Background Screening

Screen Every Visitor. Before They Enter.

Real-time screening against sex offender registries, custom watchlists, and BOLO lists. Flagged visitors are stopped at the door — not after they're inside.

Real-time screening · Under 2 seconds · Configurable workflows

Screening Sources

Multi-Layer Background Screening

Four levels of screening run simultaneously during every check-in.

National Sex Offender Registry

Every visitor is screened against the National Sex Offender Public Website (NSOPW) database, which aggregates data from all 50 states, DC, and US territories. Flagged matches trigger instant alerts before entry is granted.

Required by law for schools in many states. Essential for any facility with minors present.

Custom BOLO / Watchlists

Create your own Be On the Lookout lists for banned visitors, terminated employees, restraining order subjects, or any individual your organization wants flagged. Unlimited entries with notes and reason codes.

Commonly used by healthcare facilities for patient safety and by corporate offices for terminated employee tracking.

Global Watchlist Screening

Screen visitors against international sanctions lists, denied persons lists, and government watchlists. Essential for organizations with ITAR, EAR, or C-TPAT compliance requirements.

Defense contractors, aerospace companies, and logistics firms use this for export control compliance.

Custom Database Integration

Connect your own databases via API for organization-specific screening. Screen against internal HR records, vendor blacklists, or industry-specific registries.

Healthcare organizations screen against OIG exclusion lists. Financial firms screen against OFAC SDN lists.

Response Workflows

You Decide What Happens Next

Configure different responses for different screening sources. One size doesn't fit all.

Instant Deny

Visitor is matched on a screening list → entry is automatically denied → front desk is alerted → visitor sees a generic "please see the front desk" message (no indication of why).

Best for: Sex offender registry matches for schools and facilities with children.

Alert & Review

Visitor is matched on a screening list → front desk/security receives an alert with match details → staff reviews the match and decides to approve or deny → visitor waits.

Best for: Custom BOLO lists where matches may need human judgment (e.g., common names).

Log & Allow

Visitor is matched on a screening list → match is logged for audit purposes → visitor is allowed to proceed → security/compliance team is notified for later review.

Best for: Low-risk watchlists where awareness is important but immediate denial isn't necessary.

How It Works

Screening in Action

01

ID Scanned

Visitor's name, DOB, and ID data are captured from driver's license barcode or manual entry.

02

Instant Screening

All configured databases are queried simultaneously. Results return in under 2 seconds.

03

Action Taken

Based on your workflow rules: auto-deny, alert for review, or log and allow. Everything is recorded.

Compliance

Meet Regulatory Requirements

Background screening helps satisfy requirements across multiple compliance frameworks.

FERPA

Schools must protect student records. Visitor screening ensures only authorized individuals enter the building.

HIPAA

Healthcare visitor screening helps control access to patient areas and protect PHI.

ITAR

Defense contractors must screen visitors against denied persons lists before granting facility access.

C-TPAT

Supply chain security requires screening all visitors to manufacturing and warehouse facilities.

SOC 2

Visitor screening and access logging are key controls for SOC 2 physical security requirements.

Alyssa's Law

Multiple states require panic alarms and enhanced security measures in schools, including visitor screening.

Security & Privacy Safeguards

Encrypted Data

All screening results encrypted at rest and in transit.

Role-Based Access

Only authorized users can view match details and override denials.

Discreet Alerts

Visitors never see why they're flagged. Alerts go to staff only.

Audit Trail

Every screening action is logged with timestamp and decision maker.

"In our first month, KyberAccess flagged a registered sex offender who had been signing in with a paper log for months. That alone made the entire investment worthwhile. Our parents and staff have peace of mind now."

Dr. Patricia Morales

Superintendent, Greenfield Unified School District

FAQ

Screening Questions

Don't let dangerous visitors walk in unchecked

Start screening every visitor today. Setup takes 5 minutes. The peace of mind lasts forever.

KyberAccess Support

We typically reply within an hour

Hi there 👋

Have a question about KyberAccess? Drop us a message and we'll get back to you.