top of page

PROJECT: DOMESTIC WORKERS, CONTRACTORS AND ACCESS CONTROL RISKS

  • 1 day ago
  • 5 min read

PLEASE SHARE THIS PUBLIC DOCUMENT

A significant percentage of residential security breaches are not the result of forced entry,

but rather authorised access that was poorly managed, inadequately monitored, or never properly controlled.

Domestic workers, gardeners, maintenance contractors, delivery personnel, and temporary service providers form part of daily residential life. However, from a security and investigative standpoint, these individuals also represent structured access points into private property.


The risk does not lie in employment or assistance itself—

it lies in the absence of formal access control protocols, accountability, and verification systems.

SSS investigations consistently reveal a common pattern:

homes are compromised not because security measures failed,

but because access was granted without control.

1. UNDERSTANDING THE RISK PROFILE:

  • It is critical to approach this subject with professional objectivity.

  • The overwhelming majority of domestic workers and contractors are law-abiding.

  • However, risk emerges in three key areas:

    • Unverified identity or background.

    • Unmonitored access to property and routines.

    • Uncontrolled third-party exposure (friends, relatives, or accomplices).

  • From an operational perspective, any individual with repeated access to a property gains:

    • Knowledge of alarm systems and blind spots.

    • Awareness of household routines and vulnerabilities.

    • Visibility of valuable assets.

    • Insight into occupancy patterns.

  • This information, whether intentionally or unintentionally shared, can be exploited.

2. THE REALITY OF “INSIDE INFORMATION” CRIME:

  • A large portion of residential crimes involves information leakage rather than direct participation.

  • SSS case analysis frequently identifies:

    • Staff unknowingly discussing household details externally

    • Contractors observing and later relaying security weaknesses

    • Access codes being seen, shared, or reused

    • Duplicate keys being created without the homeowner’s knowledge

  • The critical point is this: criminals do not need to enter your home if they already understand it.

3. CONTRACTORS: THE TEMPORARY ACCESS RISK

  • Contractors present a unique challenge because they are:

    • Often unknown to the homeowner.

    • Granted short-term but high-level access.

    • Allowed to move through multiple areas of the property.

    • Sometimes left unsupervised.

  • Common failures include:

    • No identity verification.

    • No record of entry and exit times.

    • No supervision during work.

    • Allowing additional, unvetted individuals on-site.

  • In multiple investigations, crimes occurred days or weeks after contractor visits, once vulnerabilities had been identified.

4. DOMESTIC STAFF AND ROUTINE EXPOSURE:

  • Long-term staff create a different type of risk—predictability and routine exposure.

  • Over time, domestic workers may:

    • Become familiar with security habits (or lack thereof).

    • Know when occupants are away, asleep, or alone.

    • Understand where valuables are kept.

    • Observe patterns of alarm activation and deactivation.

  • Even without malicious intent, this level of knowledge becomes a security liability if not properly managed.

5. ACCESS CONTROL FAILURES IDENTIFIED IN SSS INVESTIGATIONS:

  • The following failures are consistently identified:

    • Shared alarm codes between multiple individuals.

    • Lack of code changes after staff turnover.

    • Uncontrolled key distribution.

    • No visitor logs or access records.

    • Open gates or doors during working hours.

    • Absence of CCTV monitoring or review.

    • No vetting or reference checks.

  • These are not sophisticated failures—they are basic procedural gaps.

6. LEGAL AND LIABILITY CONSIDERATIONS:

  • Homeowners must understand that negligence in access control can have legal consequences, particularly where:

    • Incidents occur involving third parties on the property.

    • Unvetted individuals are allowed access.

    • Security measures are knowingly ignored.

  • Additionally, in criminal investigations, failure to control access can:

    • Complicate suspect identification.

    • Weaken evidential timelines.

    • Introduce multiple potential points of entry.

  • Proper access control is not only a security requirement—it is also a legal safeguard.

7. PRACTICAL SECURITY PROTOCOLS FOR ACCESS CONTROL:

  • Effective access control is structured, consistent, and documented:

  • VERIFICATION:

    • Conduct identity checks and retain copies of identification.

    • Confirm references and previous employment where applicable.

  • CONTROLLED ACCESS:

    • Assign unique alarm codes (never shared).

    • Restrict access to necessary areas only.

    • Change codes immediately after termination or contract completion.

  • SUPERVISION:

    • Never leave contractors unsupervised.

    • Monitor movement within the property.

  • PHYSICAL SECURITY:

    • Maintain strict key control (no duplication without authorisation).

    • Secure gates and entry points at all times.

  • MONITORING:

    • Use CCTV systems actively, not passively.

    • Review footage when concerns arise.

  • ROUTINE MANAGEMENT:

    • Avoid predictable security patterns.

    • Regularly reassess access privileges.

  • Security is not a once-off decision—it is an ongoing management process.

The reality facing South African homeowners is clear: the greatest vulnerabilities are often created internally,

through unmanaged access and assumed trust.

Domestic workers and contractors are part of everyday life,

but access to a property must always be treated as a controlled privilege, not an informal arrangement.

Security does not fail in dramatic moments—it fails in routine, in oversight, and in the gradual erosion of control.


For professional risk assessments, investigative support, and advanced residential security strategies, the public is encouraged to engage with Specialised Security Services (SSS) and consult Mr. Mike Bolhuis and his Specialist Investigators,

who continue to address complex access-control risks and residential crime patterns across South Africa.

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

CONTACT US

Pretoria, 75 Wapad, Leeuwfontein Estate, Roodeplaat, 0186, South Africa

​​

E-mail: mike@mikebolhuis.co.za
Mobile: 082 447  6116
International: +27 82
447 6116
Fax: 086 585 4924

  • Instagram
  • Facebook
  • YouTube
  • TikTok
chat with mike bolhuis on whatsapp

Thanks for submitting!

Copyright © mikebolhuis.co.za

MLB DIENSTE CC Reg: 1995/036819/23

PSIRA Reg: 1590364/421949

Web design by Mike Bolhuis Cybercrime Unit

bottom of page