(2)Entrance access control
“Entrance access control” refers to control over the movement of people,
with respect to who has access, and when and where the access takes
place. It can also be used as a measure against suspicious individuals. Only
authorized persons can be permitted access to buildings or rooms where
important or confidential information is handled, and it is necessary to
keep records of entrance access.
Reference
Use of IC cards
An “IC card” is a card the size of a business card and contains an integrated
circuit (IC) or chip. They are often built
into employee identification cards, and
are used for personal identification purposes. In addition, IC cards are often
used in combination with a “PIN (Personal Identification Number)” as a precaution against theft.
Reference
Installation of surveillance
cameras
It is also effective to install cameras and
video cameras in order to implement
surveillance of suspicious individuals.
Surveillance cameras are installed in
places such as near doors and other
entrances, or where confidential information is stored. This can help to prevent theft and information leakage.
Reference
Measures for physical security control
The Guidelines for Personal Information
Protection Laws Concerning Fields of
Economy and Industry defines measures for physical security control as
“measures such as to control room or
building entrance access and prevent
theft of personal data.” These guidelines state that the following measures
are to be instituted. “1) Implementation
of entrance access control for building
or room, 2) prevention of theft, etc. and
3) physical protection such as of equipment and devices.” A physical measure
refers to the control of physical elements such as persons, equipment,
buildings, and rooms. These measures
are used to determine the persons that
accessed buildings or rooms containing
equipment on which personal information is stored, and when the access occurred. These measures are also used
to determine if rooms containing equipment are locked, and if equipment is
fastened or chained down to prevent
removal.
297
●Locking
Locking is the basic method of entrance access control. Just as a password
is set for a computer, facilities such as buildings, rooms, and lockers are
locked in order to prevent intrusion from the outside and use by unauthorized persons. In consideration of user convenience, electronic locks are increasingly being used.
●Unlocking
An electronic key is used to unlock and enter a room that is kept locked
using an electronic lock. There are various types of electronic keys including IC cards, security codes, and biometric authentication, which can be
chosen based on the desired level of security and convenience to users.
Since a suspicious person could gain access by slipping behind a valid user
who has unlocked the access, other measures are required such as installing a gate that only allows one person through, or installing surveillance
cameras.
●Keeping records of movement
The movement of people is recorded with respect to who has access, and
when and where the access takes place. This information can be handwritten on a paper list but due to its inconvenience, users are increasingly failing to record the information properly, which could prevent strict entrance
access control.
Currently, it is standard practice to have a system in place that records the
time, user, and place when an electronic key is unlocked. These records
can also be combined with attendance-related processing.
IC tags can be used to record movement in a more precise manner. IC tags
contain a tiny chip that can be used for radio wave transmission. When a
user who wears an IC tag passes near an IC tag reader, the reader automatically records the movement. This system can be used to record the movement of multiple persons who pass by the reader at the same time, making
it a useful solution for recording the movement and whereabouts of persons.