Bad People & Security

Keep Threats Out

Security isn’t just about hardware—it’s about knowing who’s on your site and having the right processes to deal with unwanted visitors.

From banned visitor lists and watchlist alerts to real-time threat notifications, your visitor management system should be your first line of defence against security risks.

Our Expertise

We work with high-security environments across government, healthcare, and corporate sectors where one security breach could have serious consequences.

Our platform provides:

  • Banned visitor databases and watchlists
  • Photo verification and ID checks
  • Real-time security alerts
  • Integration with security teams and systems

Your Questions Answered

Watchlist setup, alert protocols, incident response, and integration with existing security infrastructure.

Whether you’re managing a single site or coordinating security across multiple locations, you’ll find practical guidance on keeping your people safe.

How do we remove people from the watchlist after disputes are resolved or bans expire?

Removing individuals from a watchlist within visitor management or security systems in the United States, as of December 2025, relies on documented resolution of the initial concern and adherence to data retention policies dictated by federal and state laws, alongside employer obligations under OSHA regulations. Modern systems now include automated workflows triggered by dispute outcomes or ban expiry dates. When a dispute is resolved – for example, a workplace violence threat assessment concludes with no ongoing risk – the security team updates the individual’s record within the system. This action

Read More »

Can reception staff be alerted discreetly without the visitor knowing they’re flagged in the system?

Can reception staff be alerted discreetly without the visitor knowing they’re flagged in the system? Yes, modern visitor management systems (VMS) operating in the United States as of December 2025 commonly include features enabling discreet alerts, functioning within the framework of OSHA regulations and state-level workplace safety laws. These systems, now including advanced watchlists integrated with databases of individuals potentially posing a risk, utilise several mechanisms. A ‘silent alarm’ or notification can be triggered upon a flagged individual’s check-in, sending an alert directly to security personnel or designated staff via

Read More »

How do we log the reason why someone was added to the watchlist for legal documentation in Australia 2026?

In Australia, as of December 2025, the primary mechanism for logging reasons for watchlist additions is through integrated visitor management systems (VMS) and adherence to Work Health and Safety (WHS) legislation, specifically the obligations of a Person Conducting a Business or Undertaking (PCBU). These systems now routinely include fields for detailed justification when adding an individual to a security or restricted access watchlist. Current VMS platforms used in 2026 typically feature audit trails that automatically timestamp and record the user initiating the watchlist addition, the specific reason selected from a

Read More »

Can we set up different security flags – like temporary ban, permanent ban, or requires escort?

Yes, modern visitor and access management systems, as of December 2025, routinely allow for differentiated security flags – including temporary bans, permanent bans, and requirements for escorted access – applied to individuals entering facilities. These systems function by integrating with databases containing individual risk profiles. In the United States, this often ties into background check data and watchlists, while in Australia it’s linked to incident reporting systems and potentially shared threat intelligence platforms, all operating under Work Health and Safety (WHS) legislation and PCBU obligations. When an individual is identified

Read More »

How do we manage sensitive watchlist data while still complying with privacy laws?

Managing sensitive watchlist data while complying with privacy laws in the United States currently relies on layered security and purpose limitation principles within visitor management systems (VMS) and adherence to relevant federal and state regulations, including OSHA workplace safety standards and, where applicable, HIPAA or CCPA for healthcare or consumer data. As of December 2025, many VMS now include integrated watchlist screening capabilities, drawing from government-maintained lists (e.g., those related to active warrants or prohibited persons). These systems function by hashing watchlist data – converting it into an irreversible code

Read More »

What happens if someone tries to check in under a different name but we recognize them in USA?

If someone attempts to check in under a different name while being recognised by a system in the United States as of December 2025, the visitor management system (VMS) will typically flag a discrepancy, triggering a pre-defined security protocol. This relies on biometric data – facial recognition being most common – matched against watchlists or existing records within the system, and potentially integrated with external databases. Modern VMS now include advanced identity verification capabilities. When a facial scan doesn’t match the entered name, the system generates an alert for security

Read More »

Can we include photos in the watchlist for positive identification by our security team?

Including photos in watchlists for positive identification by security teams is permissible within current visitor management systems in the United States, operating under frameworks like OSHA’s General Duty Clause and state-level workplace safety regulations, provided specific legal and operational requirements are met as of December 2025. Modern visitor management systems now routinely incorporate facial recognition capabilities, allowing for the storage and comparison of images against pre-defined watchlists. These lists are typically populated with individuals posing a known threat, or those subject to legal restrictions – such as no-trespass orders. Data

Read More »

How do we share security alerts about problematic visitors between our different locations?

Sharing security alerts about problematic visitors between locations in the United States currently relies on a combination of visitor management system (VMS) functionalities, data privacy regulations, and employer obligations under OSHA and state workplace safety laws. As of December 2025, many VMS platforms now include features designed for multi-site alert propagation. These systems typically operate by flagging individuals against a centralized database, often triggered by incidents reported at one location. When a visitor is flagged – for example, due to disruptive behavior or a security breach – that information can

Read More »

Can the system automatically alert security when someone on the watchlist tries to check in for 2026?

Can the system automatically alert security when someone on the watchlist tries to check in for 2026? In the United States, modern visitor management systems (VMS) integrated with watchlist databases can indeed automatically alert security personnel as of December 2025. This functionality relies on pre-defined workflows and data integrations, operating within the framework of federal and state workplace safety laws, and employer obligations to maintain a safe environment. Currently, these systems function by cross-referencing visitor data – typically name, date of birth, and sometimes driver’s license information – against various

Read More »

How do we maintain a watchlist of individuals who shouldn’t be allowed on-site?

Maintaining a watchlist of individuals restricted from accessing a site in the United States currently relies on integrating data from various sources into visitor management systems (VMS) and, increasingly, leveraging threat intelligence platforms. As of December 2025, there isn’t a single, federally mandated ‘bad people’ list, but obligations under OSHA’s General Duty Clause require employers to provide a safe workplace, which includes controlling access. Modern VMS now include features for pre-screening visitors against internal databases – often containing records of terminated employees, individuals with documented safety violations, or those subject

Read More »
× Let's improve your Visitor Management in 2026 Contact us