Skip to main content

Others

Visitor management

Overview

Using the visitor management module, you can allow your colleagues to preregister a visitor or guest in your office in advance. The preregistered visitors can accept the uploaded documents such as the visitor data policy and the visitor code of conduct before they visit your office. Upon arrival, a receptionist or the host can check in the visitor and check out the visitor upon leave. This way, you can trace which visitors are in your office sites and protocol their stay.

You can configure which documents need to be signed digitally by your visitors and which profile attributes need to be provided before entering the office.

Use cases

With the visitor management module, you can cover the following use cases, when inviting a visitor:


1 - Invite a new visitor

The most typically use case is that you are planning to invite an external visitor to your office, knowing the visitor's name and email address.

This way the new visitor will be created as a new unverified visitor in the system and the visitor gets an invitation email after the invitation is created. Using the invitation email, the visitor can verify himself before the visit by filling out the required user attributes and accepting the uploaded visitor documents. The accepted documents will be stored in the visitor profile.

Invited visitor verifying using the email

In case the visitor ignores the invitation mail with the prior verification process, the visitor kiosk display can be used to verify the visitor on site.

Invited visitor verifying using the kiosk on site
💡
Note! You can configure the system to allow or to prevent the host to check in and checkout the visitors.

2 - Invite a verified visitor again

In case an already verified visitor gets invited into the office again, the visitor profile verification doesn't need to be re-done. The verification needs to be repeated only if the system administrator changes the requirements for the visitor verification. For example, by updating the visitor documents.

Invite a verified visitor again

3 - Invite an unknown visitor

In cases where you have an unexpected or unknown visitor, such as a maintenance worker, the simplest approach is to provide them with a Flexopus visitor kiosk tablet upon arrival. The visitor can then fill out their profile and sign any necessary documents directly on the tablet, ensuring quick and efficient check-in.

Invite unknown visitor


4 - Visitors without prior invitation

If the responsible colleague forgets to create a visitor invitation, and the visitor arrives unexpectedly, the visitor kiosk display can be given to the visitor to create a verified profile on the spot. While the visitor completes this, the host can be contacted. Once the host confirms the visit, the receiving colleague can proceed to register the visitor with the verified profile created on the kiosk.

Visitor without prior invitation

Configuration manual

To configure visitor management, go to Dashboard > Settings > Visitor management as an administrator. If this option isn't visible, please reach out to Flexopus support for assistance.

Contact support
Support contact for users If you have technical questions or problems with the application, please contact your company administrator. Support contact for admins Company administrators can contact support@flexopus.com for technical support or questions. To enable us to process your request as quickly and precisely as possible: Sales Contact

STEP 1 - Configure fields

You can set the following profile attributes in Flexopus to tailor visitor profile requirements based on your organization's needs. While name and email address are mandatory, the following fields can be set as required or optional:

Additional visitor attributes:

  • Visitor address
  • Visitor phone
  • Visitor ID document

Additional company attributes:

  • Company name
  • Company email
  • Company phone
  • Company website
  • Company address

This setup allows customization to meet specific organizational needs.

💡
Note: We recommend keeping the visitor profile requirements as simple as possible, unless there's a strong reason to make all fields mandatory. In most of the cased the name, email as required field and the phone and company as an optional field is a sufficient configuration.

STEP 2 - Configure documents

In this configuration step, you can upload the document(s) that need to be signed by the visitors during the verification process.

💡
Note! The documents to be signed by a visitor may vary based on your organization's requirements. Flexopus is providing the software for the visitor management and not the legal consulting to make a perfectly fitting visitor documents for your organization. Still, we assist you to know what kind of documents you require for a good visitor management.

We recommend adding two documents.

Data privacy policy for visitors
To ensure GDPR compliance and align with best practices, your visitor management document should include the following:

Data Processing Legal Information

  1. Purpose of Data Processing
    Clearly state why visitor data is being processed, for example, “to manage office access and ensure safety and security during visits.”
  2. Data Processed
    List the specific types of data collected, such as visitor name, email, date of visit, and time of visit.
  3. Data Retention Period
    Indicate how long this data will be stored (e.g., “Visitor data will be retained for a maximum of 30 days post-visit unless specified otherwise for security incidents").
  4. Visitor Rights
    Explain the visitor’s rights, including:
    • Right to access personal data stored about them.
    • Right to request deletion or correction of data.
    • Right to inquire about the purpose and extent of data processing.

