Making Sure Your Building is Safe No Matter Who is There

When we think about safety, we tend to only think about people that come into our schools on a regular basis. This includes parents, bus drivers, teachers, or janitors. We get their backgrounds checked on a regular basis; however, we don’t always think about other people that may periodically enter our buildings . Why don’t we always think about the HVAC workers? Or the vending machine suppliers? Or even the cafeteria food delivery truck driver? All of these people could have interaction with or access to children, so why don’t we think to make sure that they are who they say they are, and that they can be trusted inside our schools?

With SafeVendor, this problem can easily be fixed. SafeVendor is a part of SafeVisitor Solutions that allows vendors to enter any facility using the SafeVisitor system and manages all of the re-certification background checks. This means that each vendor will only need one background check, and it will work in any school or building that is protected by SafeVisitor Solutions. This can save organizations significant money because instead of having to conduct background checks on their vendors or construction workers multiple times a year and for different projects, they can conduct one comprehensive background check annually.

Why not use SafeVendor for all of those vendor visitors and increase your safety at a  reasonable price? Take a look at for more information about SafeVisitor and SafeVendor!


WA State Police WATCH Volunteer Background Checks


Are you a school or a not-for-profit in the state of Washington that is mandated or relies on the WA State Police WATCH Background Checks?  Do you have one or several people assigned with the tedious and time consuming task of collecting handwritten paper forms, deciphering sloppy handwriting, and then manually entering  info into an online system? Are your volunteers then entered into an Excel spreadsheet or database to remind you in 1 or 2 years to ask them to complete this task all over again?

Sound like a lot of work?  And in full transparency, any manual process that includes such a high volume of data entry is fraught with opportunities for mistakes.  One keystroke error can be the difference between a convicted sex offender being tagged or being allowed to volunteer.

Until recently, there was no other option. However, SafeVisitor Solutions has worked with the WA State Police to integrate WATCH background checks into our background management system.  Schools or organizations that receive the WATCH background checks for FREE, will continue to receive them for FREE.

SafeVisitor is the ONLY visitor management system with an integration to WATCH.

How does this integration work?

1.      Adopt SafeVolunteer.

2.      We enter your WATCH login credentials into our software.

3.      Volunteers (vendors, employees, student teachers, etc.) click on a link, enter their                        information online.

4.      Results are returned to your team.

5.      Any potential records have links back to WATCH.

6.      Volunteers with no records are automatically approved and receive an approval email                 along with a SafeVisitor ID Badge.

What are the benefits to organizations using this integration?

·        Reduce Errors.  This will reduce or completely remove data entry errors that result from             deciphering handwritten forms.

·        Paperless.  No more collecting handwritten forms and having to store the PII data.

·        Reduces Labor.  No more entering thousands of requests for background checks

·        Reduces Volunteer Management.  The onboarding of volunteers AND rechecks are 100%           automated.

·        Automates Background Check Program.  Volunteers can now submit a WATCH                           background check 24 hrs a day, 7 days a week.

·        Free Your Team for Other Projects.

SafeVisitor also provides many unique opportunities for organizations that rely on the WA State Police WATCH background checks.  WATCH is a statewide search, so it is very limited considering that most volunteers have traveled outside of Washington for business or pleasure, or they live near a state line and may routinely travel to other states as a normal part of their day.

Consequently, there are additional screening options available in SafeVisitor to enhance the WATCH background check:

  • ArrestAlert.  SafeVisitor is the ONLY visitor management system with ArrestAlert.  We               have an integration with 80% of the jails in the U.S.  ArrestAlert works two ways:
  • Part of the background check.  We query the jails across the U.S. to determine if there are any additional arrests aside from where a person has lived or worked.
  • Real-Time Monitoring.  SafeVisitor can provide real-time monitoring of volunteers, employees, vendors, or any classification of visitor.  You would receive a real-time alert if one of your volunteers (or other classifications) is arrested and booked into a jail.
  • National Criminal Database Search.  SafeVisitor uses a criminal database the contains records from throughout the United States.
  • Federal Criminal District Court Search.  Most state criminal databases do NOT contain criminal records from federal cases.  This is important since we have a proliferation in the number of criminal cases being tried in the federal courts.  Why?  Because of the use of the internet to commit crimes such as identity theft, child solicitation, child pornography, etc.

Would you like to see a 30 minute demo of SafeVisitor and the WATCH integration? You can register here for a 1:1 demo.

How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor

There is no such thing as an emergency situation that is calm, relaxed, and easy to deal with. As it is part of our name, we try and make all situations including emergencies as safe as possible.  While it may seem like a simple feature within our system, the emergency button nonetheless plays an important role in maximizing safety.


