Efficient guarding with software

July 2015 Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management

The degree of success of a guarding company is largely determined by the degree of efficiency with which the company’s guard force is applied to the requirements of the company’s clients. The process of ensuring the efficiency may be called workforce management.

100% efficiency with regard to guard force utilisation would mean that the correct numbers of guards, of the correct grades are rostered and posted for the correct number of hours to the correct sites. Furthermore, there should be no overtime, no non-productive time, and each site should deliver the required percentage of profit. Obviously it is almost impossible to achieve 100% efficiency because of ever changing client requirements and guard complements, as well as varying degrees of unpredictability with regard to personnel behaviour. However, the closer a company can get to achieving the 100% efficiency target, the happier its clients will be and the lower the wage bill will be.

In order to achieve maximum efficiency with regard to guard-force utilisation, it is necessary to consider the following.

1. Contract management

It is essential that client contracts are initiated and maintained with the utmost care and accuracy. The current state of contracts determines the number of guards that are required at the current point in time. If contracts are not maintained, then either rosters or invoices, or both, could be incorrect.

It is equally important to ensure that all applicable staff members are notified of any contract changes.

2. Legislation with regard to wage determination

Wages are by far the biggest cost driver in the guarding industry and should therefore be given the most attention when it comes to controls.

The current legislation should be used to determine the most efficient shift pattern that should be used to roster and post guards. The most efficient shift pattern is the one according to which no overtime as well as no non-productive time is accumulated. Taking the current wage determination in South Africa into account, the most efficient shift pattern that can be used is one where a guard works four shifts on and is then off for two shifts. Some companies do however have a collective agreement whereby guards work six shifts on followed by three off shifts.

If the four-on-two-off shift pattern is being used, it is usually better to do the calculation of overtime on a weekly basis (after 48 hours) rather than on a monthly basis (after 208 hours). The reason for this is that a week is always seven days in duration, while some months are longer than others. If you are currently calculating overtime on a monthly basis, you will find that the overtime bill is a lot higher for a 31-day month than for a 30-day month. This problem goes away if you calculate overtime on a weekly basis. If, however, the six-on-three-off shift pattern is being used, then it is obviously preferable to calculate overtime on a monthly basis.

3. Number of guards needed to meet client requirements

It is very important to determine the correct number of guards (by grade and skill level) needed to meet the requirements of all client sites. The reasons for this are twofold.

Firstly, if there are too few guards then it would mean that some of the existing guards would have to work overtime in order to meet client requirements. This obviously has a negative effect on wage costs. Secondly, if there are too many guards then the company carries unnecessary costs with regard to basic wages, uniforms, provident funds, etc.

Naturally, the shift pattern used to roster guards determines the number of guards that are needed to cover all sites. The HR department should use these details to ensure that the correct numbers of the correct grades of guard should be employed, where possible, and that the correct grades of guard are employed when new guards are needed.

4. Complement of excess or spare guards

It is desirable to have a complement of excess or spare guards (usually by area, depending on the level of operational control). These excess guards should also be rostered according to the most efficient shift pattern. The reasons for the excess complement are threefold.

i. Firstly, to be used as relievers when guards go on leave.

ii. Secondly, to take the places of guards that are AWOL or sick during a specific shift.

iii. Thirdly, to be used to cover ad hoc or temporary requirements that occur from time to time.

It is important that the company decide on an acceptable percentage of guards that should fulfil this role.

5. Tendering

When preparing a tender or quotation for a specific client, it is obviously necessary to consider the following:

i. What exactly the client requires in terms of numbers of posts, grade requirements and shift patterns to be used,

ii. What the actual cost to company would be to meet these requirements as efficiently as possible,

iii. What the required wage-to-revenue percentage should be on the site.

6. The rostering cycle

Historically, rostering has been carried out as a manual process without taking all the components of efficiency into account. It is suggested that rostering should really be carried out in a cycle with each iteration of the cycle being used to increase the efficiency of the roster. In this way a company can ensure maximum efficiency with regard to the utilisation of the guard force by rostering the correct number of guards of the correct grades for the correct number of hours at the correct sites.

Furthermore, the roster should ensure that overtime and non-productive time is limited as much as possible and that rostered wage-to-revenue percentages will provide the desired profits.

7. Operational control

All the above-mentioned steps which should be followed to plan for maximum efficiency in the utilisation of a guard force would be worthless if a company did not have effective operational control. Rostering or planning is only one step in the operational process. Once an efficient roster has been compiled, it is imperative that operational managers at all levels ensure that the roster is followed by guards as much as is possible. This includes ensuring that sites are neither over-posted nor under-posted. Otherwise, the effect of all the efficiency planning would be negligible.

Wherever guards do not work according to the roster, rostered excess guards should be used as relief in order to minimise the cost of exceptions. Making use of biometric devices, either mobile in supervisory vehicles, or static at sites, makes the registration of attendance far more accurate than relying on manual reporting procedures. Other than that, this technology enables real-time reporting which obviously enables operational management to rectify any attendance issues immediately.

Payroll

Ideally, the payroll should be generated from the attendance details that have been captured and checked for accuracy by operational managers who have also ensured that there are no over- or under-postings at sites. In this way, the correctness and minimisation of the payroll can be ensured.

Invoicing

Ideally, invoicing should be generated from the attendance details that have been captured and checked for accuracy by operational managers who have also ensured that there are no over- or under-postings at sites. In this way, the correctness and completeness of invoices can be ensured.

As can be determined from the discussion above, there are quite a number of issues that should be taken into account when managing a workforce in a guarding company. Some guarding companies seem to be of the opinion that a simple time-and-attendance system would solve their wage problem. This is definitely not the case. The main contributors to a minimised wage bill are efficient planning and operational control (which obviously includes time and attendance).

It is almost impossible to make the correct management decisions with regard to the above-mentioned issues without the use of a management tool which provides the necessary information to help in the decision-making process. EasyRoster is used by a large number of guarding companies to ensure that guarding operations are planned and controlled efficiently.

For more information contact neaMetrics, 0861 632 638, [email protected], www.neametrics.com

EasyRoster, +27 (0)12 809 4270, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Taking fire safety seriously
G2 Fire Editor's Choice Fire & Safety Security Services & Risk Management
To gain insights into how fire systems must be designed, installed and maintained, SMART Security Solutions asked Nichola Allan, MD of G2 Fire, for some insights into the local fire market.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Innovation and security go hand in hand
Technews Publishing Facilities & Building Management Security Services & Risk Management
In a world where the demand for tech innovation is matched only by the acceleration of cybersecurity threats, businesses face the challenge of balancing new product development and robust security measures.

Read more...