A visitor management system tracks the usage of a business, public building, or site. By gathering increasing amounts of information, a visitor management system can record the usage of the facilities by specific visitors and provide documentation of visitor’s whereabouts.
Because visitor tracking provides a record of building use, these systems are frequently used to complement building security systems and access control systems. As electronic visitor management systems become more common and more powerful, these systems are taking over many of the functions of building security and access control.
Pen and Paper Visitor Management Systems
A pen and paper visitor management system records basic information about visitors to a public building or site in a log book. Information typically found in an entry includes the visitor’s name, reason for the visit, date and check in and check out times.
A pen and paper method’s main positive feature is low up-front cost. Training to use the system is minimal, and the equipment required to implement this visitor management system is cheap and readily available.
However, from the security and usage standpoint, a pen and paper visitor management system has many negative points. Visitors must write entries by hand, creating a logjam effect in public entryways. Security personnel must check each visitor’s credentials and manually initiate any further security checks (for example, a call for a background check or other action). Visitors badges rarely have photo identification and can easily be swapped from person to person. Documentation requires either manually re-entering logbook information in a computer or keeping the logbook itself in storage.
Computer Visitor Management Systems
Basic computer or electronic visitor management systems use a computer network to monitor and record visitor information. As computer processing power, digital video and information gathering technology have improved, electronic visitor management systems have added photo ID capability, database searching, automatic door access and other functions.
An electronic visitor management system improves upon most of the negative points of a pen and paper system. Visitor ID can be checked against national and local databases, as well as in-house databases for potential security problems. Many visitor management systems feature searchable visitor information databases. Photo ID cards can be custom printed for one-time only or continuing use. Swipe cards speed the security screening process.
Electronics visitor management systems are more expensive to implement than a pen and paper system. They also require a longer familiarization period for the security personnel, building staff, and visitors than a pen and paper system. The amount of information gathered by an electronic visitor management system, as well as the uses the information is put to, can also be a source of consideration.
Database security, both at the national level and at the level of the end-user of an electronic security system, is a critical concern for privacy advocates. They argue that as the level of information accessed, gathered and retained increases, additional security measures to protect the information itself should be put in place.
Also at issue, is the level of security given to the access cards themselves. Some privacy advocates point to experiments done by researchers that crack the security of RFID cards, sometimes used as part of a visitor management system. If the security of these types of cards can be compromised, this would allow identity thieves to steal personal information.
Proponents of an information rich visitor management system point to increased school security as one substantial benefit. As more parents demand action from the schools that will protect children from sexual predators, some school districts are turning to modern visitor management systems. These systems not only track a visitor’s stay, but also check the visitor’s information against national and local criminal databases.
According to the supporters of enhanced visitor management systems, the same database search capabilities could be used to protect sensitive areas from potential threats such as terrorists or criminal activity.
Pen and paper visitor tracking is easy to implement and learn, but doesn’t provide the same convenience or overall security of an electronic visitor management system.
The amount of data recorded by a modern visitor management system is formidable, and issues of information privacy have created conversations regarding the use of these visitor management systems. However, terrorist activities, school violence, and child protection issues have acted as rallying points for support of comprehensive visitor management systems in sensitive locations.
Technology Industry and Privacy Advocates Clash Capitol Weekly News 6/14/2007
Closer Eye on Sex Offenders KOTV news story 2/8/2007
- Visitor Management on Wikipedia Wikipedia definition of Visitor Management
LobbyGuard Scout Visitor Management Kiosk
LobbyGuard’s Visitor Management Solutions: