Download PDF version Contact company

Employees of MEGTEC, global manufacturer of air flotation dryers and oxidation pollution control equipment, often have to work in dangerous situations, some of which require lockout/ tagout controls. In those cases, employees put locks on electrical, gas or air supplies to make sure nothing happens while they’re working. They may also put a lock on a drain to prevent incoming liquid from reaching them.

Life Safety

People performing maintenance on a machine often are in danger of being electrocuted, crushed or sprayed with toxic chemicals if someone accidentally tries to operate the machine,” said Christopher Campbell, Environmental Health Safety/Security Manager.

In addition, when field service or shop employees travel to customer sites, they often are required to work in confined spaces. This can be any space, room or chamber that is large enough for an employee to enter and work in, but not intended for continuous human occupancy because of limited access and exit. “In other words, it can be dangerous,” said Campbell. “There might be limited air exchange. People die in confined spaces on an all too frequent basis. That’s why the Occupational Safety and Health Administration (OSHA) requires training on how to assess and control hazards in confined spaces and take care of hazards once inside.

MEGTEC Oxidizers In the case of MEGTEC products, oxidizers may need to be inspected on the inside once they are up and running

In the case of MEGTEC products, oxidizers may need to be inspected on the inside once they are up and running. For the sake of safety, customers want proof the employee has had proper training and recertification, which is needed every two years.

It is vital that we limit the number of people who come in,” he said. “Our equipment designs are proprietary.” MEGTEC began its business in the printing and papermaking industries, which still represent the company’s primary customers. But now MEGTEC provides equipment to any industry that requires its products to be dried on a cushion of air. In addition to these air flotation dryers, MEGTEC builds oxidizers that burn complex air polluting hydrocarbons into less polluting materials. “The technology is very simple,” said Campbell, “but the engineering behind it is very complex.

ID-based Card Authentication

MEGTEC first began using ID cards when an employee from one of its competitors got into MEGTEC’s building and began “nosing around,” said Campbell. It wasn’t long before a fence went up and access control points went in. That was 14 years ago.

Through the years, we have had a number of different ID badge programs for our security,” Campbell said. “We just weren’t satisfied. The printers broke down, it was difficult to change ribbons and clean the machines, and the printers jammed frequently.

About four years ago, Campbell discovered Fargo printers on the Internet and purchased a Fargo DTC510 Direct-to-Card Printer/Encoder. “Since then, we have printed about 1,000 badges,” he said. “All have been good quality. The printer is quick, easy to use and very efficient. It’s an elegant machine, meaning it provides a lot of bang for the buck. There isn’t a lot of wasted motion or effort.

Lockout/Tagout Locks

MEGTEC uses ID cards to protect the safety of its workers and to verify their training and recertification

MEGTEC uses ID cards to protect the safety of its workers and to verify their training and recertification. To draw extra attention to the lockout/tagout locks, MEGTEC attaches an ID card with the company logo, a photo of the employee and his or her name, along with a sign that says, “Locked out. Do not remove. My life is on the line.

All companies have to have something like this,” said Campbell. “Some have a standard tag, some write the information out each time. We made ours very personal. Individuals who see a person’s face and name are less likely to mess around with a lockout. The cost is only $2.00 per card, which is very reasonable, and it takes only a few second to print one out.

HID Proximity Technology

MEGTEC’s ID badges are smart cards, using HID read-only proximity technology. Access levels are encoded onto an induction coil by the company’s software. The cards themselves don’t reveal an employee’s access level. The software used by MEGTEC enables Campbell to program new information into the card whenever necessary. “This flexibility allows us to change access levels as needed,” he said. “For example, some employees may need R&D access only for a while, others may join the first aid team. This technology enables us to change access without having to change the whole card.

Borders around the photos on each badge are color-coded, however, for easy visual identification. Red is for employees, green is for vendors, blue is for security staff and white is used for children on “Take Your Kids to Work” day. “We thought it would be nice to give the children a badge just like their mom’s or dad’s,” said Campbell. “They feel more important that way.

MEGTEC’s Optical Barcode Scanner

Each ID card is actually two cards in one. with each containing a barcode with an employee’s time clock number for use with MEGTEC’s optical barcode scanner

Each ID card is actually two cards in one. Each contains a barcode with an employee’s time clock number for use with MEGTEC’s optical barcode scanner. “The barcode predates me,” said Campbell. “Someone decided that barcoding was the way to go with 180 hourly shop employees. Today, all office employees have their cards barcoded, as well, in case we ever decide to use the technology for inventory control or other accounting purposes. Someone was thinking ahead. If we want, we can jump right in and use the barcode for additional purposes.

HID Fargo ID Cards

The Fargo ID cards are durable enough to last much longer than the required two years,” said Campbell. “We don’t have to worry about someone’s signature smearing.” The card also lists the expiration date with a scanned signature. It meets OSHA requirements, has an employee’s photo, is durable and is easy to produce.

Today, the company’s security has become more sophisticated, with 12 access control points and eight access levels:

  • The master level enables employees to go anywhere on the property. It is used for maintenance workers, first aid providers and key managers.
  • An R&D level permits employee to be inside the research and development areas.
  • Employees can receive office access that gives them access to areas except R&D.
  • The shop crew leaders have access that permits them into areas to talk to others about plans and documents.
  • Shop employees have access to the manufacturing area through an employee entrance.
  • There are three vendor access levels: one for suppliers, one for those who restock manufacturing shelves and one to allow visitors into the outside gate only.

In addition to general security, MEGTEC uses ID cards without technology to identify employees who have been certified forklift operators. This certification is needed every three years, including operator training and evaluation.

As far as access goes, I think I’m there,” said Campbell, admitting he didn’t have a wish list for future upgrades. “It’s vital that we limit the number of people who come in here, and the Fargo printer has enabled us to do that.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.