Reassign access decision

Ask a question

When a cardholder has been denied access for any reasons, Sigur allows the user to override the system’s decision and register the access event accordingly.

Why is it important?

In such cases, it is important to ensure security but also to accurately record all information about the relevant access event for further analysis, including for time and attendance tracking purposes.
For this feature to work properly, it is important to think through the access procedure and predefine the algorithm, which will ensure fast and accurate handling of such situations.

If an employee does not have a card

Allow access without a card

If a security officer’s workstation is located near the checkpoint, the security officer can allow access by pressing a button. However, the identity of the accessing person will not be registered.

To avoid such situations, Sigur allows you to grant access for a selected cardholder as if they use their card for access.

To do this, you will need to click a respective checkpoint on the monitoring screen and select Permit access and then select a cardholder from the list. After that, the operator will see the cardholder’s file to verify the identity.

However, this method will work only if the cardholder needs to cross only one checkpoint (e.g., the main checkpoint) since it will not work without a security officer.

However, if the identity of an accessing cardholder has not been identified, you will be able to overrule the absence of this cardholder by adding a justification document.

Allow access and issue a temporary or new card

If a cardholder has lost or forgotten their card, you can issue a new card and change the information on the cardholder’s file accordingly. The old card will be blocked and the new card will have the same access rights and the cardholder will be able to walk through other checkpoints within the territory of your company. The term of validity of a new card can be limited.

Generally, these procedures are performed by employees of a pass and registration office, which is usually located not far from the checkpoint.

If the access has been denied

If the access has been denied, the operator can override the system’s decision. In this case, the operator can, by clicking the access denied event, select Permit access from the popup menu on the monitoring screen.