Compliance activities & patrol management

Product Hero Image

& checks

Audits, assessments, and checks are essential for identifying potential risks and ensuring that appropriate measures are in place to protect the security, health and safety of employees and visitors, as well as securing the assets and information of the organisation.

Regularly conducting these activities helps create a safe and secure working environment, complying with legal requirements and promoting a culture of safety and security within the organization.

Key benefits

  • Help identify and evaluate risks across various operations, enabling proactive management and mitigation strategies to avoid potential financial losses, legal penalties, and reputational damage.
  • Identifying inefficiencies and bottlenecks in processes, these activities provide insights into areas where operations can be streamlined, leading to cost savings, increased productivity, and enhanced overall performance.
  • Regularly conducting these processes ensures ongoing compliance with relevant laws, regulations, and industry standards, minimising the risk of legal issues, fines, and sanctions that can arise from non-compliance.
  • Reveal areas for improvement in quality and customer service, contributing to higher levels of customer satisfaction, loyalty, and potentially expanding market share.
Synapse Divider


Enhances organizational ability to anticipate, prepare for, respond to, and recover from unexpected challenges and disruptions.

Safeguards assets, data, and personnel from potential threats, ensuring operational continuity and stakeholder confidence.

Ensures adherence to legal, regulatory, and ethical standards, avoiding fines and enhancing industry reputation.

Streamlines operations, reduces waste, optimises resource use, leading to improved productivity & cost savings.

Synapse Divider
Custom audits and checks (see: "Customisation")

Create your own categories of audits, checks and assessments including specific types and workflows

Automatically integrate audits, checks and assessments from other systems to provide a single repository of all incidents across your business (see "APIs")

Command, control & investigate - management tools

Edit - complete changes, collate, consolidate and manage all evidence centrally ensuring it is handled securely and in a compliant way.

Assignment - triage and allocate responsibility of the alarms to individuals and teams - internal or 3rd party responders/keyholders.

Statuses - move the alarm report through the cycle through to closure.

Comments - two-way communication with responders, add notes, continuous commentary and narrative to the alarm report.

Mapping - view the alarm location, surrounding area, swop the view from map to satellite & activate layers for people/sites.

Criticality - set default priority & severity levels and manually escalate or deescalate alarms to keep teams informed.

EOP/SOP automation - automate & orchestrate pre-defined standard & emergency operating procedures by the auto-creation of tasks.

Files - upload media, files, CCTV & wide range of files to support an alarm either manually uploaded, from a mobile device or via the API.

Tasks - coordinate the planning & tracking of alarm response tasks to ensure designated actions are completed & deadlines are met.

Notifications - automatic or manually triggered alerts and notifications using a wide range of communication methods.

Responses forms - formalised responses, statements, checks, sign-offs, forms and processes can be setup and enforced.

Plot - add points, polygons & radius to the map with response forms to mark actions and additional locations i.e. damage, cordons etc.

Involved parties - capture of suspects, offenders, organised groups, victims, injuries, witnesses, vehicles and emergency services.

Linking - linking of alarms and other events, with configurable link relationships - allowing for a investigations to see the bigger picture.

Costs - Log all losses as a consequence of an alarm - from time-based costs, purchased resources to damages, stock losses etc.

Audit timeline - transparency of all updates, actions and activities conducted on an event, displayed in a clear timeline.

Data restrictions - management and control over user access & permissions defining which user group can access and manage.

Export - export the alarm details in a PDF format to print - PDF reports can branded and customised.

TV mode - for display on control rooms video walls and triage rooms for situational awareness and ongoing updates.

Data push - interface with 3rd party systems via API endpoints.

Alarm analysis (see: "Dashboards & Analysis")

Search - powerful filtering facility & advanced query builder that allows users to customise search criteria, filter & interrogate data sets.

Analysis - map key metrics and unlimited reporting suites and dashboards using flexible widgets - add lists, counts, graphs & maps.

