Access Control Security: The Complete Guide
Juggling keys, rekeying locks, and wondering who has access to your property can be a major source of stress. What if you could manage your entire property’s security from the palm of your hand? Modern access control security makes this possible. It replaces cumbersome physical keys with streamlined digital credentials, allowing you to grant or revoke access instantly, set time-based permissions for visitors, and receive real-time alerts on your phone. It’s about giving you complete command over your environment, simply and effectively. Here, we’ll explore how these systems provide unmatched convenience without ever compromising on protection.

access control systems
At American Alarm Corporation, we believe that security solutions like access control aren’t just a tool—it’s your frontline defense. Since 1995, and with decades of experience, we’ve helped Georgia homeowners and business owners protect Atlanta’s homes and businesses with systems that evolve alongside modern threats. Compared to other companies in the security industry, American Alarm Corporation stands out for its reliability and innovative features. From advanced encryption to real-time mobile management, our solutions are engineered to offer you unmatched protection, visibility, and convenience.
Why Is Modern Access Control a Must-Have?
Access control systems regulate who can access your property, when, and under what conditions. These business security systems are no longer just optional; they’re essential. In today’s world of increasing internal and external threats, a weak access control system can put your staff, property, and sensitive data at risk. For residential protection, home security and home security systems are also essential to safeguard your home and loved ones. At American Alarm Corporation, we design systems that cater to your security needs and integrate with your existing security infrastructure—whether it’s video surveillance, intrusion detection, fire safety, or a home security system—to build a seamless, multi-layered security solution. Our goal? To help you focus on your business or your home without second-guessing your security.
Core Principles of Effective Access Control
A strong access control system is more than just locks and keycards; it’s a strategic framework built on a few core ideas. Understanding these principles helps you see your security not as a collection of gadgets, but as a cohesive strategy that protects your people and property. Whether you’re securing a small office or a large commercial facility, these concepts are the foundation of any effective system. They ensure that your security measures are intentional, comprehensive, and capable of adapting to new challenges. At American Alarm, we design every access control solution around these proven principles to provide security that is both intelligent and reliable, giving you confidence that your assets are properly protected.
The Principle of Least Privilege
The Principle of Least Privilege is a simple but powerful concept: a user should only have access to the information and areas necessary to do their job. Think of it like giving a house key to a friend—you’d give them the key to the front door, but not to your safe. In a business setting, this means an employee in marketing doesn’t need access to the server room, and a temporary contractor shouldn’t have keys to the executive offices. This approach dramatically reduces your risk. If a user’s credentials are ever compromised, the potential damage is contained because their access is limited from the start. Modern systems make it easy to assign these specific permissions, ensuring everyone has access to exactly what they need, and nothing more.
The Role of Access Control in a Zero Trust Model
The “Zero Trust” model is the new standard for modern security, and its motto is straightforward: “never trust, always verify.” This framework assumes that threats can come from anywhere, both outside and inside your property. Access control is the engine that powers this model. Instead of assuming someone is safe just because they’re already in the building, a Zero Trust approach requires verification at every checkpoint. Every time a user tries to open a door or access a secure area, the system re-validates their credentials. This is a fundamental shift from older security mindsets and is essential for protecting your most sensitive areas and valuable assets in an increasingly complex world.
The Three A’s: Authentication, Authorization, and Audit
Effective access control relies on three key processes working together: Authentication, Authorization, and Audit. First, Authentication answers the question, “Who are you?” by verifying a user’s identity with a credential like a key card, PIN, or biometric scan. Next, Authorization determines, “What are you allowed to do?” Once identified, the system checks if that user has permission to enter that specific door at that specific time. Finally, Audit answers, “What did you do?” by creating a detailed log of every access attempt—successful or not. This audit trail is crucial for reviewing security events and maintaining accountability. All three are essential; without them, you have an incomplete system with critical gaps.
Why Broken Access Control is a Top Security Risk
Industry experts consistently identify broken access control as a leading security vulnerability for businesses. A “broken” system isn’t just one with a faulty door reader; it’s often a system with flawed policies, such as giving too many people master-level access or failing to remove credentials for former employees. These gaps can lead to unauthorized access to sensitive data, theft of physical assets, and significant operational disruption. The consequences go beyond financial loss, potentially causing serious damage to your company’s reputation. Partnering with security professionals to design, install, and maintain your system ensures it’s configured correctly, helping you avoid these common and costly risks. If you have questions about your current setup, we’re here to help you find a solution.
