Skip to content Skip to footer

Loading Results

Thank you for your submission

Please use the link below to download the eBook. 


For more information about Check-In, read more here.

Respects user privacy

We place user protection, privacy and trust above everything else. Access and retention controls further protect users and their data.

Uses tech you already have

Check-In is accessible on laptops, desktops, Android and IOS and does not require VPN. No additional hardware is required, and using location services for proximity measures means less battery drain on devices.

Provides data transparency for users

Assess risks with an encrypted record of self-reporting. Access precise proximity information with no incremental hardware or infrastructure.