1.0 Access Control
In the past, access control consisted of locks and keys, sometimes complemented with security guards. While the locks were cost-effective to install, and met a certain level of effectiveness, the long-term costs continued to mount. Most mechanical keys are easy to duplicate, and lost keys resulted in re-keying locks. As well, the lock and key system could not provide records of who accessed the building or when. The shortcomings of this system, and the emerging need for more efficient security and accountability led to the advent and implementation of modern access control systems.
1.1 What is access control?The modern use of the term access control has been defined by Security, Technology & Design magazine as "... a reading device located near a locked door or gate that is connected to a microprocessor and when the correct entry token is presented, access will be granted to that given locked door or gate." (Lionel Silverman, "Keyless Access Control," ST&D, Sept. 1999).
Controlling access gives you the ability to authorize, restrict or deny entrance or exit of people, vehicles and/or property at any given time in your buildings and facilities. In addition to performing basic lock and key functions, access control also establishes and controls specific access privileges for each person and each door within the facility. Real-time monitoring and event-generating alarm software functions provide the best possible security.
An effective access control system embraces the following elements:
- Automatic door unlocking/locking system (eliminating mechanical keys)
- Electronic tracking system
- CCTV interface
- ID badging (photo, employee/visitor status)
- Ability to grow and integrate with other security-related systems
An access control system grants or denies access or egress based on the correct identifying information presented as:
- A number entered on a keypad
- The encoded information of an access card scanned by a card reader
- A biometric attribute
- Or a combination of any or all of the above
The microprocessor in the reader transmits the information to the controller, which evaluates the validity of the request. Access or egress is then either granted or denied based on whether the information can be verified against a stored authorization profile. These profiles are designed to provide independent access rules for each person or entry point.
The profiles define the ability of the encoded card number, Personal Identification Number (PIN), and/or biometric attribute to gain access based on any number of the following criteria:
- Access level
- Door
- Time of day
- Day of week
- Previous events (i.e., mantraps, anti-passback controls, etc.)
- Alarm condition
If the information passes these checks, the secured door will unlock electronically. If the information is invalid, the system response may be to simply not grant entry, or it may also initiate CCTV recording, alarms, or dispatch physical guards or the police to the site.
More advanced access control systems also have the capability to integrate a number of facility control functions, including alarm events, on-line CCTV monitoring and recording, photo verification, photo imaging and badging, multiple technology cards, HVAC control and management, and automatic elevator control.
A truly integrated access control provides a central point of control, from a local or remote location, that offers a unified approach to an electronic infrastructure system. This single location can be programmed to monitor and control multiple sites across the country or around the world, enabling higher security for global organizations.
1.3 Why should I invest in an access control system?An access control system is an investment. It increases security, enhances overall building integrity and improves operations efficiency by controlling access and providing recorded data that verifies who has accessed the building (or any secured portion of the building) at any given time.
It provides safety for employees and protection of physical and intellectual property. In an integrated system, it can also provide burglar alarm, CCTV, HVAC, elevator control, time and attendance, facility management, and asset tracking and photo identification/badging capabilities. Information can be monitored, controlled and synchronized from one central point, eliminating the need for costly, independent systems.
The integrated capabilities of such a system provide significant cost savings in equipment, wiring, and manpower. Some of the points to considering when investing in an access control system are:
- Life Safety:
Violence in the workplace continues to be the leading concern of security managers at America's largest corporations. The Workplace Violence Research Institute reports that each workday, an estimated 16,400 threats are made, 723 workers are attacked and 43,800 are harassed. OSHA reports that more than 1,000 U.S. workers are victims of homicide at work each year. Approximately two million assaults and threats of violence occur each year in the workplace, according to the United States Department of Justice.
Estimates propose that workplace violence costs U.S. businesses as much as $4.2 billion annually. By limiting the access into parking facilities and work areas to authorized individuals, the possibilities of assault or accidents are greatly reduced.
Another benefit in this area is that the installation of an access control system will often result in a reduction of insurance premiums. Security Magazine's Year 2001 Profile study noted that security professionals ranked liability insurance as the seventh most important security issue for 2001.
- Intermediate Security Response:
Whether monitoring a system with on-site security personnel, or utilizing an outside agency, access control systems can report forced, or unauthorized, entry into protected areas. The system can provide continuous security, while allowing authorized individuals to perform normal job functions within a secure environment.
- Asset Protection:
All facilities have assets to protect, ranging from high-cost equipment and products to intellectual property. The level of security within areas containing such material can be modified based on the potential threat. Records of who accessed the areas, and at what times, are available real-time.
- Employee Productivity:
Employees can be granted access only to work areas where their presence can benefit the organization. Employees may be prevented from entering work areas where their only probable cause for entry would be to socialize with other employees.
- Multi-tenant Building Protection:
An access control system can be structured to cover multiple tenants in a building at whatever level of security they require on an individual basis. Individual tenants can receive reports from the main system that are specific to their floor, suite or personnel, thus reducing total operating costs for each tenant.
- Reduced Security Costs:
The response time of physical security guards can be enhanced with a cost-effective access control system, reducing costly human error in the field. In some cases security guard services can be replaced completely by an electronic system.
- Improved Accountability:
All access-related activities within a facility can be monitored and analyzed for compliance with policies and procedures, effectiveness of access privileges, and changing security needs.
- Buildings and Facilities Management:
The system controller can control and override entry points with simple point and click computer functionality in the event of emergency evacuation. Heating, ventilation and air conditioning systems can also be controlled automatically or manually via a card or keypad.