The emergency button can be found on every page of our SafeVisitor software at the top left corner. One click of this button will do the following:

It will alert all personnel that are chosen to be included on the Emergency-Notify List . This list can vary but may include security guards, principals, administrators, and/or local law enforcement. The notification is not simply an alert stating but will also include information as to where the emergency is located. In addition, if the check-in process has started, the notification will include a picture and any information regarding the individual attempting to enter.

Just recently, this button was useful for a school attendant. A disgruntled parent entered the lobby of a school building and was causing a problem while refusing to leave. The attendant simply clicked the emergency button, and help responded within minutes to resolve the situation. This specific situation was fortunately never life-threatening, but a more serious scenario could easily have occurred in which case, the emergency button could have saved lives.

Our hope is that the emergency button never needs to be utilized, but we certainly realize its necessity. While it may not seem like much of a difference compared to picking up a phone and calling for help, time is a major factor in emergencies. As we strive to be have a fully comprehensive visitor management system, this button is just one way that SafeVisitor works to create a safe and secure environment for you.

For more information on SafeVisitor, click here


How to Protect Yourself at Work


Since the most recent church shooting in Texas my inbox has been flooded with emails from friends, prospects, clients, and even casual acquaintances all asking the same question:  how do I protect myself at work?

This year alone we have seen several high profile workplace or church shootings related to domestic violence.  So what is happening?

Sadly, this is not a new phenomena.

In 1994, Congress passed the Violence Against Women Act.  I was a young police officer in Nashville, TN, and we used the funding to start the largest law enforcement-based Domestic Violence Prevention Unit in the U.S.  It became an entire detective division of our police department.

I learned very quickly that domestic violence was a huge workplace problem.  Think about it, domestic violence had always been a hush, hush problem that was to be kept behind closed doors.

In the early 1990s, there were very few states that had even criminalized domestic violence.  Seriously.  Of course if it was a felony assault, then law enforcement could intervene and prosecute on behalf of the victim.  But since more than 70% of domestic violence is reported as a misdemeanor, this provides few options for law enforcement intervention if the victim does not want to prosecute.

As Nashville shouldered the responsibility for prosecuting domestic violence offenders and providing safe options for victims like shelters, we were also flooded with cases of stalking that were disrupting the workplace.

Why should we be shocked?  If communities do a better job of protecting victims, then those that harm them have to work a little harder to find them.  But where is the one place they almost always will be able to find them?


However, most of our workplaces are no match for these sophisticated manipulators.

After September 11, 2001, our organizations spent money to beef up security to protect ourselves from foreign terrorists when it was the domestic terrorist that posed the greatest risk to us.

Paul Dvorak, SafeVisitor Advisory Board Member & a U.S. Secret Service Special Agent, has spent his entire career creating safe perimeters for dignitaries like President Bush and United Nations Representatives.

Once a person of danger gets inside the perimeter, it is very difficult to protect yourself or others.  Paul talks of controlling how close people can get to high value targets like the President, and how anybody that gets within arms reach has gone through an extensive background check and security screening process.

How does this apply to my workplace?  Well, there are 5 things that every employer should focus on. Listed in order of importance they are:

  1. Controlling the Flow of Visitors.  Many of your employers think they are doing this with a clip board at the front desk or a security guard at the door.  This does not work.  You need a visitor management system that can ensure your different levels of visitors have received proper vetting before they are allowed into your facility. If an employee discloses they are going through a divorce or has taken out a protective order on a spouse or partner, then that person who represents a perceived threat could be placed on an Excluded Parties List to keep them out of the workplace and away from you and your peers. What are the key components of a quality visitor management system? It is one that:
  • Scans Government Issued ID.  Validates and confirms identity.
  • Mobile ID’s for Frequent Visitors.  Requires volunteers, vendors, or more frequent visitors to undergo comprehensive background checks before they are issued an ID.
  • GeoFencing.  Uses geofencing to ID approved visitors before they are allowed inside the building.
  • Background Checks.  Ranges from checking Excluded Parties Lists to conducting comprehensive national background checks.
  • Accurate Visitor Logs.  Accesses a prior visitor’s information.

2.  Training. This is not a one-and-done training module but an ongoing process.  How           do we handle domestic violence?  What happens during an active shooter event?

3. Active Shooters.  We are starting to see more workplaces implement training and             policies related to active shooters.  How  do we prevent, contain, and protect                   employees?

4. Communications.  During an active shooter event or security incident, it is critical to        have communication options that instantly inform your employees and moves them          away from  danger as quickly as possible.

5.  Culture of Confidence.  Organizations lose hundreds of thousands of dollars each             year to low productivity related to security issues.  Implementing a comprehensive           security program raises productivity and can be a great recruiting tool in an                     economy with low unemployment where prospects have multiple employment                  options.

