Why exceptions matter
At access points, most interactions follow routine checks. Exceptions are the moments when routine does not fit: a person cannot prove authorization, instructions conflict, or behavior suggests risk. Handling exceptions well means two things at once: (1) protect people and property, and (2) keep service professional and predictable. This chapter focuses on what to do in non-routine situations without re-teaching standard verification or visitor workflows.
(1) Common exceptions and how to handle them
No ID or missing credential
Concept: “No ID” is not automatically malicious, but it removes your ability to confirm authorization. Treat it as an unverified request, not a personal failure.
Step-by-step response:
- Pause entry: Do not allow tailgating or “just this once.”
- State the requirement: “I can’t allow access without an approved credential.”
- Offer options: retrieve ID, contact host/tenant for confirmation, use designated alternative process if approved by policy.
- Control the space: direct the person to a waiting area that does not block traffic or create pressure on the checkpoint.
- Escalate if needed: if the person refuses to comply or becomes agitated, move to deny-entry protocol and escalation paths below.
Expired credential
Concept: An expired credential is a clear rule boundary. Your role is to enforce the boundary consistently while providing a safe next step.
Step-by-step response:
- Listen to the audio with the screen off.
- Earn a certificate upon completion.
- Over 5000 courses for you to explore!
Download the app
- Confirm what you see: check the date and the credential type (badge, pass, digital token).
- Explain the impact: “This credential is expired, so it’s not valid for entry.”
- Provide next steps: direct to renewal point (security office, management, HR, credentialing desk) or host confirmation if policy allows temporary authorization.
- Watch for pressure tactics: “I’m late,” “I come here every day,” “Your coworker lets me in.” Acknowledge, then restate the rule and options.
Unlisted visitor (not on expected list / no appointment found)
Concept: Unlisted does not equal unauthorized, but it means you cannot confirm the visit through normal channels. The risk is allowing entry based on persuasion rather than verification.
Step-by-step response:
- Hold at the access point and prevent entry beyond the controlled line.
- Check for common causes: wrong building, wrong tenant, name spelling, time mismatch.
- Contact the host/tenant using approved contact methods (directory, internal phone list), not numbers provided by the visitor if that is against policy.
- If host confirms: follow the approved exception workflow (e.g., temporary authorization) and document the confirmation source.
- If host cannot be reached: deny entry with clear next steps (reschedule, return with confirmation, contact management).
Conflicting instructions (host says “let them in,” policy says “no”)
Concept: Conflicts happen between convenience and control. Your job is to follow the highest-authority instruction: legal requirements, site policy, and safety rules override informal requests.
Step-by-step response:
- Identify the conflict clearly: “I have a request to allow entry, but policy requires X.”
- Do not negotiate policy at the gate: keep the conversation short and procedural.
- Escalate to the right authority: supervisor or property management for a policy exception decision.
- Document the decision: who authorized, when, and what conditions (escort required, limited access areas).
Suspicious behavior (inconsistent story, probing, surveillance, aggression)
Concept: Suspicion is based on observable indicators, not personal characteristics. Focus on behavior and context: inconsistent explanations, repeated attempts, avoiding cameras, testing doors, watching staff routines, refusing reasonable instructions, or escalating quickly.
Immediate safety steps:
- Increase distance and barriers: keep a counter, door, or stanchion between you and the person when possible.
- Slow the interaction: ask short, factual questions; avoid arguments.
- Signal for support early: use radio/code word/panic device per site practice.
- Limit information: do not reveal schedules, staff names, or security details.
(2) Deny-entry protocol: calm, safe, and clear
Core principles
- Professional tone: calm voice, neutral wording, no sarcasm.
- Safety first: maintain space, keep an exit route, avoid being cornered.
- Clarity: short explanation, one rule, one next step.
- Consistency: apply the same standard to everyone to reduce arguments.
Step-by-step deny-entry script (adapt to your site)
State the decision: “I can’t allow entry right now.”