How Outdated Access Control Hurts Atlanta Businesses
For many businesses in metro Atlanta, the most expensive losses don’t come from outside—they come from within. That’s why we offer business security solutions tailored for small business needs, providing comprehensive protection and access control options. Without robust access logs, credential tracking, or multi-layered permissions, businesses are left exposed to internal theft and unauthorized access. Our clients across Alpharetta, Sandy Springs, and Midtown Atlanta have seen how security cameras, digital credentialing, and event-based alerts stop unauthorized access before it happens. Access control systems help small businesses operate securely and efficiently by ensuring only authorized personnel can enter sensitive areas. With our monitoring service, you can know exactly who accessed what area, when they did it, and how frequently. This kind of insight doesn’t just improve security—it boosts operational awareness.
Beyond Traditional Locks and Keys
Access control has come a long way from the simple lock and key. Modern systems offer sophisticated ways to manage who enters your space, providing enhanced security and detailed oversight. Instead of just preventing entry, today’s solutions are about managing permissions with precision. Think key cards that can be activated or deactivated instantly, biometric scanners that use unique physical traits, or mobile credentials that turn a smartphone into a key. These advancements give you greater control and a clearer picture of who is coming and going, which is essential for protecting your property and assets effectively.
Understanding Access Control Models
Not all access control systems operate the same way. The logic that determines who gets access and who doesn’t is based on an underlying “access control model.” Think of these models as different rulebooks for your security system. Some are extremely strict and centralized, while others offer more flexibility to individual users. Understanding the core differences is the first step in choosing the right setup for your business. The goal is to find a model that matches your security requirements without creating unnecessary hurdles for your team. Selecting the right framework is a critical part of designing effective access control systems that truly protect your Atlanta-area business.
The three most common models you’ll encounter are Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Subscription-Based Access Control (SBAC). Each one serves a different purpose and is suited for different environments. For example, a facility that handles sensitive government information would need a much different rulebook than a small office where employees need to share files freely. By exploring these models, you can make a more informed decision about what kind of protection makes the most sense for your specific needs, ensuring your security is both robust and practical.
Mandatory Access Control (MAC)
Mandatory Access Control (MAC) is the most stringent and centralized model. In a MAC system, access rules are set by a central administrator—like the property owner or a designated manager—and individual users have no authority to change them. Access is granted based on security labels or classifications. For example, an employee might be assigned a “Confidential” clearance level, allowing them to access only rooms and data with the same classification. This is the type of system you’d find in high-security environments like government agencies or military facilities, where preventing unauthorized access to sensitive information is the absolute top priority.
Discretionary Access Control (DAC)
Discretionary Access Control (DAC) is a more flexible and common model, especially in commercial settings. With DAC, the owner of a resource—whether it’s a file, a folder, or even a specific room—can decide who gets to access it. If you’ve ever shared a Google Doc and adjusted the sharing settings, you’ve used a form of DAC. While this model is user-friendly and promotes collaboration, it also carries some risk. According to security experts at Delinea, users can sometimes give away too much access by mistake, potentially exposing sensitive information to the wrong people without realizing it.
Subscription-Based Access Control (SBAC)
Subscription-Based Access Control (SBAC) is a model where permissions are granted based on a user’s subscription level. This is incredibly common for online services and software. For instance, a streaming service like Netflix uses SBAC to determine what content you can watch based on your payment plan. In a business context, this model might apply to software where different tiers of users get access to different features. While it’s more prevalent in the digital world, the principle of tiered access can also apply to physical spaces, such as a co-working office where members have different levels of access depending on their membership package.
The Technology Behind Our Access Control Systems
We don’t just follow trends—we lead with cutting-edge systems that adapt to your specific environment. Reliable equipment is essential for building effective access control and ensuring long-term security. Here are the components we use to create smarter, safer systems:
Core Hardware Components
A solid access control system is built on a foundation of reliable hardware. Each piece plays a specific role in keeping your property secure, working together seamlessly to manage who comes and goes. Let’s break down the key components that make it all work.