I wanted to write this article directly to you employees to say that you need to make your voice heard.  Work with your employers to educate them on options for creating a safe work environment.

If you would like to learn more about how SafeVisitor can protect your place of employment, click here or request more information on a security assessment.

Cost of Paying for Volunteer Background Checks

Volunteers are widely utilized and are big contributors to many businesses. But while volunteers are obviously not on the payroll, they are often allowed the same access to people, records, and  information as regular employees. This creates a dilemma for administrators. That is, how do they ensure that volunteers are not only safe to be in a facility but also safe to interact with those inside the facility and perhaps even have access to privileged and confidential information?

In reality, many organizations are opting to simply conduct a free, limited background check on employees. The theory behind this is that volunteers somehow present less of a threat than regular employees, and therefore, do not need to be thoroughly screened.  A limited criminal history is better than no background check at all, but it is far from the best option available. Many issues arise from a limited background check, and often, information is missing from limited background checks.

An Expanded Criminal History is a much more comprehensive and thorough background check. It checks an individual's criminal history throughout all 50 states. The additional price may be the reason many organizations choose not to go with an Expanded Criminal History Check. While it only costs less than the price of a full tank of gas, many organizations still consider it too costly.

The decision really boils down to an organization’s priorities. Does safety, security, and prevention take precedence over saving a volunteer the additional $20 that a more thorough check will cost?

Many schools are now choosing to prioritize safety and security and are requiring that volunteers pass an Expanded Criminal History Check before being allowed to volunteer. Considering many recent national incidents, it is becoming more and more clear that  cost cannot be the driving factor when protecting the lives of the innocent.

Our recommendation? Don’t jeopardize the safety of those within a facility by trying to save volunteers money. Treat volunteers just as you would any other employee and ensure they don’t pose any threats before allowing them access into your facility.

Click here to learn more about SafeVolunteer.

How do I Conduct a Kiwanis Background Check?

kiwanis background checks

This is a great question if you are involved with Kiwanis International. SafeHiring Solutions and Kiwanis have a great relationship that allows the two to work hand-in-hand to get the best available background checks.  Our question is: Are you wanting to open a background screening account for your club, or are you needing to complete a background check as an individual within a club? Either way, we can accommodate you.

The answer to both of these questions can be found here.  If you click on this link, it will take you straight to the Kiwanis page on SafeHiring Solution’s website.  On that page, there are two separate links.  The first link is for setting up a new account for an entire Kiwanis club.  The second link is for individuals who were asked to complete a background check by their Kiwanis club.  This link will take you straight to the Kiwanis International login page, and you can go through there to complete the background check.

Because of the relationship between Kiwanis International and SafeHiring Solutions, this is an easy process for either a new club account or an individual background check!


What’s the Purpose of a Visitor Management System?

visitor management system

Visitor management systems have many different purposes and functions. They ensure increased safety by offering peace of mind for students, teachers, and parents, and they allow schools the freedom to address other areas of concern in creating a successful educational experience. SafeVisitor Solutions is a visitor management system that does all of these things for schools and businesses.

In a building that uses SafeVisitor, all visitors must scan their state-issued ID in order to enter. Their information is run against the National Sex Offender registry and against any exclusion lists the building may have in place. This ensures that schools have screened and identified all visitors for the protection of those within.

These screening procedures allow peace of mind for anyone involved in a school that is using SafeVisitor’s system. Students will know that their school is safe, thus freeing them from worry about the wrong people entering their school. They can focus on school work. Teachers will be able to focus on teaching and the needs of the classroom. Parents will know that their children are in a safe environment every day.

With such an increased sense of safety, the school can perform at a higher level. Because the system allows for the administration to trust that their school will be safe, administrators can focus their time on other areas to improve the school. Knowing the building is protected is very important not only because safety is a big concern, but because it will allow all concerned to perform at a higher level.

Safety is crucial for all schools. A visitor management system is very useful to enhance security. If you would like to learn more about SafeVisitor Solutions, please join us for a free webinar!


Visitor Management System: Cloud Hosting vs Local Server


For SafeVisitor, we use the synonymous terms “cloud hosted” or “cloud based” to describe the software; however, someone with minimal knowledge of software may have no clue what these terms mean. We want to provide some insight into the meaning and benefits of being cloud based.

What Does it Mean to be “Cloud Hosted”?

A cloud hosted software is one that is made available through the Internet. The software is not  uploaded to one’s personal computer, as it can simply be accessed through the Internet. Data can be stored and processed through this online software. Basically, cloud based software does not require servers or computers in an office to run it. Instead, it is all accessible online.

