{"id":2907,"date":"2016-02-02T20:47:14","date_gmt":"2016-02-02T20:47:14","guid":{"rendered":"\/?p=2907"},"modified":"2016-03-29T21:33:28","modified_gmt":"2016-03-29T21:33:28","slug":"can-the-company-provide-proof-that-the-work-is-being-done","status":"publish","type":"post","link":"https:\/\/securityprosbend.com\/2016\/02\/can-the-company-provide-proof-that-the-work-is-being-done\/","title":{"rendered":"Can the company provide proof that the work is being done?"},"content":{"rendered":"

We use an Electronic Verification\u00a0System (EVS)\u00a0that records the exact date and time that we were at your location.\u00a0 This tamper-proof system provides you with verification that we are performing the agreed to services.\u00a0\u00a0Our custom NFC Tags\u00a0will be positioned at all checkpoint locations (doors, gates, parking lots, buildings, etc.) ensuring that we\u2019ve completed the security work required to fully protect your property\u2026.no other security firm in Central Oregon provides you with this level accountability.\u00a0 You will receive PROOF of the work being done – Total accountability in security by a company protecting over $1,000,000,000.00 (ONE BILLION DOLLARS) in client assets\u2026no one else even comes close!<\/p>\n","protected":false},"excerpt":{"rendered":"

We use an Electronic Verification\u00a0System (EVS)\u00a0that records the exact date and time that we were at your location.\u00a0 This tamper-proof system provides you with verification that we are performing the agreed to services.\u00a0\u00a0Our custom NFC Tags\u00a0will be positioned at all checkpoint locations (doors, gates, parking lots, buildings, etc.) ensuring that we\u2019ve completed the security work […]<\/p>\n","protected":false},"author":3,"featured_media":2932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"xn-wppe-expiration":[],"xn-wppe-expiration-action":[],"xn-wppe-expiration-prefix":[]},"categories":[41],"tags":[],"_links":{"self":[{"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/posts\/2907"}],"collection":[{"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/comments?post=2907"}],"version-history":[{"count":0,"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/posts\/2907\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/media\/2932"}],"wp:attachment":[{"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/media?parent=2907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/categories?post=2907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityprosbend.com\/wp-json\/wp\/v2\/tags?post=2907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}