User's basic guide to access control

Access & Identity Management Handbook 2004 Access Control & Identity Management

The outcome of the risk assessment of your premises will determine the level of security you require and in turn influence your choice of access control system to be used.

1. Risk assessment: Carry out a comprehensive risk assessment of your premises and decide the level of security you require before planning your access control system. Take into account any special features you may require.

2. Appearance: Your access control system is often the first impression made on visitors to your premises. Consider environmental aspects and the aesthetics of your building.

3. Ease of access: Examine the layout of your system. Do your entry and exit procedures allow legitimate users to pass without undue effort and delay?

4. Ergonomics: Consider the physical aspects. Can PIN pads, card and token readers be accessed without difficulty? Can displays be readily observed?

5. Training: Are your staff fully aware of the role and operation of your access control system? Your installer should provide adequate system training.

6. System management: The integrity of your access control systems must be preserved. Are you fully conversant with correct system management and administration procedures? Request well defined written procedures from your installer.

7. Database management: Are you aware of the legal implications concerning personal data held on your database?

8. System maintenance: Your installer should supply all relevant system documentation, eg, log books and service schedules. Are you aware of the actions required on systems breakdown? Do you have a satisfactory system maintenance agreement in place?

9. Interaction: Your access control system may supplement other security measures. Consider system compatibility.

10. Compliance: Are you and your company compliant with: Promotion Of Access To Information Act; Regulation Of Interception Of Communications; Electronic Communication And Transactions (Critical Databases And Consumer Protection). Are you familiar with the basics of Data Privacy Law in South Africa?

11. Objectives: Are your desired objectives being satisfied? If necessary, carry out a further risk assessment and address any shortcomings accordingly.

Access control is only one important element of your overall security system.

Source: British Security Industry Association,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Enhanced biometric technology for mines
September 2019, ZKTeco , Mining (Industry), Access Control & Identity Management
Biometric identification and authentication are currently used at various mines in South Africa and in the SADC region.

Improving access in mines
October 2019, Astra Fasteners , Mining (Industry), Access Control & Identity Management, Products
The VP1 controller provides full access control and remote monitoring of intelligent locks without having to wire into a network or install, manage and maintain software.

Invixium and Pyro-Tech partner in South Africa
October 2019 , News, Access Control & Identity Management
Invixium, a manufacturer of IP-based biometric solutions and Pyro-Tech Security Suppliers have announced a new distribution partnership.

Suprema receives FBI PIV/FAP30 certification
October 2019, Suprema , News, Access Control & Identity Management
Suprema has announced that the company's BioMini Slim 3 has received FBI PIV (Personal Identity Verification) and Mobile ID FAP30 certification.

Frictionless access with a wave
October 2019, IDEMIA , Access Control & Identity Management, Residential Estate (Industry)
IDEMIA was the Platinum Sponsor for the Residential Estate Security Conference 2019 and set up its MorphoWave Compact frictionless fingerprint biometric scanner at the entrance to the conference.

Streamlined access and reporting
October 2019, Comb Communications , Access Control & Identity Management, Residential Estate (Industry)
The main focus of the Comb stand was its practical demonstration of the MK II Lite intercom system with third-party integrated products.

Customised and integrated solutions
October 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry)
iVisit offers both high-end and low-end residential complexes a cost-effective visitor management solution that is fully integrated into Suprema's offerings.

Access solutions for every estate
October 2019, Impro Technologies , Access Control & Identity Management, Residential Estate (Industry)
Impro's flagship Access Portal solution comprises one of the most user-friendly software solutions on the market.

SALTO achieves Environmental Product Declaration (EPD)
October 2019, Salto Systems Africa , News, Access Control & Identity Management
SALTO Systems has announced that it has received the first Environmental Product Declaration (EPD) for XS4 smart locking solutions, including the XS4 Original model for the European and Scandinavian standard ...

Managing staff effectively
September 2019, dormakaba South Africa, iPulse Systems , Integrated Solutions, Access Control & Identity Management
Workforce management solutions allow organisations to track the relationship between productivity and the cost of employment, incorporating issues such as health and safety, T&A, rostering and more.