Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Why Access Control and Identification is Healthy for Your Organization

By Bernard Scaglione
Ben Scaglione
October 1, 2011

On the heels of the tenth anniversary of 9/11, it is important to reinforce the need to control access into organizations and to properly identify those persons who are seeking access. Controlling access into and within a building or campus not only thwarts a possible terrorist attack, but reduces the opportunity for the commission of a crime or occurrence of a violent act. It also promotes a feeling of security and safety for employees and other persons utilizing the organizational space.

Unfortunately, organizations still cling to the idea that an open campus or facility is a positive approach to business practices and employee satisfaction. Many C-suites still see the idea of controlling access as a “police state” placing an undo burden on employees and visitors. Additionally, they believe that the expense to implement access control is too costly. 

A work environment that controls access and identifies outsiders provides peace to employees, thereby delivering spiritual health to the organization. This is self-evident when you look at Maslow’s hierarchy of needs. In Abraham Maslow’s 1943 paper “A Theory of Human Motivation,”Maslow developed levels of psychological needs that focused on the stages of human personal growth. Maslow’s “hierarchy of needs” is based on the idea that all people have specific needs in their lives, and these needs are hierarchical, starting with the most fundamental and necessary needs and progressing to more intellectual needs.

The most fundamental of the four basic needs are called “deficiency needs”— needs that are essential to our personal well being. They are esteem, friendship and love, security and basic physical needs like water, food and shelter. According to Maslow, once physical needs are met, the individual’s safety needs take precedence and dominate behavior. In the absence of physical safety, people will experience stress or trauma. Maslow’s theory is relevant not only in an individual’s personal life, but his professional life. If an employee is not at peace, does not feel safe and secure at his workplace, then he may not reach his full career potential, contribute to the spiritual health of the organization and may even leave the organization to seek out a workplace that can meet his basic hierarchical needs.

How does an access control and identification program assist in the well being of an individual and the spiritual health of an organization? It promotes a culture of safety and security by reducing risks associated with the theft of property or an individual’s ID. It reduces the potential for workplace violence, domestic disputes and abuse from visitors and violence between employees.

An effective access control program assesses visitors utilizing the facility and stores a photo record and identification documents in the event of an emergency or their involvement in criminal activity. It helps in directing visitors who may be wandering around by restricting their access to public areas only and can pre-authorize visitor appointments through a computerized visitor management system.  

In addition, an effective access and identification program can audit the access of employees, visitor and vendors, determining how often and when they enter high-risk areas. It can provide behavior modification or behavior enhancement by promoting and educating employees to the appropriate access control and identification culture within the organization. 

There is some truth to the idea that restricting access into a facility may present the feeling of Big Brother and be counter productive to an organization. Such a program may even produce its own stress because of long waiting lines for visitor registration, turnstiles that back up because they are not manufactured to take the amount of people entering the facility and more. And there’s the access control door that does not close properly or stays ajar, creating the perception that administration really does not care about the security of its employees. The naysayers who insist that access should be unrestricted because of these concerns may be correct. Although there is an inherit need for every person to feel safe and secure, the poor application of any access control and identification system can contribute to the demise of an individual’s “deficiency needs.” That is why it is so important to ensure the proper installation and maintenance of any access control and identification system.

The design, installation and the implementation of an access control and identification program require long-term planning and assessment prior to purchase and installation. Create a detailed plan that includes not only the design and physical installation of the access and identification system, but an assessment of the access process, the purchase of the technology to be installed and the creation of an interdisciplinary team that determines the program’s road map. 

In addition, the access control and identification systems should be continuously maintained. That means that new user should be enrolled immediately and provided access rights right away. When a person leaves the organization, his credentials should be confiscated and his access rights removed that day. Regular inspections of the system should be conducted to certify that access levels are correct and the application is operating to manufacturer’s specifications.   

KEYWORDS: identification system IDs

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP is the Director of Healthcare Security Services for G4S Secure Solutions. He has 30 years of experience in the healthcare security field including a Master’s Degree from Rutgers University School of Criminal Justice in New Jersey. Ben currently serves on the Board of the International Association for Healthcare Security and Safety (IAHSS). He served on IAHSS Education Council from 2005 until 2011. Ben is past Chairman of the ASIS International Healthcare Council and the Past President of the New York City Metropolitan Healthcare Safety and Security Directors Association. He has been a columnist for Security Magazine and contributing author for the Journal of Healthcare Protection Management. Ben was an adjunct faculty member at Pratt Institute in New York teaching engineers and architects in physical security. He taught at Interboro Institute in New York and at New Jersey City University. He was also an instructor at John Jay College Peace Officer Academy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Open door to a room

    Managing Modern Risks in Access Control and Identification

    See More
  • Bernard J. Scaglione

    Metrics: The Evaluation of Access Control and Identification

    See More
  • Ben Scaglione

    The Identification and Control of Fraudulent Behavior

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing