Teamgo's *deny visitor access* feature provides organizations with a way to prevent specific individuals from entering their premises. It works by setting up a "deny list" or "watchlist" where individuals' details are recorded and flagged if they attempt to check in. Here’s how it typically functions:
Deny List Configuration: Authorized administrators can add individuals to the deny list, including names, photos, identification details, and the reason for restricted access. The deny list can often be customized based on security needs and organizational policies.
Automatic Screening at Check-In: When a visitor attempts to sign in using Teamgo’s system (such as at a kiosk or via mobile), the software automatically checks their details against the deny list. This happens in real time to ensure any flagged visitors are quickly identified.
Immediate Alerts: If there’s a match, Teamgo can send automatic alerts to designated personnel, such as front desk staff, security teams, or specific managers. The system can also restrict the visitor from completing the check-in process, effectively blocking access.
Privacy Controls: Teamgo ensures privacy compliance by limiting access to the deny list and sensitive information to authorized personnel only. This helps protect the organization while respecting privacy regulations.
Logging and Reporting: Teamgo keeps a log of denied access attempts, including details like the date, time, and location of the check-in attempt. This data is useful for audits, reviews, and security reporting.
This feature can help your deployment by maintaining a secure environment, automatically identifying unauthorized visitors, and managing notifications to the relevant people for faster responses.
How to enable denied access
Login to your administrator dashboard
Navigate to Users OR Reports and find the user to deny
Select user, click on Access
Select Disable Access for the user or selective locations
When a user attempts to sign in and they are disabled access, a notification will be issued advising location managers/compliance officers of the attempted sign in.