Frequently Asked Questions

These features enable organisations to streamline their audit processes, ensure accuracy in data collection and analysis, and maintain compliance with regulatory standards. These technical aspects are critical for ensuring that audit, checks, and assessment platform meets the complex needs of modern organisations, facilitating efficient, accurate, and compliant audit and assessment processes.

Here’s an overview of the key technical platform aspects of these tools:

1. Data Collection and Management

  • Automated Data Gathering: Ability to collect data from various sources within the organisation.
  • Centralised Database: A centralised repository for storing all audit-related data, making it easier to manage, access, and secure information.

2. Workflow Automation and Management

  • Automated Workflows: Automates repetitive tasks and processes, such as scheduling audits, assigning tasks to auditors, and following up on outstanding items.
  • Task Management: Features for assigning, tracking, and managing tasks and responsibilities among audit team members.
  • Notifications: Automated alerts and notifications to keep relevant stakeholders informed about audit progress, findings, and deadlines.

3. Risk Assessment and Analysis

  • Risk Analysis Tools: Advanced tools for identifying, assessing, and prioritising risks based on their likelihood and potential impact.
  • Customisable Risk Frameworks: Allows organisations to define and implement their own risk assessment methodologies and frameworks.
  • Heat Maps and Dashboards: Visual tools like heat maps and dashboards for easy interpretation of risk data, highlighting areas of concern.

4. Compliance Tracking

  • Regulatory Compliance Database: Contains a comprehensive database of relevant regulations and standards, facilitating compliance checks against industry-specific requirements.
  • Compliance Assessment: Assess and document compliance with various regulatory and internal standards.
  • Update and Alert Mechanisms: Keeps the regulatory database up-to-date and alerts users to new or changing compliance requirements.

5. Reporting and Documentation

  • Customisable Reporting: Ability to generate customisable reports and documentation that summarise audit findings, recommendations, and action plans.
  • Audit Trail: Maintains a detailed log of all audit-related activities, changes, and findings, ensuring transparency and accountability.
  • Electronic Signatures: Supports electronic signatures for document approval, enhancing the efficiency and paperless operation of the audit process.

6. Security Features

  • Data Encryption: Ensures that all data stored and transmitted by the software is encrypted, protecting sensitive information from unauthorised access.
  • Access Controls: Implements robust access control measures, ensuring that users can only access information relevant to their role and permissions.
  • Audit Trail of User Activities: Tracks and records user actions, aiding in security audits and investigations.

7. Scalability and Customisation

  • Scalable Architecture: Designed to scale with the organisation’s needs, accommodating an increasing amount of data and users without performance degradation.
  • Customisation Options: Offers extensive customisation options to adapt to the specific workflows, terminologies, and processes of the organisation.

8. Cloud-based and Mobile Accessibility

  • Cloud-based Deployment: Many solutions offer cloud-based options, providing flexibility, reduced IT overhead, and accessibility from anywhere.
  • Mobile Applications: Mobile app support for conducting audits and assessments on-the-go, enhancing convenience for auditors and field staff.

Physical security audits, assessments, and checks are essential for identifying vulnerabilities and enhancing the security measures of an organization or facility. These processes involve a systematic examination of the physical security arrangements to ensure they are adequate to deter, delay, detect, and respond to potential threats. Here are detailed examples of physical security audits, assessments, and checks:

1. Security Risk Assessment

  • Objective: To identify and evaluate risks to the facility's assets, including people, property, and information.
  • Methodology: This involves identifying potential threats (e.g., burglary, vandalism, terrorism) and vulnerabilities (e.g., unsecured entrances, inadequate lighting) and assessing the likelihood and impact of these threats materializing. Recommendations are made to mitigate identified risks.
  • Outcome: A prioritized list of security risks with recommended mitigation strategies, such as improved lighting, increased surveillance, or enhanced access control systems.

