Security Entry Check Report

Security Entry Check
What It Does
The Security Entry Check report provides a comprehensive log of all ID scans and security verifications performed at your establishment's entry points. It captures detailed information about player identification, verification status, entry times, and security flags.
Why It Matters
This report is critical for security operations, compliance with age verification requirements, and maintaining a secure gaming environment. It provides documentation of your due diligence in checking IDs and enforcing barred player restrictions.
Accessing the Report
From the main menu, select Reports
Click on Security Entry Check
Set your desired date range
Apply any additional filters as needed
View the report or export the data
Report Features
ID Verification Details
For each entry check, the report displays:
Player card and ID information
Player ID number
Name information (first, middle, last)
Date of birth
Scan date and precise time
ID verification status
Barred status indicators
Gender
Accessibility needs
Additional identification details
Security Indicators
Barred status (Yes/No)
ID verification status (Passed/Failed)
Secondary ID requirements
Special handling flags
Scan History
Chronological listing of all ID scans
Multiple entries for repeat visits
Failed verification attempts
Complete history of entry attempts by barred players
How to Use This Report
Daily Security Operations
Review all entry verifications from previous shift
Identify any patterns in failed verifications
Monitor for multiple entry attempts by barred individuals
Compliance Documentation
Maintain records of age verification compliance
Document enforcement of barred player restrictions
Provide evidence of security protocols for regulatory inspections
Training and Improvement
Identify areas where security procedures may need enhancement
Track verification throughput during peak times
Monitor staff performance on verification checks
Risk Management
Document denied entries for potential incident reports
Track verification exceptions and overrides
Maintain historical records for potential investigations
Export Options
The Security Entry Check report can be exported in multiple formats:
CSV: For detailed analysis and record-keeping
PDF: For printing and compliance documentation
Best Practices
Regular Review: Security management should review this report daily
Compliance Verification: Maintain exports for regulatory documentation
Incident Connection: Reference this report in any security incident reports
Staff Performance: Use data to evaluate front desk staff thoroughness
System Verification: Periodically check that all entry stations are properly logging scans
Common Questions
Q: How long are security check records maintained? A: Records are maintained in the system indefinitely for compliance and security purposes.
Q: Can I see who performed the security check? A: If staff login was required for the scan, staff information will be included in the detailed view.
Q: What should I do if I find a barred player was admitted? A: Follow your internal security protocols and document the incident. Review security camera footage if available.
Q: How can I identify suspicious patterns in entry attempts? A: Look for multiple failed verifications with similar names or multiple entry attempts by known barred players.
Last updated
Was this helpful?