State the reason in policy terms (not personal judgment): “Entry requires a valid credential/host confirmation.”
Offer the next step: “You can (a) retrieve your ID, (b) contact your host to meet you here, or (c) return after your credential is renewed.”
Set the boundary: “Please remain on this side of the line while we sort it out.”
Close the loop: “If you choose not to follow these steps, I will need to call a supervisor.”
Safe positioning checklist
- Stand at an angle rather than directly squared-off.
- Keep hands visible; avoid pointing or sudden movements.
- Maintain a reactionary gap; do not step closer to “prove authority.”
- Do not block the person’s exit; allow them a clear path to leave.
- Use physical barriers (counter, gate, door) when available.
(3) Escalation paths: who to call and when
Escalation is a tool, not a punishment
Escalate to bring the right authority to the decision, to reduce risk, or to prevent a situation from becoming unsafe. Escalate early when you see warning signs; do not wait for a confrontation.
Decision guide: when to call whom
| Situation | Primary call | Secondary call | Notes |
|---|---|---|---|
| Policy exception request (e.g., host wants override) | Supervisor | Property management | Do not approve exceptions yourself unless authorized. |
| Unlisted visitor; host unreachable | Tenant/host office line | Supervisor | Keep visitor outside controlled area. |
| Repeated attempts, probing questions, suspicious behavior | Supervisor / on-site security lead | Property management | Increase observation; preserve camera view. |
| Threats, attempted forced entry, physical aggression | Emergency services (per local procedure) | Supervisor | Prioritize life safety; follow site emergency plan. |
| Medical emergency at the access point | Emergency services | Supervisor | Separate medical response from access decision. |
| Domestic dispute / stalking concern at entry | Supervisor | Emergency services if imminent threat | Use privacy and safety protocols; avoid sharing victim info. |
Escalation communication template (radio/phone)
Keep messages short and factual. Use a consistent structure:
WHO you are: “Front desk, [name].”
WHERE: “Main lobby access point.”
WHAT: “Unlisted visitor requesting entry to Suite 1200; no ID; refusing to wait.”
RISK: “Raising voice; moving toward the gate.”
REQUEST: “Need supervisor assistance and guidance on denial.”(4) Conflict management at access points
Verbal de-escalation: practical techniques
- Use the “acknowledge + rule + option” pattern: “I understand you’re in a hurry. The rule is valid ID is required. Your options are to retrieve it or call your host.”
- Lower the temperature: slower speech, fewer words, neutral facial expression.
- Ask choice-based questions: “Would you like to call your host, or return with your ID?” Choices reduce arguing.
- Repeat the boundary consistently: repetition signals stability and reduces debate.
- Move the audience: if a crowd forms, direct the person to a side area to reduce performance pressure.
Boundary setting without provocation
- Use “I” statements tied to policy: “I can’t open the gate without authorization.”
- Describe behavior, not character: “Please stop stepping past the line,” not “You’re being aggressive.”
- Set consequences calmly: “If you continue, I will call a supervisor.”
Avoid escalation triggers
- Do not argue about fairness; restate policy and options.
- Do not threaten, mock, or use sarcasm.
- Do not match volume or posture.
- Do not disclose security details (“the camera is here,” “we’re short-staffed”).
- Do not touch the person unless required for immediate safety and you are trained/authorized.
(5) Post-event actions: what to do after the situation
Immediate after-action steps
- Reset the access point: ensure doors/gates are secured, lines are restored, and normal flow resumes.
- Check on people: if staff or visitors were distressed, notify a supervisor and follow welfare procedures.
- Preserve evidence: note camera locations and time window; do not overwrite or tamper with recordings.
Documentation and evidence preservation (event-focused)
Write down facts while they are fresh. Focus on what you observed and did, not assumptions.
- Timeline: start time, key moments, end time.
- Identifiers: description, vehicle plate (if applicable), names provided (mark as “stated”).
- Exact phrases: threats or key statements in quotes.
