risking life and limb to ensure that your assets are secure from the clutches of the criminal element. Hi-Tech Security Solutions spoke to a few local companies about how technology is providing mine operators with the tools to keep patrolling security officers safe.

The first order of business is the ability to track exactly where security officers are at any point in time. Laura Pretorius of Instacom, says that it has a solution called Mission Critical Locate (MCL) that enables live and historical tracking of all staff on ruggedised mobile devices. This also enables the dispatch of a response team that knows the right location to resolve any situation before anyone gets hurt. This live monitoring of staff is conducted in a control room environment from anywhere in the country.

The tracking app also provides security officers with a panic function that works together with the tracking application. Should the security officer press this panic button (located on his or her mobile device), the control room will be notified by an audible alarm. The PC software will then pinpoint the location of the officer and establish what team members are in the vicinity to assist with the event. The control room operator can view the map, and see if there is traffic en route to the incident, thereby minimising reaction time and maximising the safety of the security officer.

Once the panic button has been pressed, an incident may be recorded automatically by the device and saved to the cloud in case this information needs to be retrieved for investigation. The controller has the ability to listen in and thereby determine whether the event is an actual panic or merely a false alarm.

An electronic occurrence book/incident reporting system enables the security officer to actively capture an incident and record what he sees via voice. This provides him with enhanced safety since he no longer has to physically write a comment, allowing him to stay alert and record the incident. The incident message is then sent to all relevant parties.

Automatic discovery and dispatch

Keith Lawrence of BetaTrac, cites the company’s eGuard as an alternative to a handheld device. The eGuard is a GPS-enabled tracking device within an armband worn on the security officer’s left upper arm. This effectively keeps the officer’s hands free and the unit is located out of harm’s way. “When we designed the eGuard, the main focus was on the safety of the patrolling security officer, so it has a panic button and is linked via GPS for accurate positioning every 30 seconds. This regularly relayed signal differentiates the device from those which only emit a signal at the security touchpoints or when a panic button is pressed.”

Because mine properties are very large, with a correspondingly extensive patrol area, security officers need the reassurance that no matter where they are on the property, they will have instant access to a response team via the control room when they activate the panic button.

Lawrence explains that when BetaTrac developed the eGuard in 2010, there were no other body-worn devices available. Combined with the company’s AIMSS (Analytical Intelligent Mobile Security System), which sits on the back-end in the control room, eGuard enables the security company response vehicle to be directly linked to the eGuard duress panic position (via the RapidTrac vehicle module). This eliminates the stress of locating the nearest dispatch vehicle, thereby reducing the critical time to respond, since mere seconds may save a life.

Not only does RapidTrac provide information on the nearest vehicle to a panic situation, it also assists management with an overview of vehicle events such as the vehicle’s location, excessive and harsh braking, and all stop-start incidences. It also enables the most efficient and rapid deployment of vehicles when a security officer activates a panic button.

“Both the eGuard and RapidTrac come with full daily, weekly and monthly autonomous reporting, highlighting performance of all involved. In addition, daily status reports show the real-time status of all the modules in the field. All violations and necessary alerts that are sent to the control room are also mirrored to mobile phones and emails, notifying management at any level selected. eGuard is always on duty in the field as a battery swap-out takes approximately only 30 seconds and it never needs to be docked for recharging,” states Lawrence.

Using RFID

Casey de Villiers and Steve Boulton of Active Track, believe that it is advisable to place RFID tags at key points in facilities such as access and egress points, fence lines, machinery stores, and areas where extraction, sorting, crushing and screening takes place. This will serve companies from both a security and safety perspective. In the first instance, a security officer will be provided with a predetermined patrol route and the times required for him to conduct his patrols at these RFID tag points, whether they be external or internal points.

Boulton adds that a device, such as the Active Track, used together with RFID tags in key safety areas, will maximise adherence to occupational health and safety (OHS) regulations through the provision of a record of regular safety checks. The reports that are generated are completely independent and cannot be changed, thereby verifying their validity and objectivity, and providing accountability.

Active Track has online software which supports its device. As it is GPS-enabled, an accurate time and date stamp confirms events. Should a scanning event be later than scheduled, or even completely missed, an alarm will be triggered and a notification will be sent via SMS or email to a responder and a call made to the security officer on the device to establish the officer’s status.

Boulton points out that most mines today outsource their security in order to contain operational costs. Active Track can be used to determine whether the security officer is patrolling according to the required SLA. The reports generated can be used for disciplinary hearings and will provide protection for both an aggrieved client or for a security officer who has been wrongly accused.

De Villiers says that in addition to a panic button, the Active Track device contains both a shock sensor and a call-in function. The shock sensor is activated when the device is dropped and it places a silent call to either the client or a call centre/control room that can then listen in on the event.

“We train security officers and control room personnel to calmly and methodically handle panic situations and we brief customers on what solutions are best suited to lone worker protection. The location of the event is precisely pinpointed via GPS and a notification is issued to a predetermined recipient. The Active Track device can function with as little as 7% Internet connectivity and still allow the movement of the device to be viewed as the security officer patrols.”

Additional safety mechanisms

Another aid to security officer protection is the deployment of duress RFID tags. De Villiers explains that these tags are not scanned during a ‘normal’, patrol but when the security officer is being held under threat when he/she is trained to scan the standard as well as the duress tags. This action sends an alert to recipients and reaction teams can be deployed to assist him.

Lawrence says that eGuard is adding another element to the safety of all security personnel working on an opencast mine. With many large vehicles moving around a site, it is important for officers to be aware of their presence. “We have leveraged the Internet of Things (IoT) by adding an active RF tag to the eGuard so that all the vehicles fitted with a transponder will send an alert to people in specific predefined zones within their vicinity. This buzzer alert instantly notifies the security officer when the vehicle is nearby.”

Pretorius says that, in order to ensure security officer safety, it is imperative that one has secure and reliable communication, such as PTT. “Conventional two-way radios just don’t do the trick anymore, especially when it comes to range and clarity. When it is time to patrol, our devices are tracked, and a patrol alarm will be emitted, ensuring the employee has not fallen asleep. Should the security officer not accept the patrol alarm, the control room will be notified immediately, so that they can act accordingly, either contacting the guard or tapping into the device and listening in.”


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • From the editor’s desk: Converging access control
    November 2018, Technews Publishing, News
    Welcome to the Access & Identity Management Handbook 2019. We’re publishing this in January as opposed to our traditional end-of-year publishing schedule to make sure you have some bed-time reading for ...
  • Significant differences in ­perceptions on state of digital trust
    November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • A scan of fingerprint biometrics
    November 2018, Technews Publishing, Access Control & Identity Management
    Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
  • Your face tells a story
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
    Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.
  • The right access decisions
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management
    Making the right access control decision depends on what you want secured and how secure it should be.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.