[xml][/xml]
The Bahamas Weekly Facebook The Bahamas Weekly Twitter
Columns : Preventative Measure - Gamal Newry Last Updated: Feb 6, 2017 - 2:32:04 PM


Access Control and You
By Gamal Newry
Jun 17, 2007 - 5:09:25 PM

Email this article
 Mobile friendly page

Access control a critical component in any security operation, has in the last few weeks received a lot of attention. We have seen our Ministry of Transport and National Security join forces to ensure that our ports of entry meet and hopefully exceed international expectations. By gaining an understanding of the key concepts of access control , which embodies such things as;



  1. natural surveillance,
  2. territorial reinforcement,
  3. management and maintenance functions
  4. legitimate activity support,

The crime prevention planner, law enforcement personnel, security consultant, property manager, architect politician leader can put theory into practice to address community disorder, workplace violence, street crime or acts of terrorism.

 But really the intent of such an endeavor, generally the purpose can be summed up as follows

 Access control programs are instituted to:

• permit or deny entry to or presence in a given place;

• increase or reduce the rate or density of movement to, from, or within a defined place;

• protect persons, materials, or information against unauthorized observation or removal;

• prevent injury to people or damage to material.

 It is important to be clear which objective is sought, because that influences the type, degree of reliability, and cost of access control equipment.  This being the case the International Ship and Port Facility Security (ISPS) code indented objective is as follows

  1. to establish an international framework involving co-operation  between Contracting  Governments,  Government  agencies,  local  administrations and  the shipping  and  port industries to detect security threats and take
    preventive measures against security incidents affecting ships  or  port  facilities used in international trade;
  1. to establish the respective roles and responsibilities of  the Contracting Governments, Government agencies, local administrations and the shipping and port industries, at the national and international  l evel for ensuring maritime security;
  1. to ensure the early and efficient collection and exchange of security-related information;  
  1. to provide a methodology for security assessments so as to have in place plans and procedures to react to changing security levels; and
  1. to ensure confidence that adequate and proportionate maritime security measures are in place. 

These measures taken by the International Maritime Organization are no more than large scale access control systems. However, this is not an investigation into our ability to comply with international regulations; this discussion about access control is to heighten the awareness of the business community on the numerous methods available in granting and denying access to your location. Be they natural systems, such as trees, and water ways to more technological advanced devices such as bar codes systems. The decision should rest on the risks associated with that particular facility.

The biggest problem with access control in my opinion is that successful business want people to visit there location. Weather it is 1 st and main or at a World Wide Web address, there is need to have an open invitation is given to all. Filtering out those who pose a threat to business continuity presents the clear and present danger.  When this is looked at comprehensively many organizations have just as much entry points as our archipelago, thus it can be a daunting task.  How to screen these potential hazards, and yet keep the authentic customer coming back without making them fear for their lives.

In this series of articles I will examine the ever present task of providing access control to your organizations facilities.  You are reminded that one of the lessons from September 11, 2001, is that primary targets of penetration and which received the most damage and loss were all privately owned business, not government operated facilities. Types of organizations being targeted are primarily;

  1. When compared to government operations these targets are considered soft
  2. The potential for collateral damage is increased 

There are a variety of techniques to employ in granting or denying access to a given place. These techniques, some as simple as a deadbolt on the door, others as sophisticated as coded card access systems will be discussed.


Stay Safe,  Stay Strong
Be Safe, Be Strong


Bookmark and Share




© Copyright 2007 by thebahamasweekly.com

Top of Page

Receive our Top Stories



Preview | Powered by CommandBlast

Preventative Measure - Gamal Newry
Latest Headlines
Crime Risk Assessment: How exposed are you?
Communicating During a Crisis: What to Say - When to Say it – Who Should Say It
We must learn from past tragedy, by preparing for it!
What is your Company's Pandemic Policy? Maybe you already have one…
Evacuations: How Are We Going to Get Out?