Managing hospital visitors with video intercoms and visitor management systems

Current security-industry best practices call for a combination of video intercoms and visitor management systems


Current security industry best practices call for a combination of video intercoms and visitor management systems at main entries as the most effective and efficient way to screen and identify visitors, according to an article on the Campus Safety website.

Campus buildings – clinics, offices, labs, treatment centers and other facilities – are often connected to the hospital by walkways and tunnels creating multiple entries to protect. 

Visitors can be screened at a single unlocked public entry for each building entry. That could require multiple visitor management stations to prevent long lines. It might not be possible to staff lesser-used entries. 

Software can manage an unmanned system, while a vestibule with a locked door blocks entry into the building until the background check is complete and an officer in the security operations center uses a video intercom to approve the person and remotely unlock the entry.

Read the article.



October 4, 2019


Topic Area: Security


Recent Posts

Biofilm 'Life Raft' Changes C. Auris Risk

Microscopic survival structure protects fungal pathogen from disinfectants and help it survive for long periods.


How Healthcare Restrooms Are Rethinking Water Efficiency

Manufacturers discuss strategies, technologies and design approaches that help healthcare facilities meet their sustainability goals.


Northwell Health Finds Energy Savings in Steam Systems

Case study: A proactive steam trap maintenance program is delivering millions in savings, fast payback and measurable carbon reductions across one of the nation’s largest health systems.


The Difference Between Cleaning, Sanitizing and Disinfecting

Cleaning methods and products have various purposes in reducing the spread of germs.


Jupiter Medical Center Falls Victim to Third-Party Data Breach

The third party has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information on legacy systems.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.