Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Assessing Access Control Standards

By Bernard Scaglione
Access control image
December 1, 2012

Door hardware plays such a significant role in access control and identification. A door that does not close properly provides no access control. The alignment of the door: the door hinges, return and handle hardware all combine with an electronic access device or a key to secure a room, building or facility. It is the quality of door hardware that makes for an operational physical barrier or controlled access point.

Several months ago I had the privilege to speak at the Builders Hardware Manufacturers Association (BHMA) annual conference. The major purpose of this association is to develop and communicate standards in door hardware. It was impressive to see the large number of manufacturers, both international and regional, represented at the conference who take part in the creation and review of door hardware standards.

It is not necessary to develop standards for every aspect of access control and identification, but some standards make sense – such as BHMA. The association looks to provide a safe and secure environment through standards in door hardware manufacturing. When it comes to access control and ID, maybe more consideration should be given to developing standards in electronic access control devices, ID cards and identification products.

There are minimal published standards: ISO/IEC 7810 Identification cards and the Transportation Worker Identification Credential or TWIC. ISO/IEC 7810 provides an international standard that defines the physical characteristics for identification cards, like physical dimensions, resistance to bending, flame, chemicals, temperature and humidity, toxicity and resistance to heat. TWIC sets standards in the type and application of cards for transportation workers. However, for access control and identification, standards make sense when they focus on the manufacturing and installation of products.

There are real advantages to creating standards for the manufacture and installation of electronic access control equipment – setting product quality standards and categorizing products for specific uses. For example, BHMA has established lockset grades for different industries. Many healthcare facilities utilize the highest grade door hardware because it is used 24/7/365. This produces a lot of stress on the internal mechanisms of a lockset as compared to an office building that is only operational during regular business hours. Product quality levels can be published so that users can determine what product works best for them.

For example, many electronic access control locksets have batteries that are designed to last for 18 to 24 months, on average, between battery changes. In the healthcare setting, most electronic locks will only last three to four months between battery changes, which limits purchases to the few manufacturers that cater to the healthcare industry.

Standards help to create an open use platform so products are interchangeable as opposed to being propriety in use. This is the case with the HVAC industry where products from different manufacturers are interchangeable and can communicate with each other.

Standardization creates ease of use for the end user and installer. When products are manufactured to the same set of standards, they become easier to install and use. For example, door locksets have standard sizes for mounting. The holes created in a door are a standard width and dimension so that any manufacturer’s door hardware can fit in any door. When all products are built in a similar fashion, they generally operate the same way. The internal mechanisms may differ, but when you insert a key and turn it clockwise, the door will unlock.

The collaboration between BMHA manufacturers allows for the creation of products that make for a safer and secure environment. Standards on the manufacturer of door hardware only improve the quality of products and make their use easier. This model should be extended to the electronic access control industry; card readers, controllers, magnetic locks and all other components should be manufactured and installed off of the same set of standards. These standards should be published so that the end user and installer are not only aware of the standards but know them well enough that they use them in purchasing and installing electronic access control equipment.   

KEYWORDS: door hardware healthcare security security standards

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP is the Director of Healthcare Security Services for G4S Secure Solutions. He has 30 years of experience in the healthcare security field including a Master’s Degree from Rutgers University School of Criminal Justice in New Jersey. Ben currently serves on the Board of the International Association for Healthcare Security and Safety (IAHSS). He served on IAHSS Education Council from 2005 until 2011. Ben is past Chairman of the ASIS International Healthcare Council and the Past President of the New York City Metropolitan Healthcare Safety and Security Directors Association. He has been a columnist for Security Magazine and contributing author for the Journal of Healthcare Protection Management. Ben was an adjunct faculty member at Pratt Institute in New York teaching engineers and architects in physical security. He taught at Interboro Institute in New York and at New Jersey City University. He was also an instructor at John Jay College Peace Officer Academy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ben Scaglione

    Preventing Healthcare Crime With Access Control and ID

    See More
  • Bernard J. Scaglione

    Metrics: The Evaluation of Access Control and Identification

    See More
  • Open door to a room

    Managing Modern Risks in Access Control and Identification

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing