Controlling visitor access on mines

October 2018 Mining (Industry), Access Control & Identity Management, Products & Solutions

Visitors to mining facilities, quarries and processing plants need to be carefully screened to ensure that their entry into the premises is valid. Concurrently, their identity needs to be verified to ensure that they are indeed the person they claim to be. By not confirming these two elements, mining operations are opening themselves up to potential security risks.

According to ExcellentID’s Riaan van den Berg, a best practice visitor management system should form part of the whole security equation, which includes deterrence, obstruction, identification, detection and response. “By being able to accurately identify people entering one’s property, there is an automatic deterrent to illegal entry. Furthermore, verifiable identification assists with detection.”

By instituting a visitor management system, on-site and remote security teams are able to determine who is on the premises at all times and to keep an accurate record of who visited whom and when. “In addition to providing heightened security, this is also helpful from an occupational health and safety perspective, since it is able provide management with critical information regarding people on site in the event of an emergency,” adds Van den Berg.

One way of ensuring that only visitors with verifiable identification are permitted to enter mining facilities is the scanning of drivers’ licences using proven 2D barcode scanning technology.

The machine readable component (barcode) of the South African driver’s licence (SADL) contains the visible information displayed on the card, with the exception of the fingerprint image and the driver’s signature image. The driver’s photograph, as reflected on the front of the card, is embedded in the 2D barcode and all data is encrypted. In order to decrypt the data string, a decryption algorithm is used by solution providers.

The latest-generation eSkan SADL 2D barcode scanner from EXID incorporates cutting-edge OEM barcode engine technology from Honeywell. Available with an LED-based aimer, the N6600 series integrates Adaptus 6.0 technology for unparalleled 1D and 2D scanning performance. The scanner quickly and accurately reads barcodes and OCR fonts with motion tolerance, even for hard-to-read codes like the SADL barcode.

“Since the data contained in the SADL 2D barcode is captured by the Department of Home Affairs (DHA) it is considered to be valid and verifiable. By a simple process of deduction, one can then assume that any data that is captured by a reputable SADL 2D barcode reader from the SADL barcode is both valid and verifiable,” Van den Berg points out.

For more information contact ExcellentID, 086 107 7776, [email protected], www.exid.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
Managing mining physical security risks
Zulu Consulting Security Services & Risk Management Mining (Industry) Facilities & Building Management
[Sponsored] Risk-IO, a web app from Zulu Consulting, is designed to assist risk managers in automating and streamlining enterprise risk management processes, ensuring no steps are skipped and everything is securely documented.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...