Compliance

Is your company prepared to meeting regulatory compliances in your industry?

EntryLogic’s visitor management system is an essential tool to support your business in meeting major compliance standards in several regulated industries.

SOC 2 compliance reporting details how organization’s systems are designed to meet the requirements of the SOC trust principles. While each SOC 2 compliance report can be unique, EntryLogic has several features that may assist organizations in meeting and maintaining their compliance.

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges that include all of the visitor’s identity information, including Photo, First, and Last Name.

Enacted by the Food and Drug Administration in 2011, the Food Safety Modernization Act oversees and regulates the way food is grown, harvested, and processed. It’s important that organizations take all measures to control and eliminate potential opportunities for contamination in food production facilities. It’s a good practice for organizations to authorize and account for everyone visiting their facility. EntryLogic can assist by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Required a valid purpose for visits and mandate a host be selected upon sign-in.
  • Require visitors to accept legal documents pertaining to their food safety compliance requirements and productions processes.
  • Create badges that identify visitors, display their name and photo, and include the host name (or escort).

The Gramm-Leach-Bliley Act requires organizations offering consumers financial products and services (loans, insurance, financial advice) to disclose their information sharing practices to their customers and to safeguard sensitive data.

While GLBA requirements are generally flexible to accommodate the needs of each organization, protecting information is critical and it is paramount that organizations maintain compliance aground physical security and access control. EntryLogic can assist with organizations by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges that identify visitors, display their name and photo.

The Customs-Trade Partnership Against Terrorism (C-TPAT), led by the US Customs and Border Protection, is a voluntary public-private sector partnership impacting importers, carriers, consolidators, licensed customs brokers, and manufacturers who choose to protect their supply-chain. EntryLogic can assist these organizations by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges, that can be worn by the visitor that clearly identifies the visitors name and photo.
  • EntryLogic can mandate a host be selected upon sign-in, who’s name will also be displayed on the visitor badge.

The Federal Information Security Modernization Act (FISMA) was enacted by US Legislation to protect government information, operations, and assets. This Act requires all federal agencies to develop and maintain information system security plans. State agencies and private companies may also be affected if they are involved in federally funded initiatives.

FISMA requires companies to demonstrate controls around physical security and access control. EntryLogic can assist in meeting these needs by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges, that can be worn by the visitor that clearly identifies the visitors name and photo.
  • EntryLogic can mandate a host be selected upon sign-in, who’s name will also be displayed on the visitor badge.

EntryLogic can assist any organization, including data centers that host service providers or merchant data, like credit card information. Organizations must demonstrate their access controls and restrict access to cardholder data. EntryLogic can assist organizations in meeting the requirements outlined in sections 9.1 – 9.4 of the PCI Self-Assessment questionnaire by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Include Visitor Name, Company represented, and host selection during the sign-in flow.
  • Create badges, that can be worn by the visitor that clearly identify the visitors, their host and have a set expiration date.
  • Badges can be returns, filed, or destroyed upon sign-out.