Raising the Grade

Schools adopt visitor management systems to help secure teachers, students and premises

THE Jessica Lunsford Act -- named for the nine-year old who was murdered by a construction worker at her school -- sent school districts throughout Florida scrambling to implement fingerprinting and screening systems to comply with the law. Visitor management systems, usually an afterthought to employee access control systems, took front stage as the preferred solution to screen would-be vendors, visitors and volunteers.

Over the past few years, electronic visitor management systems emerged as the replacement for handwritten log books, which have long been viewed as ineffective to track or verify visitors. These systems have matured from basic badging, workstations to enterprise-wide, networked solutions that allow users to register, badge, and track and manage visitors.

In light of the Jessica Lunsford Act, Florida schools districts were drawn to the flexibility of robust visitor management systems to meet their requirements. For example, Collier County Public Schools implemented the first system-wide, networked visitor management system in Florida. Though the school district had already begun fingerprinting all workers, vendors and regular volunteers in search of violent criminals, drug dealers and sexual predators, they still had to contend with the thousands of visitors and volunteers who had unfettered access to students. Because it would be impractical and prohibitively expensive to fingerprint every visitor, Collier County deployed FastPass to create security at the front door.

The FastPass system first scans the visitor's ID and automatically populates the database with information from a United States or Canadian license, military ID or passport. The system recognizes immediately whether the ID is properly formatted or fake. The system then checks the name against a national sex offender registry and other internal watch list(s). If there is no match, FastPass takes the visitor's photo and prints a badge. Preset fields allow administrators to customize the badge to include time and date of entry, areas the visitor is permitted to access, badge expiration or any other relevant data. Administrators can quickly create reports, view the history of a group or single visitor. And since all systems are networked, a visitor may not move from building to building, hoping to gain access -- the system will consistently check their identity, determine privileges and show visitation history.

Collier County is hoping that FastPass will act primarily as a frontline deterrent to identify convicted sex offenders by robbing them of their anonymity. Each time the system generates a hit, the administrators knows they've done their part in keeping their schools safe.

The system also acts as a district-wide messaging center. If an Amber alert is issued, for example, an administrator can push the alert out to each of the workstations. If the system is integrated with the employee access control system, each employee can receive the same alert by e-mail. Since mere seconds can make a difference when a child turns up missing, having a vehicle to push alerts out quickly is critical.

The same is true for emergencies. In the event of a hurricane, fire or school shooting, administrators can quickly alert employees of the impending event and quickly generate a report showing all visitors with photographs. This tool, along with the employee access control system, enables administrators to account for all building occupants and evacuate them from the property.

The robust nature of the system gives administrators the tools and flexibility to keep their schools safe. Once a step child to employee access control systems, visitor management systems have come into their own.

About the Author

Catherine L. York is the senior vice president of GVI Security Inc., Enterprise Solutions Group.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.