Detailed Reporting and Compliance

Accurate data capture is essential to a secure environment, enables contact tracing, and assists with meeting certain regulatory compliances.

EntryLogic securely captures and stores all visitor information within the system for easy retrieval. You have the ability to see details for everyone who visited within specific time frames or you can search by name to see when specific individuals were in the building. Visitor data is also consolidated and can be filtered and viewed at the location-level providing you full visibility and control.

Several major regulations, like PCI and SOC2, require that you collect and retain detailed information from everyone that enters your building. Collecting visitor names, phone numbers and email addresses can be helpful for contact tracing as well as ensuring that unwanted visitors are not allowed entry.

How EntryLogic™ can assist with SOC 2 compliance:

SOC 2 compliance reporting details how organization’s systems are designed to meet the requirements of the SOC trust principles. While each SOC 2 compliance report can be unique, EntryLogic has several features that may assist organizations in meeting and maintaining their compliance.

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges that include all of the visitor’s identity information, including Photo, First, and Last Name.

How EntryLogic™ can assist with FSMA compliance:

Enacted by the Food and Drug Administration in 2011, the Food Safety Modernization Act oversees and regulates the way food is grown, harvested, and processed. It’s important that organizations take all measures to control and eliminate potential opportunities for contamination in food production facilities. It’s a good practice for organizations to authorize and account for everyone visiting their facility. EntryLogic can assist by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Required a valid purpose for visits and mandate a host be selected upon sign-in.
  • Require visitors to accept legal documents pertaining to their food safety compliance requirements and productions processes.
  • Create badges that identify visitors, display their name and photo, and include the host name (or escort).

How EntryLogic can assist with GLBA (Gramm-Leach-Bliley Act) compliance:

The Gramm-Leach-Bliley Act requires organizations offering consumers financial products and services (loans, insurance, financial advice) to disclose their information sharing practices to their customers and to safeguard sensitive data.

While GLBA requirements are generally flexible to accommodate the needs of each organization, protecting information is critical and it is paramount that organizations maintain compliance aground physical security and access control. EntryLogic can assist with organizations by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges that identify visitors, display their name and photo.

How EntryLogic can assist with Customs-Trade Partnership Against Terrorism (C-TPAT) compliance:

The Customs-Trade Partnership Against Terrorism (C-TPAT), led by the US Customs and Border Protection, is a voluntary public-private sector partnership impacting importers, carriers, consolidators, licensed customs brokers, and manufacturers who choose to protect their supply-chain. EntryLogic can assist these organizations by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges, that can be worn by the visitor that clearly identifies the visitors name and photo.
  • EntryLogic can mandate a host be selected upon sign-in, who’s name will also be displayed on the visitor badge.

How EntryLogic can assist with Federal Information Security Modernization Act (FISMA) compliance:

The Federal Information Security Modernization Act (FISMA) was enacted by US Legislation to protect government information, operations, and assets. This Act requires all federal agencies to develop and maintain information system security plans. State agencies and private companies may also be affected if they are involved in federally funded initiatives.

FISMA requires companies to demonstrate controls around physical security and access control. EntryLogic can assist in meeting these needs by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Create badges, that can be worn by the visitor that clearly identifies the visitors name and photo.
  • EntryLogic can mandate a host be selected upon sign-in, who’s name will also be displayed on the visitor badge.

How EntryLogic can assist with PCI DSS compliance:

EntryLogic can assist any organization, including data centers that host service providers or merchant data, like credit card information. Organizations must demonstrate their access controls and restrict access to cardholder data. EntryLogic can assist organizations in meeting the requirements outlined in sections 9.1 – 9.4 of the PCI Self-Assessment questionnaire by:

  • Verifying visitor identity – Photo capture, ID Check, and Pre-registration processes. In addition, EntryLogic can deny access to those who are not permitted (Watchlist).
  • Maintain visitor logs, compiling a historical database on sign-ins and sign-outs.
  • Include Visitor Name, Company represented, and host selection during the sign-in flow.
  • Create badges, that can be worn by the visitor that clearly identify the visitors, their host and have a set expiration date.
  • Badges can be returns, filed, or destroyed upon sign-out.

Privacy violations won’t be a concern since all data is encrypted and securely stored on Amazon Web Services. The personal information collected during the check-in process is secure and password protected.

Discover a Streamlined Front Desk Experience

Try EntryLogic for FREE today or speak directly with one of our solution experts. The EntryLogic team is always available to discuss your business objectives and work with you on a solution to meet your needs, and provide the best option for your company.

START A FREE TRIAL

Start a FREE Trial

SCHEDULE A CALL

Schedule a CALL

SCHEDULE A DEMO

Schedule a DEMO