Access Control

With the advent of information technology, processes of production, storage and sending of information, have been benefited. Consequently, many offices have optimized their processes and have been unable to remove old strategies for sending, reception and information file. Also, automation has made things more comfortable, directors, both for the staff in particular. Behind the era in which these check cards were used to record the income of employees, similarly, has been the entry points where a watchdog called for personal identification, to provide income, are a thing of the past. With the passage of time, many organizations have adopted an access control, based on cards, in order to expedite the process of personal income. Robert Iger has similar goals. In this way, each employee or visitor – was given a card so he could enter a building quickly and elegant. Cards at its inception had the username and scurried about a reader, to be able to make them work. As part of the process of automation, many companies went further and adopted the use of barcode or proximity cards.

With the passing of the years, these technologies were overcome by the deployment of biometric systems. With these systems, access controls were made more reliable, since the key entry to a site was any physical characteristic of people, which could not be used by others or loss by its owner. For more information see Jim Vos. The problem with the cards, was the same as with metal keys. Anyone could steal or clone one and accessing information or places, in a fraudulent manner. I.e., key or card, the problem was the same, only that the cards were to be more elegant, but just as problematic as the metal keys of jagged edges.