The new facility has a total of five points at which entry and exit are controlled. Everyone gets in through the common entrance. The common entrance should therefore be made in such a way that both visitors and employees will be able to gain access with minimum strain. There are two perimeter openings for exit. These can be made for use by the different employees on one hand and the visitors on the other. Finally, there is a common parking lot for both employees and visitors. Entry and exit into the parking lot should not be difficult (Fay, 2011).
The entry point is supposed to be the first point of assessment. This point should prevent intrusion by undesirable elements like thieves and terrorists. For employees, entry should be as stress free as possible. Employees can get through the in through the gate by the use of a two-layered security system. At the point of entry, employees should produce an employee id and expose it to a security officer at the entrance. The employee should then move ahead to the barrier which he must lift by swapping his card through a machine to allow for identification. The vehicles of employees can also be fitted with RFID devices so that entry and exit of employees is monitored (Fay, 2011). This can also reduce the risk of employee vehicles from being stolen.
On the other hand, employees are allowed in through the entrance only after production of an identification documents that contain their pictures. Once the employees produce identification documents and are verified, they are allowed in through the gate after being given an identification document and leaving their identification documents which are to be transferred to another point of exit. The visitor then drives into the compound after swiping the registration card.
Once inside the establishment, the visitor parks at the open parking lot without any identification documents. The visitor completes his business and returns to the parking lot. The card he had swiped through the gate contains information regarding his car model and registration number as they were registered by the security personnel at the gate. He drives out with his card and is checked for the last time as he drives out. The visitor is however also checked for possession of company items which are also fitted with RFID devices. At the exit he is provided with his original identification documents and he leaves.
The employee on the other hand drives out through the other gate. He swiped the card through the gate. If he has any company items which are noticed by the RFID devices, then he is provided with a place to sign confirming that he has carried them. If his car leaves without him, it is noted at the gate and security calls to confirm that he allowed someone to use his car (Fay, 2011). Whenever employees are moving out of the facility, the RFID devices fitted into their car records his time out in the system. His time in is also registered the moment he gets into the compound for the last time.
Overall,
the system allows for the adoption of various systems to allow for the entry of
employees and visitors while at the same time preventing intrusion. Cards are provided
to employees to allow easy entry and exit. Visitors are provided with cards to
act as temporary identification card which serves for exit.
References
Fay, J. (2011). Contemporary Security Management. Burlington, MA: Butterwoth-Heinmann.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more