Download PDF version Contact company

The cannabis market is one of the fastest-growing markets. By the end of 2025, Grand View Research estimates that the global legal cannabis market will grow to US$ 66.3 billion. Its increasing legalisation and use in the medical field, as well as recreational applications, are some reasons driving its growth.

Cannabis market

However, there are stringent rules and regulations regarding the products’ cultivation and sale. According to Adherence Compliance, a Denver-based company that specialises in cannabis compliance, about 76 percent of all cannabis operators fail at inventory requirements, 72 percent fail security and surveillance requirements, 67 percent are unsuccessful with labeling and packaging, 64 percent on business records and 53 percent fail on transport and storage.

What do cannabis operators need to know before they grow? Blake Albertsen, Salient Regional Sales Manager for the Pacific Northwest, helps operators navigate regulations, a security plan, and the importance of a Clean Green Certified security manufacturer and integrator.

Regulations

From seed-to-sale, all activities that occur with each cannabis plant needs to be tracked and captured on security video

From seed-to-sale, all activities that occur with each cannabis plant needs to be tracked and captured on security video, including the interaction between an employee and a plant. Even plant waste and dead plants must remain under surveillance at all times.

According to Jeff Hubbard, the Owner of Constellation Cannabis, one of the largest cannabis grow facilities in Washington, before Constellation could begin growing cannabis, they needed a licence for the facility and then to develop an operating plan, specifically designed for the Washington State Liquor and Cannabis Board (LCB). The LCB is responsible for the licencing of establishments that sell and grow any type of alcohol and cannabis.

Operational blueprint

The operational blueprint delineates where, in the building, seeds are stored, where cannabis grows, where the flower room is, and where the concentrates production and processing takes place. In addition, a waste quarantine room is required in case a plant dies.

If we have a plant that dies, we can’t just take that plant and throw it in the compost pile; the plant is tagged, so we can scan the plant; we notify the LCB that the plant has died, and we remove the plant from our gardens,” Hubbard says.

But it needs to sit in our quarantine space for 72 hours because that gives the LCB three days to come out to our farm and do a spot check inspection,” says Hubbard, adding “Until compliance of all requirements were met, Constellation could not grow a single plant, and thus, was not able to generate revenue, says the Salient Systems case study.

State-specific cannabis regulations

Every U.S. state, county, and city can potentially be different when it comes to regulation,” says Albertsen, adding “Within a county or a city, there can be even more requirements. Even in Canada, there are different cannabis regulations within each province. Knowing where you are growing and where you are selling is critical even before you open your retail location or a grow facility.

At Salient Systems, we can help cannabis operators follow regulations within each state, city, and county"

Albersten further said, “At Salient Systems, we can help cannabis operators follow regulations within each state, city, and county, and help them make the right decision when it comes to their security needs. We have the ability to help operators to stay compliant and follow regulations. We can help clients make the best decisions.

Video surveillance footage maintenance period

One of the strictest regulations with regards to security is the amount of days that video surveillance footage must be maintained.

The US State of California, for instance, requires:

  • Retention time for video footage is 90 days
  • Security cameras must be placed at all entrances and exits, and must record from indoor and outdoor vantage points for 24 hours a day, with no interruptions, even during extreme weather conditions
  • A minimum camera resolution of 1280 x 720 pixels
  • No less than 15 frames per second (fps)
  • Cameras and storage must be IP compatible
  • Fencing and gates surrounding growing operations must be monitored at least 20 feet beyond the perimeter

In the State of Washington:

  • Footage must be retained for 45 days on-site
  • 24-hour continuous recording
  • Minimum camera resolution of 640 x 470 pixels
  • No less than 10 fps

In Canada:

  • Footage must be retained for 1 year
  • 24-hour continuous recording
  • Minimum camera resolution of 720 pixels
  • No less than 15 fps

Designing security plans

Navigating strict regulations requires a well-thought-out plan and a flexible storage solution

There are various other security requirements, such as implementing a functional alarm system, security personnel must be stationed during all hours of operations and proper notification to appropriate agencies in the event of a theft, loss or breach.

Navigating strict regulations requires a well-thought-out plan and a flexible storage solution that allows for enterprise surveillance systems that provide scalability, the necessary capacity to store video footage, and remote monitoring capabilities.

According to Albertsen, the following are key elements in a security plan that all growers or those looking into opening retail locations should consider:

