SecurePoint USA
SecurePoint USAEnterprise Compliance
Request Demo
Back to Documentation

Administrator Hub

Your operations playbook for launching and running SecurePoint successfully. Use these sections for fast answers and repeatable day-to-day administration.

Sites and Locations

The Sites and Locations module is the foundation of your compliance deployment. It allows you to digitally map your physical footprint, applying specific entry rules, notifications, and data collection policies based on regional requirements or facility risk levels.

Do this first

  • Create your headquarters or primary facility.
  • Define standard operating hours, entry points, and emergency exits for each location.
  • Assign a dedicated manager or point-of-contact for every site.

Common mistakes to avoid

  • Grouping distinct buildings into a single site, which obscures audit trails and access reporting.
  • Failing to align timezone and regional formatting settings with the physical location.

How to know it’s working

  • Location-specific data appears correctly segmented in the central dashboard.
  • Global administrators can filter visitor logs natively by site name.

Kiosk Flows

Kiosk Flows dictate the exact sequence of questions, legal agreements, and verifications visitors experience upon entry. Customizing these pathways ensures you capture necessary compliance data without causing friction at the front desk.

Do this first

  • Select a standard check-in template tailored to your primary visitor type (e.g., guest, contractor, employee).
  • Add mandatory compliance documents (e.g., NDAs, safety waivers) that require electronic signatures.
  • Configure automatic notification rules to alert hosts upon their guest's arrival.
  • Set up automated label printing for quick visual badge identification.

Common mistakes to avoid

  • Overloading the check-in process with unnecessary questions that cause lobby bottlenecks.
  • Deploying to the front lobby before running a complete test on the physical kiosk hardware.

How to know it’s working

  • Visitors successfully complete the check-in process seamlessly.
  • Host notifications trigger instantly via email, SMS, or internal messaging tools.
  • Signed compliance agreements are automatically attached to the visitor's permanent log.

Roles and Permissions

Roles and Permissions govern who can view sensitive data, modify system settings, or approve access requests. Enforcing the principle of least privilege ensures your deployment remains secure and audit-ready.

Do this first

  • Audit the default system roles and understand their access boundaries.
  • Grant Global Administrator privileges to a minimum of two trusted individuals to prevent lockouts.
  • Provision location-level managers with access restricted only to their assigned sites.

Common mistakes to avoid

  • Issuing Global Administrator rights to standard operators or front-line staff.
  • Creating overly complex custom roles when default profiles already meet operational needs.

How to know it’s working

  • Front desk staff cannot access billing, global security, or data retention tabs.
  • Location managers only see visitor activity, logs, and analytics pertinent to their specific physical site.

Log Retention and Audit Downloads

The Log Retention and Audit module provides tools to manage data lifecycles in accordance with your internal policies and regulatory mandates. It ensures historical records remain securely archived and easily exportable for external review.

Do this first

  • Configure your automated data retention window (e.g., 90 days, 1 year) to align with your organization's compliance SLAs.
  • Enable automatic data anonymization for aged records to support ongoing privacy requirements.
  • Run a test export of visitor logs to verify report formatting and data completeness.

Common mistakes to avoid

  • Setting data retention windows to "indefinite" without consulting your legal or privacy teams.
  • Attempting to manually delete historical logs instead of utilizing the automated retention policies.

How to know it’s working

  • Records older than your specified retention period are automatically anonymized or purged from the active dashboard.
  • Generated export files (.CSV or .PDF) contain the requisite timestamps, signatures, and host details required for compliance audits.

Next Step: Final Launch

With your foundational settings configured, your environment is ready for operational rollout. Transitioning from backend setup to active use requires aligning your team and validating the hardware deployment.

Do this first

  • Schedule a brief training session with your front desk and physical security personnel.
  • Provision and pair the application with your lobby hardware devices.
  • Conduct a final end-to-end walkthrough by checking in as a test visitor.

Common mistakes to avoid

  • Skipping the staff training phase, leading to operational confusion and bypasses on launch day.
  • Hard-launching physical kiosks without verifying their network connectivity and power stability.

How to know it’s working

  • Front line staff can confidently process manual overrides, print badges, and assist guests.
  • The system correctly records your test visitor data and triggers the appropriate compliance checks and host alerts.