Drugs and Alcohol in the Workplace
We have come a long way from the 1970s and 1980s when those of us in the military can remember our senior NCOs disappearing to lunch at the Sergeant’s Mess and not returning

The digital world is replete with reminders of how vulnerable we can be in that security landscape.
Handle exceptions with ease. See how foreign workers returning on different visas and names were able to be identified pre-immigration.
Identify patients whose lives depend on absolute assurance. See how we stop potentially fatal medications reaching the wrong hands.
Know exactly who’s on site and what they’re qualified to do. See how IrisID was implemented after a non-credentialed crane operator.
We have come a long way from the 1970s and 1980s when those of us in the military can remember our senior NCOs disappearing to lunch at the Sergeant’s Mess and not returning
The Microsoft Digital Defence Report 2024 is out and its easy but sobering reading. A snippet summary of what’s been at play in our digital landscape highlights hostile governments leading the assault on our
The short answer is ‘no’. The longer answer is ‘Not ever’.An even longer answer exposes iridology as ‘a pseudoscience of no clinical value’ at best.A more damning expression
Bunnings is in the news (and breach) for using biometrics contrary to the nation’s privacy laws and principles. It’s topical and it’s relevant even though biometrics have been around for decades and the subject
It is a leading identity authentication system utilising unique iris patterns for robust security in sensitive areas. It provides a high level of security and accuracy. The technology is 100% foolproof and never misses, ensuring absolute protection and certainty by eliminating human error in identity verification and circumvention in processes
The system captures an image of the individual’s iris using a specialised camera It then converts this image into a secure, encrypted digital template. Identification is a quick match against the stored template, providing immediate, absolute, and error-free recognition
Iris patterns are unique with a probability of two irises having the same pattern being 1 in 1078, making them highly accurate and reliable. This offers 100% foolproof identity verification. Unlike other biometrics, iris recognition works reliably in challenging environments like those with dirt, dust, chemicals, or even when users are wearing masks or full PPE. This ensures only authorised people are onsite, reducing reliance on costly human supervision and providing absolute protection against fraudulent access.
Privacy is a key design consideration. The system stores encrypted digital templates (a 512-byte template), not the original iris images. These templates are transformed using an algorithm that makes it impossible to regenerate the images or re-engineer the irises. The encrypted data is not inherently connected to other personal identifying information, protecting the individual and preventing fraud or misuse. The data is essentially useless even if decrypted without the proprietary algorithm to reverse-engineer it (which is not possible). Encryption methods like AES256 are used for data security.
Yes, obtaining informed and voluntary consent is essential. The system is designed as “opt-in only”; iris data cannot be captured without the knowledge and witting compliance of the individual. This aligns with privacy best practices and requirements like Fair Work. The system’s API documentation indicates capability to manage user consent status. Clear communication about purpose, data usage, and privacy measures is part of obtaining consent.
Yes, integration is a core capability. Iris ID devices use standard interfaces and protocols such as Wiegand, Relay, RS232/RS485, and TCP/IP. Comprehensive APIs and SDKs are available for seamless integration. Specific integrations, like the documented one with Alcolizer breath testers, demonstrate the capability to simplify complex workflows for safety and compliance verification. Integration with existing access control systems is a common deployment method.
Iris ID offers various hardware options suitable for different workplace needs:
In Mining, it directly addresses issues like “buddy punching” by providing indisputable identity verification, ensuring accurate time & attendance and payroll. Integrated solutions (like with Alcolizer) eliminate costly manual supervision at alcohol test points and prevent significant contractual issues and revenue leakage caused by circumvention of safety.

