0333 900 0101

Access Control in the Workplace: Employee Rights & Privacy (UK)

Access Control in the Workplace

Electronic access control protects people and assets by deciding who can go where, when—and recording that outcome. Because those records are personal data (and, if you use biometrics, often special category personal data), the system also sits squarely inside your privacy obligations as an employer. This long-form guide explains how to run access control that’s secure, safe and fair to your workforce—aligned to UK GDPR, the DPA 2018 and ICO guidance—without turning the front door into a privacy headache.

If you want a defensible design and commissioning plan, we can translate the steps below into a scoped specification, governance pack and staff-friendly roll-out. (See: Commercial Access Control Installation)

Why this matters (and why now)

The UK Information Commissioner has been clear: monitoring workers must be lawful, transparent and fair. The ICO’s 2023 guidance on monitoring workers specifically calls out the rise of new technologies and reminds employers to consider both the law and workers’ rights before implementing any monitoring. In short: build privacy in from the outset, and be able to explain your choices.

The regulator has also acted. In 2024, the ICO ordered a major leisure operator to stop using facial recognition and fingerprint scanning to track attendance and to delete unnecessary biometric data, noting the employer had not justified why intrusive biometrics were needed over less-intrusive options and had not offered alternatives. That is a strong signal for all employers considering workplace biometrics.

The legal frame at a glance

  • Access logs are personal data. You need a lawful basis (often legitimate interests for premises security) and you must apply the core GDPR principles—fairness, transparency, data minimisation, storage limitation, security and accountability. The ICO’s video surveillance guidance is the go-to reference whenever cameras are part of the entry journey.

  • Biometrics usually raise the bar. If you use biometric recognition (e.g., fingerprint or face) to uniquely identify a person, you’re processing special category biometric data. That requires both an Article 6 lawful basis and an Article 9 condition, plus careful governance (DPIA, alternatives, template security, retention). The ICO’s dedicated biometric guidance sets clear expectations

  • Audio recording is rarely justifiable. The ICO cautions that recording conversations is particularly intrusive and generally hard to justify: only do it if strictly necessary and proportionate.

  • Workers must be told clearly. UK GOV guidance reinforces the basics: tell workers if they’re monitored, how, and why—ideally in the staff handbook and onboarding materials, not just a poster on a wall. 

Build your access control around privacy by design

1) Be up-front and specific (transparency).
Give staff clear, layered information at the point of capture and in internal docs. Say what you collect (door events, any associated images), why (safety and security), who sees it (security/FM/HR in defined circumstances), how long you keep it, and how to exercise rights. The ICO’s surveillance guidance shows what good signage and notices look like; mirror that approach for doors and lobby cameras.

2) Pick a defendable lawful basis.
For standard door logs, legitimate interests is common; document your assessment and safeguards (e.g., no tracking beyond what’s necessary for security). If you intend to reuse logs for HR purposes (e.g., productivity), reassess: the legal and ethical bar is higher and may be inappropriate. The ICO’s monitoring-workers guidance exists precisely to keep you from sliding into “function creep.”

3) Do a DPIA early for higher-risk cases.
If you process special category biometric data, or you systematically monitor entrances (especially where staff might feel compelled), complete a Data Protection Impact Assessment before you buy hardware. The ICO expects this; it is your evidence trail that you assessed necessity, proportionality and risks, and that you chose mitigations (alternatives, short retention, access controls, training).

4) Minimise and set retention.
Collect what you need, not everything you can. Typical practice is to keep routine access logs for a defined, short period unless they’re needed for an incident. Automate deletion and document the policy; avoid “keep forever”. The same logic applies to camera footage linked to doors.

5) Engineer security, not surveillance.
Design your platform so it does its core job reliably—deterministic decisions at the door, event logging, safe release on fire alarm—without over-collecting. If your design adds cameras or microphones at entrances, justify each element. The ICO warns that audio capture is highly intrusive and generally unnecessary.

Biometrics in the workplace: do it right—or don’t do it

Biometric access can raise assurance (no card sharing) but is not a default choice. To pass legal and cultural tests:

  • Evidence necessity and proportionality. Reserve biometrics for high-risk zones (e.g., data rooms, labs) where you can show why cards/PINs aren’t enough.

  • Provide a reasonable alternative. Workers should not have to choose between handing over biometrics and getting paid or keeping their job. The ICO’s enforcement makes that point plain.

  • Protect templates, not raw images. Store encrypted templates, restrict who can enrol/delete, log all admin actions, and purge promptly on leavers.

  • Explain clearly. Staff should understand how their data is used, for how long, and what happens if they opt for the alternative path. The ICO’s biometric guidance is explicit on these points.

Worker expectations, remote work and fairness

The ICO stresses that monitoring must be fair and context-aware. People working from home often have a higher expectation of privacy; designs that might be acceptable on a staffed lobby can be excessive in domestic settings (e.g., always-on audio or broad video analytics). Keep access control firmly tied to its security purpose; avoid repurposing it as a tool for performance tracking. 

Rights, requests and practical boundaries

  • Subject access. Employees can request copies of their personal data—access events and any related images. Be ready to locate and extract records without disclosing others’ data. The ICO’s surveillance guidance offers practical approaches to video; apply similar care to door logs.

  • Rectification & objection. Keep clocks/time-sync clean and fix mis-tagged credentials quickly. Where you rely on legitimate interests, be prepared to consider objections.

  • No covert monitoring (except in rare cases). Covert monitoring is only justified in exceptional circumstances and for a strictly limited time—your DPIA and legal advice should explain why.

Policy, people and culture (the bits that make it work)

Put the rules in writing: who administers the system, how joiners/movers/leavers are handled, when to step-up authentication (e.g., card + PIN), who can run reports, how long you keep data, and how to respond to rights requests. Train reception and security staff on verification without over-collection (e.g., verifying ID visually without storing document numbers), and keep your staff handbook aligned. UK GOV guidance is clear: employers should tell workers plainly if and how they’re monitored. 

If you integrate doors with CCTV and intruder alarms (recommended for investigations and first-in/last-out logic), engineer it so manual releases are still logged by the controller and alarms/cameras only do what’s necessary. Our explainer on orchestrating those systems shows practical patterns that preserve security and audit without overreach.
(See: CCTV–Access Control–Alarm Integration)

A practical, defensible playbook

  1. State the purpose (safety/security), the scope (doors/zones), and the lawful basis for logs. Publish a clear internal notice.

  2. If biometrics are proposed, complete a DPIA, choose an Article 9 condition, and provide a non-biometric alternative.

  3. Design for minimisation: no audio by default; keep images only where necessary; short, automated retention.

  4. Engineer trust: deterministic door decisions, supervised fire-alarm release, clear admin roles, MFA for admins, and auditable changes.

  5. Train and test: induction briefings; signage; drills that include door release on alarm; rights-request rehearsals.

  6. Review annually: lawful basis, retention periods, alternative routes, and whether your access data is leaking into performance monitoring (it shouldn’t).

Do those things and you’ll have a workplace access system that keeps people safe and respects their privacy—and that sails through audits because you can show your working.

If you’d like us to turn this into a site-specific policy bundle (privacy notices, DPIA templates, commissioning tests, and a staff-friendly “how we use access data” explainer), we can help design, install and hand over a system that’s secure, compliant and easy to live with.
(See: Commercial Access Control Installation)