Designing the visitor journey (and wiring it into access control)
Pre-arrival. Encourage hosts to pre-register guests so reception can anticipate peaks. Invitations should contain arrival instructions, wayfinding, and a privacy notice link. For higher-risk environments, brief reception on document fraud indicators and “challenge culture” so visual checks are efficient and consistent. NPSA’s guidance on robust visitor entry processes is an excellent primer to train teams against fraudulent documentation and to raise vigilance at the front desk.
Arrival and verification. Decide how you’ll verify identity for different visitor types (escorted guest vs. contractor attending unescorted, etc.). A simple approach is a staffed desk with video entry support at secondary doors, so releases are logged and auditable instead of bypassing the controller. (See: Entry Phone Installation.)
Issuing access. Integrate the VMS with access control so a successful check-in issues a temporary, least-privilege credential (sticker pass with barcode, QR, card/fob, or mobile credential), scoped by location and time. That credential should be created by the access platform—not a dry-contact relay—so grants are recorded as access events against a named visitor. Use zones sensibly: reception → meeting room floor → facilities. On check-out (manual or automatic) the credential is revoked.
During the visit. Correlate door events with the right cameras so a forced door or out-of-bounds attempt brings up the video for operators automatically. It shortens investigations and proves exactly what happened. We’ve covered pragmatic patterns for tying doors and cameras together in our CCTV–access–alarm explainer. (See: CCTV–Access Control–Alarm Integration.)
Departure. Encourage self-checkout at the kiosk or reception so the muster list remains accurate. Expire unused invitations nightly.
Life safety and evacuation: design it in, test it often
Security never trumps safe escape. Any electronically-controlled door on an escape route must release reliably on fire alarm and on relevant fault conditions. The latest update to BS 7273-4:2015+A2:2023 clarifies the “critical signal path” between the fire system and door release devices and gives extra detail on acoustic and radio mechanisms—detail that matters if you’re mixing technologies across a lobby. Make release behaviour a design line-item and witness-test it during commissioning and drills.
At the same time, your VMS should support muster reporting so you can produce a current list of visitors during an evacuation and confirm all have left. That’s as much an operational habit (hosts escorting guests to assembly points) as it is a systems feature.
UK data protection: privacy by design, not by poster
A VMS processes personal data (names, organisations, contact details, timestamps; sometimes car registrations; occasionally images). If you use CCTV around entrances, you’ll also be processing video data. The ICO’s guidance for surveillance systems is unambiguous: apply the UK GDPR principles—lawfulness, fairness, transparency, purpose limitation, minimisation, accuracy, storage limitation, integrity/confidentiality—and be able to show you did so. In practice that means clear signage, concise privacy information at the point of capture, appropriate retention, and controls that reflect real necessity rather than technical possibility.
You don’t need to over-collect. For example, the ICO’s own “Visitors to the office” notice shows a proportionate approach: verify ID at reception when required but don’t record the ID details; destroy personalised badges when visitors leave; sign guests in and out. It’s a useful benchmark when drafting your own notices.
If your VMS is cloud-hosted, apply the NCSC Cloud Security Principles—in particular strong identity and authentication for admins and secure administration paths—to keep the management plane tight. Aligning procurement and configuration to these principles makes board approvals and audits easier.
Standards and codes that keep projects sane
Use recognised baselines so tenders are comparable and commissioning is disciplined:
- BS EN 60839-11-1 for electronic access control systems (functional/performance requirements for systems and components). It keeps behaviour predictable and logging meaningful when the VMS hands a door a time-limited credential.
- NSI NCP 109 (Issue 4) as the delivery code of practice for design, installation, commissioning and maintenance. It ties together door hardware, interfaces, and documentation so your acceptance tests aren’t guesswork.
Design to these up front and insist contractors evidence them at handover.