Mustering Tutorial

By: Brian Rhodes, Published on Apr 01, 2013

Access control can be used for more than just securing buildings. Among these powerful 'other' functions is mustering, which immediately accounts who is where in a building. However, a system has to be designed properly and carefully to use this. In this note, we look at mustering, and what it takes to implement in a typical system.

Mustering's Two Approaches

First, one must select / differentiate between the two types of mustering, depending on how much adminstrative oversight is required:

  • Area tracking
  • Checking In

Area tracking: The concept of mustering uses access control to generate a roster of occupants in a certain area. Every time an occupant scans a card to enter and leave an area, the access system logs the time, date, and credential holder of the credential. This data can be used to determine who is in the area at any given time, including emergency situations.

Checking In: Alternatively, mustering can be implemented in some systems as a 'opt-in' control, where a credential reader located at an evacuation point is scanned as cardholders reach that location. Then that list of names can be compared against the assigned list of evacuees who should scan into that reader during emergency. The report screen below is an example output screen from a 'mustering reader':

In either use case, the goal of mustering is to account for specific individuals, so if they are not confirmed present within an area, then additional action can be taken to investigate where they are. In an emergency situation, the resources to search for the unaccounted are limited, and having an accurate list of who is present helps bring focus to those efforts.

Where Is Mustering Used?

Aside from 'Emergency Roll Calls', mustering functions can be applied in several ways. In industrial or mining facilities, mustering can be used for 'Lock Out/ Tag Out' situations, where machinery should not be restarted or an area reoccupied until all maintenance personnel are accounted for. If even one maintenance person has scanned in to an area, but not yet scanned out, all machines are de-energized until everyone can be accounted for.

Likewise, in facilities where frequent headcounts are important, like prisons, daycares, or passenger manifests, mustering can be configured to ensure that all members of a group are present in an electronically logged system. 

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Depending on how mustering is implemented, it can send notifications or print reports to predefined locations. Not only can 'absentee reports' be sent to nearby printers within an evacuation area, it can send emails or text messages to current occupants alerting them to emergencies (ie: severe storms, bomb threats, or other emergency circumstances).

Additional Design Required

Depending on how a system implements mustering, additional software configuration and hardware may be required. If 'mustering readers' are used, then configuring this function may be no more than selecting a few checkboxes. This configuration often requires cross referencing other readers in the system to confirm occupants are not elsewhere in the system, or may even cross-reference shift or vacation schedules to confirm occupants are gone.

However, other forms of mustering may require additional readers. In order to take an accurate inventory of who is present in an area, occupants must 'scan out' when they leave. Most access controlled openings simply require 'scanning in' for access, so the addition of an out reader, even when hardware is not linked to it, adds cost and complexity to a system.

System Examples

Implementation of the feature varies by access control software, but is typically supported by enterprise level offerings. For example:

  • CCURE: Older versions of CCURE support mustering by way of designating specific readers as "Evacuation Points", however current versions include exception reporting that generate a list of names in an area on demand. 
  • DSX: This system supports mustering readers, as well as input/output linking that can be used to create 'mustering reports'. When 'Time & Attendance' readers are used, mustering reports can be filtered by who is currently present in a facility.
  • LENEL: OnGuard supports both reference readers and exception reports method in all versions, and can be integrated with other systems.

If mustering is important to you, make sure to check carefully check how it is implemented in your access control software as approaches and availability vary greatly.

3 reports cite this report:

Paxton Access Control Company Profile on Dec 07, 2015
This note profiles access company Paxton, our 3rd installment in an ongoing...
Avigilon Access Control Tested on Jun 22, 2015
Avigilon aims to deliver an end-to-end solution of video surveillance and...
The Coolest New Access Control Product In Years is from Tyco on Oct 22, 2014
Cool. Access control. Tyco. 3 things that you or I may have never...
Comments (10) : Members only. Login. or Join.

Related Reports

Help Security End Users Facing Coronavirus Improve Remote Access on Mar 24, 2020
Many end-users and integrators are struggling with the impact of coronavirus...
Access Control ADA and Disability Laws Tutorial on Feb 17, 2020
Safe access control is paramount, especially for those with...
Use Access Control Logs To Constrain Coronavirus on Apr 09, 2020
Access control users have included capabilities that are not commonly used...
Delayed Egress Access Control Tutorial on Feb 04, 2020
Delayed Egress marks one of the few times locking people into a building is...
Vehicle Gate Access Control Guide on Mar 19, 2020
Vehicle gate access control demands integrating various systems to keep...
Converged vs Dedicated Networks For Surveillance Tutorial on Feb 12, 2020
Use the existing network or deploy a new one? This is a critical choice in...
Hazardous & Explosion Proof Access Control Tutorial on Feb 27, 2020
Controlling access to hazardous environments requires equipment meeting...
Convergint Coronavirus Cuts on Mar 25, 2020
One of the world's largest security integrators, Convergint, has made a major...
Cancel or Not? Industry Split Over ISC West on Feb 26, 2020
The industry is split, polarized, over whether ISC West 2020 should run or be...
VSaaS 101 on Mar 25, 2020
Video Surveillance as a Service (VSaaS) is the common industry term for cloud...
ISS Presents Face As A Credential and UVSS on Apr 30, 2020
ISS presented its security platform, including access control integration,...
ADT Changing Model To Work From Home on May 12, 2020
ADT is 146 years old but the mega-company is making a bold move, in the face...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Hikvision Fever Screening Thermal Solutions Examined on Apr 13, 2020
Hikvision is marketing "safer, faster, smarter" with their Fever Screening...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...

Recent Reports

Dangerous Hikvision Fever Camera Showcased by Chilean City on Aug 07, 2020
Deploying a fever camera outdoors, in the rain, with no black body, is...
"Grand Slam" For Pelco's PE Firm, A Risk For Motorola on Aug 07, 2020
The word "Pelco" and "grand slam" have not been said together for many years....
FLIR Stock Falls, Admits 'Decelerating' Demand For Temperature Screening on Aug 07, 2020
Is the boom going to bust for temperature screening? FLIR disappointed...
VSaaS Will Hurt Integrators on Aug 06, 2020
VSaaS will hurt integrators, there is no question about that. How much...
Dogs For Coronavirus Screening Examined on Aug 06, 2020
While thermal temperature screening is the surveillance industry's most...
ADT Slides Back, Disappointing Results, Poor Commercial Performance on Aug 06, 2020
While ADT had an incredible start to the week, driven by the Google...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all of the...
SIA Coaches Sellers on NDAA 889B Blacklist Workarounds on Aug 05, 2020
Last month SIA demanded that NDAA 899B "must be delayed". Now that they have...
ADI Returns To Growth, Back To 'Pre-COVID Levels' on Aug 05, 2020
While ADI was hit hard in April, with revenue declining 21%, the company's...
Exposing Fever Tablet Suppliers and 40+ Relabelers on Aug 05, 2020
IPVM has found 40+ USA and EU companies relabeling fever tablets designed,...
Indian Government Restricts PRC Manufacturers From Public Projects on Aug 04, 2020
In a move that mirrors the U.S. government’s ban on Dahua and Hikvision...
Directory of 201 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
Dahua Loses Australian Medical Device Approval on Aug 04, 2020
Dahua has cancelled its medical device registration after "discussions" with...
Google Invests in ADT, ADT Stock Soars on Aug 03, 2020
Google has announced a $450 million investment in the Florida-based security...