Access Management

The Human Factor

In today’s technological world, the focus of access control and identification are mainly electronic – utilizing identification cards, biometrics, numeric keypads and passwords. One critical component of access control and identification that is routinely over looked is the use of people.

Recently, my new employer reminded me of the role people play in securing facilities, places and entities. From screening persons entering a building to sitting and watching an x-ray machine or TV monitor, the role that people play in controlling access and authenticating identities is enormous, and so very important. This was evident when, recently, a security officer working in a south Florida courthouse identified what she thought was a gun through an X-ray machine and began to question the situation. The individual carrying the bag with the gun wasn’t able to provide any identification, so a deputy was asked to respond. At that same time a second security officer cleared the lobby area of all people. Two deputies checked the individual’s bag and found a loaded .40-caliber Smith & Wesson handgun, an additional loaded magazine and six boxes of ammunition. 

The task of providing personnel to control access and check identification is monumental, and it presents various challenges. Access control work can be very stressful and at times be monotonous for the people that conduct the screening. It takes a special type of person to become and work successfully as a screener, something that is not always considered when hiring a person to screen persons or packages.

In general, we take for granted the work that people do that tends to blend into the routine of our everyday lives until their actions impact us. Access control screeners affect our daily routine when we pack the wrong item into our carry-on suitcases or when we leave our identification at home. In my career I have seen countless people push, shove, kick, scream, spit and even assault access control personnel. I have seen people wave their finger in the access control officers face, threaten officer’s jobs and pull out a gun.

So what does it take to become an effective access control screener? Is it personality, birth order or a specific astrological sign? It could be any of those things, however, more likely, what is needed is knowledge of the job, experience in carrying out the job, perseverance doing the job, objectivity and a clear understanding of why the job is being conducted.

Knowledge means understanding the specific details of each function of the job and the details, such as knowing the procedure when a weapon is discovered, what to say to someone to keep them calm and to stop them from running away or pushing past an access point.

Proficiency entails learning how to deal with people, being comfortable greeting them, stopping them and double checking their credentials. It involves screening each person thoroughly enough to feel comfortable that the building is secure. It also means having enough experience to orient new people on the exact procedures to follow when conducting the screening process.

Perseverance includes consistently carrying out the job functions the exact same way no matter what occurs, even when you have stresses in your personal life.

Maintaining objectivity is important as well, as every person that enters the screening process needs to be treated the same. Sides cannot be taken, and everyone deserves a level of respect and courtesy as they go through the screening process.

Just as you wouldn't hire your next security executive without knowing whether or not he or she has the right skills to be an effective member of your team, successful access control screeners need to properly vetted, as well. Hiring someone who’s not right for the job could mean all the difference in the world. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bernard Scaglione

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine February 2015 issue cover

2015 February

In the February 2015 issue of Security Magazine, see what other companies have learned from the massive data breach and what they are doing in the now and in the future. Also, what could adding thermal cameras to your operation do for you? and Mohegan Sun at Pocono Downs prepares for the future with security decisions.
Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.