2. Physical Security Survey

  • Objective: To evaluate the current state of physical security measures and practices within the organization.
  • Methodology: A comprehensive walkthrough of the facility to inspect physical barriers (fences, gates, doors), security personnel deployment, surveillance systems (CCTV cameras, motion detectors), access control systems (key cards, biometrics), and environmental design (lighting, landscape). This survey often includes interviews with staff to understand security procedures and response protocols.
  • Outcome: A report detailing the effectiveness of existing physical security measures and any gaps or weaknesses, along with recommendations for improvement.

3. Perimeter Security Check

  • Objective: To assess the security of the outer boundary of the facility, ensuring it effectively deters unauthorized access.
  • Methodology: Inspection of fences, walls, gates, and barriers for integrity and effectiveness. This includes checking for any breaches, potential climbing aids, or undergrowth that could conceal intruders. The adequacy of perimeter lighting and surveillance coverage is also evaluated.
  • Outcome: Recommendations for reinforcing perimeter defenses, such as repairing damaged sections, enhancing lighting, or upgrading surveillance equipment.

4. Access Control Audit

  • Objective: To verify that access control systems are functioning correctly and only authorized individuals can enter the facility.
  • Methodology: Testing of mechanical and electronic access control systems, including door locks, turnstiles, and badge readers, to ensure they are operational and secure. This might also involve a review of access control policies, procedures for issuing and revoking access credentials, and logs of entry and exit.
  • Outcome: Identification of any failures or breaches in access control systems, with suggestions for system upgrades, policy revisions, or additional training for security personnel.

5. Surveillance System Evaluation

  • Objective: To ensure that surveillance systems are optimally positioned, functioning, and effectively monitored.
  • Methodology: Checking the placement and field of view of CCTV cameras to ensure there are no blind spots in critical areas. Testing the recording and playback capabilities of the system and verifying that monitors are watched by trained personnel. The maintenance schedule of the surveillance system is also reviewed.
  • Outcome: Recommendations for repositioning cameras, upgrading equipment, or improving monitoring practices to enhance surveillance effectiveness.

6. Lighting Inspection

  • Objective: To ensure that lighting contributes effectively to the security of the facility by deterring intruders and aiding surveillance.
  • Methodology: Nighttime inspection of exterior and interior lighting to identify dark spots that could hide intruders or criminal activity. Evaluation of the type, placement, and intensity of lighting fixtures.
  • Outcome: Suggestions for adding or adjusting lighting to eliminate dark areas, potentially incorporating motion-sensor lights or upgrading to more efficient and brighter lighting solutions.

7. Emergency Response Plan Review

  • Objective: To assess the organization's preparedness for responding to security incidents and emergencies.
  • Methodology: Review of emergency response plans, including evacuation procedures, lockdown protocols, and communication strategies. This may involve drills or tabletop exercises to test the effectiveness of these plans.
  • Outcome: Recommendations for updating emergency plans, improving training for staff and security personnel, and enhancing coordination with local law enforcement and emergency services.

Conducting these audits, assessments, and checks regularly helps ensure that physical security measures are robust, comprehensive, and adapted to evolving threats, ultimately safeguarding the organization's assets, employees, and operations.

Health and safety audits, assessments, and checks are critical for ensuring that workplaces adhere to regulations, minimise risks, and provide a safe environment for employees and visitors. These activities help identify hazards, assess risk levels, and suggest improvements. Here are examples of health and safety audits, assessments, and checks that organisations might conduct:

1. Workplace Safety Audit

  • Objective: To ensure that the workplace meets all legal and industry standards for health and safety.
  • Methodology: This comprehensive review includes examining policies, procedures, training records, and incident reports. Physical inspections of the workplace to identify hazards related to machinery, chemicals, and general working conditions are also conducted.
  • Outcome: A detailed report highlighting any areas of non-compliance or concern and recommending improvements to meet safety standards.

