Frequently Asked Questions
Welcome! Below you'll find our categorized FAQ to help you find answers to common questions about Good2Go and its products.
If you have additional questions, please contact our sales team.
How does Good2Go prevent crime and misuse?
Good2Go requires a mobile device to generate a one-time digital credential, creating accountability through a unique digital ID for every entry. This digital footprint deters theft, vandalism, and other misuse.
How is Good2Go more secure than keys and punch codes?
Keys can be lost or copied, and punch codes are easily shared. Good2Go replaces them with single-use, digital credentials that can’t be reused, shared, or duplicated.
Can Good2Go identify and block bad actors?
Yes. Good2Go logs device and network identifiers to create a digital ID (e.g., IP address, browser/device fingerprint). If suspicious activity is detected, the device can be restricted. Working with your security team, we can identify flagged devices using footage or event logs.
How does Good2Go prevent QR code tampering?
Good2Go uses layered protection:
Tamper-evident signage in acrylic frames makes interference visibly clear.
Backend monitoring detects abnormal scan patterns that may indicate a fake QR code.
Clear signage reminds users that Good2Go never asks for personal or payment info.
Simple visual checks by staff can easily confirm authenticity.
Together, these layers make tampering highly unlikely.
.png)