T&A the right way

September 2016 Access Control & Identity Management, Integrated Solutions, Industrial (Industry)

Time and attendance (T&A) systems track and manage employee check-in and check-out times, meal-time, vacations and absences. Traditional T&A systems were based on a manual recording process, where employees recorded their time and schedule information on various manual recording devices from paper to punch cards and even computers.

The data gathered from such records would be processed by managers and then salaries calculated based on this information. This process is deemed very inefficient due to the long hours it takes for managers to process such data. Furthermore, such processes suffered from inaccuracy and lack of reliability from data input errors, calculation errors or scamming activities that arise from using human resources.

The implementation of an automated time and attendance system resolves the previously mentioned issues by greatly reducing errors that may occur during the collection and calculation stages. It allows for simpler management of the workforce as they can easily be grouped and attendance rules such as work hours, breaks, absences, meal time etc. can be applied accordingly. Furthermore, reports can be generated on demand as processing and calculation of such data is done automatically.

The largest threat to your T&A system is ‘buddy punching’, which means another person records time for a person. Workforce waste, overpaid payroll, and cheating the clock is increasing annually across the globe because of buddy punching. Buddy punching means that a fellow employee records time in place of the actual employee, and an ordinary time and attendance system, which uses credentials such as cards, PIN, or passwords, cannot prevent buddy punching because credentials can be shared.

By combining the T&A system with biometric technology, buddy punching is prevented resulting in efficient management with associated decreases in costs. Furthermore, it provides more security than card, FoB, PIN and passwords. Suprema’s BioStar 2 linked with Suprema’s latest fingerprint recognition devices allow you to efficiently and professionally manage an organisation’s human resources. You can also prevent authorisation using forged fingerprints if you use the Live Finger Detection (LFD) feature on some of Suprema’s latest fingerprint recognition devices.

T&A redesigned

BioStar 2’s T&A management system features Pay Codes, Shifts, Schedules, Schedule Templates, and Overtime Rules. The Time Card and Report features can be used to edit or print out individual time and attendance records as reports.

Structure-wise, BioStar 2 T&A and BioStar 1 T&A may look similar. However, BioStar 2 T&A simplifies the complicated configuration of BioStar 1 T&A and increases the flexibility of the functions to allow for diverse configurations.

BioStar 2’s T&A System isn’t merely an employee check-in and check-out tracking system. It also allows for other employee payroll events to be tracked, for example; work, breaks, meals, leave types and times. Furthermore, time and attendance records edited by the administrator can be seen in a single glance.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Quality fire detection installation at Baywear Clothing
G2 Fire Fire & Safety Industrial (Industry) Products & Solutions
JZL Projects and Solutions was asked to provide a comprehensive yet cost-effective and reliable fire detection solution for Baywear Clothing that would be installed with minimum disruption to the factory.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...