Understanding a Building-wide or Enterprise-wide Do Not Admit List
Does your building have systems in place to keep unauthorized and unwanted visitors from entering the premises?
Learn more about how to streamline access for scheduled visitors and keep your security staff up-to-date with the most recent visitors on your company’s “do not admit” list of barred visitors.
A visitor management system is only as good as its ability to adapt to your company’s needs in real-time. Potential threats from terminated employees, disgruntled customers, or those wishing to disrupt a business or employee in your building must be denied access. Unfortunately, too many companies and commercial properties today still rely on manual Do Not Admit or Watch Lists. In iVisitor, we call this list of unwanted individuals the “Barred Visitors” list.
Every single visitor that is scheduled to visit your company is cross-referenced against this list of Barred Visitors to ensure that your security team is immediately notified of any potential threats. Potential visitors are screened against the Barred Visitors list both when they are pre-registered by iVisitor users and also when they check into the building, so your security team will always know who is and is not allowed access on-site. As a web-based visitor management system, your Barred Visitors list in iVisitor is always available to all appropriate security personnel and always up-to-date.
Handwritten or manually updated lists put your tenants or employees at risk because it is nearly impossible to keep your list up-to-date and immediately disseminated to every security officer within your company. However, with iVisitor, your Barred Visitors list can be updated immediately in the event of a new threat or unwelcome visitor. Not only is it fast and easy to update your barred list, with iVisitor everyone who needs access to this list always has the most recent version at their fingertips.
In a multi-tenant environment, it can be a challenge meeting the unique needs of each individual tenant company. In the event that a barred individual attempts to enter the building iVisitor will immediately alert all appropriate security personnel. If one of your tenants does not want a particular individual to have access to their office, and another tenant pre-registers this individual as a visitor, security personnel can review the visit information and take appropriate action. If it is a case where an individual is seeking access to interview for a job, or has other verifiable business in the building, access may be granted on a case-by-case basis. Depending on the building’s security protocol, this individual’s visit may require an escort throughout the duration of their stay. The automatic alert functionality within iVisitor allows for security personnel to prepare for the potential arrival of unwanted personnel, and if necessary contact law enforcement for assistance.
In addition, iVisitor can be integrated with HR systems so that terminated employees or vendors can be automatically added to your list of Barred Visitors. If this ex-employee attempts to access any of your company’s locations, their visit record will be “flagged” and your security teams will be alerted to the fact that there is a barred visitor requesting access to your site. Especially when individuals have previously had unfettered access to multiple properties within your corporation, it is crucial that the onsite security personnel at other locations are alerted in real-time that this previously allowed individual is now barred from entry.
iVisitor helps facilitate communication between the host party, the visitor, and the building security team. In addition to the safety of your building and its occupants, it is important to recognize that “old-fashioned” do-not-admit lists may not meet the requirements dictated by data privacy laws. In the eyes of the law, it doesn’t matter if you’re storing this information in a hard-copy physical binder kept at your security desk or via computer: any personal information that you store for your visitors must be protected and secured, no matter what way you are storing it. In order to be compliant, buildings must keep information about visitors (even potential visitors deemed a threat) secured so that a person’s identifying information is never at risk. iVisitor encrypts personal visitor information and is compliant with data privacy laws, which means that your security personnel and management team are free of the liability that they expose themselves to when keeping hard-copy lists of personal information on-hand.