How to become a smart farmer with RFID technology

How to become a smart farmer with RFID technology

South Africa produces some of the best wines in the world. It has brought an array of economic benefits to the country including many employment opportunities.

Wine farms bring in an estimate of R2 billion to the economy. This includes direct expenditure from tourism/visitors and indirect from goods bought by wineries from other local businesses.

This expansive growth of industries has enabled wine farms to unlock all available opportunities to offer the world the best quality wines.

The issue at hand

Hand-picking is the only way to harvest grapes properly and effectively to ensure that the best quality grapes are selected.

The timely and old process of tracking the number of grapes picked by the harvesters to get their weekly wages is outdated. It involves labour intensive work and human error.

Wine farms continue to grow in South Africa, better processes are necessary to reduce time wasted.

Technology must be implemented to help systemize the process. Allowing processes to be faster, accurate and efficient.


Farmers have found many ways to adopt the latest technology to improve agriculture. Technology is used to save time, cut costs and improve yields.

RFID helps to automate the process of hand-picking in the wine industry.

HID (human interface device, an RFID producer) is finding new alternative ways to help the production process become more efficient, accurate and productive (RFID world, 2021).

With the new solution, each harvester is issued an armband with a unique HID card. The grape collection bins are tagged with HID tags and the vineyard supervisors are fitted with NFC (near field communication) enabled smartphones.

To activate the system, supervisors simply place their smartphone next to the harvester’s armband triggering an audible beep that assures both the harvester and supervisor that the collection bin has been counted and credited to the right person.

This new system will reduce administrative expenses and time, saving the vineyard valuable money and enabling them to get better harvest and yields.

The harvesters are also valued more for their efforts as it is better monitored and measured. They are compensated more fairly and thus motivated to work knowing their efforts will be properly rewarded. 

The NFC and RFID system generates more detailed, real-time information that can be used to guide better management decisions. Allowing wineries to present the best wines to their customers. Growing the industry to its full potential.

5 benefits of RFID technology in the wine industry

  1. Anti-counterfeit wine

RFID track and trace wine preventing fake wines from being put on the market. Both the wine retailer and customer can check whether the wine is authentic by checking the attached tag. Enabling a tamper-proof bottle and placing the RFID tag at the bottom of the bottle defeats counterfeits. Assuring authenticity can build brand reputation and value (Wang Y, 2013). 

  1. Real-time monitoring

Temperature is an important factor in preserving wine and preserving its value. This reduces spoilage of the wine and can monitor its shelf life. By using RFID tags, Bluetooth and 3G networks monitoring temperatures on their way to retailers. Every bottle will arrive with a complete history of temperature change information. This enables the product to be kept at the optimal temperature and not spoil along the supply chain. Consumers can check the safety of the products, making more informed decisions about their purchases. 

  1. Tracking and tracing

Barrel tracking allows you to visibly track your cargo’s movement, improves the efficiency of transport and increases the accuracy of where your cargo ends up. Identification of the bottle enables the farmer to manage cargo and be more cost-effective providing better proof of ownership to reduce theft and increase transparency (Ruiz-Garcia L, 2011).

  1. Labour cost and saving

RFID does not require human interference, reducing human error and employment costs. More time can be spent on customer services and less on production monitoring, inventory counting and information mix up.

  1. Data security

The data on RFID technology can only be read through coding preventing counterfeit. This will protect the brand’s value and enhance the brand’s competitiveness in the market. 


RFID eliminates many problems. These devices help automate farming processes, enabling farmers to have better control over their products, managing time more efficiently and managing crop inventory.

All of these systems in place make the process easier to sell to its customers. Providing a better experience for all. Ensuring that the quality of the product is not affected and the reputation is upheld.

South Africa has always been admired for offering the best quality products and services including wine. Consumers enjoy this product because of the relaxed sensation and good feeling they receive from consuming the beverage.

To keep moving on this growth path, the wine industry needs to keep on improving with the times. Technology is an important way to help the industry unlock its full potential and become the best producers in the world.


