Waterloo Public Library Digital Collections

Waterloo Chronicle (Waterloo, On1868), 12 Jul 2006, p. 20

The following text may have been generated by Optical Character Recognition, with varying degrees of accuracy. Reader beware!

'e-,scti'fii,t'. _ sigzéfinfim s', ss', . I 'iiiWii c, ’ C- -_ i _ p' ' .rrclyy) , C " 5f$£51&;\Â¥1 l 'cd?' ers"' “9. , V 1 ' I; U ue.,"'" t” V 't - 7. g _ a, _ g 3 an l *%‘-:,,u; r ' - a; , 5 T ._ , _ ' (ti, V '.'rri,rit/s/:/a15 » H th c' oi-s-,',],;- _." _ V co. . ' 'rrp . _ t . _ ,1", fjr r"iitj?tkfs't"t' y' J l 't", V 01186 '8ttttatr (',. P . . V, _ , Til';,'?:",:;":')';';;),,;:,,';,),')' LUTHERWQQD J, LUTHER VILLAGE em Keeping track of visitors is critical "ellow Pages Group Yreccnlly named Ker, A nels Popcorn and Straight Street liven! Ser- vices as the recipients of the Make It Real program in Kitchener. Waterloo and Guelph, a new initiative Kernels pops into winner's circle cant enhancement to that investment. Ihcre are several conr Inon methods of controlling access by visitors. For the small business. it can be as simple as having an office employee greet individuals as they enter the building and advise the company contact of their arrival. While inexpensive. this Thousands of dollars are invested to install wcurily syslems. cameras and access systems to achieve the level of security desired by lumen and management. Accurate» ly and cfrectively monitoring visitors can provide a signifi- [he ability to screen and monitor visitors can have an immediate and significant impart on the safety and securily of stuff and corpo- rate rmou mes. lh-tx-mling on the \1/1- of the [mum-xx. scorn ot nu» lurs enter and lcave the building every day. Who are they? Who do they want to see? Once they an: out of sight where are they? What an: they doing? Did they leave? These are all wriuux issues businesses must (on sider. - 105 King St., EM Kmhonon ON Ptr Wm‘rm Par-on lmnuw: 1’me W-tmwlrb Loncon; an WArhway " M "teh-- Vlnorloo‘ The “It mm in IN, tat the mmhmwmmâ€"oâ€"mu’nmmmyumam-mm mmmmwwmnbaw,mmmmwx won-ummmmnmmqamummmmm. New whmdmeMflopnllwlsmmMm-Ml). Torn": Cash. vita/MC. Amer, Cqretnqqt (nova-1‘ 15% Juror: "only!" plul 6.5.1, I p.51. nppllcpblo, Son" Inna luhlod to prior "ms/errors/om-tOrr, Police murky on min/nu; Photo ID "“1an for curry. All um 'href, lights of “mink": "and. "eearro of ham for urn-round"! par”..- orfr. For i no" = all I'm“ hitsttetmtx IM-Qg-INZ. Small" cmnpanirs have nru-r had the luxury at a n-u'pnnnlsl allowing visitors In ruler and leave the facility unannounced and. Al lulu-s. unseen. n-u'pliumst. um- irnporou role p, the cmnml and mum mn ng of aux-xx, Plus Forced to auctibn follpwing Ciluaa, Otaue,.e, Mop/00 Aiau Public Auctlon: Sum. July "th at 2 PM provlow at 1 PM urceu to auction tollowing asset restructuring Is I result of previous Declaration of Family Bankruptcy v r ' -d i a vast Majority of valuable items from other various sources A Maura AtrTro_ or Nurunr IWFOIIIANII' 7* Intludts Val-"bl: plrlill Collttlinl at Major Real Estate Developer/Builder (Name withhtld upon Lawyer‘s request) “UNIV hthX i. To be held at the exclusive Kernels Popcorn. owned and operated by Irene and Douglas Dulchak, was that recognizes and rewards Canadian small businesses that are dedicated to improving the communities they serve. Today there are effective and reliable electronic visitor access systems available to businesses of all sizes. Companies like Honey- While this type of control is an improvement it still provides little security. ( hrds go missing. and manage- ment (or security) do not know if the individual has actually left the building One of the mm! rmnnmn methods today is the issuance of identification tags worn by the visitor. This usually involves the visitor signing a "visitor log book" and filling out the approprt- ale columns. The informa, tion provided is rarely checked, In many situations the visitor doesn't bother fill- ing out the information required, method provides the lcast security. and. at ttest, only acknowledges a visitor is in the building, JOHN HENDRY WPOIIFA awarded the $5,000 prize for its dedication and contrihu, lion to the Kitchener and Waterloo communitv. Irene Dutchak and Ker nels are active in the com For more information an controlling “(Tess In your company. or (my other securi- ty "mums. email m Jhertdryetittltitonbrothersxr, m. Cotrs,istvut registering, monitoring and trucking vis- itors is a prudent policy to implement or strengllmn. thereby improving overall security for your srtitff and your business. Be pro-active, Dun't wait until a serious incident ovum before deciding to get control over it?" enters your btiilaiitg. I Ihese systems also have the ability to notify the appropriate employee tho visitor is waiting to sue them. Since the badges are specific to the holder, the business nu longer has to worry about lost tags, In an emergency, it also provides an immediate list of "on-employees In the build, ing. rsell have dru-Iupvd hm Cost, high tech \Nlur nun agenu-m sun-ms that (an an?” and track Indnldualx usmg their drivers' iiccnw or business card, At any tune managrnn-nl m wrunly can determine who is In the (utility. Bumm- all visitors an: idenufivd with a personalized nillllt‘lug ll become, cum-r ttt idcruiry amour who has gained access without uuthoriza, lion. Continued on page 21

Powered by / Alimenté par VITA Toolkit
Privacy Policy