Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsIdentity ManagementRetail/Restaurants/ConvenienceTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Biometrics and access control for cannabis operators

Biometric access control can be used to increase security, reduce theft and protect inventory within cannabis businesses.

By Bobby Varma
biometrics at cannabis dispensaries

Image by noexcusesradio from Pixabay 

July 29, 2022

Grow? Process? Deliver? Dispense? There are many ways to profit from the exploding commercial cannabis market, but meeting security requirements is a significant hurdle for any business model. Like alcoholic beverages, the production, sale, and distribution of marijuana is highly regulated and different in each state. Unlike the alcohol industry, everyone involved with legalized cannabis is treading new ground. Many security regulations remain works in progress and are poorly defined. Nonetheless, failure to comply with them can result in a loss of license, business closure, hefty fines, and even jail time.

Cannabis sites demand the highest levels of security. The product is lightweight, easy to transport, and worth far more than its retail price on the black market, which still exists in most states. Unlike other industries that view product shrinkage as an inevitable part of business, cannabis operators must take theft far more seriously.

Rules for how licensed operators must protect their product and employees vary by state. Most dictate strict video surveillance technology specifications, including camera resolution, device placement, storage requirements, and more. By contrast, the regulations are uniformly vague regarding access control technology. Michigan, typical of most states in its lack of specificity, requires locking interior rooms, windows, points of entry, and exits with commercial-grade, non-residential door locks. There is no mention of the types of systems best deployed to meet these requirements. Illinois treads the furthest in specifying technology. It requires the use of electronic door locks.

While cannabis operators are not required to invest in electronic access control systems, they have every incentive to do so. All states require that access to marijuana products and facilities be tightly managed and access logs kept. 

Lacking definitive standards within their own fledgling industry, cannabis operators can turn to long-established, tightly regulated, high-security sectors, like banking and pharmaceutical manufacturing, for inspiration on ways to best implement access control. One such option to harden security, simplify system management and comply with access documentation requirements is biometric identity solutions. Biometrics may be used alone, in place of cards, fobs, or mobile credentials, or as part of a dual authentication system. Because surveillance cameras are required throughout cannabis facilities, integration with facial recognition is the most cost-effective option. Cameras already in place at critical access points can often perform double-duty, assisting with identity verification.

When faces are used for authentication as part of an opt-in access control application, today's facial recognition software can identify enrollees, regardless of skin color. In regards to privacy, many of today’s advanced systems don't store an image of the face, but rather hold an encrypted digital code that represents each face, generated by proprietary algorithms within the software. There is no way to reconstruct the face or recognize an individual's identity, should access to the stored code be compromised. When combined with a second form of authentication, facial identity creates an almost impenetrable barrier for unauthorized personnel attempting to use a lost or stolen card or PIN code to access restricted areas.

In some cases, biometric modalities can be deployed alone, eliminating the need for cards or fobs. For example, the probability that an iris-matching solution presents a false match is less than one in one million. Specialized readers can be mounted anywhere electronic locking mechanisms and traditional readers can be installed, while offering the advantage of a completely hands-free experience for workers. Iris readers are ideal for warehouse entrances and storage units where marijuana is regularly transported in and out. 

Touch-free, card-free access is also desirable in retail spaces, where product may be in locked displays. If workers are wearing gloves to handle product, iris readers can provide a seamless experience as they unlock cases and cabinets to assist customers.    

For transporting marijuana between grow farms, processing facilities and dispensaries, biometrics can be deployed throughout the distribution chain. Shipping ports have long used biometrics to verify the identity of truck drivers before releasing cargo to them. The same could be done for drivers entrusted with truckloads of cannabis. Statewide biometric databases of vetted, authorized drivers could simplify the process of safely releasing inventory for transport. In addition to identify verification, securing the supply chain can create a clear chain of custody in the event of inventory shrinkage.

One of the clearly specified requirements for cannabis operators is the documentation of who has access to product and when. Reporting of events in the form of an activity log is standard for electronic access control systems. That remains true when they utilize biometrics. Cannabis operators can provide an accounting of all personnel with access to restricted areas, as well as time-stamped documentation of their “ins” and “outs.” 

Those entering the cannabis industry must navigate how to comply with demanding expectations for security with limited direction on how to best implement access control. Biometric identity technology can be a tool to help businesses reduce the risk of theft, simplify system management, automate procedures and reporting required for regulatory compliance, and deliver a more convenient, seamless user experience. 


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bobby Varma is CEO and Founder of Princeton Identity, a manufacturer of biometric identity solutions to streamline security, optimize operations, and control costs. She is a recipient of SIA's 2022 Women in Biometrics Award and a member of SIA Women in Security Forum's Power 100. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • nurse with mask

    The future of healthcare visitor management will leverage biometrics

    See More
  • cannabis

    From Seed-to-Sale: What Cannabis Operators Need to Know Before They Grow

    See More
  • blockchain-enews

    Why the global cannabis industry needs blockchain for more effective quality control

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!