Tuesday, July 22, 2014

who is in the campus

!!!! Who is in Your Campus !!!
The main feature of any visitor management system is to screen the unwanted individuals. An internal watchlist to can be used to alert the security officers of malicious individuals, disgruntled employee or any other individual who are not wanted inside the school facility. External databases can be accessed directly from the Visitor Management System to screen the individual against registered sex offenders.

True Fact
As per 2013 Survey
Visitor management: More and more university, hospital and school protection professionals are realizing that paper guest logs are no longer acceptable ways of keeping track of visitors. More than two in five campuses (43%) say that lack of a visitor management system is one of their top five access control challenges. The issues with sign-in sheets are many, including illegible handwriting, lack of confidentiality and the potential for counterfeit visitor badges. Consider adopting a software solution to help you better manage campus guests as well as decrease your institution’s exposure to liability.

As per 2010 Survey
In 2009–10, about 74 percent of public schools recorded one or more violent incidents, 16 percent recorded one or more serious violent incidents, and 44 percent recorded one or more thefts.

Enhance Security
The schools use Access Control Systems for their staff. The same access control system can be leveraged for visitor and contractor management to grant temporary access. In this way the school can showcase more security and professionalism. Some of the large campuses in the country are using Visitor Identity Management systems to track visitors and contractors entering the premises.
This enhanced visitor management system allows us to analyze the visitor trends and patterns. In case of any unwanted visitor the system allows to quick flag the information to the Security Personnel and School Administrators. In the worse situation, during a fire emergency in the campus, it will be impossible to determine who is still in the campus since it is the human factor to enter the inconsistent check-in and check-out times.
In addition to basic visitor management facilities like information capturing, badging and reposting some of the visitor management systems has self service capabilities that allows the staff and employees to preregister their  visitors.

Shortcomings of Traditional Method
1.     You can capture the photo of the visitor
2.     It is difficult to read the handwriting of people
3.     The names of the employees will be much visible in the log which will make it easy for the intruder to just enter the name of the employee from the list above.
4.     During the time of emergency it is difficult to track the number of visitors who are inside the premises.
Uses of Visitor Management System
1.     Integration of Visitor Management systems with the existing access control systems
2.     Custom Badge Design allows you to have one or many of these, name of the person being visited, type of the visitor, expiry date and time of the visit and photo.
3.     The self service allows preregistration of the visitor and scheduling the visit.
4.     In case of a security alert, the information is flagged to the concerned Security Personnel and the Administrators.
5.     The visitor destination such as floor, building, department can be addressed and appropriate privileges can be assigned
6.     In case multiple school campus allows integration with the central database
Not recommended
A visitor Kiosk is not the recommended solution in the campus. Let us consider a situation that a visitor enters the campus with the stolen ID proof and enters the same details in the kiosk to avoid getting tracked as a match on the watchlist. Instead of reducing in the school environment, you are actually adding risks. It is always a best to have face to face contact with the visitor before granting access to the premises,

Data Analysis
The data analysis allows to analyses the visitor trends like
1.     Visitors who stayed overtime
2.     Type of ID proofs presented by the last 100 visitors
3.     Areas within the campus with more visitor footprint – need to explore and improve security.
4.     Total Badged Visitor hours
5.     Repeated Visitor in the past 4 weeks

6.     Visitor Denied Access 

No comments:

Post a Comment