Can someone help me in getting information on dos and don'ts when using access control cards and systems in an office? We plan to implement the same in our office, and I have to issue the dos and don'ts to the employees regarding the use of the access control.
From India, Bangalore
From India, Bangalore
Dear Akash_Ganga,
It would have been much more wonderful if you had manifested your points and then asked seniors/members in this forum to add or modify them. Specific and clear-cut points are required to be integrated while designing such policies for employees.
An Access Control Card (ACC) is an identification card with the name and picture printed on it, specifically aligned with the company's identity. Measures are taken to ensure legitimacy when employees use them to access designated areas by swiping the card.
Do's:
- The ACC must be worn at all times for identification.
- The card must be physically shown on demand by officials.
- Every swipe is necessary when entering or exiting doors.
- Access cards are unique with distinct identifications; therefore, only the employee should handle the card carefully.
Don'ts:
If the access cards have magnetic strips, the main issue is that these strips can be easily demagnetized. Although information cannot be extracted from the card, not having it can limit the employee's access.
- The card must not be transferred.
- Avoid using the card in non-accessible/denied zones that are not relevant.
- Refrain from folding or tampering with the card.
- Do not create duplicates of the card as the original one contains magnetic chips that detect employee ID and information.
- Avoid scratching or using watermarks on the card that could damage the data.
When discussing system access cards, they should be similar, with a password linked to the data of the specific employee. This password cannot be changed without prior consent.
System access cards are quite expensive in the market, especially for companies that store significant data. The system card passwords should align with computer passwords preset by the IT department, and each card should be used for accessing a specific system.
My suggestion: If you use an Access Control Card as an ID card, it could serve the purpose well. Recent computer modifications include built-in password and face recognition systems, making additional software unnecessary.
All the best!
From India, Visakhapatnam
It would have been much more wonderful if you had manifested your points and then asked seniors/members in this forum to add or modify them. Specific and clear-cut points are required to be integrated while designing such policies for employees.
An Access Control Card (ACC) is an identification card with the name and picture printed on it, specifically aligned with the company's identity. Measures are taken to ensure legitimacy when employees use them to access designated areas by swiping the card.
Do's:
- The ACC must be worn at all times for identification.
- The card must be physically shown on demand by officials.
- Every swipe is necessary when entering or exiting doors.
- Access cards are unique with distinct identifications; therefore, only the employee should handle the card carefully.
Don'ts:
If the access cards have magnetic strips, the main issue is that these strips can be easily demagnetized. Although information cannot be extracted from the card, not having it can limit the employee's access.
- The card must not be transferred.
- Avoid using the card in non-accessible/denied zones that are not relevant.
- Refrain from folding or tampering with the card.
- Do not create duplicates of the card as the original one contains magnetic chips that detect employee ID and information.
- Avoid scratching or using watermarks on the card that could damage the data.
When discussing system access cards, they should be similar, with a password linked to the data of the specific employee. This password cannot be changed without prior consent.
System access cards are quite expensive in the market, especially for companies that store significant data. The system card passwords should align with computer passwords preset by the IT department, and each card should be used for accessing a specific system.
My suggestion: If you use an Access Control Card as an ID card, it could serve the purpose well. Recent computer modifications include built-in password and face recognition systems, making additional software unnecessary.
All the best!
From India, Visakhapatnam
Hi, Sharmila,
Thank you so much for your wonderful suggestion. I have noted the same. I have done the policy herewith, which is attached. Kindly review the same and let me have your good comments on it. If there is anything to be added, kindly let me know.
Regards, Akash_Ganga.
From India, Bangalore
Thank you so much for your wonderful suggestion. I have noted the same. I have done the policy herewith, which is attached. Kindly review the same and let me have your good comments on it. If there is anything to be added, kindly let me know.
Regards, Akash_Ganga.
From India, Bangalore
Engage with peers to discuss and resolve work and business challenges collaboratively - share and document your knowledge. Our AI-powered platform, features real-time fact-checking, peer reviews, and an extensive historical knowledge base. - Join & Be Part Of Our Community.