Access Control System

Access Control System Features

ST Cards uses a state-of-the-art Access Control System to manage entry and exit, primarily utilizing a Facial Recognition System.

Feature Benefit
Scope Regulates and monitors access to various areas within the office building / factory areas. Specifically controls and monitors access to sensitive areas like the server room, control room, data generation room, key ceremony room, destruction room, and warehouses.
Enrollment All employees, visitors, and contractors are enrolled in the system. Employee registration is handled by the HR department through the STEP portal, where an employee ID and photo are synced with the Access Control System.
Authentication for Sensitive Areas Access to sensitive locations within the high-security areas (HSAs) requires two-factor authentication. This includes dual facial control, or in the case of HSA3 (Vaults, Storage, Destruction Room), special facial recognition systems with face and PIN (dual factor Authentication).
Access Levels The system uses 5 access levels, where Level 1 is the highest and Level 5 is the lowest. Access Level 5 is assigned by default to each employee during registration. An employee must have a matching or higher access level to pass through a particular location's device.
Logging and Tracking Movements into, out of, and between defined secure zones are tracked and logged by the access control system.
Control and Review Access rights configuration is under strict control, and all changes must be auditable and granted on a strict need-to-access basis. Access privileges are periodically reviewed, updated, and revoked when necessary.

Visitor Management System (VMS) Features

ST Cards' VMS is an advanced system designed to streamline check-ins and enhance security by regulating visitor access.

Feature Benefit
Registration and Monitoring The system allows for quick registration, real-time monitoring, and restricted access to sensitive areas.
Visitor Process
  1. The host creates an appointment for the visitor.
  2. Upon arrival, the receptionist asks for the visitor's name, company, host, and requests their CNIC (Computerized National Identity Card) for identification.
  3. The receptionist validates the data against the appointment details in the VMS Reception POS device.
  4. The host/receiver is contacted to receive the visitor.
  5. The receptionist selects the receiver's name and checks in the visitor, granting seamless access through turnstiles/speedgates.
HSA Visitor Requirements Access to sensitive locations within the high-security areas (HSAs) requires two-factor authentication. This includes dual facial control, or in the case of HSA3 (Vaults, Storage, Destruction Room), special facial recognition systems with face and PIN (dual factor Authentication).
Access Levels For visitors intending to access a High Security Area (HSA):
  1. The authorized employee creating the appointment must enable the HSA feature.
  2. The host/receptionist must obtain a signed Non-Disclosure Agreement (NDA) from the visitor.
  3. The receptionist uploads the necessary documents (CNIC/Passport and Visitor NDA) through the STEP App.
  4. The GM Administration & Security must review and approve HSA access for the visitor.
Logging and Deactivation A physical log book or an electronic audit trail (VMS) of all access is securely maintained and monitored. Access privileges are deactivated through VMS once the visitor has left.

Chatbot

close
send