Benefits of Cloud Hosted

There are many benefits to having cloud based software:

  • It is available anywhere there is Internet access.

  • The user can log-in on any computer.

  • It provides real-time data - meaning edits can be made and automatically integrated into the software.

  • Updates to software do not require any additional downloads.

  • Multiple users can access the software at the same time.

  • Data is continuously backed up to minimize data lost during crashes.

When it comes to running our SafeVisitor software on your system, the cloud based accessibility is a huge plus. It makes using SafeVisitor to ensure safety of any building or facility extremely easy. It also diminishes the fear of experiencing a system failure. As long as there is electricity and Internet access, the cloud-based data is available to protect the safety of those needing it,


For more benefits of SafeVisitor, click here.

Is the Visitor Management System Sex Offender Data Up To Date?


SafeVisitor Solutions frequently receives questions concerning how often updates are made to their sex offender information. When a visitor comes into a building that is protected by SafeVisitor, the office will scan their license or ID. This information will be run against the registry which has access to the most current information regarding sex offenders.

Having current information about sex offenders is critical to the safety of children. SafeVisitor uses a third-party database. This search accesses multiple data sources so that the information is being continuously updated. Each source is updated in every state multiple times a day. This way nothing is missed.  The benefits of getting the data from multiple sources is that the sources can be checked against one another. Data comes from all over the country and not from just one location. In this way, information is continuously updated as it is received.

This continuous method of collecting the latest data lessens the possibility that someone might slip through the cracks. This system not only makes the school significantly safer for children, but it also makes the jobs of the administration easier. Administrators can depend upon this reliable and current system to vet every visitor against the latest sex registry information.

With a constantly updated registry, the school is a much safer place. SafeVisitor Solutions takes great pride in the reliability of their system of keeping the most up-to-date sex offender information that is currently available.

Do not assume your data is being updated.  We recently replaced another visitor management system with a large school district that had no idea their sex offender data was stored on a local database that had not been updated in 3 years.  That could have (and might have) lead to sex offenders being allowed access to children. 


If you would like to learn more please join us for a free webinar! Please click here to register.

How Do We Comply With Indiana HEA 1079?


This July, Indiana issued a new law pertaining to schools and background checks known as the House Enrolled Act (HEA) 1079. Knowing and understanding the requirements of HEA 1079 will increase your appreciation for how Safe Hiring Solutions can help schools comply with the law. SHS has developed a  process that will allow Indiana school administrators and HR managers to save time and money while meeting HEA requirements.

What is HEA 1079?

As mentioned above, HEA 1079 mandates that every school in the state of IN have an updated Expanded Criminal History background check on file for every employee. This includes lunch workers, janitors, substitutes, teachers, and anyone else on the school’s payroll.

The bill pertains to public and private schools alike. In addition, every five years the Expanded Criminal History check must be updated for every employee. New hires must receive an Expanded Criminal History check prior to starting, and then they must be incorporated into the five-year cycle for updated checks.

How We Ensure Compliance

This law can be unnerving especially for larger schools with many employees. The pressure to update and expand checks on existing employees while running checks on prospective hires can especially be felt in large mega-corporations. Safe Hiring Solutions has created a simple solution that not only guarantees compliance with the bill, but will help to alleviate much of the work involved in managing re-checks. The solution is SafeVisitor - our visitor management software. SHS can utilize SafeVisitor to handle the HEA 1079 bill in three easy steps.

SafeVisitor will:

  1. load every employee into the system.

  2. perform an Expanded Criminal History check on each individual employee.

  3. set a date to automatically email and remind the employee in 60 months to perform a re-check.

The system can also manage payments for the background check thereby taking much of the record keeping off the shoulders of office administrators. Let SafeVisitor and Safe Hiring Solutions completely automate required background checks while also ensuring compliance with HEA 1079.

To learn more about how we can set you and your school up to handle HEA 1079, be sure to view our webinars:

Call us Toll Free: 866-434-0002 or email:





How Will SafeVisitor Improve School Employee Rechecks?


Background rechecks are vital to keeping a safe environment in schools and businesses.  Many schools have never required background rechecks for their employees after they have originally been approved for hire. An unfortunate truth is that we do not fully know another person, even if it is someone who we have worked with for many years. This is the major reason that rechecks are important.  

Indiana recently passed the House Enrolled Act 1079 that requires schools to administer background rechecks on school employees every five years.  This is a huge step in keeping students safer; however, it can be both a challenging and daunting task for school officials to manage these rechecks.  Luckily, these rechecks can be managed by SafeVisitor Solutions.

