
Welcome to a modern approach
to continuous compliance.
It’s time to upgrade!
The modern approach
GATHER
Gather findings during a round on a mobile device by taking a photo of the finding and entering known information about its location with the option of connecting it to a relevant code and standard.
REPORT
Access reporting details about overall findings by logging on to Spotlight in a web browser, update individual findings and export the results for use in presentations and reporting.
ACT
Users with permissions can task individuals with actions needed to address findings as well as monitor the progress on the actions taken on all findings associated with their rounds.
ANALYZE
Access deep reporting that will allow the tracking of trends in improvement, surface opportunities for education and benchmark the facility and/or system
The traditional approach
HAND WRITTEN FINDINGS
Gather findings during a round on a mobile device by taking a photo of the finding and entering known information about its location with the option of connecting it to a relevant code and standard.
REPORT
Access reporting details about overall findings by logging on to Spotlight in a web browser, update individual findings and export the results for use in presentations and reporting.
ACT
Users with permissions can task individuals with actions needed to address findings as well as monitor the progress on the actions taken on all findings associated with their rounds.
ANALYZE
Access deep reporting that will allow the tracking of trends in improvement, surface opportunities for education and benchmark the facility and/or system

Tested, proven, secure.
Spotlight leverages Microsoft’s Azure infrastructure to ensure data security through encrypted communications, threat management and mitigation practices, including regular penetration testing.
Safe, secure, and ready.
SSL encrypted
All communication between Spotlight and the server is SSL encrypted.
World-class hosting environment
The hosting environment is architected using Microsoft Azure services.
Authorization filters
Every request for data from Spotlight passes through strict authorization filters to ensure proper user roles and access to the entities requested.
Protected files
All hosted files are protected by an access key to ensure that only Spotlight can retrieve them.
Private Data
All survey data is private and only accessible to Spotlight administrators and users that you provide with access.
Second factor security
New user invitations and password help in Spotlight utilize a second factor relying on the email address added to the account by an administrator.
Authentication credentials
Every feature of Spotlight requires strong authentication credentials.
Firewall protected
All communication to the Spotlight database is protected by a firewall to ensure only the website can access it.
Safeguarding and Securing the Data
Spotlight is committed to securing your data and keeping it confidential. Spotlight will never share your identifiable data with a third party.