Receptful is committed to your data security and company privacy

We know that protecting company data is tantamount to your business’ success and brand reputation. From proprietary and protected facility plans to logs of who is coming and going at your workplaces, you need to be confident in the privacy of your company information. Learn how Receptful protects sensitive data, safeguards your physical office, and helps you to maintain regulatory compliance measures.

 

Receptful Signed Agreement NDA white desk stand

Download Our Security Overview

Our full security overview dives into the proven processes that Receptful takes to keep your company information safe. Find out more about Receptful’s data storage practices, privacy features, and more in this helpful document — get your free copy by providing us with some details over there!

"*" indicates required fields

SOC Audited

 Secure Your Private Data

If outsiders gain unauthorized access to your private data, it can have a devastating effect on your business. Receptful lets you know who is in your building at all times, the purpose for their visit, and exact times that they checked into and out of your facilitiy If you have a data breach, you’ll be more easily able to identify which visitors were in your office at the time.

Receptful’s image capture and badge features allow you the peace of mind to confirm that visitors are who they say they are and keep an indisputable record of their physical visit to your facility.  Collect and record signatures on critical legal documents like NDAs to protect propriety company information and intellectual property. 

Stay Compliant With Receptful

Many companies face significant penalties for non-compliance with security and regulatory standards. Besides that, not taking proper care of your visitors’ private information can ruin the reputation you’ve worked so hard to build for your company.

First and foremost, we make sure we maintain your trust by keeping your information safe and secure. We have achieved compliance or certification in the following:

While it’s not always easy to develop and maintain compliance processes, that’s where Receptful helps you meet the challenge. You can easily customize the workflow you use for different types of visitors to create exactly the type of record you need for various compliance regulations like those described below.

Receptful Supports Compliance With

International Traffic in Arms Regulations (ITAR)

ITAR stands for International Traffic in Arms Regulations. It’s a set of export control laws to prevent sensitive information from getting into the hands of foreign nationals. All manufacturers, exporters, and brokers of defense articles, defense services, and related technical data are required to be ITAR compliant, which is also referred to as ITAR certified. ITAR compliance is not a small task. Among other things, organizations must register with the Directorate of Defense Trade Controls, follow certain import and export procedures, and screen suppliers, vendors, and subcontractors. One of the requirements is to keep records of everyone who enters a facility (and thus could be exposed to sensitive information). This is where a visitor management system comes in. To be ITAR compliant, companies must have a documented visitor management process that involves verifying whether visitors are United States citizens. Visitors may be required to sign an ITAR NDA and a technology control plan (TCP) briefing. Companies must also maintain comprehensive visitor records. A compliance-friendly visitor management system can help you meet all of these requirements. Learn more about ITAR on the U.S. State Department website.

If you’re in the food industry, you’ve undoubtedly heard of the Food Safety Modernization Act (FSMA). These seven FDA rules set the bar for food manufacturing and transportation safety practices and procedures. The Final Rule for Mitigation Strategies to Protect Food Against Intentional Adulteration, aka the Food Defense Rule, aims to protect the U.S. food supply from intentional contamination. Like the other regulations on this list, the Food Defense Rule has many aspects, including requirements for visitor management. To help companies comply, the FDA has put together a database of mitigation strategies. Here are some of the strategies listed under Facility-Wide Security Measures:

    • Implement a check-in/check-out procedure at security or reception areas that includes verification of proper identification, screening equipment, and relinquishment of prohibited items
    • Implement a visitor policy which requires proper identification, escorts, and adherence to rules regarding restricted access
    • Implement a policy for driver check-in and vehicle documentation review 

A visitor management system can help you achieve compliance, as well as ensure that the food supply is safe. Learn more about the Food Defense rule on the FDA website.

The Customs-Trade Partnership Against Terrorism (C-TPAT) is a U.S. Customs and Border Protection (CBP) program to ensure the safety of all goods entering the United States. C-TPAT is like TSA Precheck for containers arriving in the United States from foreign suppliers. Under this voluntary program, importers are responsible for implementing best practices for security across their supply chain so that they don’t run into any problems when the goods arrive at the border. Like ITAR, C-TPAT involves several processes, but its foundation is visitor management. The required best practices include taking photos of all visitors, issuing ID badges, and keeping records in a visitor database — exactly what a compliance-friendly visitor management system is designed to do. Learn more at C-PTAT on the U.S. Customs and Border Protection website.

The Export Administration Regulation (EAR) governs the export and re-export of some commodities, software and technology, including ‘dual-use’ items that can be used both for commercial and military purposes and certain defense items. Similar to the regulations under ITAR, access to these controlled goods is restricted to U.S. citizens and certain foreign national individuals. A visitor management system that verifies authorized access, tracks those access events and issues, and stores appropriate NDAs and identification documents is essential. Learn more on the Bureau of Industry and Security website.

GMP or cGMP is the aspect of quality assurance that ensures that medicinal products are consistently produced and controlled to the quality standards appropriate to their intended use and as required by the product specification. GMP defines quality measures for both production and quality control and defines general measures to ensure that processes necessary for production and testing are clearly defined, validated, reviewed, and documented, and that the personnel, premises and materials are suitable for the production of pharmaceuticals and biologicals. GMP also has legal components, covering responsibilities for distribution, contract manufacturing and testing. These general measures and components require limited-access areas and restricted personnel, which is best managed with an organized visitor management system. Learn more about GMP on the U.S. Food and Drug Administration website.

PCI-DSS (or simply, PCI) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment. While not required by law, PCI compliance is within the contract terms of a merchant or payment service provider and the card networks. The Payment Card Industry Security Standards Council is an independent body of card networks that manages PCI security standards while the enforcement of these standards falls to the card networks and payment processors. There are 12 PCI compliance requirements, including restricted physical access to cardholder data and the development of security systems and processes. A manufacturing visitor management system directly contributes to adherence of these guidelines. Learn more about PCI-DSS on the PCI Security Standards Council website.

If you have any specific questions about how Receptful can help your enterprise bolster workplace security, data security, and compliance, contact us! Our team will be more than happy to provide you with an in-depth look at our security practices and provide you with full key documents like SOC-2 reports and more to help provide you peace of mind.