mVisitor is a complete visitor management solution that you will wish to have for your establishment.
Friday, 6 October 2017
Managing School Visitors
In today’s post Sandy Hook era, nearly every K-12 school district in
the United States has an electronic access control system protecting its
buildings. Faculty carry proximity cards or fobs, and most doors are
equipped with card readers. Some schools also require cards for
students. Administrations and schools boards have united in allocating
funds for technology that is considered indispensable for protecting our
children.
However, for all the investment put into tracking and managing school
access to employees, many schools are far less vigilant in monitoring
and managing the access provided to visitors. Many school visitors still
simply sign in on a clipboard and are handed a paper badge. At my own
kids’ school, as a visitor, my photo ID is scanned into a system, but
then I am handed a paper badge. Once I’m in, there is no electronic
tracking of where I go, or if I leave.
As a security professional, I can’t help but find it a bit ironic
that so many schools are keeping careful track of “their own” – but “the
outsiders” who enter the building are under far less scrutiny, and they
are equally capable of posing a security risk.
Perception vs. Reality
Why do schools consider access control systems a non-negotiable
necessity, but not visitor management systems? One reason may be the
perception that it is much harder to operate a visitor management system
in a K-12 setting.
Typically, when a systems integrator installs an access control
system, the integration team handles set up and populates the database
with an initial list of credentialed card holders. The system is then
turned over to an administrator for management and maintenance. Very few
others within the school need to understand how to use the system in
any capacity.
By contrast, a visitor management system must be
operated, day-to-day, by personnel located at the front door –
oftentimes a security guard, receptionist or clerk. While a school
administrator, probably within the IT department, will still be
responsible for establishing visitor credential settings, reviewing logs
and running reports, he or she will not be the one generating visitor
badges and interfacing with the public. The clerk or guard doing so must
be comfortable and efficient using the technology, as must all of the
individuals who serve as back-up when the primary user is on break, sick
or otherwise not on the job.
Some schools may feel that this training and supervision of system
users requires more effort than it is worth. They are also probably not
aware of the full benefits they are missing out on, especially when the
visitor management system is integrated with access control, both in
areas of security and operational efficiencies.
In fact, explaining the value of an integrated access control and
visitor management solution to K-12 users, as well as what the
integration process involves is vitally important to systems integrators
serving this vertical market.
How Does It Work?
When a visitor management system is integrated with access control,
school visitors are provided with a temporary credentialed badge that
allows them access only to areas where they should be allowed to go. It
is also capable of reporting where specific visitors actually do go, as
far as the school’s access control system allows for tracking.
In effect, the visitor has been entered into the access control
database and can be monitored just like any employee within the system.
To generate the credentialed badge, visitors provide photo ID, which
is scanned into the system. Some visitor management systems use the
image right from the photo ID; others require the clerk to take a quick
digital photo of the visitor.
When a badge is generated, it provides
access to approved areas for a set amount of time, and then expires.
Upon exiting the school, visitors scan their badge, letting the system
know that are no longer on the premises. If they take the badge with
them, it will not work after the expiration.
Some visitor management systems have integrated SMS capabilities,
enabling faculty to be notified via text when their visitor has arrived,
or can alert security if a visitor has not been logged as exiting the
building within the time they have been allotted.
System
administrators are responsible for defining the access level provided to
visitors and length of time for which access is granted.
In some instances, when an ID is scanned into the system, schools may
choose to check that the visitor is not on a “black list,” such as on
the sex offender registry, or a parent with limited visitation rights,
or someone subject to a restraining order.
Setting It Up
From an integrator’s perspective, the key to making this as simple as
possible is to choose a visitor management solution that offers a
pre-built integration to the access control system that is either
already in place, or will be installed.
Most manufacturers offer these pre-built visitor management “plug
ins” to a host of different access platforms. Choose one of these
combinations, and the programming should be minimal and straightforward.
In many cases, schools will look to security service providers or
systems integrators to take the lead in helping their IT department and
administrators define their needs, and then they will set up and program
the system to perform as desired. Once installed, responsibility for
the system must be assigned to a staff member who understands
programming and has the authority to manage the visitor management and
access control software.
The Security Benefits
Once visitor names and photos are captured within a searchable
database, there are many ways in which security is enhanced. Integrators
should be stressing these benefits of an integrated solution to their
K-12 customers; and, with the right education from integrators,
administrators will be better prepared to lobby for budgets that will
pay for them.
Here are benefits to share with customers:
Wandering Visitors:
Let’s say a visitor has finished doing what they came to do – like
visiting their child’s classroom. Instead of heading directly to the
exit, they decide to stroll the hallways unsupervised. While not ideal,
if the visitor has been provided with a credentialed badge, he or she
will not be able to access any restricted areas of the school that their
badge does not allow, such as locker rooms, storage areas, the
cafeteria, etc. And, if they do try to enter anywhere they should not,
security will be immediately notified – with both the visitor’s
information and their location in the school.
School Lockdown: In a lockdown, law
enforcement and first responders want to know who is in the building,
and even better, where they are within the building. If an access
control system can be logged into, the same report will include both
on-site employees and all current visitors. Furthermore, if law
enforcement can access video from security cameras within the locked
down building, they can potentially identify visitors from their photos.
Forensic Investigation: Tracking of where a
visitor went – and when – can be important in an investigation.
Integrated capabilities provide that “where and when” information. In
addition, if the access control system is integrated with video
surveillance, authorities can also quickly see what the person was
doing. Many access systems offer this type of integration, and provide
quick links to access events with video. As long as a camera has been
associated with a card reader, for each time that reader was swiped,
associated video can be called up.
Operational benefits can be another great selling point for systems integrators:
Support for regular visitors: Volunteers
who come for weekly activities or service personnel who make regular
visits, for example, can be granted a reusable badge that is programmed
to be valid for the times they visit the school each week. This
eliminates the need for them to be “processed” each time they arrive.
They just scan their badge when they enter, and the clerk can confirm
their identity from the photo. Once in the school, they can enter the
areas they need to be without an escort, as their programmed badge
provides access.
Eliminate visitor escorts:With the ability
to track the whereabouts of visitors, school administrators do not have
to assign escorts, freeing up school personnel to do more important
tasks.
No badge collection: Because badges expire, there is no need to collect them when a visitor leaves, and there is no risk of reuse or misuse.
Time tracking: Integration with the access
database makes it easy to track hours of volunteer workers. Other
analytics can also be provided depending on the specific solutions in
place.
Even when not integrated with access control, electronic visitor
management delivers many other security and operational efficiencies,
including: enhanced confidentiality (no list of previous visitors on
display); the ability to easily pre-register visitors for large events;
and, as mentioned, the ability to quickly check visitors against a black
list. Some solutions also offer a “mobile” module that can be used to
keep track of students on field trips, as they board or exit the bus.
No comments:
Post a Comment