Visitor management

Visitor management

Visitor management refers to tracking the usage of a public building or site. By gathering increasing amounts of information, a visitor management system can record the usage of the facilities by specific visitors and provide documentation of visitor’s whereabouts.

Because a visitor management system provides a record of building use, these systems are frequently used to complement building security systems and access control systems. As electronic visitor management systems become more common and more powerful, these systems are taking over many of the functions of building security and access control.

Many different vendors provide visitor management software and systems.

Visitor management technologies

Pen and Paper Visitor Management System

A pen and paper visitor management system records basic information about visitors to a public building or site in a log book. Typical information found in an entry includes the visitor’s name, reason for the visit, date and check in and check out times.

A pen and paper visitor management system’s main positive feature is low up-front cost. Training to use the system is minimal, and the equipment required to implement this visitor management system is cheap and readily available.

From the security and usage standpoint, a pen and paper visitor management system has many negative points. Visitors must write entries by hand, creating a logjam effect in public entryways. Security personal must check each visitor’s credentials and manually initiate any further security checks (for example, a call for a background check or other action). Visitors badges rarely have photo identification and can easily be swapped from person to person. Documentation requires either manually re-entering logbook information in a computer or keeping the logbook itself in storage.

Computer Visitor Management Systems

Basic computer or electronic visitor management systems use a computer network to monitor and record visitor information. As computer processing power, digital video and information gathering technology have improved, electronic visitor management systems have added photo ID capability, database searching, automatic door access and other functions.

An electronic visitor management system improves upon most of the negative points of a pen and paper system. Visitor ID can be checked against national and local databases, as well as in-house databases for potential security problems. [cite news | first=Ed | last=Moorhouse | coauthors= | title=Kiosks guard the lobbies at Lenape district's high shools | date=2008-01-20 | publisher= | url =http://www.phillyburbs.com/pb-dyn/news/112-01202008-1474276.html | work =Burlington County Times | pages = | accessdate = | language = ] Many visitor management systems feature searchable visitor information databases. Photo ID cards can be custom printed for one-time only or continuing use. Swipe cards speed the security screening process. [cite news | first=Greg | last=Toppo | coauthors= | title=High-tech school security is on the rise | date=2006-10-10 | publisher= | url =http://www.usatoday.com/tech/news/2006-10-09-school-security_x.htm | work =USA TODAY | pages = | accessdate = | language = ]

Electronics visitor management systems are more expensive to implement than a pen and paper system. They also require a longer familiarization period for both the security personnel, building staff and visitors than a pen and paper system. The amount of information gathered by an electronic visitor management system—as well as the uses the information is put to—can also be a source of controversy.

Computer visitor management systems have seen a rise since their inception in the late 1990s, with the software growing more advanced over the years. Although these systems have seen a considerable boost after many companies and government agencies increased security measures following the events of September 11, 2001, some believe interest in them might have begun to diminish. [cite news | first=John | last=Egan | coauthors= | title=Interest in Post-9/11 Security Technology Diminishes | date=2007-08-14 | publisher= | url =http://nreionline.com/news/911_Security_Technology_Diminishes/ | work =National Real Estate Investor| pages = | accessdate = | language = ]

Controversy

The amount of data recorded by a modern visitor management system is formidable, and issues of information privacy have created controversy regarding the use of these visitor management systems. However, terrorist activities, school violence and child protection issues have acted as rallying points for support of comprehensive visitor management systems in sensitive locations.

Database security, both at the national level and at the level of the end-user of an electronic security system is a critical concern for privacy advocates. They argue that as the level of information accessed, gathered and retained increases, additional security measures to protect the information itself should be put in place.

Also at issue is the level of security given to the access cards themselves. Some privacy advocates point to experiments done by researchers that crack the security of RFID cards, sometimes used as part of a visitor management system. If the security of these types of cards can be compromised, this would allow identity thieves to pilfer personal information.

Proponents of an information rich visitor management system point to increased school security as one substantial benefit [cite news | first=Ashli | last=Sims | coauthors= | title=Closer Eye On Sex Offenders | date=2007-02-07 | publisher= | url =http://www.kotv.com/news/local/story/?id=119892 | work =KOTV | pages = | accessdate = | language = ] . As more parents demand action from the schools that will protect children from sexual predators, some school districts are turning to modern visitor management systems that not only track a visitor’s stay, but also check the visitor’s information against national and local criminal databases. [cite news | first=Mike | last=Savicki | coauthors= | title=School Uses High-Tech Checkpoint for Visitors (article reprint) | date=2007-10-10 | publisher= | url =http://www.lobbyguard.com/news/charlotteobserver-20070426.htm | work =Charlotte Observer | pages = | accessdate = | language = ]

According to the supporters of enhanced visitor management systems, the same database search capabilities could be used to protect sensitive areas potential threats such as terrorists of criminal activity.

References

ee also

* access control
* optical turnstile
* identity document
* proximity card


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Visitor Based Network — What is a Visitor based Network (VBN)? A Visitor based network (VBN) is a network designed for mobile users in need of temporary Internet service. A visitor based network is most commonly established in hotels, airports, convention centers,… …   Wikipedia

  • Visitor — For the Catholic equivalent, see Canonical visitation, and for other uses, see Visitor (disambiguation) A Visitor, in United Kingdom law and history, is an overseer of an autonomous ecclesiastical or eleemosynary institution (i.e., a charitable… …   Wikipedia

  • Henry M. Jackson Visitor Center — The Henry M. Jackson Visitor Center is a day use facility located in the Paradise area of Mount Rainier National Park. The facility offers exhibits, films, guided ranger programs, a book store, a snack bar, and a gift shop [… …   Wikipedia

  • Facility management — In business, facility management (or facilities management) is the management of building, estates which encompasses both building fabric and services. The services are sometimes considered to be divided into hard services and soft services. Hard …   Wikipedia

  • Hospitality management studies — The Cornell University School of Hotel Administration The Uni …   Wikipedia

  • United States Visitor and Immigrant Status Indicator Technology — US VISIT (United States Visitor and Immigrant Status Indicator Technology) is a U.S. immigration and border management system. The system involves the collection and analysis of biometric data (such as fingerprints), which are checked against a… …   Wikipedia

  • International Creative Management — Type Private Industry Talent and Literary Agencies Founded Century C …   Wikipedia

  • Mobility management — This article is about wireless communication. For mobility management in public transport, see Transportation Demand Management and Transit oriented development. Mobility management is one of the major functions of a GSM or a UMTS network that… …   Wikipedia

  • Cultural heritage management — (CHM) is the vocation and practice of managing cultural heritage. It is a branch of cultural resources management (CRM), although it also draws on the practices of conservation, restoration, museology, archaeology, history and architecture. While …   Wikipedia

  • Communication Management Unit — is a recent designation for a self contained group within a facility in the United States Federal Bureau of Prisons that severely restricts, manages and monitors all outside communication (telephone, mail, visitation) of inmates in the unit.… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”