Visitor’s Code of Conduct
In addition to data privacy policies, specify the conduct expected of visitors to ensure security and decorum:

  • No Unauthorized Photography or Recording
    Visitors are prohibited from taking photos or recording videos during their stay.
  • Avoid Removing Documents
    Documents from shared office equipment (like printers) should not be removed.
  • Restricted Area Access
    Visitors may not enter restricted areas without explicit host approval.
  • Emergency Procedures
    In emergencies, such as a fire, visitors should follow host instructions.
  • Wear Identification
    Visitors must visibly display their name tags at all times.
  • Damage Reporting
    Any damage caused during the visit should be promptly reported to the host.
  • Guest Wi-Fi Access
    Visitors are welcome to use the guest internet during their stay.

Note: Avoid including a Non-Disclosure Agreement (NDA) within the visitor management documentation. If an NDA is essential, it’s best managed separately before the visit.

💡
Note! Be fair with your visitors and keep the documents simple. Keep in mind which real requirements need to be fulfilled through the visitor management. The requirements are mostly defined by an information security certificate such as ISO27001 or TISAX.

STEP 3 - Display configuration

To proceed, enable the verification process for the kiosk display on a designated, preconfigured tablet. We recommend using a visitor kiosk display and activating the signature option for the kiosk. By enabling this, the kiosk registration code will appear during the visitor invitation process and will also be sent to the visitor via email.

Enable kiosk for visitor registration

Using the visitor kiosk, you can handle the visitors onsite faster and easier, since they don't need to use their private devices for the verification process. To configure a visitor kiosk display, please follow the instructions in the following article:

Visitor kiosk tablet
In progress

STEP 4 - Configure invitation email

You can customize the visitor invitation emails by providing a custom text, which will be displayed at the top of the email.

You can use the following template text as well:

You were invited by an employee of **Flexopus GmbH** to visitor our office. Please fill out your visitor profile before coming to the office.
Configure invitation email

STEP 5 - Privacy configuration

As the last step, you can configure how to anonymize and automatically delete the visitors' data, such as the invitations and the user profiles.

Navigate as an administrator to Dashboard > Settings > Data Privacy Settings. Here you can find two settings, which you can set based on your data privacy policy, which you uploaded in STEP 2.

Visitor invitation anonymization
Anonymize past visitor invitations after the configured time. The invitation details (arrival time, check-in, building, etc.) are preserved, but the visitor profile is detached from the invitation. The anonymization is irreversible, as it is done to protect the users and visitors from data collection and behavior tracking.

Delete inactive visitors automatically
The system automatically deletes older inactive visitors. Visitors are considered as inactive if they have no upcoming invitations or no past invitations in the configured number of days. We recommend putting this setting to the same value as the visitor invitation anonymization.

💡
Note! You can define both settings separately, however we recommend only enabling the “Delete inactive visitors automatically” option by setting it to 365 days.

The Users can see all existing visitor profiles setting, found under Dashboard > Settings > Visitor management, controls visibility of visitor profiles. If disabled, users only see their own visitors by default, which helps prevent sensitive situations, such as accidental re-invitations of rejected candidates. However, when creating a visit, if an email address matches an existing visitor, that profile will be suggested, allowing the user to add the visitor without requiring profile re-verification.

By default, this setting is disabled to maintain privacy and prevent potential mismanagement of visitor information.


Visitor registration process

In this section, we describe the visitor registration process.


STEP 1 - Configure invitation

Both regular users and administrators can register a new visitor in Flexopus, with similar steps. However, administrators have the option to create an invitation for a different host. To do this, go to Dashboard > Visitors > New invitation and specify the host's details during the invitation process.

Create visitor invitation as an administrator

When creating a visitor invitation, you can set the following parameters:

  • Host: Select the user responsible for the visitor. Administrators can create invitations for other colleagues.
  • Office & Floor: Specify the office for the visitor's arrival, especially if managing multiple offices. The floor selection is optional.
  • Arrival Due Time: Enter the expected arrival time, even if the visitor may arrive slightly earlier or later.
  • Reason for Invitation: This is a required field for internal tracking and communication, such as specifying if it’s for an interview or a social visit. Both the visitor and administrators can view this reason.
  • Internal Note: Optionally, add an internal note related to the invitation.

