He reviews his access control logs to see whose card was being used to try to enter. Unfortunately, he has no way of confirming whether that person actually was attempting entry or someone else was using the person’s card because the corporation’s video system is not integrated with its access control system.