  • Seek guidance from a professional in the industry before getting started with the security plan - “Whether it’s a consultant or a professional who has experience with security, security products, video, or designing a plan, it’s very important to use an experienced individual for many reasons,” said Albertsen, adding “One of them is to help with the regulations and requirements.
  • Cover all aspects of the building - “There are more areas that need to be covered, as well,” Albertsen says, adding “These include rooms, all perimeters, lobby spaces, and break rooms. Surveillance isn’t the only security system you might need to cover all those areas, access control systems, perimeter security technology (such as fencing), and an intrusion detection system, may be required by regulations.
  • Video surveillance is a must; the security plan must be designed around it - “Video surveillance is a piece of the puzzle that is in every single regulation, whether it’s retention of 45 days, 90 days, or 120 days,” says Albertsen, adding “In order to achieve retention, there are a number of things that must be done, such as running calculations on camera types, frame rates, or minimum resolution. Typically, many off-the-shelf products do not meet those regulations because they might have a small amount of storage when a 40tb drive is needed to meet retention requirements.
  • Find a security solution that is camera agnostic and provides cameras that fit the requisite surveillance needs - “No matter which area you’re trying to cover, both in grow areas and dispensary environments, you want to make sure that the security system covers head, hands, and feet in every surveillance camera. You want to monitor who is touching the plant, if the product has been placed somewhere else, such as pockets or in backpacks. You want to ensure there is nothing missing at the end of the day,” Albertsen notes, adding “A video management system will allow you to track a plant’s movement and the employees who work with plants throughout the facility, as well as an audit trail”.
  • Controlling access to the video is critical, too - “There are multiple ways to search for video footage: by motion, event-based searching, and thumbnail searching, which really makes investigations faster and more efficient. With the Salient Systems CompleteView 20/20, we can go back to video logs to check when video recording started and when there was motion detecte Even if there is continuous recording, we can set the video search on ‘alarm event’ to make sure we’re capturing those images by date, time, and even hourly”, stated Albertsen.
  • Special Features are A Must – Albertsen said, “Geo-tracking is based on maps, so we can input a map, either based on a Google, Bing, or .jpg map file, of the facility’s layout. In the GeoView, we can highlight specific geographical areas where an incident took place, for instance. We can enable cameras to be focused on a view, allowing investigations to be run on that view. It’s a very easy and quick way to go back and review video footage of specific cameras.
  • Seed-to-sale tracking is critical – Albersten points out, “Ensure that you have your seed-to-sale system in place to monitor the seed during the plant’s growth and then final product for sale in the market. You need to place a tracking on the plant so that it is tracked throughout the process. That includes fertilisation, production, processing, packaging, and sale.
  • Easy access to sites via apps, such as iOS and android device - “Even when you are not physically there, you want to know if there’s an event going on at your site, who’s there after hours or if there’s an incident,” Albertsen said, adding “You can have the option to monitor what is happening through your mobile device before you drive out to the facility.
  • A web login for the video - According to Albertsen, “There are two options: a web interface or software. A web interface is designed for clients who want to log in quickly and easily into their facility’s system, he notes. Another option is loading software onto PCs to access a facility’s system. Both options provide cannabis operators with easy access to their facilities, so they can remotely monitor their operations.
  • Custom versus off-the-shelf - “There are multiple levels of security systems available,” says Albertsen adding, “There are many off-the-shelf systems that growers can buy at retail facilities. But they are not made for a cannabis industry. We will create a surveillance system that meets regulatory requirements. Typically, off-the-shelf camera systems are boxed kits with not enough hard drive space. That likely won’t be enough storage to meet regulatory requirements of continuous recording. We will help a client to ensure that regulations are met through a series of calculations, meetings, and design work that creates a customised solution to meet the need of your regulations.
  • A clean green certified vendor and integrator is extremely important - Because the USDA does not recognise cannabis as an agricultural crop, cannabis cannot legally be labelled ‘organic’. A Clean Green Certification was established in 2004 to regulate cannabis products, which helps processors/handlers to meet all of the rigorous regulations. Albersten said, “A Clean Green Certification is given to both vendors and integrators, as well. Not many people or products are Clean Green Certified, and you want to make sure they are right for what your facility and enterprise needs.
  • Experience counts for an integrator and manufacturer – Albersten said, “The consultant, integrator, contractor, manufacture, should know the process, the requirements, and regulations. There are integrators that are good with banking, government, or healthcare security. Some integrators have specific knowledge with the cannabis space, and it’s important to have them involved because they understand video surveillance storage needs and how to design a plan that caters to your facility’s needs.
  • Check references - “Vendors and integrators should both be able to discuss their references with you,” Albersten said.

Importance of a unified security, access platform

Additional advice from Albertsen includes, “Team up with a manufacturer and integrator that has experience. Look at the whole picture of what manufacturers can do to support your facility. If the manufacturer does not have any experience in the cannabis space, then you should consider other options”.

He concludes, “You should also look at different levels of security: does the solution integrate to the seed-to-sale program, or the access control system? Does the video have a unified platform to allow access control platform integration, seed-to-sale integration? Those are all very powerful tools to make sure your security system is solid for the cannabis space. Don’t settle for the cheapest solution, if it sounds too good to be true, it probably is.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

How has security industry training changed in the last year?
How has security industry training changed in the last year?

In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?

Physical access control: Critical steps to ensure a smarter future
Physical access control: Critical steps to ensure a smarter future

Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalisation bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformation While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment. Yet, with more organisations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximise the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge. Improved access control in smart environments These urban constructs are capable of reducing waste, driving efficiencies and optimising resources The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimising resources and increasing citizen engagement. Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. Frictionless access control During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity. Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimising the risk of infection, by removing the need to touch shared surfaces. Such systems can be customised and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful. Barriers to adoption Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Many are now beginning to realise that connected network-enabled solutions are here to stay Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space. Time will not stand still, and many are now beginning to realise that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature. The importance of cyber hygiene Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks. Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT). While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited. Cyber security considerations Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognised cyber security principles, incident reporting and best practices. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security. The future of access control There is a natural dispensation towards purchasing low-cost solutions There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organisations by their association. The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world. Cyber security key to keeping businesses safe In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies. As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor. The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.

Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach
Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach

The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labour costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming 29th June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organisations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practice, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.