Until now we have discussed how visitors are signed in, identified and move around a facility, the last element that needs to be considered is how the visitor leaves the site at the end of their visit.
The next step in Visitor Management is to determine whether visitors are required to wear a visible form of identification, and if so, what does that look like?
This article discusses the various forms of visual identification, including pros and cons that should be taken into account before deciding on a particular method.
Implementing Effective Visitor Management Part 3 – Visitor Escorting
Within a security design and policy statement, everything should be based on the Security Risk Assessment and Design Basis Threat which enables us as security professionals to deploy protective security measures that are proportional and effective, without being overly obstructive.
Visitor Management Part 2 – Managing Visitor Access Permissions
Once a visitor has been signed in and identified, we need to ensure that they can move around the building to facilitate the purpose of the visit.
Visitor Management is an important part of security and access management within any company or facility.