Control Panels
Think of the control panel as the central nervous system of your access control setup. This device is the “brain” that makes all the critical decisions. When someone presents a keycard or fob at a reader, the panel receives that information and instantly checks it against the rules you’ve established. It determines who is allowed in, at what times, and through which doors. This intelligent processing is what transforms a simple lock into a smart security solution. At American Alarm, we ensure our access control systems are powered by robust control panels that can manage everything from a single door to an entire commercial complex, giving you complete command over your property’s security.
Readers
The reader is the part of the system your employees or residents will interact with every day. It’s the device mounted by the door where you present your credential—be it a keycard, a fob, or even a smartphone. The reader’s job is to scan the credential and send the data to the control panel for verification. Once the panel gives the green light, the reader signals the lock to open. But it doesn’t stop there; it also records the event, creating a detailed log of who entered and when. This provides an invaluable audit trail for your records. We offer a variety of readers to fit your needs, from simple card scanners to advanced biometric options, ensuring a seamless and secure entry experience.
Locking Hardware and Door Switches
The final pieces of the puzzle are the hardware that physically secures the door. This includes electric locking mechanisms, like electric strikes or magnetic locks, which are controlled by the system. When an authorized credential is used, the control panel tells the lock to release. Just as important is the door switch, a small but vital sensor that monitors the door’s status. It lets the system know if a door is securely closed or if it has been propped open, which can trigger an alert. Together, this hardware ensures that your doors aren’t just locked—they’re intelligently monitored. If you’re unsure what hardware is right for your Atlanta business, our team can help you design a custom solution.
Go Keyless with Biometric Security
We deploy fingerprint, facial recognition, and iris scanning technologies to verify identities using unique physical traits. These identifiers are virtually impossible to replicate, dramatically reducing the risk of credential theft.
Add Layers of Protection with MFA
Instead of relying on a single form of access, we combine two or more authentication methods—like passcodes, ID badges, and biometrics—to ensure the person at the door is truly authorized. This multi-layered defense protects your access points against a range of common attacks.
Get Smarter Alerts with AI Monitoring
Using artificial intelligence, our systems analyze behavior patterns to flag suspicious activity in real time. Whether it’s after-hours entry attempts or repeated badge denials, our monitoring service with AI-powered alerts and integrated alarm monitoring gives you the power to act fast and investigate before a breach occurs.
Use Your Phone as Your Key
Our mobile-enabled access platforms let you issue digital keys directly to your team’s smartphones, allowing employees to use their phones for secure access and communication. No more keycards to print or physical badges to replace—just instant access and total control via a secure mobile app.
How We Keep Your Access Data Secure
Your data deserves the same protection as your physical space. Our access control platforms, alongside fire alarm systems, encrypt all stored and transmitted data, making it virtually impossible for hackers to intercept or manipulate credentials.
Common Physical Access Threats and How to Counter Them
Even the most advanced security system has to contend with simple, everyday human behavior. Understanding the common ways unauthorized individuals try to gain access is the first step in building a truly secure environment. These threats often exploit trust or look for physical weaknesses in your setup. The good news is that with a combination of smart technology and clear policies, you can effectively counter them. Let’s look at a few of the most frequent threats Atlanta businesses face and the practical steps you can take to stop them before they become a problem.
Preventing Tailgating
Tailgating, sometimes called piggybacking, happens when an unauthorized person slips through a secure door right behind someone with valid credentials. It’s a simple but surprisingly effective tactic that preys on politeness—most people will hold a door open for the person behind them. To counter this, it’s crucial to train your team to be aware of who is following them into secure areas. Beyond training, physical solutions offer a more reliable fix. Implementing barriers like turnstiles or advanced mantrap doors, which only allow one person to pass through at a time, can eliminate the risk. Our access control systems can also be configured with door alarms that trigger if a door is held open too long, alerting you to potential tailgating in real time.
Defending Against Forced Entry
A forced entry is exactly what it sounds like: an intruder breaking a lock, door, or window to get inside. This is a brute-force method, but it remains a persistent threat for both commercial and residential properties. The most effective defense is a layered one. It starts with high-quality, durable locks and reinforced doors and windows that make breaking in difficult and noisy. The next layer is a responsive alarm system. Modern alarm systems can detect the vibration of a window being broken or the pressure of a door being forced open, immediately triggering an alarm and notifying our 24/7 monitoring center to dispatch help. This ensures that even if an intruder attempts to get in, they won’t have the time to succeed.