Donaldson, J. (2021). RFID Nips Growing Problem in the Bud. Mojix [Online]. Available: 29 January 2021

Kumar V & Srivastava A. 2018. The Role of RFID in the Agro-Food Sector. Agriculture research and technology, open-access journal. 14(4): 121-123.

RFID world. (2021). RFID and NFC Technology Helps Automate Age-Old Processes in the Winery Industry. RFID World [Online]. Available: 22 January 2021.

Ruiz-Garcia, L. 2011. The role of RFID in agriculture: Applications, limitations and challenges. Science direct: Elsevier. Vol 79(1): 42-50.

Wang, Y. 2013. Research on the Influence of RFID Technology on French Wine Supply Chain Management in China’s Wine Market. Université de Strasbourg. 1(1):2-47.

Why your mine is losing valuable money

Why your mine is losing valuable money 

Mine Card Holders

At the start of the 4 am shift, miners scan their access cards. They squeeze themselves through tiny turnstiles designed to prevent thieves from slipping through. Piling into cages that descend 3km underground.

Flattened against the hard earth on each side of the narrow tunnel, they make it to their designated posts where they will blast rock all day and extract valuable resources. 

Deep in the bedrock, the air feels hot and humid as a tropical jungle. They will work consistently for the next 9 hours before they go home and do it all over again the next day. 

Every day engineers, workers and professionals risk their lives by going underground to extract special resources from the ground. Making mining one of the largest high-risk industries in the world.

Mining is one of the longest standing sectors in SA. Having one of the world’s richest reserves of precious minerals and metals creates an array of economical benefits. 

So if mining is so prosperous, why is your mine losing money?

Mine Card Holders

Mining faces huge security and safety threats. 

Mines are at risk of:

  1. Theft – Mainly people on-site operate alone or with criminals accessing the mine from outside due to poor security. 
  2. Criminal activity – Community members may feel neglected if not included in mining operations and may protest. 
  3. Illegal mining – Known as the “Zama Zamas” (taking chances) slip down mines unnoticed, stealing precious minerals and coercing communities to cooperate with them.
  4. Natural disasters (collapsing mines, fires, acid drainage and leaks of poisonous gases). Pressure from billions of tons of overlying rocks results in tremors from extraction, putting workers in grave danger. 

Who needs protection? 

  • The mining staff
  • Mining equipment
  • Minerals being extracted

This disaster reduces the mine’s profits and efficiencies. The mine is unable to deliver in time as operations are closed, creating increased costs. 

What can we do to solve this?

Mine Card Holders

Verifying all employees who work at the mines is the first step to increasing a secure working space. Access control is an important aspect that controls who enters and exits the mine. 

Access control can act as the eyes, ears and evidence collectors to protect the mines. Restricting criminal activity and making it easier to identify suspects, working towards securing our mines across SA. 

Clocking in time and attendance allows for managers to keep track of their employees. Access shall only be granted to those who have passed the safety, medical, training and background checks which is all available on the card information.

All cameras need to be seal proof and airtight preventing dust or water from entering and damaging them.

Why are plastic ID card holders a good investment for your mine?

Plastic ID card holders also known as card caddies are great solutions for keeping your access card safe and secure. These are mainly used in mines to store your access cards together (you may store 3). 

Access may be granted by the reader by presenting your access card. This can easily be worn around your neck with a lanyard or on your shirt with a clip. 

The ease of accessibility frees up hand space and reduces touching surfaces, limiting the spread of COVID-19.

This ensures that your employees will not lose their personal access card and ensures safety as each card is unique to the employee. 

The plastic structure is lightweight and durable with a clear sliding lid that aids in the protection of your cards and increases visibility for the reader. 

Why is security important?

Mining Access Control

Security programmes ensure a safe working environment leading to more efficient and profitable mines. They limit damage and loss, enabling mines to grow without interruptions. 

Access control, surveillance, sensors and RFID with management software and regulations ensure worker safety. 

Workers can be tracked and traced if an accident or disaster occurs by access control, RFID & video surveillance.