STEP 2 - Select visitor

To complete a visitor invitation, choose a visitor type from the following:

  • New Visitor: Requires only the name and email fields for invitation creation. Additional fields are optional and can be filled in advance to assist with the visitor's verification process. Required fields must be completed by the visitor to finalize verification.
  • Existing Visitor: Select a previously verified visitor from the list to bypass the verification process. Administrators can access all existing visitors, while regular users can only view their own visitor profiles by default. Using an existing profile is recommended whenever possible.
  • Unknown Visitor: Use this option for anticipated but unspecified visitors, such as maintenance workers. It’s recommended to include a detailed internal note for clarity on the expected visitor’s purpose.

STEP 3 - Invitation

After setting up the visitor invitation parameters and data, finalize the invitation. The visitor will receive an invitation email, and the invitation will be listed in the system. To view all invitations, go to Dashboard > Visitors > Visitor invitation > All visitor invitations.

All visitor invitations

In case the visitor is not yet verified, you will see an orange disclaimer next to the invitation. This means that the visitor cannot be checked in yet, since the verification process is pending.


STEP 4 - Verification options

The verification process is where the user fulfills their visitor profile based on the configured requirements and accepts the configured visitor documents. Without a proper verification, a check in is not possible. There are two ways to do the verification process:

  • Verify visitor profile using the link in the invitation email
  • Verify visitor profile on site using the visitor kiosk tablet

Verification using the invitation email link
The invitation email includes a unique invitation specific link, which leads the visitor to a verification form. On this form, the visitor can enter the missing profile attributes and accept the documents.

Invitation mail example

Verification using the visitor kiosk tablet
If a visitor forgets to complete their profile verification before arrival, they can do so on-site using a preconfigured visitor kiosk tablet. The host, admin, or visitor can simply enter the 6-digit code associated with the invitation on the kiosk to begin the verification process.

6 digit invitation code for kiosk registration process

STEP 5 - Verification

No matter which option is chosen for the verification, the same form will open:

  • The first section shows the invitation details.
  • The second section shows the attributes that need to be filled out.
  • The third section shows the documents that need to be accepted.
Verification form for the visitors

Optionally, a signature can be requested from the visitors, which will be copied to the last page of the required documents:

Signature for document verification
💡
Note! In case a signature is configured as a mandatory step, the signed documents will be stored in the verified visitor profiles under the signed documents section. Flexopus is not storing the signature in a plain format. They are always embedded in the documents and only the PDFs are stored as long you require it based on the privacy settings.
Signed documents

The signature will be copied to the last page on the documents.

Signature on the last page of the document

STEP 6 - Check-in / Check-Out visitor

Once the visitor verified their profile, the host, or the visitor administrator can check in the visitor on the target day.

Check-In visitor

Clicking on the check-in button, the current time will be documented.

Check-Out visitor

After the check-in, the check-out button will be displayed. Clicking on the checkout button, the current time will be used.

Finalized check-in / check-out

The check-in and check-out time can be edited afterward based on the settings you configured for the visitor management. In some cases, the documentation of the arrival or the leave will be forgotten.

Edit check-in and check-out times afterward

The visitor protocol is done.


Why use visitor management?

Visitor management is crucial for safeguarding information and knowing who is on-site in emergencies. Here are two key examples:

Example 1
Protecting Information (Theft of Company Property)

When a company laptop or critical documents go missing, visitor management helps identify who accessed the office at the time. This allows the security team to investigate further and work with information security to minimize potential breaches.

Example 2
Emergency Evacuation (Building Fire)

In emergencies like a fire, the fire department needs to know if anyone is still inside. Visitor records provide quick insights into who might still need assistance, avoiding delays from checking with each employee.

In addition to internal security, visitor management often fulfills external requirements for information security:

  • Information Security Certifications
    Certifications like ISO27001 or TISAX mandate knowledge of office visitors to safeguard access to company premises. Many clients require these certifications for security compliance.
  • GDPR Compliance
    Under GDPR Article 32, companies must document measures to secure data access, including physical space access control, which is part of any Data Processing Agreement (DPA) shared with clients.

These examples highlight that visitor management is often less about internal preference and more about meeting critical security and compliance requirements.