With SafeVisitor Solutions, the background recheck process can be automated and managed by the system.  This results in time saved and fewer mistakes that could arise while keeping track of who needs a recheck and when it is needed.  The software can work like this:

  • The school uploads a spreadsheet with all of its employees and their respective dates of hire. After this is done, the school is pretty much hands off other than adding new employees as they come on board and removing employees as they leave.

  • The system will start with rechecking the employees with the earliest hire dates, unless if otherwise specified by the school, and will continue updating rechecks from there.

  • If there is an issue or a failed check, the school will be informed, but if the recheck is clean, then they will just be uploaded into the system as a completed check.

  • Once an employee’s recheck is due, the system will send them reminder emails with a link to the background check to initiate the process.

The automation of these rechecks using SafeVisitor Solutions significantly decreases the amount of time spent by office administrators keeping checks monitored and current. They will not need to send out constant reminders, or chase people down to get their rechecks completed.  Only reports with issues will require attention, while checks that will be returning clear will be automatically entered as complete.  

This system for processing background rechecks will not only save the district time and consequently money, but will also ensure a safer environment for the school.

Join us for an upcoming webinar to learn more about SafeVisitor.

How Current Are SafeVisitor Background Check Checks?


Visitor management systems are vital for protecting schools and businesses from people that should not be there. It is always important to have a safe environment in schools, so all school visitors need to be checked against the Sex Offender Registry. SafeVisitor Solutions ensures that regular sex offender checks are maintained of all visitors in order to keep children safe.

Every single visitor who enters a school using SafeVisitor Solutions is required to scan their state issued ID. The scan will instantaneously run that person against the National Sex Offender Registry. Right then and there, the system will either accept or deny the visitor entry into the school. The Sex Offender Registry is continuously updated, so the registry is always current and reliable. Here is a short description of how the process works:

  1. The visitor enters the building and scans a state issued ID at the attendant’s station.

  2. The system instantly checks the visitor against the Sex Offender Registry, and the result appears on the attendant's computer screen.

  3. If accepted, the visitor is free to enter the building.

  4. If denied for any reason, the attendant is able to see this and can take the appropriate action.

With an instantaneous check against an updated Sex Offender Registry, the school can be certain that the building is safe, and that all visitors in the building have been thoroughly checked. If you would like to learn more about SafeVisitor Solutions, please join us for a free webinar! Please click here to register!


How Does Geo-Fence Expand Your Security Perimeter?


In today’s world, security is always a topic of discussion for any organization. With the recent tragedy in Las Vegas, this topic will be discussed by many people over the next several weeks. There is no one method of security that works for everyone. Every organization has to evaluate their facilities, events, and business culture to determine the right mix of security options that will accomplish their goals.

At SafeVisitor, we take security seriously. We take it so seriously that we have formed an Advisory Board that includes a Secret Service Agent, a Cybersecurity Expert, and others who work or have worked in various areas of law enforcement and technology.  

Expanding your security perimeter is one way to have more control over how close people can get to your facilities before being recognized. One tool we use for this at SafeVisitor is Geofencing.

What is Geofencing?

“Geofencing” is a term that is foreign to many people. In simple terms, a geofence is a GPS hotspot. It is similar to a Wi-Fi hotspot that you would purchase from a phone carrier to give you Internet access within so many feet of the hotspot. Our SafeVisitor Visitor Management System, paired with our free mobile app, utilizes geofencing to alert you when someone with the app on their phone approaches your building.

Setting up a geofence is a simple process and does not require any additional hardware. First, you must determine the area you want to cover at a location. You may want to cover the entire building, the building plus parking, or maybe just the front entrance. Once that has been determined, the geofence is active and ready to be used.

To fully utilize the geofence in SafeVisitor, a few things have to be done by the person who has been vetted by your organization. They must :

  • Download the SafeVisitor mobile app. This app is available in both Apple and Android stores.

  • Enter their SafeVisitor badge ID number that they would have received via email and the email address they used to register with SafeVisitor.

Once completed, if they have visited a building before,  they will see their badge in the app along with their picture.

That is all that’s needed. When a person comes for a visit, they will open the app and make sure that Location Services is turned on. When they approach the building and step inside the geofence hotspot area, the attendant will see them on their dashboard in the Visitors Nearby tab. The moment they are within that hotspot, the system will log them in the Nearby Log. The attendant can choose to leave them in the Visitors Nearby tab or click the arrow next to them and check them into SafeVisitor. Either way, their arrival to your location has been logged by the system in an efficient manner.

Using a geofence can expand the perimeter of a location to allow you to see people on your property before they actually arrive at the front door. It’s just one tool that can be used in the security plan for your organization.

If you are interested in learning more about how SafeVisitor can protect your organization, you can sign up for a webinar by clicking HERE.