The use of video surveillance underground helps to monitor safety & security by monitoring rock falls or accidents as they happen. Surveillance speeds up rescue and search time and hinders the activity of Zama Zamas. 


Access control is necessary for a safe working environment, allowing mines to be more profitable, efficient and get the necessary work done. 

Access control enables us to work towards securing our mines all across South Africa. 

At Easi-Card we strive to provide simple solutions for our customers that protect people and businesses. To find out more about access cards and card caddies visit our card holder section by clicking here ????


How RFID is changing the world

How RFID is changing the world 

RFID (radio frequency identification) uses radio waves to identify people or objects. 

These radio waves send out information about their identity to nearby readers which then decide what to do with that information (granting access or not). 

There are three types of tags:

  1. Active – this comes with a battery that powers the tag, transmitting information frequently without the need for a reader. These can store a lot of data and their signal can reach several km. 
  2. Passive – these have no battery and utilise radio energy from the reader to power themselves. These can only store a small amount of data and their signal can only reach a few cm. 
  3. Battery-assisted – a tag whose battery powers it when it gets close to a reader.

Frequency is the physical contact between the tag and the reader allowing communication. There are three categories of frequencies:

  1. Low Frequency (125-134 kHz) – very short range, restricted to just a few centimetres and limited memory storage. Data transmission speeds are low, and only a small number of tags can be read at once.
  2. High Frequency (13.56 MHz) – range of a few inches, but larger memory capacity and higher data transfer rates. 
  3. Ultra-High Frequency (433 MHz & 856-960 MHz) – long range, up to 70 feet, with large memory capacity and high transfer rates.

Most RFID systems are found at a high frequency using passive tags.

History of RFID

RFID cards have been around for decades, evolving from its early roots of World War II until today’s advanced security technology use. 

RFID Key Fobs

In World War II the Germans, Japanese and Americans used radar to warn their troops of foreign plane intruders that were approaching kilometres away. To differentiate planes that belonged to the enemy and their own, the German’s rolled their planes as they returned to base camp which would change the radio signal that reflected. Showing that these planes were not intruders. RFID helped save lives in a time of need, differentiating friends from foe and preventing their planes from being shot down in the process. 

RFID world war 2

Today, radar and RF communications are used to identify objects remotely. Companies began commercializing anti-theft systems using radio waves of whether an item had been paid for or not. Electronic article surveillance tags are used to track whether an item is paid for or not. If the item is not paid for, readers at the door signal an alarm to alert the owners of theft. 

RFID tags

Charles Walton was the first person to receive a patent for a passive transponder. He was able to unlock a door without a key. Instead, he used an access/RFID card or tag. 

What is an access card/tag?

This key card/tag is a big antenna (active RFID) with a chip inside of it. The chip is powered through the antenna so that there is no power source included. Once it is powered it will transmit a series of zeros and ones at a specific frequency. Just like a radio would. These are low-frequency transmitters of 125 kHz. 

The reader from the door transmits on a specific frequency too. When the card answers, it sends it specific information to the controller. If the description matches the description on the card it will read the correct card number and give access. The reader will then unlock the door. 

Deciding which user should have access & encoding?

What is an RFID tag

Everything is programmed from access software on a computer. Each access control card comes with a key encoded machine, which will set up permission for your card. The system should allow you to grant permission for multiple doors, configure date and time for access and even the number of times a user can access the space.

All these details are built into a very complicated algorithm, which is written into your keycard’s magstripe. This magstripe contains thousands of tiny magnetic bars, each can be polarized either north or south. Polarizing these magnets creates a sequence that is encoded on your card. Finally, the unique ID will grant access to some and not to others based on what permission you have granted. 

How has RFID changed the world?

RFID is used in many industries including:

  • Access control.
  • Time & attendance.
  • Grant identification.
  • Contactless smart cards.
  • Anti-theft devices in cars (the car will not start without the passive RFID tag).


