Biometrics in healthcare

August 2017 Healthcare (Industry), Access Control & Identity Management

There are various challenges employees in the health sector must face, the growth of decentralised facilities, standardising security products, cost containment across all physical security systems, employees and patients having a higher expectation of security, and protecting the privacy of patients and their records are just some of those.

Finding new ways to balance operating costs, patient expectations and cost-effective security solutions is sustainable with a phased plan for technology migration to IP-centric solutions. Different health sectors have various needs and these may depend on the high reliability and availability of security systems. Some require more cost-effective security for smaller facilities, higher level of validated access control in critical areas, and lower operating costs for security. One needs to take into consideration all these factors and look for ways that technology can improve the various facilities that need customised solutions.

The right solution

It is essential for the healthcare facilities to search the market, as certain companies have products that enable healthcare facilities to have access control systems, time and attendance devices etc., that help to ensure only authorised personnel have access to restricted areas of the building. Making use of biometrics within a hospital or pharmacy will ensure that security systems are more accurate and safe. Imagine having to deal with very private information and having to allow only a few people access to this information? Having a biometric device installed at that restricted part of the hospital or pharmacy will ensure that management knows exactly who has been in that area, and when and how long they have been in there. Having a biometric time and attendance system can make it easier for hospitals to be able to record the presence of doctors, nurses and staff. Such processes will enable the department heads to monitor employees better.

One may argue that because biometric machines usually require a fingerprint or thumbprint, or some other unique information to identify a person, that this can lead to serious risk of identity theft. Faking or obtaining fingerprints are virtually impossible. One cannot obtain fingerprints from a biometric reader’s memory or a database on a computer because these details are encrypted by an algorithm that is also virtually impossible to crack.

For more information contact ZKTeco (SA), +27 (0)12 259 1047, [email protected], www.zkteco.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...