Now that we’re familiar with some of the basic concepts of building a track and trace procedure, we can begin to examine how technology may help improve the efficacy and robustness of the process. In our last blog post, we identified that your security team is likely to be key to the investigative process. They’re going to be communicating with the infected employee and attempting to help them remember who they may have interacted with and where they have been in the office.
Let’s talk about how contact tracing with access control works.
So, how do you use access control to contact trace?
Access Control Can Answer Who, What, and When
If you have an employee who has tested positive, they’re unlikely to be in a great mental state and no matter how sensitive your investigator is, they are simply unlikely to remember who they’ve been in contact with, what parts of the building they have been in, and at what times of day. Your access control software can produce a list that can answer those questions and aid the infected employee in this scenario.
Monitoring High-Traffic Touch Surfaces
COVID-19 has been proven to remain on hard surfaces like door handles for several hours after an infected person touches it, and it’s unlikely that you’re deep cleaning every door handle or push plate between each person going through. Your access control system will be able to tell you which employees passed through that door in a specific time window after the infected employee. These people should be added to the top of your track and trace list.
End-to-End Tracking and Tracing System
These benefits do rely on your access control system being effectively deployed and will only report on doors with access control panels installed and enabled. By combining this access control with other physical security technologies, such as Internet of Things (IoT), video surveillance, and visitor management software, it is possible to use technology to enhance the robust track and trace process we discussed in our earlier post.
Feeling good about using access control to contact trace?
Drop us a line to tell us what you think.
Provide Feedback ›