RFID is widely used in logistics. A group of scientists wanted to use RFID to track trucks and their cargo with the use of transponders. This was done by using readers at the gates of secure facilities. The gate antenna would recognise the transponder in the truck responding data with an ID (mainly the driver’s ID). This was commercialised in the mid-1980s where an automated toll payment was created which is widely used today (also known as the dreaded E-tol in SA). 


Today RFID systems are found as high as 13.56 MHz (1K & 4K Mifare). 

Track and trace & improved supply chain 

This was especially important for business as a manufacturer could let their business partners know when the shipment left the dock at the warehouse, allowing the retailer to let the manufacturer know when the goods arrived. It allows companies like Takealot to track & trace their entire supply chain easily. Ensuring uninterrupted services and identifying missing goods instantly. 

Automated shopping 

Some of the biggest companies in the world use RFID including Amazon, H&M and Zara. According to Statista, “In 2020, the global market for RFID tags is projected to be sized at around 24.5 billion U.S. dollars. Retail applications are expected to account for the largest share of the market.” (Kumar, A. 2019). 

Amazon wanted to create the quickest checkout experience so that you do not have to wait in line and can simply “just walk out”. All you have to do is enter the Amazon store via the RFID Amazon app, pay for your item and walk out. Creating incredible customer experience and service.

Keeping track of your pets

By putting a RFID tag on your pets collar you will be able to keep track of them if it gets lost. Important ID information will be found on the RFID tag about the owner allowing those that have found the animal to bring it back to its owner. 

What are the risks?

What are the risks

The main issue in today’s age is security. Data can easily be captured and copied, allowing misuse of important information. To capture data, the scanner has to be in the range of the RFID chip. Making passive chips the safest option as they have a small range. In order to prevent data from being captured, you can carry your keys or cards in a protective pouch (mainly consisting of tin to prevent data from being copied). 

Privacy is another big issue. RFID can track your preferences, spending habits and physical movements without your knowledge or consent. This can then be used in many areas of unauthorised activities like target marketing and dynamic pricing. By storing all your data on a database, people can have access to all your personal information. And if this gets into the wrong hands it can be dangerous.

At Easi-card we promote DESfire as one of our most secure and safest options. DESfier provides the most secure, practically unbreakable 128 encryptions. The Desfire tag/card cannot be cloned, the reader cannot be hacked and the transaction cannot be skimmed.  Making it the safest option for you. 

Where is it going?

Where is it going

RFID is changing the world quickly in the most cost-effective way as prices decrease for this technology over the years. 

RFID is increasingly innovative and progressive. RFID provides important information that can assist your organization all the way. They help save time and increase your profits since staff can work more efficiently. 

RFID is a continually increasing innovation. It is expected to branch off into many more industries in the future. 

At Easi-card we strive to make life easy for you and your customers. Find out more about the RFID cards we sell in the link below. 

Written by Sherry Johnstone


IDESCO. 2019. How does DESfire work? IDESCO, [Online]. [03/11/2020].

Konica Minolta Business Solutions. 2020. RFID: how businesses use chip technology, [Online]. [03/11/2020].

Kumar, A. 2019. 5 Big Brands that Use RFID Technology in Business Smartly: asset, [Online].  [03/11/2020].

Pritchett, D. 2018. 5 ways that RFID is changing the world: Rockwest solutions. [Online]. [04/11/2020]. 

Violino, B. 2020. The history of RFID Technology: Radio frequency identification has been around for decades. Learn how it evolved from its roots in World War II radar systems to today’s hottest supply chain technology, [Online]. [03/11/2020].

How to stop illegal miners from accessing your mine

What is the problem?

South Africa’s mining sector has shrunk considerably since its peak in the early 1980s. As depicted in the figure below, mining contributed more than 20% of the country’s GDP. In contrast, that number has fallen to less than half in recent years. 