Securing Against Card Cloning and Attacks
Keycards and fobs are convenient, but they aren’t foolproof. Sophisticated criminals can use devices to “skim” the data from a proximity card and create a clone, giving them unrestricted access. This is a quiet threat that can go unnoticed until it’s too late. The best way to protect against this is to add another layer of verification. We strongly recommend implementing dual authentication methods for high-security areas. This means requiring both a card and a unique PIN or a biometric scan (like a fingerprint) to grant access. By requiring two different forms of credentials, you make a cloned card useless on its own, effectively shutting down this line of attack and keeping your sensitive areas secure.
Securing Your Digital Environment
In today’s connected world, your security strategy can’t stop at the front door. Protecting your digital assets—from customer data and financial records to proprietary information—is just as critical as securing your physical space. Digital threats can be just as damaging as physical ones, and they often originate from simple oversights in digital hygiene. A comprehensive security plan integrates both physical and digital defenses to create a seamless shield around your entire operation. By applying the same principles of controlled access to your digital environment, you can protect your business from the inside out and ensure your sensitive information stays in the right hands.
Best Practices for Password Security
Passwords are the first line of defense for your digital accounts, but they are often the weakest link. Creating strong, unique passwords is one of the most effective habits you can instill in your team. A strong password should be long—at least 12 characters—and include a mix of uppercase and lowercase letters, numbers, and symbols. Most importantly, avoid using easily guessable information like birthdays, pet names, or common words. Encourage the use of password managers, which can generate and store complex, unique passwords for every account. This simple practice dramatically reduces the risk of a breach stemming from a single compromised password.
Managing User Accounts and Permissions
Not everyone on your team needs access to everything. Effective access control is built on the principle of least privilege, meaning employees should only have access to the information and systems essential for their specific job functions. This involves carefully managing user permissions and regularly reviewing who has access to what. Maintaining robust access logs is also key, as it allows you to track who is accessing sensitive data and when. This level of credential tracking helps you spot unusual activity quickly and prevents unauthorized individuals from moving through your systems undetected. It’s a foundational step in preventing both internal and external data breaches.
Securing Workstations and Endpoints
Every computer, tablet, and smartphone connected to your network is an endpoint—and a potential entry point for threats. Securing these devices is a critical part of protecting your digital environment. Simple measures can make a big difference. For example, you can disable unnecessary ports, like USB drives, to prevent unauthorized data transfers or malware infections. It’s also wise to password-protect the BIOS settings on workstations to ensure that devices can only boot from the designated hard drive. These steps help lock down your hardware, making it much more difficult for anyone to tamper with your devices or introduce malicious software to your network.
Manage and Customize Access from Anywhere
Whether you’re managing a single building or a multi-location enterprise, our systems are built to give you real-time control with real-time alerts. You can easily manage access control settings in real time, empowering you to oversee and adjust your security systems as needed. Features include:
- Live Alerts for every door event or security breach attempt
- Customizable Entry Logs for detailed user tracking
- Time-Based Access for cleaning crews, vendors, and contractors, with the ability to schedule access for different users or groups
- Remote Locking and Credential Management from your mobile device
With remote access, you can create custom access rules based on job roles, shift schedules, or threat levels—adjustable on demand from anywhere.
Streamline Your Visitor and Key Management
Forget the hassle of rekeying locks or chasing down missing badges. With our digital systems, you can:
- Instantly assign or revoke access
- Set expiration dates on temporary passes
- Monitor one-time entries for deliveries or service personnel
This not only enhances your security but also frees up your team’s time by automating visitor management.
The Role of On-Site Personnel in Managing Access
Advanced technology is the backbone of modern access control, but it works best when paired with smart, on-site management. Our access control systems are designed to empower your staff, not replace them. Your team plays a vital role in monitoring entry points and verifying that the right people are coming and going. When integrated with your employee databases, the system allows your staff to instantly update permissions as roles change, which keeps operations smooth and secure. This combination of smart tech and human oversight turns your access control from a simple gatekeeper into a responsive part of your daily workflow, improving both safety and overall efficiency.
