Identifying good visitor management practices

Access & Identity Management Handbook 2019 Access Control & Identity Management, Asset Management

There are a number of factors that security managers need to consider when implementing visitor management and access control protocols. According to Excellent ID’s Riaan van den Berg, securing a device that eliminates the issues around traditional visitor logbooks entails careful due diligence and a request from suppliers that they provide a portfolio of success stories.

“Apart from the problem of highly inaccurate and often illegible information provided in paper-based visitor log books, visitors are often disinclined to write down their personal information in a medium which can be read by many people. By using an electronic device to capture and verify personal data, such as that found in a South African Driver’s Licence (SADL), visitors can be assured that the data is safe from prying eyes,” says van den Berg.

Additionally, with the exception of data that is contained in a blacklist database, captured data is generally kept for only a very short period of time. “Using an electronic device with its associated software means that one can also add specific people to the blacklist, thereby helping to build up a reliable database of known offenders. And because one can log into the system at any stage, real-time data is available for reporting purposes,” he adds.

The use of an electronic identity-scanning device does not obviate the need for rules of access. Security officers need to be well trained and versed in the systematic capture of visitor data and should be able to react quickly and efficiently when a person flagged on the blacklist tries to gain access. However, a lot of the decision making is taken out of the security officer’s hands since the verification of personal identity data is automated when using an SADL reader,” says van den Berg.

It is important when selecting an identification verification device to ensure that it complies with the PoPI Act. Van den Berg explains that EXID’s own back end software as well as the physical eSkan device work together with the responsible operations manager on site to guarantee that all data is collected in accordance with the PoPI Act.

The back end system for such a data collection device requires very little investment in terms of infrastructure. Typically the system would require a PC and a network and/or access to the cloud as the throughput speeds required are minimal compared to the capture of surveillance footage, for example.

“This, together with actual cost of the device and its accompanying software, means that the solution is extremely cost effective. For example, the overall cost of the solution for a single site with one entry/exit, one security officer, one scanner together with installation, training and Wi-Fi infrastructure (excluding a PC/server) could start at under R50 000. The benefits derived from capturing accurate, verifiable visitor data are apparent but security managers do need to do their homework in terms of aligning themselves with a reputable provider,” says Van den Berg.

For more information contact EXID, +27 12 548 0940, [email protected], www.exid.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simplified fire and facilities management from one screen
Fire & Instrument Services Facilities & Building Management Fire & Safety Asset Management
Fire & Instrument Services (F&IS) and Scansoft are simplifying the complexities of facilities management, including fire safety, with iBMS Adrenaline, an integrated building and facilities management system enabling companies to monitor, control, and manage system hardware through a single interface.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Natural catastrophes and fire risks top concerns
Security Services & Risk Management Asset Management Residential Estate (Industry)
Natural disasters are the highest risk in the real estate industry, followed by fire and explosions, and then business interruption. Estates must prioritise risk management and take proactive measures to safeguard their assets, employees, and reputation.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...