Source: South African Statistics, 2015 (pg 15.1 and 6.1)

Source: South African Statistics, 2015 (pg 15.1 and 6.1)

Over this period, nearly 6000 mines were abandoned, and tens of thousands of South Africans retrenched. Although many displaced workers have sought a living elsewhere, some have seen these derelict mines as a business opportunity and operate outside the law to extract any left-over resources. Zama Zamas, or ‘chance-takers’, is the colloquial term given to these nearly 30 000 illegal miners (Martin, 2019, p. 2).

The operations of Zama Zamas are not exclusive to dormant mines, however. Many illegal miners have found footing within the shafts of legitimate mines and are the cause of significant economic damages. Although all types of mines are affected, gold mines are their favorite targets. The Global Initiative for Transnational Organized Crime estimates that Zama Zamas are responsible for at least R14 billion in lost gold production, annually (Martin, 2019, p. 3).

Source: Sifile, L. 2018.

Safety is another concern. Zama Zamas can spend upwards of six months below ground on a single expedition and, without appropriate gear, supervision or knowledge, are a danger to themselves and those around them.

When they are above-ground, illegal miners regularly engage in turf wars with rival gangs that involve deadly shootouts, imperiling the lives of anyone unlucky enough to be caught in the crossfire.

Whether it be the loss of life, the theft of valuable goods or the damage done to property, wherever Zama Zamas go danger follows.

With the threat of illegal miners more prevalent now than ever before, how can you protect your mines from invasion? Read on and we will tell you.

How are illegal miners gaining access to your mines?

Zama Zamas gain access into active mine shafts by bribing on-site officials. Once the illegal miners have access to inside information, it is easy for them to infiltrate the premises and avoid security sweeps (Martin, 2019, p. 5). For any mine, the most critical problems to address come from the inside.

What can you do to stop illegal miners from accessing your mines?

A typical response is to request the assistance of law enforcement. However, there is an endemic problem with this approach: corruption. The South African police force is unreliable, and members are prone to bribery (Martin, 2019, p. 6). Illegal mining enterprises use this to their advantage.


Managing internal security has proven to be much more effective than outsourcing help from the authorities. After a mining firm spent R366 million on improving its security systems they caught and expelled over 1400 illegal miners (Martin, 2019, p. 7). Although it was an expensive investment, the mine quickly made up for it by avoiding further damages to their resources and infrastructure. 

You might be sweating at the prospect of paying such a large sum upfront, but there are more cost-effective ways of enhancing your mine’s security. By installing an ID-card issuance system, you can gain significant security benefits at an appealing price point. 

How does an ID card security system work?

An ID card system allows cardholders to access the premises of a business. Each card comes with an electronic chip that interacts with a scanner. The scanner recognizes the chip in the card. It sends a signal to an entrance or exit door, instructing it to open if the chip is authorized or to remain closed if it is not.

As a business owner, this gives you the flexibility to:

  • Monitor when and where cardholders enter your business.
  • Remotely control access to specific parts of your business.
  • Set parts of your business to automatically lock for extra security.
  • View activity logs of who has accessed your business, from where and at which times throughout the day

For the above reasons and many more besides, introducing modern security measures is a must for any business operating in uncertain conditions. This is especially true for South African mines. Prevention is the best protection.

Why choose Easi-card?

Easi-card supplies everything a mine would need to set up their ID card security system. Whether you want to outsource printing or purchase an ID card printing machine, we have you covered. In addition, we can arrange for alcohol breathalyzers as an added layer of occupational safety. Should you encounter a snag, we offer round-the-clock support and on-site technical assistance.

Our experience, detailed portfolio and product offerings make us a force to be reckoned within the industry. With the support of the Easi-card team, you will significantly reduce the risk of illegal miners and other unwanted individuals interfering with your operations. Do not hesitate to contact us if you would like to find out more about the measures you can take to enhance your business security.

Protect your investment with Easi-card. Leave the chance-taking to the Zama Zamas.

Primary Sources

Republic of South Africa. 2017. Mining: a brief history, Stats SA [Online]. [2020, July 24]

Martin, A. 2019. Uncovered: the dark world of the Zama Zamas. Enact. [Online]. [2020, July 24].

