Description
But what if you don’t need (and can’t afford) the latest and greatest high technology security solution?
The good news is there is a simple, inexpensive tool you can implement right now to help improve the security of your office.
Price range: $33.00 through $56.00
Used by 20,000 companies nationwide!
The white first part contains a “blockout” pattern on all names to protect the confidentiality of those signing in.
The yellow second part provides an automatic duplicate record for office use.
Quantity discounts | ||
---|---|---|
# of Books: | 20 - 39 | 4% |
# of Books: | 40 - 59 | 8% |
# of Books: | 60 - 79 | 10% |
# of Books: | 80 + | 12% |
What is a Visitor Log Book?
A visitor log is a record-keeping system used to track everyone who enters and exits a facility. Maintaining an accurate log of who’s on-site, when, and for what reason is critical for facility security.
A visitor log book traditionally sits at the reception desk, where guests manually sign in, providing basic details such as their name, the person they’re visiting, time of arrival, and departure.
How does the Confidential Visitor Sign-In Book work?
Two-part carbonless forms perform two jobs in one step – the white first part contains a “blockout” pattern on all names to protect the confidentiality of those signing in. The yellow second part provides an automatic duplicate record that lets only you and your staff see the names that are “blocked out” on the white first part. The right side of the two-part set is glued together as an additional confidentiality measure, protecting against subsequent visitors peeking inside.
What makes THRESHOLD log book “confidential” and secure?
A security blocking pattern is printed over the fields on the top sheet of the product that contain sensitive information (visitor’s name, who they are there to visit, etc.) The security blocking allows visitors to see that the pen they are using is actually writing something (thanks to a little bit of white in the pattern). However, it prevents others from deciphering what is being written, such as visitors who sign in later; they can’t read any sensitive information on the top sheet. In addition, the right edges of the original and duplicate sheet are sealed together to further prevent snooping.
"Prompt service. Quick delivery. Perfect product".
-Ron Speed, Allstate Insurance, Coppell, TX
"Great company, always willing to help and provide a great product and information to help keep our company safe".
- Carrie Jamieson, BioSafe Systems, East Hartford, CT
"Always quick to help and quick to ship orders. Regular communication and new product offerings shows they care about their customers".
- Paul Martin, The Endurance International Group, Inc., Burlington, MA
"This product had helped our office with the confidentiality issues dramatically. I would highly recommend this to anyone who is concerned with the privacy of visitors in the office environment".
- Valerie Jones-Garner, SAIC (Science Application International Corporation), Panama City Beach, FL
"The product is great, the customer service is even greater. They always seem to know when I need to order and they send me quick email reminder".
- Kelly Maddox, Sherwin Williams, Lawrenceville, GA
Only logged in customers who have purchased this product may leave a review.
Select at least 2 products
to compare
Sidra Saleem, INOC (verified owner) –
Visitor sign in log is very confidential, just like we want it. They did a great job on it.