Top 5 Problems with Vendor Background Checks

Vendor background checks is an area that still exposes organizations to a lot of risk.  Most organizations have a policy on requiring vendor background checks, but do they actually audit this process or even understand how to audit the process?


When evaluating the security of organizations, the first line of defense is to always know exactly who is entering the facilities. Employees are a priority for screening, but often visitors, vendors, and volunteers are screened at a much lower level or not even screened at all.

I recently spoke with a friend who works for a large multi-state law firm.  She is an attorney in their Government Relations Group.  With that role, it is not uncommon for her to be working after hours. On more than one occasion, she has bumped into a man working for the cleaning contractor and had no idea who he was or if he had a violent criminal history.

Her experience pinpoints a serious problem for organizations.  Would her employer be held liable if she was harmed on their property by a vendor who had a violent criminal history?  Quite possibly.

Let’s look at 5 problems with vendor background checks:

  1. Self Certification.  This is the most common form of vendor credentialing.  Companies require their vendors to conduct employee background checks, and then certify to them that they have done so.  How can these companies ensure compliance has been conducted with an acceptable level of screening?
  2. Definition of “Background Check”.  There is not a standard definition of what constitutes a background check.  How does a company ensure that their vendors require the same level and depth of screening?  To do so requires specific documentation or clearly defined requirements that are supplied IN WRITING to vendors and followed by periodic audits.
  3. Date of Background Check. Are vendors conducting regular background checks on their employees?  Many organizations only require background checks when an employee is hired.  What protocols are in place for checking employees that have been employed for 10 or 20 years?
  4. E-verify/ Legal Right to Work.  The federal government’s E-verify program is being increasingly  legislated across the U.S. for organizations that provide services to cities, states, or the federal government- including schools.  This is not a service that can be conducted by a third party.  Employers are the only entity that can conduct E-verify, and it must be done within the first 3 days of employment.  So E-verify is a post-hire check.  It is important that vendors provide a Letter of Agreement stipulating that they are using the E-verify program (if this is a requirement for your organization).
  5. Privacy Issues.  The recent Equifax breach has certainly raised the awareness of millions of Americans to the possibility of their personal information ending up in the wrong hands. Privacy issues are a concern when conducting vendor background checks.  One option would be to include any third parties in an Authorization Form, so the information can be shared with business partners who have a business necessity.

SafeVisitor has created a SafeVendor module that makes this process secure and comprehensive while removing policy concerns.  SafeVendor has a policy requirement to be able to be SafeVendor Certified.  Once you are certified, then any organization using SafeVisitor can check a vendor to ensure there is a completed background check.

To ensure strict privacy restrictions, SafeVisitor does not share the background screening report with third parties, but only shares the vendor’s ID badge, photo, and certification that stipulates the level of background check completed and passed

Join us for a webinar to learn more about how SafeVisitor and SafeVendor can help protect your organization while at the same time protecting the privacy rights of your vendors.

Creating a Volunteer Background Screening Consortium

As an active member of a community do you ever get the feeling that you are nickel-and-dimed when trying to volunteer for multiple organizations? One organization requires an “X” background check while another one requires a “Y” background check ?


Have you ever turned down the opportunity to volunteer because you’ve already paid for two separate background checks, and you are unwilling to pay for, or to go thru the hassle, for yet another one within the SAME community? As an organization, have you lost quality potential volunteers for this very reason?  

If you answered, “Yes,” to any of the above questions, there is a solution that can make volunteering seamless between organizations within your community. It will also allow multiple organizations to maximize the availability of volunteers within a community without creating a monetary or  management nightmare.

SafeHiring has developed a solution using our background services plus our SafeVisitor software that remedies these problems for an entire community. The solution is for similar organizations to create a Volunteer Consortium. What is a consortium? Well, it’s just a fancy word to describe an agreement among groups to accomplish something that is beyond the resources of any single member of the group. In this case, that would be vetting and tracking all the available approved volunteers within a community.

What is needed for an effective Volunteer Consortium?

  • Groups to participate

  • Agreement on background check criteria

  • Consensus on who will vet the volunteer applications

At first, you might think that getting all the groups in your community to agree to participate in a consortium is difficult . . . and you would be correct. It can be challenging; therefore,you wouldn’t want to begin building your consortium with too many groups. As the old saying goes, “Don’t try to eat the whole elephant!” You could start with just a couple of organizations that you know share many of the same volunteers. You might want to assign one of the organizations to vet all the volunteers, or have a company like SafeHiring Solutions do that for you. There is no need for each organization to vet because of the guidelines agreed upon and shared by all groups.