2. Ergonomic Assessment

  • Objective: To prevent musculoskeletal disorders by ensuring that workstations and practices promote good posture, reduce excessive force, and minimize repetitive motions.
  • Methodology: Evaluation of workstations, equipment, and job tasks to identify ergonomic risks. This may involve observing employees at work, discussing discomfort, and reviewing job functions.
  • Outcome: Recommendations for adjustments to workstations, changes in work practices, or the use of ergonomic tools to reduce strain and improve comfort.

3. Hazardous Materials Handling Assessment

  • Objective: To ensure safe storage, handling, and disposal of hazardous materials to prevent accidents and health risks.
  • Methodology: Inspection of storage areas, review of material safety data sheets (MSDS), and evaluation of handling procedures and personal protective equipment (PPE) usage. Compliance with regulations for hazardous substances is also checked.
  • Outcome: Suggestions for improving storage conditions, enhancing handling procedures, and ensuring that appropriate PPE is available and used correctly.

4. Fire Safety Inspection

  • Objective: To minimise the risk of fire and ensure readiness in case of a fire emergency.
  • Methodology: Examination of fire detection and suppression systems, such as smoke alarms and sprinklers, to ensure they are functional. Inspection of fire exits and evacuation routes for accessibility and signage. Review of fire safety training and drills.
  • Outcome: Recommendations for maintenance of fire safety equipment, improvements to evacuation routes, and increased training for employees.

5. Electrical Safety Check

  • Objective: To prevent electrical accidents by ensuring that electrical systems and equipment are safe and comply with standards.
  • Methodology: Inspection of electrical installations, equipment, and cord management. Testing of electrical safety devices, such as circuit breakers and ground fault circuit interrupters (GFCIs).
  • Outcome: Identification of electrical hazards, such as exposed wires or overloaded circuits, with recommendations for repairs or upgrades to improve safety.

6. Occupational Health Assessment

  • Objective: To identify and mitigate health risks associated with specific job roles or workplace exposures.
  • Methodology: Assessment of exposure to noise, dust, chemicals, and other potential health hazards. Health screenings and monitoring for employees may be included to detect early signs of work-related health issues.
  • Outcome: Strategies for reducing exposure to hazards, such as engineering controls, administrative changes, or PPE. Recommendations for health monitoring and employee wellness programs.

7. Emergency Preparedness Evaluation

  • Objective: To ensure that the organisation is prepared to respond effectively to emergencies, including natural disasters, medical emergencies, or workplace violence.
  • Methodology: Review of emergency plans, communication systems, and supplies. Drills and exercises to test the effectiveness of response procedures and employee training.
  • Outcome: Recommendations for improving emergency plans, enhancing training, and ensuring that supplies and equipment are adequate and accessible.

Conducting these audits, assessments, and checks regularly is essential for maintaining a safe and healthy workplace. They help identify risks early, ensure compliance with regulations, and foster a culture of safety and well-being among employees.

A contractor audit is a comprehensive evaluation of the services provided by a contractors to ensure that they meet the contractual obligations, adhere to industry standards, and follow best practices. This type of audit is crucial for organisations that outsource their operational functions to ensure that the contractor effectively delivers.

Here are detailed aspects of conducting a security contractor audit - this can be adapted for any type of contractor.


  1. Compliance with Contractual Obligations: Verify that the security contractor fulfills all terms and conditions outlined in the contract, including staffing levels, qualifications of personnel, and service delivery standards.
  2. Adherence to Laws and Regulations: Ensure the security contractor complies with all relevant local, state, and federal laws and regulations, including those related to licensing, training, and employment.
  3. Performance Evaluation: Assess the effectiveness and efficiency of the security services provided, including incident response times, communication protocols, and problem resolution.
  4. Quality of Staff: Evaluate the qualifications, training, and professionalism of the security personnel employed by the contractor, including background checks, ongoing training programs, and performance reviews.
  5. Security Procedures and Protocols: Review the security procedures and protocols implemented by the contractor, including access control, surveillance, emergency response plans, and reporting mechanisms.