Sifile, L. 2018. Zama Zama turf war fears after 7 bodies found in veld. IOL. [Online]. [2020, July 24].

Further Readings

Power talk. 2019. Listen: what will it take to legalize Zama Zamas? Power 98.7. [Online]. [2020, July 24].

Minerals council South Africa. 2020. Brief history of mining in South Africa, Mining for schools. [Online]. [2020, July 24].

By R. J. Steens | Updated 23/10/2020




How can lanyards bring you more business?

1. Useful and practical

Lanyards are easily accessible cords or straps worn around your neck to carry important items such as keys or identification cards.

Lanyards are hands-free allowing you to move freely without losing or having to hold your ID card.

Lanyards come in a variety of fabrics and styles. They are 100% polyester/nylon. Common functions of lanyards are found at events, conferences or consultations.

Creating a sense of familiarity and comfort, lanyards enable customers to identify employees with ease.

Increased unity amongst employees helps them work together successfully, and build trust. Lanyards provide a sense of belonging to their company boosting their trust and pride.

2. Everyone wears them

Lanyards are good identification tools used to promote your business. They are a good way to display identification and are used everywhere.

People use lanyards to carry their keys. Students use lanyards to keep track of their student cards and employees use lanyards to carry office identification.

When people wear lanyards, others will see it too, providing free marketing for your business and word of mouth conversation.

People are more likely to keep a lanyard than a business card because it has many more uses.

3. Low-cost

Lanyards are inexpensive promotional items for better security and easy company identification. Those who use them will wear them for a long time, increasing durability. Re-use allows people to use lanyards for a broad range of activities thus caring for the environment in the process.

At Easi-card we aim to do our best for the environment. Lanyards provide multi-use purposes reducing unnecessary waste and overconsumption.

Promotional giveaways will not cost you much compared to other materials.

By ordering in bulk you can receive lanyards at an extremely affordable price at your convenience.

4. Safety & Security

Lanyards add security, branding and functionality to your brand.

Safety in the workplace is very important. This will help identify unauthorized personnel from entering your workplace. Monitoring who comes in and out of your office building with ease.

5. Make your Lanyard stand out

Custom lanyards are a good way to get your brand out into the public as they attract attention to your organization with quick identification.

Customized lanyards remind people where they received it and reminds the wearer of your brand. Creating a stand out impression of your brand.

Lanyards are increasing strategies to improve brand recognition and increase customers to your company. By simply personalizing your lanyard it shows that your brand is professional and that you care to show it.

At Easi-card we offer customized and printed lanyards. We can print any design, colour and style (text, logo or image). For more information about lanyards, visit

What Entrust Datacard’s new name change means to you

What Entrust Datacard’s new name change means to you

It’s not uncommon to hear global companies changing their names.
As the environment changes rapidly, so does the pressure to provide solutions to new and complex problems.
Often, the quest for new, results in change, like a company’s vision and mission, or at least an updated and improved one.
But, sadly, this is not the only reason why a company may change its name. They also can change them to hide or burry their former identity. To get rid of problems rather than to solve new ones.
In South Africa, recently, the latter has been the case. With many corruption scandals being brought to the publics awareness, Auditing & Management Consulting firms have been busy with expensive makeovers.
So why am I telling you this?
Well, with Entrust Datacard’s big reveal in September, I thought I would start off by assuring you that it has everything to do with solving new problems and nothing to do with hiding them!
Entrust Datacard is now Entrust ????????
What does this mean to you?
If you are a dealer of Entrust Datacard’s current product range, you will be excited to know there’s a whole lot more to add to your arsenal.
Or if you aren’t, don’t worry we will be supplying them to you soon!
And I’m not just talking about ID desktop card printers, but a whole new range of Identity, Payment and Data protection solutions. Products that look to solve growing security problems the world is currently facing!
” While this change may seem straightforward, it’s so much more than a shortening of our name. It’s an evolution. A shift in mindset. A powerful moment in our company history. ” – CEO of Entrust | Todd Wilkinson
what kind of security problems are Entrust at the forefront of?
Let’s dive in:
  • Immigration Control for Governments
  • Payment credential security for large banks
  • Access control for Government Agencies
  • Securing enterprise remote workforce data
You can now see that Entrust is positioning themselves as a leader in developing the core technologies needed to keep the world moving safely.
Where does this tie into the current COVID19 pandemic and the future?
A quote from Todd Wilkinson sums it up nicely for us:
“The global impact of the COVID-19 pandemic has shown us how critical digital transformation is in our daily lives, As consumers, we depend on digital technologies and security to do more than ever, whether it’s making purchases, crossing borders, accessing government services or logging into corporate networks.
We are proud that some of the world’s largest governments, organizations and enterprises trust us to keep citizens, commerce and information moving safely. Making Entrust the foundation of our brand reflects how our technology and innovation are central to securing this ever-evolving world”
At Easi-card we stand behind the vision and mission of Entrust.
Aligning our vision and mission “to help protect businesses and their people, by reducing the barriers to security, be it cost, knowledge or advice”.
If you would like to connect with us and are interested in Entrusts new product range, please feel free to drop us an email by clicking this link.