At SafeHiring Solutions we have the consortium model already working in Indiana. We provide a link through our SafeVisitor volunteer management software for a volunteer to apply. Once they have submitted their application, their background check is performed, and vetted by SafeHiring. When approved, the checks are available to be viewed within SafeVisitor by all participating organizations. That volunteer is now available to every organization in the consortium within SafeVisitor. Depending on the groups involved, that means a parent volunteer at school can also be approved for coaching a sport or volunteering at a local church, festival, etc. Since everyone in the consortium has agreed to the conditions for volunteers, there is no need for additional vetting or cost, regardless of which organization in the consortium they are volunteering for.

We have found that once a consortium is started, local non-participating organizations soon express interest in becoming participants. They find it’s a very easy way to manage their volunteer pool within their community. They can be confident that each person has been fully vetted, and there is no need for additional applications or cost to the volunteer. They are ready to go!

If you would like to learn more about how Safe Hiring Solutions and SafeVisitor can help you to manage your volunteers, you can click HERE to sign up for a webinar to learn more about SafeVisitor.

Are You Keeping Students Safe with a Quality Visitor Management System?

There can never be too much safety for our schools. As technology advances, it is vital for schools to make technological advances as well. A main advancement that many schools are implementing is a visitor management system.

Visitor management systems not only keep children safe, but they also provide a sense of comfort for your district’s parents. SafeVisitor Solutions can provide safety for your school, comfort for parents, and organization for the school’s office. Here are a few key features that SafeVisitor offers:

  • Monitors temporary visitors by checking the visitor’s identification against the National Sex Offender Registry in a matter of seconds.

  • If cleared for entry, SafeVisitor will print a time-expiring badge for the visitor.

  • The software allows the school’s attendant to know who is in the building at all times.

  • SafeVisitor Solutions can screen and manage school volunteers.

These features are only a few that SafeVisitor Solutions offers to keep schools safe. Along with the features listed above, the software can also manage existing employee background checks along with all background checks for any vendors that come into the school. These features ensure that anyone in contact with students on school grounds, is thoroughly checked and vetted.

With SafeVisitor, schools are able to manage the safety of students and teachers with ease. With SafeVisitor Solutions, both safety and visitor management will be enhanced in a more organized and efficient manner. If your school does not have the latest in a visitor management system, please check out a webinar on how SafeVisitor Solutions can help your district.

Please click here to register for a free webinar!

Can I Create Multiple Visitor Types in the Visitor Management System?

A visitor management system’s job is to identify and screen any visitors that enter a building. However, not all visitors are the same. This means that not all visitors should be treated and screened in the way. Some are frequent visitors such as vendors and part-time employees. Others may only pop-in once or twice a year. Can a visitor management system differentiate between visitors that may have never been within the facility from those who visit more frequently?

We cannot speak for all visitor management systems. However, our SafeVisitor visitor management software does have the ability to distinguish multiple visitor types in a simple and efficient manner. In fact, it is the first option when using the software. Our software main screen has three buttons, with the first two designated to determine the type of visitor.

How we classify different visitors:


Temporary Visitor:

A temporary visitor is any visitor that does not have frequent access to the building or facility. This would include parents entering a school building, business consultants, and some volunteers.

SafeVisitor ID Badge Visitor:

Visitors identified by a SafeVisitor ID badge are more frequent visitors that already have their existing background checks and vetting on file. This prior vetting means that these individuals no longer need to go through the check-in process each time they arrive at a building/facility. Examples of a SafeVisitor ID badge are janitors, volunteers, and employees.

In addition to the two types of visitors, a temporary visitor that is making a scheduled visit can also bypass the check-in.This can be done through a pre-approval process. For instance, a group of 20 volunteers all arriving at the same time would result in a long check-in line once arriving at the building. To avoid this, each volunteer can pre-register days before the arrival date, and receive vetting and screened beforehand. Once approved, each volunteer can then bypass the check-in with those who have a SafeVisitor ID badge. To expedite the process even more, a link to submit the background check can be added to any organization’s website.

Any visitor within an organization presents a potential liability, no matter how big or how small. Don’t leave security to chance - be proactive and screen any type of visitor with SafeVisitor.

Join our weekly webinar to learn more about how SafeVisitor can protect your visitors:

Can Visitor Management System Take a New Photo Each Time Visitor Enters?

As the world of technology is ever-changing, it is vital for schools and businesses to keep up with those changes. This is especially true when it comes to visitor management systems. SafeVisitor Solutions is a visitor management system that is cloud based and can therefore make improvements easily and efficiently.


One important part of a visitor management system that is often overlooked is the capability to take a new photo each time a visitor enters a school or business. People often change in appearance making it especially important to always have an updated photo of every visitor. A few reasons why this is important is:

  • An updated photo can document any recent change in appearance.
  • In the event of a problem arising on site, an updated photo will make it easier to identify when necessary.
  • The updated photo will show the visitor's current dress which, when compared to the image on the badge, can verify that the badge is not expired.
  • The photo can be compared to the driver’s license picture as an added means of identification.

