Access control

Depending on the policy of your employer and the client, you will be required to sign people in and out of private property. Using duty books and log books, recording names, dates, times of entry/exit, descriptions and other vital information will likely be duties you engage in.

Visitor’s pass:

  • Contains information allowing the guard to recognize which visitor’s need to be escorted.
  • Allows the guard to see who has authorized the visit
  • Status of the visitor
  • The business of the individual on the site

Material Access:

  • The removal of goods from a site is a very sensitive task and must be dealt with accordingly.
  • Computers, computer disks, and briefcases full of materials and things that people routinely leave a work site with.
  • The client must decide the necessary steps that need to be taken in order to protect his property.
  • The supervisor should inform you of the proper steps and process to follow in order to protect the owners property to your fullest capability.
  • Security should follow these steps carefully.
  • Security guards must comply with the protocols set up and take precaution with people entering and exiting the building.

TYPES OF ACCESS CONTROL:

  • The first form of access control is the security guard themselves (Physical security). Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • Locks and keys are also a common form of access control
  • Access control system. When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor.
  • Credential. A credential is a physical/tangible object, a piece of knowledge, or a facet of a person’s physical being that enables an individual access to a given physical facility or computer-based information system. Credentials can be something a person knows (such as a number or PIN)