Assurance
Visible presence assures stakeholders, enhancing compliance, trust and safety perceptions among community members.
Deterrence
Patrols deter potential threats by signalling an active, monitored presence, reducing risk and identifying issues early.
Proactive
Proactive scheduled measures, including patrols, prevent incidents by addressing risks before they escalate.
Control
Controlled operations ensuring systematic coverage, efficient resource use, and effective incident management.
Creation of unlimited checkpoints assigned to a site/location.
Add a custom checkpoint name, description.
Upload any reference images to support the checkpoint and identify the location.
Selection of checkpoint verification with the options of geo-location, image/META, NFC and Barcode.
Self scanning of NFC tags to auto link the tag to the checkpoint.
Plot the checkpoint on a map to pin point the location of the checkpoint.
Enter a risk description to log any risks the user needs to be aware of i.e. poor lighting, steep steps etc.
Create routes with a custom name and description.
Add checkpoint actions that are required when the checkpoint is verified.
Link checkpoints together in an order and provide a ‘group’ of checkpoints that are required during a scheduled visit.
Select if the route is a 'step-by-step' where it needs to be completed chronologically or 'random' where they can be completed in any order.
Add a route timeline and select a tolerance time (+/-) for allowancing and alerting purposes.
Create a schedule by entering a custom name and selecting the route.
Entering the date and time of when the patrol or activity is required to start.
Select if the patrol repeats - repeat daily, weekly, monthly and yearly ongoing or custom with a specific end date or after a number of occurrences.
Assign the patrol to an individual or leave blank for self-assignment from the app.
Add any additional instructions and any additional documents.
Select if a risk assessment is required prior to commencing the activity - add a risk assessment summary & upload a document(s).
Access and conduct activities using our Verify App - available on Android.
Access the schedule in list and calendar views on both the Command platform and the Verify App.
Self assign a patrol activity from the list of unassigned patrols.
View the scheduled route with supporting information, accept the risk assessment (if required) and start the activity.
Verify the arrival at a checkpoint with the allocated verification (options of geo-location, image/META, NFC and Barcode).
Report an incident during the patrol.
Complete any assigned actions when verification of a checkpoint has been made.
Automated status with complete, partially complete or missed options (actions or checkpoints).
Trigger notification when - overdue, reassigned, incident occurs, incomplete actions, missed checkpoints and overdue completion.
Search - powerful filtering facility & advanced filtering that allows users to customise search criteria, filter & interrogate data sets.
Operational live lists and statistics to provide key statistics on the progress of verified activities.
- Pending - all, ready, overdue, declined, reassigned, suspended, abandoned, disabled/cancelled.
- Started - all, in progress, started early or late, with incidents, incomplete actions, missed checkpoints, overdue completion.
- Completed - all, no issues, with incidents, early, late, incomplete actions, missed checkpoints.
Data restrictions - management and control over user access & permissions defining which user group can access and manage.
Export - export the patrol details in a CSV format or print the details.
Completing patrols is crucial for several reasons, aligning closely with the principles of deterrence, assurance, proactive measures, and controlled operations in security management
In essence, completing patrols is fundamental to effective security operations, serving not only as a cornerstone of preventative measures but also as a critical component of a comprehensive strategy to maintain safety, provide assistance, and manage risks.
Patrols, a key element in security operations, come in various formats tailored to meet specific objectives and environmental needs.
Each patrol type has its strengths and is chosen based on specific security needs, the size and nature of the area to be patrolled, the level of interaction desired with the public, and the resources available to the security team. Often, a combination of these patrol types is used to create a comprehensive security strategy.
Here’s a look at the different types:
While the requirement for security patrols isn't universally mandated across all settings, there are circumstances and sectors where they become a necessity.
The mandate for patrols in these facilities is typically rooted in the need to protect people, assets, and sensitive information, as well as to comply with regulatory and insurance requirements. The specific regulations and standards dictating the need for patrols can vary significantly by country, state, and even municipality, reflecting the diverse security challenges and priorities of different regions.
A proof of presence / patrol management platform, while primarily designed to streamline and enhance the efficiency of patrols, can be leveraged in a variety of other use cases beyond traditional security tasks.
By leveraging the core functionalities such as task scheduling, real-time tracking, and reporting—organisations across various sectors can enhance operational efficiency, ensure compliance, and improve service delivery. This adaptability showcases the platforms' potential beyond security, serving as a comprehensive tool for operational management.
These platforms often incorporate features like real-time communication, GPS tracking, incident reporting, and task management, making them versatile tools for different operational needs:
Yes, there's a difference between proof of presence and patrol management, although they are closely related and often work together within security and facility management operations. Understanding the distinction is crucial for implementing effective security strategies.
Proof of presence is a verification method used to confirm that a person, typically a security guard or maintenance personnel, has physically visited a specific location at a certain time. It's fundamentally about authentication and documentation, ensuring that designated checkpoints or areas within a facility, property, or designated route have been physically checked or inspected as required. Proof of presence can be achieved through various technologies like NFC, QR codes, GPS tracking, or biometric verification. The primary aim is to verify and record the presence of personnel at critical points to meet security, safety, maintenance, or compliance requirements.
Patrol management, on the other hand, encompasses a broader scope of planning, executing, monitoring, and analysing patrol operations. It involves scheduling patrols, defining patrol routes, assigning personnel, and ensuring that patrols are conducted efficiently and effectively. Patrol management also includes the strategic aspects of patrol operations, such as determining the frequency of patrols, the specific objectives for each patrol (e.g., checking for safety hazards, ensuring doors are locked, observing for suspicious activities), and the deployment of resources. Modern patrol management often leverages software and technology to optimise patrol routes, schedule patrols, and analyse patrol data to improve security and operational efficiency.
While proof of presence is a component of patrol management, serving as the means to verify that the patrol objectives are met, patrol management is the overarching framework that guides how patrols are planned, executed, and reviewed. Integrating proof of presence into patrol management systems allows organisations to ensure accountability, enhance security and safety protocols, and make informed decisions based on the data collected from patrol activities.
In summary, proof of presence focuses on the verification of individuals being at specific locations, whereas patrol management deals with the broader strategy and execution of patrol operations. Together, they form a comprehensive approach to security and facility management, ensuring not only that personnel are where they need to be but also that patrols are carried out in a strategic, efficient manner.
Yes.
Zinc work in partnership with the most trusted names in the industry and accredited with ISO27001, Cyber Essentials and Secured By Design. The platform is highly secure utilising military-grade AES 256 encryption for data at rest and TLS for data and transport.
Zinc is approved for use within Government Category 1 Responders and approved with government frameworks including G-Cloud 13 and Vertical Applications Framework (Lot 5 - Blue Light Services). Staff hold SC clearance (Government secret & monitored top secret access) and are also SIA vetted.
From a compliance perspective, Zinc uses the Risk Ledger platform for our standardised, security-led Supplier Assessment Framework (SAF). The standardised framework maps to ISO27001, Cyber Essentials, the NIST Cybersecurity Framework & the NCSC Cyber Assessment Framework. We cover compliance with key security certifications, ensure all relevant company policies are in place, check that major data protection legislation is being followed and explore technical controls for corporate networks, cloud environments and secure software development.