  1. Document Review: Examine contracts, service level agreements (SLAs), incident reports, training records, employee files, and compliance certifications to verify that the security contractor meets all required standards and obligations.
  2. On-site Inspections: Conduct visits to the facilities where the security contractor operates to observe their operations firsthand. This includes inspecting the deployment of personnel, security equipment, and adherence to security protocols.
  3. Interviews: Hold discussions with management and staff from both the contracting organization and the security contractor. This helps gather insights into the working relationship, communication effectiveness, and any areas of concern.
  4. Performance Data Analysis: Analyze data related to security incidents, response times, and any breaches or failures. This helps in assessing the effectiveness of the security measures in place.
  5. Benchmarking: Compare the contractor’s practices and performance against industry standards and best practices to identify areas of strength and opportunities for improvement.


  1. Audit Report: The main deliverable is a detailed report that includes findings on compliance, performance, staffing, procedures, and any deviations from contractual obligations or standards. It should highlight areas of non-compliance, concerns, and any incidents of note.
  2. Recommendations: Based on the findings, the report should offer recommendations for improving security operations, addressing any gaps or weaknesses, and enhancing compliance and performance. This may include suggestions for additional training, changes in staffing, upgrades to security equipment, or modifications to security protocols.
  3. Action Plan: Develop an action plan in collaboration with the security contractor to address the recommendations. The plan should outline specific steps, responsible parties, and timelines for implementation.
  4. Follow-up and Continuous Improvement: Establish a follow-up mechanism to ensure that the recommendations are implemented and to monitor ongoing performance. This could involve scheduled reviews and regular updates to the security strategy based on evolving risks and requirements.

A security contractor audit is a vital tool for organizations to ensure their security needs are being met effectively and efficiently. By conducting these audits regularly, organizations can maintain a secure environment, improve security outcomes, and build a strong partnership with their security contractor.

The platform is completely flexible and allows you

These audits, assessments, and checks are vital for uncovering areas of risk, inefficiency, or non-compliance within an organization’s operations. They provide actionable insights that can lead to improved processes, cost savings, enhanced compliance, and a stronger competitive position in the market.

1. Compliance Audit

  • Objective: To ensure that the company is adhering to legal, regulatory, and internal policies and procedures.
  • Methodology: Review of documents, policies, and procedures to ensure compliance with relevant laws and regulations (e.g., GDPR for data protection, OSHA for workplace safety). Interviews with staff and management might be conducted to assess understanding and implementation of these policies.
  • Outcome: Identification of areas of non-compliance and recommendations for corrective actions to mitigate risk and ensure regulatory compliance.

2. Supply Chain Audit

  • Objective: To assess the efficiency, reliability, and sustainability of the supply chain.
  • Methodology: Evaluation of the entire supply chain process, from procurement of raw materials to delivery of finished products. This includes assessing relationships with suppliers, inventory management practices, and logistics operations.
  • Outcome: Identification of supply chain vulnerabilities and recommendations for improving supply chain resilience, efficiency, and sustainability.

3. IT Systems Audit

  • Objective: To ensure that IT systems are secure, reliable, and aligned with the business’s strategic objectives.
  • Methodology: Assessment of IT infrastructure, software applications, and data management practices. This includes evaluating cybersecurity measures, data protection protocols, and disaster recovery plans.
  • Outcome: Recommendations for strengthening IT security, improving system performance, and ensuring data integrity and availability.

4. Customer Satisfaction and Service Quality Assessment

  • Objective: To evaluate how well the company meets the needs and expectations of its customers.
  • Methodology: Collection and analysis of customer feedback through surveys, interviews, and review of customer service records. Measurement of service quality, response times, and resolution effectiveness.
  • Outcome: Insights into customer satisfaction levels and areas for improvement in product offerings or service delivery.

Zinc Synapse Suite