IronmongeryDirect
8th December 2022
5 mins
These classifications are used to determine the requirements needed to gain legitimate access to a property. While each class involves various types of access methods, there are some procedures that all classes must include.
These procedures are as follows:
· All classifications of access points that include a requirement to use a token must have policies and actions in place to ensure that the data included within these tokens cannot be changed without authorisation – for example, allowing a limited number of trusted individuals to gain access to the central software that controls tokens such as these to make changes when necessary
· All classifications of access points that include the entry of a code as a requirement must implement a method to reduce the risk of unauthorised persons entering the correct code – for example, setting a limit on the number of attempts to enter the correct code
There are 4 types of access point classes, each based around the level of security required in each type of property and the risk associated with unauthorised access.
For Class I access points, the only requirement for access under these classifications is to enter a correct code of no less than 10,000 differs, meaning a 4-digit code is required.
Examples of properties that would require Class I access points include retail and office spaces.
There are two options that can be used in an Access Control System to allow users to gain access to low to medium risk properties.
These options are either:
· Entering a correct code with no less than 1,000,000 differs
· Presenting a valid unique token of access
Properties such as hospitals would require Class II access points.
Just like with Class II access points, there are multiple options that can be used, but the requirements are stricter.
· Entering a correct code with no less than 10,000 differs and presenting a valid unique token of access
· Presenting a valid biometric
Biometric refers to a unique characteristic or trait that can be used to identify an individual – including fingerprints, voice recognition and keystroke dynamics.
Properties that are responsible for holding sensitive or classified data and information would require Class III access points.
As the properties being protected in this case carry the greatest risk if unauthorised access is gained, this class has the most steps in both of its options, and the use of the most efficient technology.
· Presenting a valid biometric and presenting a valid token (in the case of Class IV access points, these tokens must use radio frequency identification, also known as RFID)
· Presenting a valid biometric and valid unique token, as well as entering a correct code with no less than 10,000 differs
Class IV access points tend to be used in more specialist applications, including extremely high security facilities such as cargo screening facilities at airports.
Whether you’re looking to safeguard a small office space from intruders or install high tech systems to protect the most valuable of information or assets, Access Control Systems offer an easy to use and efficient way to keep properties safe and users comfortable and protected.
If you’re looking to protect small scale premises, you can find exactly what you’re looking for within our own range of Access Control products.