User's basic guide to access control

Access & Identity Management Handbook 2004 Access Control & Identity Management

The outcome of the risk assessment of your premises will determine the level of security you require and in turn influence your choice of access control system to be used.

1. Risk assessment: Carry out a comprehensive risk assessment of your premises and decide the level of security you require before planning your access control system. Take into account any special features you may require.

2. Appearance: Your access control system is often the first impression made on visitors to your premises. Consider environmental aspects and the aesthetics of your building.

3. Ease of access: Examine the layout of your system. Do your entry and exit procedures allow legitimate users to pass without undue effort and delay?

4. Ergonomics: Consider the physical aspects. Can PIN pads, card and token readers be accessed without difficulty? Can displays be readily observed?

5. Training: Are your staff fully aware of the role and operation of your access control system? Your installer should provide adequate system training.

6. System management: The integrity of your access control systems must be preserved. Are you fully conversant with correct system management and administration procedures? Request well defined written procedures from your installer.

7. Database management: Are you aware of the legal implications concerning personal data held on your database?

8. System maintenance: Your installer should supply all relevant system documentation, eg, log books and service schedules. Are you aware of the actions required on systems breakdown? Do you have a satisfactory system maintenance agreement in place?

9. Interaction: Your access control system may supplement other security measures. Consider system compatibility.

10. Compliance: Are you and your company compliant with: Promotion Of Access To Information Act; Regulation Of Interception Of Communications; Electronic Communication And Transactions (Critical Databases And Consumer Protection). Are you familiar with the basics of Data Privacy Law in South Africa?

11. Objectives: Are your desired objectives being satisfied? If necessary, carry out a further risk assessment and address any shortcomings accordingly.

Access control is only one important element of your overall security system.

Source: British Security Industry Association,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Weatherproof Bluetooth padlock
Issue 4 2020, ASSA ABLOY South Africa , Access Control & Identity Management
The new ABLOY BEAT locking solution includes a novel digital key, a mobile app and an IP68-rated, weatherproof Bluetooth padlock.

Touch-free face recognition terminals
Issue 4 2020, Hikvision South Africa , Access Control & Identity Management
Hikvision announces touch-free MinMoe face recognition terminals for easier access control and time and attendance.

Contactless T&A
Issue 4 2020, LD Africa , Access Control & Identity Management
Matrix COSEC APTA is a mobile-based employee portal, allowing COSEC users to monitor and manage all their time and attendance, total working hours and leave options.

New touchless upgrades
Issue 4 2020 , Access Control & Identity Management
Invixium upgrades touchless biometrics technology and introduces fever detection enhancement kit.

Expanded entrance control
Issue 4 2020, Gunnebo Africa , Access Control & Identity Management
Gunnebo entrance control solutions are now available with body temperature control and building capacity management functionality.

Entrance control from Axis
Issue 4 2020, Axis Communications SA , Access Control & Identity Management
Access control solutions from Axis offer flexibility, agility and open platforms that are fit for both today’s needs and tomorrow’s.

Paxton releases latest door entry monitor
Issue 4 2020, Paxton Access , Access Control & Identity Management
Paxton has added to its video entry product line by launching its next generation standard monitor – the Entry Standard monitor.

Safety in work and education
Issue 4 2020, ASSA ABLOY South Africa , Access Control & Identity Management
Mobile access technology provides innovative ways of keeping safe in work and educational environments.

SALTO KS integrates with FICHAJ.ES T&A software
Issue 4 2020, Salto Systems Africa , Access Control & Identity Management
The technology partnership allows SALTO KS users to add attendance features to its cloud-based wireless smart access control solution.

32-inch touchscreen for facial recognition
Issue 4 2020, ZKTeco , Access Control & Identity Management
FaceKiosk-V43 is ZKTeco’s multipurpose facial recognition smart device running on Android with a 32-inch touch screen to provide a friendly and interactive user experience.