Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Biometrics as an Integration Tool

September 1, 2005

Can biometrics change the story?

James Lowder, chief technology officer of MDI Security, San Antonio, Texas, said he envisions the day when a school has a biometric access control system in place to help responding firefighters not lose critical minutes to find missing children.

“Should a fire occur, school officials would know through mobile readers which students were missing. A school could then use specially placed video cameras to locate the children and document their decision to hide in the closet,” said Lowder.

As the technology cost decreases, the senior executive said he hopes school districts will soon embrace its capabilities and cost effectiveness.

Biometric systems could not only help with disaster preparedness issues, but also help schools track their daily enrollment, document truancy, deal with discipline issues and monitor the location of high-cost equipment and computers.

“I think that access controls can be significant aids in helping schools in their efforts to combat crime and violence provided the access controls are used properly and are made part of a broad-based comprehensive strategy,” said William Modzeleski, associate assistant deputy secretary, Office of Safe and Drug-Free Schools, U.S. Department of Education.

Still, school districts may not be ready to change to these new systems.

“Typically school systems would need to show that using the new system would be more cost effective than the old method, which essentially was nothing,” said Gary Hoover, Ph.D., a University of Alabama economic professor who teaches public finance courses.

Yet, some schools districts are now underwriting the costs to build rudimentary access control systems. Michael Garretson, the Broward County, Fla. Public School deputy superintendent for construction, said he realized the need to expand his district’s security access control system. The district, which includes the cities of Fort Lauderdale and Pompano Beach, Fla., will spend $24 million to upgrade its 300 school access control systems.

“We are creating a single controlled point of entry, a double fence line, one for the entire campus and one that just controlled access to the buildings,” said Garretson. “We are also adding cameras and upgrading to color in those schools that are still using black and white ones.”

Once the new access control system is installed, Garretson said his district will require staff to carry their ID cards. In addition to providing staff access to the schools, the ID cards will also serve as debit cards for vending machines and school cafeteria purchases.

Benefits of biometrics

School administrators may question the costs of building access control systems into their infrastructure, but Garretson pointed out that there are a number of possible benefits in addition to improved risk management practices.

Keeping child predators out of schools: In Florida, everyone from the principal to the delivery guy delivering the snacks and sodas to the teacher’s lounge will have to have an FBI Level 2 background check. Even parent volunteers must submit to this process. The background checks are part of Florida’s Jessica Lunsford Act, enacted this year to protect students from child molesters.

Discipline: Garretson said his district will test a complete biometric access control system at three alternate education centers this year for 300 students ages six to 20. “All students are required to be transported by school buses,” he said. “This has been a problem area with students boarding the wrong bus accidentally or with more devious intentions.”

Garretson said he hopes that by adding the biometric ID system to buses that he hopes his district can minimize the problem. “Because this is a small and unique population, we do not expect any objections,” he said. “In fact, parents and administrators have been very supportive.”

Attendance: Children who ride the bus to school can scan their finger or thumb on a mobile scanner as they board. Once they arrive at school, they can access a door guard, which records the time they arrived. In middle and high schools where students change classes, another door guard can be placed on each classroom monitoring the arrival of each student.

“I think teachers will see a considerable amount of savings because the attendance taking function will be fully automated,” said Lowder. “As schools must compile daily attendance records to qualify for their funding, this function will save district administration considerable time and costs. Teachers could spend more time teaching than completing attendance reports.”

When Peter goes to his school cafeteria for breakfast or lunch, the school’s cafeteria registers his name into its database and deducts money from his school cafeteria account. If Peter were a participant in the U.S. Department of Agriculture School Lunch program, his ID card would remove the stigma of having others see that the government subsidizes his meals.
School lunch program participation: Access control cards could also increase student participation in reduced or free lunch programs, particularly for older students. “Students in middle and high school are extremely concerned with status and are very sensitive to any stigma that characterized them as impoverished,” said Mitch Johns, the president of Food Services Solutions Inc. of Altoona, Pa.

Johns points to research that show a 15-30 percent decline from elementary schools to high schools for participation in the USDA National Lunch programs. He believes school cafeteria managers can set up systems where their register reads the student’s ID card to see if they are enrolled into an income database that qualifies them for the federal subsidized breakfast and lunch program. For one school system with 4,000 students, a 5 percent increase in the USDA subsidized program can mean nearly $80,000 in additional funding, said Johns.

Keeping track of equipment: Lowder said he believes schools could use a radio frequency identification tag to keep track of high value items located within a school with an access control system. “If a school purchases new computers or telescopes, it can then place this tag onto them,” he said. “If someone moves them out of the school or classroom without permission, it can set an alarm to notify a school district’s security team or local police force.”

Deterring terrorism: Until an attack by Chechnyan terrorists against a Russian school in September 2004, a classroom had never been attacked before.

“School system security has mostly been a matter for the local districts but with increasing threats, the federal government is at least paying attention,” said Hoover.

“If successful, they probably would implement a matching grants program,” he added.

When Peter leaves school, his school’s access control system monitors his departure time. Inset, when Peter boards his bus for the return trip, the mobile video scanner notes his arrival time on the bus.
“By controlling who comes into and goes out of our schools, we can better manage who has access to faculty and students and thereby help deter certain types of crime and violence,” said Modzeleski.

Garretson said he thinks parents will want an access control system set up in their children’s schools, but he admits he has heard some concerns as well. “As I talk to parent groups, they all want greater security in schools,” he said. “The series of sexual predator incidents in Florida this spring has heightened interest in security.”

Yet Garrettson notes that parents also have shown some fear in the use of biometrics. “When I mentioned biometrics I can seen in the faces of some parents that they consider this an invasion of privacy,” he said.

Even with several incidents involving weapons, Garretson’s school board overruled the use of metal detectors.

Lowder said he believes once schools like Broward County expand their access and biometric control systems, parents will quickly embrace its advantages.

A better design converges biometrics and smart cards in an integrated security solution.

Sidebar: Faster Validation, Response

Some electronic security systems that use biometrics are plagued with slow response times for entry validation because the information must be authorized by internal controller memory or even at the host workstation. Higher level systems can integrate biometrics-based solutions. For example, the I/NET Seven and Continuum integrated security systems from TAC of Carrollton, Texas, incorporates biometrics and smart card technology into the same system. This scenario also decreases the potential for failure because the system is not dependant on any high-level controllers or PC workstations to perform its duty.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Smart Cards and Biometrics Integration; Casino Designs

    See More
  • Business intelligence gathering is revolutionizing rainforest research.

    How Business Intelligence Becomes an Eco-Research Tool

    See More
  • Enhancing Security Officer Professionalism: Using Certification Programs as a Career Development Tool

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products

Events

View AllSubmit An Event
  • December 9, 2011

    New Axis Design Tool

    The Axis Communications Design Tool has been completely retooled to provide system designers with much more information on Axis Camera installations. Please join us for this demonstration of the powerful new tool from Axis engineered to take the guesswork out of surveillance systems.
  • January 13, 2012

    New AXIS Design Tool

    The Axis Communications Design Tool has been completely retooled to provide system designers with much more information on Axis Camera installations. Please join us for this demonstration of the powerful new tool from Axis engineered to take the guesswork out of surveillance systems.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!