- Elevator Control:
An access control system allows or restricts access to any floor, or group of floors, while granting free access to public floors.
- Real-time Card Access Deletion or Replacement:
A lost or stolen access card can be deleted and voided from a system quickly and easily. New cards can be activated just as quickly. In a key and lock system, if an employee loses a key or leaves the company without returning the key, the locks need to be changed before the building can again be considered secure.
- CCTV Integration:
Integrating a monitored or recorded CCTV system with an access control system can enhance the effectiveness of CCTV by providing programmable inputs and outputs. This enables event-generated recording or monitoring by combining a detector within a camera viewing area. Images can then be viewed and controlled via a computer monitor screen with simple point and click functionality.
Nearly every type and size of business can benefit from an access control system. Whether you have 1 door or 3,000 doors, there is an appropriate system available to meet your requirements.
Crime has reached a plateau over the past few years, but business crime has grown. There are fewer reported incidences of crime, but at higher losses. Those losses translate to liability increases.
Security Magazine's Year 2001 Profile study brought out the top concerns for security professionals. They ranked employee theft first, property crime second and access/egress third. Then came violent crime, computer security, parking security and liability insurance.
To meet the requirements of safeguarding both employee and property, companies are investing more money into high-tech security equipment. In fact, according to the "World Security Products & Systems" study published by The Freedonia Group Inc., the world market for security products and systems is projected to grow nearly 9 percent annually through the year 2004, approaching $60 billion. These figures are clear that security directors and building managers are taking security seriously.
The following are examples of specific business sectors and their most outstanding needs relating to security and access control.
- Retail
Retailers need to restrict unauthorized employee access to loading bays, stock rooms and warehouses to improve safety and reduce shrinkage sue to internal and external theft. Integrated systems can also control camera surveillance systems, produce photo ID badges for personnel and control HVAC and lighting.
- Sports Arenas and Stadiums
Sports facilities require control over public, player and employee access to unauthorized areas. Integrated systems can produce photo ID badges for personnel and control HVAC and lighting.
- Health Spas and Leisure Centers
Clubs can issue members an access card that is programmable to allow access to specific areas that are appropriate to their membership level. Members who are delinquent on their membership fees can be identified and denied access privileges immediately until fees are settled.
- Transportation
(Airports, Rail and Bus Terminals, Sea Ports and Trucking Distribution Centers) Public transportation terminals can restrict access to sensitive areas such as runways and baggage areas through the use of secured doors and photo ID badges for authorized personnel.
- Chemical Plants and Oil Refineries
Plants and refineries may need to prevent sabotage, vandalism, and corporate espionage. A "who's in" feature is invaluable in the market when a fire, explosion or other catastrophic event creates a need for emergency evacuation.
- Pharmaceutical
A pharmaceutical company's profits for 10 years can be linked to just one technological breakthrough. Intellectual espionage, narcotics theft, malicious tampering of product, and threats from animal rights activists are all reasons a pharmaceutical company would want to increase their security.
- Automobile Industry
The automobile industry faces the threat of industrial espionage and pilferage of parts and tools. There is more concern for employee theft in this industry. Time and Attendance is often more necessary than access control due to tight union regulations. With an integrated access control system, timecards can be maintained using the same system.
- Base Metals Industry
Access control is an integral part of a total energy management system. Photo ID badges can be issued for personnel, both for access and egress control, as well as worker safety. Disaster planning makes a "who's in" feature very useful. As well, certification scheduling requirements can be integrated into an access control system.
- Financial Institutions
Banks and other financial companies can issue photo ID badging for personnel to control access to records, vaults, and computer files. The bank may also issue identification cards to customers in the form of bankcards. An integrated access control system can tie in video surveillance systems and, in the case of multi-floor organizations, elevator control.
- Insurance Companies
Insurance companies can issue photo ID badging for personnel to control access to record vaults containing confidential information. Multiple locations can be interconnected on the company WAN to monitor and administer badging and access from a central location.
- Electronics
Electronics firms face the threat of international espionage. Defense contractors working on top-secret projects may need additional security in parking lots and can benefit from mantraps and/or biometric backup systems. The 'Who's In" feature is commonplace in this application.
- Service
(Medical, law offices, computer services, advertising, cleaning and maintenance)
Many firms in the professional service sector need to limit access to computer data and hard copy files. - Government Installations
Government installations most often require access control and photo ID badging for personnel in secured areas to protect intellectual property and employees from the threats of terrorism and international espionage.
- Defense Industry
The defense industry has the obvious requirement to safeguard its national security. Access control, integrated with photo ID badging, CCTV, and physical guards all work together to avert terrorist threats.
- Educational (Primary and Secondary)
School facilities can issue student photo ID badges to control access to classrooms, computer labs, science labs, administration offices and dormitories. Integrated systems such as Time and Attendance, fire, and building management can be tied into the access control system. Even meal accounts for eating in the cafeteria can be added, lowering the risk of youth being harassed by peers for lunch money. An additional barcode affords the school the ability to offer library privileges on the same card.
- Hospitals, Clinics and Research Facilities
Medical facilities face a variety of potential dangers, with access to patient records, drug supplies, and hazardous areas. A multi-technology card can be used to gain access to authorized areas of a hospital. An added magnetic stripe on the card allows the food service department to track each employee's account, saving time waiting in cafeteria lines.