- Actions taken: denial steps, who was called, instructions received.
- Witnesses: staff names, visitor names, contact info if policy permits.
- Media: camera IDs, screenshots per policy, incident reference number.
Follow-up improvements (turn incidents into prevention)
- Identify the failure point: unclear instructions, outdated access lists, weak signage, staffing gaps, confusing queue layout.
- Propose a fix: updated contact list, clearer exception workflow, improved waiting area, better lighting/camera angle.
- Share lessons: brief the next shift on patterns (e.g., repeated attempts by same person) using approved channels.
Scenario-based decision trees for typical dilemmas
Decision tree 1: “No ID” at a staffed lobby
START: Person requests entry but has no ID/credential.
|
|-- Is there an approved alternative verification method on-site? (Yes/No)
|
|-- NO --> Deny entry + provide next steps (retrieve ID / return) --> Document if unusual.
|
|-- YES --> Can host/tenant be contacted via approved channel now? (Yes/No)
|
|-- YES --> Host confirms identity + authorization? (Yes/No)
| |
| |-- YES --> Allow per exception workflow (escort/limited access if required) --> Record who confirmed.
| |
| |-- NO --> Deny entry --> If person argues/refuses, escalate to supervisor.
|
|-- NO --> Deny entry --> Offer waiting area --> If agitation increases, call supervisor.Decision tree 2: Expired badge for a regular contractor
START: Contractor presents badge; it is expired.
|
|-- Is there a documented grace/temporary authorization policy? (Yes/No)
|
|-- NO --> Deny entry --> Direct to credential renewal contact --> Notify supervisor if work is time-critical.
|
|-- YES --> Can the contractor's sponsor/manager confirm and accept responsibility now? (Yes/No)
|
|-- YES --> Supervisor/authorized party approves temporary access? (Yes/No)
| |
| |-- YES --> Issue temporary access per policy (escort/area limits) --> Record approval.
| |
| |-- NO --> Deny entry --> Provide next steps.
|
|-- NO --> Deny entry --> Reschedule/return after renewal.Decision tree 3: Unlisted visitor claims “host told me to come”
START: Visitor not on list; claims appointment.
|
|-- Can you locate host/tenant in directory and call using approved number? (Yes/No)
|
|-- NO --> Escalate to supervisor/property management for guidance --> Deny entry until verified.
|
|-- YES --> Host reached? (Yes/No)
|
|-- YES --> Host confirms visit? (Yes/No)
| |
| |-- YES --> Proceed with approved exception workflow --> Note confirmation.
| |
| |-- NO --> Deny entry --> If visitor persists, escalate.
|
|-- NO --> Offer waiting area + retry for a defined time window --> If still unreachable, deny entry.Decision tree 4: Conflicting instructions (host demands override)
START: Host/tenant requests entry that conflicts with policy.
|
|-- Is the policy a hard requirement (legal/safety/contractual)? (Yes/No)
|
|-- YES --> Do not override --> Escalate to supervisor/property management --> Deny entry until resolved.
|
|-- NO --> Is there an authorized exception approver available now? (Yes/No)
|
|-- YES --> Obtain explicit approval + conditions (escort, limits) --> Proceed and document.
|
|-- NO --> Deny entry temporarily --> Provide next steps and expected response time.Decision tree 5: Suspicious behavior at the gate
START: Person shows suspicious indicators (probing, inconsistent story, refuses instructions).
|
|-- Is there an immediate threat (weapon shown, forced entry attempt, assault)? (Yes/No)
|
|-- YES --> Move to safety + trigger emergency response per site plan --> Notify supervisor.
|
|-- NO --> Increase distance/barriers + keep person outside controlled line.
|
|-- Can the situation be resolved through normal verification quickly? (Yes/No)
|
|-- YES --> Verify; if verified, allow with awareness; if not verified, deny entry.
|
|-- NO --> Call supervisor early --> Continue calm denial script --> Preserve camera coverage.