Get Your Access Control System Installed Right
A security system is only as strong as its installation. At American Alarm Corporation, we know that a professional installation is the foundation of effective protection for your property. Our experienced team begins every project with a thorough assessment of your security needs, ensuring that every access control system, security camera, and alarm system is tailored to your unique environment. From the initial free estimate to the final walkthrough, our technicians are committed to delivering a seamless installation experience. We handle everything—from positioning security cameras for optimal coverage to integrating smart home automation and control systems for maximum convenience. Our solutions are designed to protect your property, provide peace of mind, and make managing your security effortless. Choosing a reputable security company means you benefit from the latest technology, expert advice, and ongoing monitoring services. We work hard to prevent false alarms and ensure that your system responds quickly to real threats. With our team by your side, you can trust that your security installation will keep your property, family, or business safe today and for years to come.
Meeting Atlanta’s Business Security Requirements
Operating a business in Atlanta means staying up to date with local security regulations to protect your employees, customers, and assets. The city has specific requirements for security systems, including alarm systems, access control, and video surveillance. Businesses must register their security systems with the city, obtain necessary permits, and follow guidelines set by the Atlanta Police Department. Compliance isn’t just about avoiding fines—it’s about ensuring your business is truly protected. Regular security audits and risk assessments help identify vulnerabilities, while the use of security cameras and video monitoring can deter crime and improve response times. Implementing robust access control and secure door systems further strengthens your defense. Navigating these regulations can be complex, but a trusted security company can guide you through every step. We help Atlanta businesses stay compliant, secure, and ready to respond to any threat, so you can focus on what matters most: running your business safely and successfully.
Easy Ways to Strengthen Your Access Control
Access control is a cornerstone of any effective security system. To keep your property secure, start by installing secure doors and gates at all access points. Enhance your protection with mobile credentials and biometric authentication, which add powerful layers of security that are difficult to bypass. Integrate your access control with video surveillance and alarm systems for a comprehensive approach. Regularly update and maintain your systems to stay ahead of potential breaches, and limit access to sensitive areas using secure protocols for remote access. Conducting routine security audits and risk assessments will help you spot and address vulnerabilities before they become problems. Leverage cutting-edge technology like artificial intelligence and machine learning to monitor for suspicious activity and respond quickly. By working with a reputable security company, you’ll have expert support to keep your access control systems operating at their best, ensuring your property remains protected at all times.
Developing Your Access Control Strategy
Putting a strong access control system in place is more than just installing new hardware; it requires a thoughtful strategy. A well-designed plan ensures your system meets your specific security needs, scales with your growth, and is easy for your team to use. By thinking through your goals, technology, policies, and implementation process, you can create a secure environment that protects your property and assets effectively. Let’s walk through the four key steps to building an access control strategy that works for you.
Step 1: Define Your Security Goals
Before you can choose the right system, you need to be crystal clear about what you want to protect. Start by identifying your most critical assets. Is it sensitive client data, valuable inventory, or specific high-security areas like a server room? Think about who needs access and who doesn’t. An effective access control system is designed to regulate who can enter your property, when they can do it, and under what conditions. Your goals will shape every other decision you make, from the type of credentials you use to the level of monitoring you need. This initial step ensures your investment is targeted and effective from day one.
Step 2: Choose the Right Solution
Once your goals are set, it’s time to find the technology that aligns with them. The market is full of options, from traditional key cards to advanced biometric scanners and mobile credentials. The key is to select a solution that fits your unique environment. For example, a small retail shop might need a simple keypad system, while a large office building could benefit from integrated mobile access. At American Alarm, we focus on providing reliable, cutting-edge systems and products that adapt to your needs. We’ll help you find the right balance of security, convenience, and scalability to ensure your system serves you well for years to come.
Step 3: Establish Clear Access Policies
Technology is only as good as the rules that govern it. This is where clear, consistent access policies come in. These policies should define who gets access to which areas and when. A great starting point is the principle of least privilege—granting individuals access only to the areas they absolutely need to perform their duties. Without clear policies for credential tracking, multi-layered permissions, and access logs, your business remains vulnerable. Documenting these rules and communicating them to your team ensures everyone understands their role in maintaining a secure environment and helps prevent unauthorized access before it happens.
