The access control system provides a selective restriction of access to information, goods and control areas, including data storage on all allowed passages, alarming situations and operational activities. The main task of the access control system is to control the movement (entrance, exit or access permission) of visitors and employees, time restrictions, oversight and detection of abuse of power, and protection of important areas. Likewise, this system allows removal or introduction of unauthorized substances or materials in or out from the protected facility.

Access and pass control can be used to protect the entire business facility, as well as to protect specially protected units such as server rooms, archive rooms, control rooms, parking lots, elevators, warehouses and treasuries.

Various technologies for access control systems are available on the market, and the most commonly used one is the one that used RFID contactless cards. In addition to cards, we can often also find contactless key chains, contact chip cards, magnet and barcode cards. The only available cards are those that contain the code for that card and memory for storing the data. Independent (standalone) systems (controller and reader in one device) are reasonably priced and easy to install for residential or small business facilities, and when the vulnerability is low, a quality intercom or video interface system can be applied. Systems connected to the computer allow for greater flexibility and integration into the existing computer system of the company and use them to calculate working time, report printing, billing, etc. It is also important to integrate with other technical systems within the facility, especially with other technical protection systems, primarily with video surveillance, anti-theft and external protection.

Individual physiological characteristics or behavioral characteristics that vary from person to person are occasionally used for identification. Biometric identification is applied when it is essential to accurately identify a person entering the protected area. The most common biometric identification today is fingerprint identification, which is used in applications where speed is essential due to its simplicity.

Access control is often combined with a record of working hours that each employer must keep in line with the provisions of regulations. An integrated system of access control and work time records greatly facilitates the administrative work.