Blog
What is an electronic visitor management system and how does it work?
Thursday, December 18, 2014 by Paul Kazlauskas
What is an electronic visitor management system?Electronic visitor management systems are used to sign-in and track visitors who come to visit a facility. These types of systems are becoming more and more popular with schools, healthcare facilities, and businesses of all kinds. Electronic visitor management systems are an electronic version of the visitor sign-in sheet or visitor log book used in buildings for years. While more expensive than a traditional log book, the electronic visitor ...
How does the "Sign-Out" option work on visitor badges?
Friday, December 5, 2014 by Paul Kazlauskas
When visitors fill out their visitor badge, they enter their initials, the date, and their “time in” on a stub that stays behind in the Visitor Pass Registry Book. Before exiting the facility, visitors return their badges and enter their “time out” on the stub containing their initials. The confidential log beneath the label liner makes it possible to know exactly who is in your building in case of emergency. For example, it’s easy to take the portable ...
How can I customize my visitor pass design?
Tuesday, November 18, 2014 by Paul Kazlauskas
Customizing visitor passes adds value to any facility's visitor management security. Deter forgery and promote your facility name with our custom-printed solutions. Design your own badges - we make it easy! Add your logoAdd your facility name and/or logo to any custom-printed badge. Most badge styles allow for both a name imprint and a logo/mascot. We can imprint any image in black or color (additional charge applies for color imprint). Change the titleChange VISITOR pass to ...
10 Steps to Creating A Campus Security Master Plan
Friday, February 14, 2014 by Paul Kazlauskas
Step 1: Assemble Your Committee It is important to obtain support from those who will benefit and/or be affected by the introduction of new processes or change to existing procedures. Step 2: Determine What Must be Protected Committee members must classify what is critical to the operation of the campus. Step 3: Think About Your Long-term Needs The security master plan’s development should also include long-term system compatibility, communication infrastructure, product obsolescence ...
« previous | 2 3 4 5 6 7 8 9 10 11 | next »Displaying posts 51 – 54 of 54