Track Employee Access
Restrict Visitor Passage
Audit Access
Interface to Cameras
Many business owners believe that locks and keys are enough to control access to certain areas of the business. But to often the keys are left on desks, unguarded in key cabinets that are unlocked, lost or even stolen. Usage is not tracked when the owner passes the keys to its employees which exposes the business to a hidden vulnerability.
Often business owners and managers do not take into consideration the soft assets that are "under-the-roof" of its business. Access to that information sometimes has more value than the hard assets that are within a business. Access to all areas of a business do not guard the owners responsibility of protecting it. Exposing this information to rouge employees or office cleaning personnel that may not have a clean police record places the company at risk and restriction to that data becomes of issue. Keeping audit records and access times to certain areas or individuals puts an additional layer of protection guarding those areas. Protecting financial data from certain individuals while knowing who had access to the area protects its customers from the theft and sale of non-public information that is usually stored within company files and can be copied and sold without a company knowing it.
With the new FTC regulations and the associated steep fines associated with Work Place Identity Theft and the new PCI Compliance regulations that took effect in November 2008 it becomes necessary for managers and business owners to not only understand the requirements but also put into place the necessary steps for your protection. Protecting you, your business and your home and both hard and soft assets is our specialty and our primary objective.
Each time a door is accessed we have the ability to record which card accessed the door and the time it was accessed. Unlike keys that can easily be copied during a lunch break, HID cards can not be copied. Each card has its own encrypted key that is associated with an employee. If an employee loses their keys or they are stolen, control is easy to maintain. Other areas that need to be considered are:
Even the times that an employee can access an area can be controlled. If you want to restrict access after hours or during the weekend to an area, system software allows you to change the software to modify the user. If an employee quits, deactivate the card or keyfob so a rouge employee can immediately be restricted from a facility. We install:
Software controls all aspects of a user and we can network to your existing computer to load software.
Each time a door is accessed a record is made in the log so if certain unusual activity starts to happen you can view the times that individuals were in the facility and when. Reports can be queried and viewed to establish policies to access certain areas.
Access to credit card data is restricted to only those your allow. When the system is properly maintained and installed it meets one area of PCI Compliance standards.