SafeVisitor Solutions software makes the process seamless and efficient. It works like this:

  • The visitor will arrive and walk up to the attendant working the station.

  • The monitor will have a reverse-facing camera directed at the visitor.

  • The visitor will scan his/her license.

  • The attendant will click a button on the screen to snap a picture of the visitor.

  • The updated picture will now be appear in the software.

Although this seems to be an insignificant detail, it can be an important factor in ensuring the safety of schools and businesses. With an updated picture of every visitor in the building, there will be less potential for confusion and more certainty regarding who has entered the premises. This simple process is a vital element in efficient visitor management.

Learn more about SafeVisitor via a free webinar! Click here to register.

How Can a Visitor Management System Keep Visitors Out Until They Are Vetted?

The first step in the security of your organization is controlling who comes in your front door. It seems like such a simple concept, but I am amazed day after day when I visit organizations, ranging from secure facilities to schools, just how little effort is placed into managing visitors.


As a police officer, one of the first things I tried to accomplish on a call was getting people seated.  Why?

Because when people are seated, they begin to calm down.  Even more importantly, when they were seated, I had more time to react if they decided to resist and rip my head off.

I have always been physically fit and pretty quick, but I was seldom the strongest guy in the room.  My reaction time might be fast but not always fast enough.  There is very little time to react when you already have allowed someone into your personal protective space.

If people are seated, I can see movement, and I can react to that before someone is on top of me. By having everyone seated, I am buying a little extra reaction time.

That is exactly the same concept behind our SafeVisitor Pre-Registration Program.  Why allow a temporary visitor to show up, enter a facility, and stand at the receptionist’s and then realize they are on the Excluded Parties List or on the Sex Offender Registry.

In this situation, space translates into safety.

Create a safe perimeter around your organization by including a link to pre-register for all meetings in your calendar invites.

How does this work?  It is pretty simple.

  • The visitor completes an online registration ahead of the event.

  • SafeVisitor runs a check on your Excluded Parties List.

  • SafeVisitor runs a check of the Sex Offender Registry (optional).

  • Visitors arriving soon are already on a tab on client’s dashboard.

  • Clients can scan a week in advance for any visitors and make sure they passed the background checks.

What if I have a large group?  

  • Use the same link above; or

  • Upload a spreadsheet.

  • All visitors are checked against the Excluded Parties Lists (and Sex Offender Registry if using)

  • Visitors remain in que until they visit.

How does a user register a visitor who has pre-registered?

  • Select the visitor on the Arriving Today tab.

  • Click on Up the arrow.

  • SafeVisitor prints a self-expiring ID badge.

  • If the visitor entered the name, email and/or mobile phone of the employee then SafeVisitor will send the employee an email/text that their visitor has arrived.

  • When visitor exits, they can:

    • Scan their barcode on temporary ID; or

    • User can click on the Down arrow to log out.

Now every visitor interaction is pre-vetted, and you know who they are allowed access to your facility.

If you would like to learn more about SafeVisitor, contact us or join us for a weekly demo by clicking here.

What is the Cost of a Visitor Management System?


To many background screening firms, when a potential customer asks ‘What is the cost of a visitor management system?’, it may seem like a loaded question. One would assume that the cost to implement such technology is far outside the logical range for something that can be done with pencil and paper. Other visitor management companies may dread getting asked the price of their product, but not us at Safe Hiring Solutions. We like getting asked the question, and we’d like to provide some insight on it.

What makes our visitor management software so unique is that we don’t just have one set cost. We also don’t have one set software. Let me explain.

Our visitor management software (SafeVisitor) can do many different things, including:


  • Monitor temporary, infrequent visitors within your facility

  • Manage background checks/rechecks for existing employees and new-hires

  • Screen volunteers to determine who may engage with your company, organization, and/or its constituents

  • Manage background checks for vendors

  • Integrate with Reflynk, a reference checking software for management

  • Implement geofencing technology for increased facility security

Any of the above features can be part of your tailor-made visitor management package. We strive to serve the differing needs of our clients. Our visitor management software price reflects this flexibility of services.

SafeVisitor visitor management system is designed for use by organizations with as few as 30 employees or as many as thousands. We can accommodate nearly any budget, and firmly believe the value of our increased security will outweigh our visitor management software price. With so many different features, we can create the ideal visitor management software for you and your organization.

Click here to sign up for a webinar for more information on how Safe Visitor can increase security for an affordable price.

Or visit us at: