As the world prepares to reopen after a months-long shutdown as a result of the COVID-19 Pandemic, physical access security companies, along with others, are working hard to find innovative solutions to help their customers get back to work. From knowing when to allow employees back into the worksite to what behaviors will need to be modified once open, companies of all types struggle for answers.
Citing common themes that have emerged from conversations with their customers, HID Global compiled the following list of the six most often voiced concerns in physical access security and their guidance to address them.
1. Building Readiness
Customer Question: How will we ensure our facilities are in acceptable working order to reopen?
After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though the workforce may be eager to return, the workplace itself may not be ready. You may want to consider continuing remote work while facility operations are prepped. Some of your workforce will continue to work from home even after your buildings reopen — and that leads to the next question.
2. Workforce Management
Customer Question: When should we allow employees, contractors and visitors back into our facilities? How do we decide who’s coming back and when?
While it’s dependent on location and industry, taking a phased approach is the best course of action. First, you’ll want facilities management to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office.
Next, consider your office density needs, which are interrelated with the facility architecture. You’ll be able to accommodate a slightly higher capacity of workforce in an airy, open office space than in a constrained one. As a good rule of thumb, start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns.
In a business where visitors or customers come in regularly, delay opening the office to them as long as possible. If that’s not feasible, then factor visitors into the total density count. An easy way to implement this is by using a cloud-based visitor management system.
3. Controlling Access
Customer Question: How can we vet staff, employees, contractors and visitors before and during the return?
This will vary greatly depending on location, but consider implementing policies that require employees to be screened regularly — and for an extended amount of time. For example, it would be helpful to obtain answers to the following questions:
- Where have you visited in the days since last entering the workplace?
- Have you come into contact with anyone else that has recently visited high-risk areas?
- Have you shown any symptoms of infection in the past xx number of days?
If there is cause for concern, refuse the visit or supplement the screening process with additional steps. Temperature checking is mandatory in many organizations— often multiple times a day. This applies to interactions at delivery bays, so take care to extend policies and monitoring in those areas as well.
A policy-based physical identity and access management solution integrated with your existing physical access controls makes it possible to enforce, monitor and report this type of activity.
4. Social Distancing and Contact Tracing Plan
Customer Question: How are the restrictions and guidelines related to physical access control going to change as a result of social distancing?
Social distancing may continue within the office. Consider reworking the office layout for proper distance in between cubicles, workplace positions and employees. Designate specific entrances, exits and pathways as one-way only.
Once the employees are inside the workplace, you can assign them with Bluetooth LE beacons that monitor proximity to others and measure localized density in real-time by using location services, contact tracing, and surge response technologies.
5. Reduced Physical Touchpoints
Customer Question: How can we reduce the number of physical touchpoints throughout the workplace? How do we go hands-free?
Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces like faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. We’ve seen an increase in requests for a contactless experience in secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access.
6. Communicate for Confidence
Customer Question: How do we ensure that both visitors and employees are aware of the policy changes and extra controls?
Proactive communication is key in the reassurance that appropriate safety measures have been taken. Equally important is to communicate a policy change before it happens and the reasoning behind it. While we would all prefer to know exactly how long new policies will continue, this is a time of many unknowns. So while there isn’t an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Ian Lowe is Product Marketing Director for HID SAFE and is passionate about marketing all things related to identity, cybersecurity, IoT, cloud and digital transformation. In his 19-year career, Ian has become a recognized product marketing and sales enablement leader, having created and launched successful cloud-based identity and security solutions that are used by top technology firms, financial services organizations and governments around the world today. You can see Ian’s original blog post here: https://www.hidglobal.com/blog/6-physical-access-security-tips-returning-workplace
Follow Brilliance Security Magazine on Twitter and LinkedIn to ensure you receive alerts for the most up-to-date security and cybersecurity news and information.