How the Datacard SD460 can protect your property from illegal miners

Nowadays, the counterfeiting industry continues to gain ground. However, when your private properties or possessions are at stake, it’s good to know how to defend yourself effectively.

In this context characterized by an innovation race, a lot of new technologies are emerging, thus giving a new impetus to the field of security.

That’s why we get involved, in order to offer you innovative and quality equipment, in particular to produce tamper proof ID Cards.

Currently, everybody is aware of the importance of illegal mining, which is very difficult to prevent. Indeed, among the 6,000 abandoned mines recorded in South Africa, it is estimated that their are 30,000 Zama Zamas mining a large quantity of resources.

The name “Zama Zama” comes from the Zulu langauge, and means “those who seek their destiny”.

A beautiful metaphor, but which constitutes a major problem not only in Africa but also worldwide. Indeed, Zama Zamas do not only work in abandoned mines, which are often very dangerous.

Sometimes they may decide to enter your own mines, much more secure and easier to access. This is a concern, not only because they get themselves into danger, but also because they are entering places they are not supposed to have access to.

Murders, accidents, fraud, money laundering, illicit economy, are enormous dangers linked to this uncontrolled clandestine activity, which must not be allowed to enter your territory.

Destabilizing the balance of international trade, it was actually estimated in 2005 that 10% of South African gold traded around the world was mined and sold illegally. In 2017, the Minerals Council confirmed that the state was losing as much as 21 billion rand, or nearly 1.3 billion $US, with these illegal practices.

So having a way to prevent illegal minors from entering your mines, to face this massive well-known issue, is essential. That’s why the stakes linked to innovative ID Cards should not be neglected.

Indeed, you don’t ignore that, if your identification systems are easily falsifiable, nothing will prevent identity thefts. It is child’s play to reproduce or print a banal card with your own photo on it. But when your ID Cards are made in a unique way, completed with a 3D logo you have chosen, the challenge is suddenly much harder to take up.

That’s why we offer a wide panel of ID Card Printers, so that you can design unique and reliable ID Cards for all your employees. For example, our Datacard SD460 Card Printer features the tactile printing technology, so your logo can be embossed, making it impossible to duplicate.

Fraud attempts can therefore be easily stifled. So, in addition to offering ID Cards with a stylish, personalized design, the Datacard SD460 Card Printer will protect you from identity thefts and illegal minors.

The principle is simple: you choose the image you want to see in 3D on the background of the ID Cards, and which will be realized in relief thanks to the inline lamination module of the Datacard SD460 Card Printer. Also, each laminate can be numbered, so you know which unique individual the ID Card belongs to.

The transparent film covering the ID Cards, on the other hand, cannot be removed without leaving traces. If the photo has been changed, you will notice it immediately. And all this can be done in a single pass, for quick and easy creation.

Equipped with encodable chips, these ID Cards are therefore adaptable to all your security needs, including the digital ones.

