At any given time you are able to identify such employees by the card dangling at the conclusion of a lanyard. Perhaps even some are laden with multiple cards pushing the lanyard's published tensile strength to the limit. A card is used to enter the employer's facility and the remaining cards are for entry to contract related organizations; each agency issuing its own recognition requirements.
A couple of months back I was flying away on business. I prefer to reach early enough to have through security and normally have a form of government issued identification and my boarding pass willing to go. When I arrive at the TSA checkpoint, I display the required credentials and am given access. I recently saw a fellow traveler approach the TSA checkpoint in the same way I was planning to do. However, instead of passing smoothly through the procedure, he became show stopper. The flow have been interrupted considerably.
The traveler caused it to be to the checkpoint, but he wasn't prepared to present his access credentials. Well, he presented information, but it absolutely was the wrong kind. When he approached the TSA official, he started to sort out what I call "the contractor rolodex ".He had worn his lanyard with about 10 access cards around his neck through the whole security line and began showing each card one by one. The in-patient TSA officer rejected each card before the traveler successfully produced the us government issued one. This has been a driver's license or perhaps a common access card for several I understand, but it was the proper one.
Aside from the comic relief the incident provided, there is somewhat of a traveler and employee security issue to deal with. Employees are trained to put away our organization's access card when not in the facility, while some apparently do not quite understand the "secrecy ".At minimum risk, the access card may identify the wearer as a government official or a defense contractor employee, based on where they live.
Identification is just a major part of doing business. Access and need to find out may be verified with proper recognition supplied by information printed or embedded in access card technology. Security professionals should provide education and training that help employees understand the importance of protecting their identification and how they're connected with sensitive information or business.
Click here for more info http://akoarmymil.com/activclient/