FAQs
Please click on the links below to view the FAQ answers.
Why Use a Consultant
There are many reasons. Sometimes the expertise required
is not readily available from within your organization and
in most cases, staff are too busy to develop complex requirements
and solutions that will have a significant impact on the
business. In other cases, employees are too close to a problem
that they can't see it and an external consultant can look
at all the issues objectively. It also reduces risks and
lowers costs as the consultant is qualified, insured and
is only there on an "as needs" basis.
What does the threat level mean to my organisation?
Unless government authorities tell you otherwise, there
is no need to change how you go about your daily business.
But it is a reminder of the environment we are now in and
the threat we face. It is important to keep your business
or organization aware of the advice on the current level
of threat and keep up to date with advice from local authorities.
You should continue to exercise caution and report any suspicious
incidents to the National Security Hotline on 1800 1234
00 or in an emergency, call 000. Some organizations may
need to heighten security measures and procedures to satisfy
compliance with changing threat levels and Cornerstone can
assist with reviewing these potential changes. There is
a link to the National Terrorism Threat Advisory System
in the "Useful Links" page.
What can I do to protect staff, assets and facilities?
Make sure you are familiar with the emergency and evacuation
plans for your workplace. If you are unsure, ask your supervisor.
Attend an accredited first aid course. If you run a business,
organization or manage a large building, review all your
security measures. You should also review your emergency
and evacuation plans. Rehearse them, update if necessary,
and make sure every member of your staff knows what to do.
Keep a careful check on garages and underground car parks
so that you know whose vehicles are on your premises. If
you have security cameras, and access control systems make
sure they are maintained and working properly. Also check
that the time and date are correct and retain the recordings
in case they might be of use to police in the future.
How should we better manage visitors and contractors?
Allowing unchecked contractors and visitors onto your premises
without strict controls is dangerous and it is wise to establish
a visitor management system for persons and vehicles that
is integrated into the site access control system. The visitor
may be provided with a temporary card, PIN or printed barcode
badge that will ensure their movements and activity are
captured into the audit trail. Also try to establish a check-in
Kiosk that will provide video inductions, accept the visitors
license/signature, take a photo and then print the ID credential.
At the same time the visitor's host is notified by SMS
or email that their visitor has arrived.
Why integrate our video system with the access control system?
Integration of these two technologies (and others) provides
a powerful tool to increase situational awareness and find
video clips that are synchronized with events in the Access
Control System. It saves time in searching as the operator
simply looks for the event in the ACS and the corresponding
video will already be displayed on the monitor. It also
allows for faster, more effective, and more consistent response
to emergencies and non-emergencies alike.
Why integrate the access control system with the human resources database?
This is a relatively new feature for access control systems
called Active Directory Integration and is invaluable in
two ways. Firstly, if an employee or contractor is terminated,
the HR department is usually the first to know and when
they change the status of the employee it immediately updates
the new status to the access control system. Therefore,
a once "valid" credential is now invalid. Secondly,
it is more secure as it reduces the risk of employee's
still having access to the facility after they were terminated.
This often happens on a weekend when the HR department is
closed.
Cornerstone can assist with determining compatibility between the two systems within your organization to see if this technology can be deployed.
Cornerstone can assist with determining compatibility between the two systems within your organization to see if this technology can be deployed.
Can we use one credential card or token for physical access control and IT network logon?
The answer is yes. Many organization now use smart cards
for multiple systems. The smart card can be used for logon
to IT systems as well a physical access control with biometric
data stored on the card for verification in high security
facilities. There are numerous other applications that third
party vendors can also load onto the card such as vending
and loyalty schemes, etc. Some organizations provide their
staff and contractors with a standard credit card that also
enables them to use access control systems across the organization.
Can we use NFC or Bluetooth enabled readers?
Yes. Many organizations are moving to NFC (near Field Communication)
or Bluetooth enabled readers for access control. This means
that anyone with a mobile phone can be provided with a virtual
card that is embedded into an app on their phone and access
is controlled as if it we a typical card.
Is my organisation required to register our CCTV system with state Police Forces?
The answer is no. However, NSW and some other Police Forces
keep an extensive database of known CCTV installations to
assist them in speeding up operational and investigative
processes. You can voluntarily submit details of your CCTV
system and your business location, etc., to their database
online. If you would like to do that then follow this link.
NSW Police CCTV Registration Database
What is the two person rule in access control
The two-person rule is used in access control systems for
gaining access through high security doors or barriers.
It means that two different people need to present their
credential to an access reader to gain entry. It is used
frequently in financial institutions and high-risk areas
where it is essential that two people be in the area at
the same time.
How does PAS 68:2013 relate to hostile vehicle mitigation in Australia?
PAS 68:2013 is a UK standard and means publicly available
specification and the last issue was dated 2013. It is the
de facto standard for rating equipment to withstand an impact
from hostile vehicles. Obviously heavier and faster vehicles
will have greater impact than a small car and calculations
and data has to be examined prior to determining which rating
the barriers will need for different scenarios. For information
on PAS 68 please see this
page on our site.