!!!!
Who is in Your Campus !!!
The main feature of any visitor management system is to
screen the unwanted individuals. An internal watchlist to can be used to alert
the security officers of malicious individuals, disgruntled employee or any
other individual who are not wanted inside the school facility. External
databases can be accessed directly from the Visitor Management System to screen
the individual against registered sex offenders.
True Fact
As per 2013 Survey
Visitor
management: More and more university, hospital and school protection
professionals are realizing that paper guest logs are no longer acceptable ways
of keeping track of visitors. More than two in five campuses (43%) say that
lack of a visitor management system is one of their top five access control
challenges. The issues with sign-in sheets are many, including illegible
handwriting, lack of confidentiality and the potential for counterfeit visitor
badges. Consider adopting a software solution to help you better manage campus
guests as well as decrease your institution’s exposure to liability.

As per 2010 Survey
In 2009–10, about 74 percent of public schools recorded one
or more violent incidents, 16 percent recorded one or more serious violent
incidents, and 44 percent recorded one or more thefts.
Enhance Security
The schools use Access Control Systems for their staff. The
same access control system can be leveraged for visitor and contractor
management to grant temporary access. In this way the school can showcase more
security and professionalism. Some of the large campuses in the country are using
Visitor Identity Management systems to track visitors and contractors entering
the premises.
This enhanced visitor management system allows us to analyze
the visitor trends and patterns. In case of any unwanted visitor the system
allows to quick flag the information to the Security Personnel and School
Administrators. In the worse situation, during a fire emergency in the campus,
it will be impossible to determine who is still in the campus since it is the
human factor to enter the inconsistent check-in and check-out times.
In addition to basic visitor management facilities like
information capturing, badging and reposting some of the visitor management
systems has self service capabilities that allows the staff and employees to
preregister their visitors.

Shortcomings of Traditional
Method
1. You
can capture the photo of the visitor
2. It
is difficult to read the handwriting of people
3. The
names of the employees will be much visible in the log which will make it easy
for the intruder to just enter the name of the employee from the list above.
4. During
the time of emergency it is difficult to track the number of visitors who are
inside the premises.
Uses of Visitor Management
System
1. Integration
of Visitor Management systems with the existing access control systems
2. Custom
Badge Design allows you to have one or many of these, name of the person being
visited, type of the visitor, expiry date and time of the visit and photo.
3. The
self service allows preregistration of the visitor and scheduling the visit.
4. In
case of a security alert, the information is flagged to the concerned Security
Personnel and the Administrators.
5. The
visitor destination such as floor, building, department can be addressed and
appropriate privileges can be assigned
6. In
case multiple school campus allows integration with the central database
Not recommended
A visitor Kiosk is not the recommended solution in the
campus. Let us consider a situation that a visitor enters the campus with the
stolen ID proof and enters the same details in the kiosk to avoid getting
tracked as a match on the watchlist. Instead of reducing in the school
environment, you are actually adding risks. It is always a best to have face to
face contact with the visitor before granting access to the premises,
Data Analysis
The data analysis allows to analyses the visitor trends like
1. Visitors
who stayed overtime
2. Type
of ID proofs presented by the last 100 visitors
3. Areas
within the campus with more visitor footprint – need to explore and improve
security.
4. Total
Badged Visitor hours
5. Repeated
Visitor in the past 4 weeks
6. Visitor
Denied Access