Step 4: Implement Best Practices for a Secure Rollout
A successful rollout is crucial for getting the most out of your new system. This involves more than just installation; it includes training your staff on how to use the system and understand the new policies. It’s also important to establish a routine for ongoing management. This means regularly reviewing access logs for unusual activity, updating software to protect against new threats, and promptly revoking credentials for former employees. A security system isn’t a “set it and forget it” tool. By committing to regular maintenance and audits, you can stay ahead of potential breaches and ensure your property remains secure. If you need help getting started, our team is always here to provide expert guidance.
Why Choose Us for Your Access Control in Atlanta?
We take a consultative service approach to access control. No two properties are the same, which is why we begin with a full site assessment, offer a free quote as part of the consultation process, and follow through with personalized system design, installation, and support. Our expertise covers both residential and commercial access control solutions. Our clients benefit from:
- Tailored access solutions
- Seamless integration with video and alarm systems
- On-site training and setup walkthroughs
- Maintenance plans and system upgrades
With over 25 years in the business and a dedicated team led by security expert Scott Gilkey, we bring deep knowledge, proven solutions, and local accountability to every job.
Access Control Solutions Designed for Your Needs
Whether you’re managing a logistics warehouse, a private school, a boutique retail store, a mid-rise office building, or looking to secure Atlanta homes, our access control systems scale with your needs and are tailored for Atlanta home environments. You can:
- Expand access levels as your team grows
- Connect security devices across multiple sites
- Add surveillance, alarm, and life-safety tools to the same platform
We design for simplicity without compromising on control, so you can adapt your system as your business evolves, providing a solution that meets the needs of both businesses and Atlanta homes.
What’s Next in Access Control Security?
The future of access control security is being shaped by rapid advances in technology. Biometrics and artificial intelligence are making systems smarter and more secure, while mobile credentials and remote access are giving users greater convenience and control than ever before. Cloud-based access control systems are on the rise, offering businesses and homeowners scalability and flexibility to adapt as their needs change. Video analytics and machine learning are enhancing threat detection, and the Internet of Things (IoT) is connecting more devices for seamless management. As cyber threats evolve, access control systems must become even more resilient and secure. The demand for advanced security solutions will only grow, driven by the need for safety and peace of mind. Staying ahead means partnering with a security company that understands cutting-edge technology and can guide you through the changing landscape. At American Alarm Corporation, we’re committed to helping you navigate the future of access control, so you can enjoy the ultimate in convenience, control, and security for your property and stay connected at all times.
Take Control of Your Access Security Today
You shouldn’t have to wonder whether your facility is secure. With our customized access control systems, you’ll know. From encrypted mobile credentials to AI-powered monitoring, we offer solutions that adapt to the challenges of modern security. If you’re still using physical keys or outdated software, now is the time to upgrade. We’re ready to help you protect what matters most.
Frequently Asked Questions
What are the 3 types of access control?
The three types of access control are Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). Each type provides different methods for managing permissions and security within a system.
What are the five major access control models?
The five major access control models are Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Rule-Based Access Control (RuBAC), and Attribute-Based Access Control (ABAC). Each model offers different levels of restriction and flexibility in managing permissions.
What are the four access control systems?
The four access control systems are Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control (RB-RBAC). Each system serves distinct purposes in managing user permissions effectively.
What year was American Alarm Corporation established?
American Alarm Corporation was established in 1995.
In which city is American Alarm Corporation based?
American Alarm Corporation is based in Atlanta, Georgia.
Key Takeaways
- Start with a Plan, Not a Product: Effective access control begins with clear goals. First, identify your most critical assets and areas, then establish rules for who needs access and when, and finally, choose the technology that supports that strategy.
- Go Beyond Basic Keys and Cards: Traditional credentials leave you exposed to common risks like cloning and tailgating. Layer your protection by incorporating modern solutions like biometrics, multi-factor authentication, and mobile access to create a more resilient system.
- Unify Your Physical and Digital Defenses: Your security plan must protect both your property and your data. Apply the same principles of controlled access to your digital environment by carefully managing user permissions and enforcing strong password policies.



Leave a Reply
Want to join the discussion?Feel free to contribute!