Effective, PoPI-compliant visitor management

Residential Estate Security Handbook 2017 Residential Estate (Industry), Security Services & Risk Management

Establishing the correct identity of visitors to an estate or complex is crucial to effective security. In the past, the tattered visitors’ book was standard at every gate, but now, everyone knows that these books are ineffective as information is largely inaccurate and mostly illegible. Moreover, with the Protection of Personal Information (PoPI) Act, paper-based access control registers will no longer be compliant and will become obsolete.

OnGuard has developed a solution for visitor management called Identiscan, a hand-held mobile data terminal effective in scanning both motor vehicle and driver’s licences. When using the Identiscan Electronic Visitor Management System (EVMS), all data is encrypted and stored offsite on a secure server to meet the most stringent regulatory requirements.

“Identiscan is a good security solution for access control and we offer it as a service to all our clients,” says Charl du Toit from SJC Security. “It takes away the work of handwritten security tasks and increases control procedures at estates and places of business.”

The system ensures both the identity of the user (the guard) as well as the visitor. Before using the device, the user first enters their PIN to identify them. This ensures that they remain accountable for management of the scanner as well as the allocation of the access record to the specific guard. There is no longer an option to say “I didn’t let that person in”.

Peter Bicar, estate manager at Silvertree Estate in Tokai, notes, “We have seen a real benefit in reduced crime by percentage on the estate since using Identiscan. It enables us to ascertain if the driver has a valid driver licence and that the vehicle is valid as well. All visitors, including contractors, are recorded entering the estate and I receive daily reports on the day’s activities. I am able to retrieve backup information from the server in order to follow up should an incidence occur.”

The benefits of using Identiscan are:

• Accuracy of information.

• Elimination of paper-based access control registers.

• Improved speed of processing visitors and contractors.

• No computer required as the data stored offsite.

• Automatic warnings of undesirables people/vehicles.

• In-depth reporting.

• Direct control of the gate or boom via the scanner.

“Identiscan is a massive deterrent for someone who wants to enter illegally. It also prevents people who don’t have a valid registration or identification from entering – there is just no basis for argument. If they don’t have a driver’s licence, they simply don’t come in,” explains Tony Heath from Stable Yard Estate.

He adds, “We have received very good service from Identiscan; there is never any downtime. We once needed something to be looked at and it was attended to in a matter of hours. The product is not just limited to use for guarding companies either. I am the chairman of a complex of 1550 houses and we have direct access to a list of all visitors on a daily basis, with their photo ID and full details so we can trace any internal incidences as they occur.”

For more information contact Identiscan, +27 (0)21 701 7777, www.identiscan.co.za.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
A winning combination for modern cybersecurity
Information Security Security Services & Risk Management
Companies are compelled to comply with legislative mandates and, more importantly, implement appropriate security measures for their customers and their most valuable asset – their data.

Read more...