Thus, opt for the maximum security in your mines, thanks to Easi-Card!

Are Card Holders Really Necessary?

With so many enticing ads on google, social media and YouTube, that follow you around wherever you go, its easy to fall victim to buying something you don’t need.

Like a limited edition sock, or a non-alcoholic beer brewed in some cold country with evergreen trees.

For us, in the card industry, its Card Holders. The question I often hear is: “Are card holders really necessary?” “Why should I buy them?” “Isn’t that what my wallet is for?”.

For some time, to be honest, I haven’t really answered it in depth, only giving surface level explanations like, “it protects your cards” or “it saves you money in the long run” without knowing by how much exactly.

So that’s what this blog post is all about, giving you the real reason why they are necessary and by how much they can impact your business. Prepare to be shocked.

How long do card holders protect your cards for?

There are many types of card holders on the market, frosted or clear to begin with and then there are a number of different types based on function:

  • Luggage card holders with a suitcase handle
  • A card holder with 2 handles
  • Card Caddies
  • Conference Card Holders
  • Twinprox Card Holders
  • Luggage Card Holders with a Suitcase Handle
  • Keyring Card Holders for Drivers License

 If you take the basic most common card holder, the luggage’s card holders with a suitcase handle – on average – if you left it to degrade the plastic itself would take 1000 years!

If Henry II had bought a card holder and for some reason left it in his chamber of treasure and we found it today, it would still be in one piece.

But what if Henry used it? How long would it last then?

How we recycle 180 000 access cards each year

By now you have probably come across a news article, a facebook post, instagram pic or twitter tweet, which sheds some light on the current state of our Oceans. The facts, figures and pictures displayed are overwhelming and so depressing, we often find ourselves wondering if we are too late to make a change. Almost everything we touch at the supermarket or buy online, comes clothed in a combination of plastic and cardboard. This makes organizing refuse into the correct recyclable bins a challenge and a futile exercise when refuse removal services throw it all into the back of the truck. South Africa only recycle 43% of their plastic. On a global scale, 260 million tons of plastic are produced each year and about 10% ends up in the ocean. It goes without saying, something needs to be done.

There are 3 strategies currently being used to curve our plastic use. We can replace plastic packaging with environmentally friendly substances that are biodegradable. We can replace plastic packaging with reusable materials, such as glass and fabric. Or we could educate people about plastic pollution to influence their behaviour. Of the three strategies listed, the second has proven to be the most effective. This is because creating biodegradable packaging takes time grow and manufacture, it therefore costs more money.

In 2003 Easi-card was the first company in the South Africa to recycle access cards. By inventing and patenting our design, not only were we able to contribute towards saving our environment but we saved our clients millions of Rands. To give you a perspective, one of our clients order 180 000 recyclable access cards every year. At a price of R140 an access card our client is saving themselves R25 200 000 a year and the environment of 900kg of PVC plastic.

So how does our brilliant patented recyclable card work you ask?

Take a look at this quick video we created below!

Our patented product uses a tamper proof sticky solution which is applied to the back of your access card and identification card. This allows you to use the original access card multiple times over the lifetime of its use, pure genius!

For example, if an employee leaves the system, simply deactivate their access card. Then assign the same access card to a new employee filling in their position and apply our patented tamper proof void foil on the back of the access card and the new employees PVC ID card. Stick them together.
Volla! you have just issued a recyclable card in no time and at a fraction of the cost.
Currently, Easi-card are looking at new ways to contribute towards the global recycling movement. We have formed a new partnership with mpact South Africa who willingly accept our used PVC cards for recycling. The money we receive from mpact is then donated to charity, giving back to many important social causes in South Africa. Have a look at our van dropping off the used PVC cards below.
 mpact and Easi-card Recycle PVC CardsEasi-card recycle PVC cards with mpact South Africa
If you would like to find out more about our recycled access cards please feel free to contact us or click the link below to receive a free quote!

Get a quote

Item added to cart.
0 items - R0.00