Utilising access control for a safe return to work
Share this content
Employers today face a new challenge: to provide a safe and clean work environment as employees bring with them a new social consciousness centred on public health awareness, social distancing and hygienic spaces. As employers consider a return to the physical workplace, they must adapt to new requirements, implement new procedures and leverage technology to alleviate their employees’ concerns.
Access control plays a critical role in creating a safe back-to-work strategy. Organisations can leverage contactless physical access technologies — including mobile credentials along with Bluetooth solutions — as well as implement location services and visitor management tools to provide employees with an experience that supports a healthy and safe work environment.
As organisations move toward re-opening their offices, workers bring with them a new awareness of issues around human proximity, environmental and surface cleanliness and the sharing of publicly accessed resources such as touch screens and keypads. Hygiene isn’t a new concern, but the level of awareness is new, as well as the need to give employees the confidence that their workplace is not only secure, but healthy and safe.
Physical access is a prime area of interest. Crowded entryways, elevators and shared working spaces are a threat to safe social distancing. Credentialing processes that come with high human-to-human contact are also a cause for concern.
Those who manage physical access can play a key role in helping to meet these changed expectations. With health and safety concerns at the forefront, security and facilities personnel have the opportunity to be the heroes of the day. At a time when employee safety is not just an ordinary need, but an extraordinary moral obligation, teams can rise to the fore with proactive solutions that meaningfully impact quality of life. Access control management can help route employees, in tandem with efforts to stagger work times. Physical access control systems (PACS) can also leverage location services to support contact tracing and reduce crowding and these same systems can be used in support of thoughtful visitor management.
While contactless credentials inherently support a touchless “badging in” experience, employers and building managers should implement these technologies as part of a holistic approach to building management. Clear policies, explicit signage, cleanliness protocols — all are part of this big picture.
Those looking to support a safe return to the workplace can look to technology to help minimise the high-touch human interactions that have characterised PACS in the past. By upgrading from legacy systems to more modernised solutions, it is possible to significantly reduce human contact around access control in a way that directly addresses employee concerns.
Touchless access control
Various forms of touchless access control can help to reduce viral spread
at human-to-object touchpoints. By reducing contact between humans and the objects related to access control, security could help to minimise potential cross-contamination.
Automatic door operators, revolving doors and sliding doors — all can help to reduce contact at high-volume entry and exit points. These can be coupled with contactless credentials and readers to ensure security while minimising surface contamination.
Another strategy involves the use of long-range capable readers that leverage Bluetooth Low Energy (BLE) connections to deliver read performance at a distance. With a read range of up to several metres, BLE can further distance employees who might otherwise crowd up around readers and doors.
Mobile access likewise reduces the need for employees to physically touch cards and communal readers. Organisations that rely on keypads or two-factor authentication may find mobile credentials and mobile capable readers to be a more hygienic alternative. The user is required to unlock their phone using a passcode, fingerprint or facial read in order for the phone to unlock, thus delivering two-factor security without the need to touch a shared keypad.
In the same way, mobile also allows for a biometric layer to be added to the access experience. Businesses can configure the mobile credential to only work when the device is unlocked, thereby requiring the owner to authenticate using their enrolled biometric, whether fingerprint or facial recognition. That mitigates the risk of a lost, stolen, or shared mobile device from being used. And by leveraging the technology on the mobile device instead of at the door, users are only touching their own device and not a touchpoint that is shared with every other occupant.
Touchless credentials, including mobile-based, shouldn’t be limited to opening doors. Organisations also may find that these credentials support more hygienic protocols for logging in to networks, paying for vending, or activating printing.
In order to reduce contact at shared surfaces, these technologies need to be implemented
in tandem with clear policies and supporting signage.
Most credentialing processes rely on a high degree of human-to-human interaction: someone in IT or the card office prepares the card, the card may then be passed to HR or the front desk for delivery to the user. And when a card is lost or stolen, the process repeats. Whether it is an employee or a visitor, the credentialing process is typically a high-touch operation.
Over-the-air provisioning minimises contact for those seeking credentials and it can have a dramatic impact on the human-to-human contact for the administrator charged with assigning credentials. Fewer visits from those looking to obtain credentials significantly reduces the risk factor for those that normally see a range of personnel on a daily basis.
Visitors introduce a new variable to the equation. They must be credentialed upon entry and their untracked movements can pose a health risk, or at least introduce a dangerous unknown should contact tracing become necessary.
Solid policies and advanced technologies can ensure safe movement of visitors. Visitor management solutions can be used either standalone or in conjunction with an organisation’s access control system. Visitors self-register in the lobby and hosts are notified when they arrive. Driver’s license scanners, barcode scanners, cameras and printers all help support those front desk processes.
While the primary use case is for visitors, these systems can also be used to issue employees temporary badges for single day use, or to issue replacement badges. Visitor management solutions are also ideal for a range of high-volume settings, including healthcare, schools and logistics — all places where physical access control is critical and visitors are frequent.
Even more, records from the visitor management system can be used for follow-up tracking of potential contacts in case an employee or visitor receives a positive virus test result.
Key to keeping people physically distanced is knowing where they are at any
given time. Much how GPS is used in outdoor settings, location services leverage BLE beacons to ping off gateways that in turn can identify the location of individuals in a physical space. An individual’s identity can be based on an ID card which broadcasts continually, creating a virtual map of location relative to the fixed gateways.
Location services give management a means to be proactive rather than reactive in their efforts to promote physical distancing.
The same system could make space utilisation more efficient. Connected beacons could broadcast room occupancy, for example, letting people know which spaces are free and which are in use. In the same way, this connectivity could serve as an early-warning system.
Making the most of technology
For those charged with implementing and overseeing physical access control, these are extraordinarily challenging times.
While technology can play a significant role in supporting social distancing and other pandemic-related needs, policies are at the core of any successful return-to-work effort.
It is critical, for example, to have solid audit systems in place. PACS systems generate logs, reports and archives — invaluable information, if put to good use. Building managers can leverage this key data to see who was in the facility and when, in order to build a fuller picture of the operational risks.
By Sanjit Bardhan, Vice President – Head of Emerging Markets, Physical Access Control Solutions at HID Global