Tag Archives: section title

Standard Operating Procedure (SOP) for Access Control

12 Dec

A – Standard Operating Procedure – (SOP)  – for Access Control

PURPOSE and definition of any access control SOP:

  • Purpose; SOP’s were designed to create uniformity of effort, and cohesion, thus resulting in the continuity of standards. These standards would also refer to unit standards, TACTICS: best practices, immediate action drills, intelligence gathering, surveillance and counter surveillance, interrogation, authentication, and legislative compliance among other things.
  • Aim; to couple objectives with standards; It becomes a standard for “tactical” implementation. (Tactical – implying; the use of military/ Police science that deals with securing objectives set by strategy).  Especially the technique of deploying and directing “troops” – guards -, and the use of terrain, and communication, as well as technology to effectively counter any threat with.
  • Strategy implementation;  Thus we design a strategy first, and then we use techniques – tactics/ SOP’s – to deploy guards/ resources for the greatest impact and effect, in executing our access control strategy.
  • Definition; To establish an integrated standard criteria and control system for all functions/aspects of access and egress control within the scope of standards.
  • Standards in this context refers to; something considered by an authority or by general consent as a basis of comparison; or an approved model. Put at its simplest, a standard is an agreed, repeatable way of doing something.

  Continue reading

The Purpose and Process of Security Access Control

5 Dec

We can speak of access control where we find a criterion for Authentication, Authorization, and Control.

The purpose of security guards and security devices at points of access. Is to create a perception of sanctuary and a presence of safety, and to enforce the access criteria.

Definition; Access control in general refers to a condition, or conditions (more than one) that must exist that specifically determines a criteria, or a set of criteria’s that has to be met, before access / entrance will be granted, thus restricting free access, by enlisting a criteria. This criteria could be simple or very complicated, physical, electronic or biometric (the recording of things such as people’s fingerprints or the appearance of their eye in order to identify them on an electronic system).By implication, anything from a key, to a credit card pin, to a finger print.

Access also implies egress, and rights

The point is exerting control over who can and who cannot access something has legal implications. Access infuses a right or a privilege that is constitutional, to a right, giving such a person user rights and denying others. Whoever has the key, code, pin, password ect., has rights of access, for or to whatever mechanism, or for whatever reason they might need it. This is called safety, which is also a right, and so too security. So we access some and egress from other rights, when we talk security, and the limitations to rights, and freedoms.

A way of thinking

Access control is a general way of talking about security, as a way of controlling people’s freedom of movement or access to any specific item, place, building, vehicle, resource or whatever. Access can be granted or denied based on a wide variety of criteria, such as predetermined.  This brings about a perception of security. By bringing about forms of control, control creates measures; processes, for dealing with entry/ access and egress, that is now referred to as a criteria for security. Continue reading

%d bloggers like this: