ALL SYSTEMS OPERATIONAL — CardOpz DEV and PROD environments are live and running smoothly.

Security Entry Check Report

Security Entry Check

What It Does

The Security Entry Check report provides a comprehensive log of all ID scans and security verifications performed at your establishment's entry points. It captures detailed information about player identification, verification status, entry times, and security flags.

Why It Matters

This report is critical for security operations, compliance with age verification requirements, and maintaining a secure gaming environment. It provides documentation of your due diligence in checking IDs and enforcing barred player restrictions.

Accessing the Report

  1. From the main menu, select Reports

  2. Click on Security Entry Check

  3. Set your desired date range

  4. Apply any additional filters as needed

  5. View the report or export the data

Report Features

ID Verification Details

For each entry check, the report displays:

  • Player card and ID information

  • Player ID number

  • Name information (first, middle, last)

  • Date of birth

  • Scan date and precise time

  • ID verification status

  • Barred status indicators

  • Gender

  • Accessibility needs

  • Additional identification details

Security Indicators

  • Barred status (Yes/No)

  • ID verification status (Passed/Failed)

  • Secondary ID requirements

  • Special handling flags

Scan History

  • Chronological listing of all ID scans

  • Multiple entries for repeat visits

  • Failed verification attempts

  • Complete history of entry attempts by barred players

How to Use This Report

Daily Security Operations

  • Review all entry verifications from previous shift

  • Identify any patterns in failed verifications

  • Monitor for multiple entry attempts by barred individuals

Compliance Documentation

  • Maintain records of age verification compliance

  • Document enforcement of barred player restrictions

  • Provide evidence of security protocols for regulatory inspections

Training and Improvement

  • Identify areas where security procedures may need enhancement

  • Track verification throughput during peak times

  • Monitor staff performance on verification checks

Risk Management

  • Document denied entries for potential incident reports

  • Track verification exceptions and overrides

  • Maintain historical records for potential investigations

Export Options

The Security Entry Check report can be exported in multiple formats:

  • CSV: For detailed analysis and record-keeping

  • PDF: For printing and compliance documentation

Best Practices

  • Regular Review: Security management should review this report daily

  • Compliance Verification: Maintain exports for regulatory documentation

  • Incident Connection: Reference this report in any security incident reports

  • Staff Performance: Use data to evaluate front desk staff thoroughness

  • System Verification: Periodically check that all entry stations are properly logging scans

Common Questions

Q: How long are security check records maintained? A: Records are maintained in the system indefinitely for compliance and security purposes.

Q: Can I see who performed the security check? A: If staff login was required for the scan, staff information will be included in the detailed view.

Q: What should I do if I find a barred player was admitted? A: Follow your internal security protocols and document the incident. Review security camera footage if available.

Q: How can I identify suspicious patterns in entry attempts? A: Look for multiple failed verifications with similar names or multiple entry attempts by known barred players.

Last updated

Was this helpful?