Access control and T&A in education­

January 2015 Education (Industry), Access Control & Identity Management

In the modern day and age that we live in, certain aspects of daily life have become important to control, monitor and measure. Two of those aspects are who has access to our education facilities and whether our educators and students are attending to their responsibilities in the education system.

To be able to achieve this we utilise systems and procedures to manage these processes. Historically this would consist of attendance registers and clock card systems, but due to the unique challenges we face and the advancement of technology it has become necessary to deploy newer and more advanced systems that negates many of the possible loopholes as well as automating management and reporting to a large degree.

This management is done in three basic ways. First would be something that we have – a key or a proximity card of some type. Second would be something that we know – typically a password or key pin. Third and last is something that we are – biometric measurements of unique physical attributes of the human body.

The first and second (something we know or something we have) is problematic as the knowledge or device can be shared with a third-party person. In time and attendance (T&A) parlance, we speak about buddy-clocking. This is not a uniquely South African issue, but it certainly is rife with both government and commercial entities reporting massive financial losses due to ghost employees and buddy-clocking.

The advantage that biometrics have over these systems are that a fingerprint or facial characteristic cannot be shared with another person thereby nullifying the buddy-clocking phenomenon. This however does not mean that biometrics are immune to any form of fraud or circumvention.

As with anything in life, not all devices are equal. Facial recognition systems are prone to rejecting users due to facial changes that occur in the course of daily life i.e. spectacles, facial hair etc. Generally, facial recognition is not seen as a mature stand-alone technology.

Fingerprint biometrics too has a vulnerability of being by-passed. The reasons for this are mainly two-fold.

Firstly, fingerprint scanners are divided into levels. Level 1 being very basic in its operation therefore they have a massive vulnerability to spoof or fake fingerprints. They are however, cheap and very inviting to the end user because of this.

Level 2 fingerprint scanners are much more intrinsic with technologies built into them to stop the use of fake or spoof fingerprints and also processes that determine whether a fingerprint belongs to an actual living breathing human being. Level 2 fingerprint scanners are much more expensive but they tend to last longer than their cheaper counterparts do, and over the long run amortises the capital expenditure better than Level 1 scanners. Secondly, build quality is an issue. Cheaper units tend to have a very limited operational lifespan resulting in false rejections, frustrations by users and eventually, replacement of the units.

When considering a biometric system the end-user must look at build quality, technologies and processes built into the device to minimise weaknesses and loopholes, but, as important as the previous, that the devices adhere and conform to labour relations and privacy legislation. The end-user must ensure that the device complies with the POPI Act (Protection of Personal Information Act 4 of 2013). Once the aforementioned conditions are met, the end-user will have a system that is correct for his application.

For more information contact Deon van Rensburg, Virdi Distribution, +27 (0)82 820 0887, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Gallagher launches Tech Talk
Gallagher News Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher has announced the launch of its new Security in Focus podcast series called Tech Talk, hosted by chief technology officer Steve Bell.

IDEMIA and Ideco demonstrate their value stacks
Technews Publishing Ideco Biometrics IDEMIA Conferences & Events Access Control & Identity Management News
Ideco and IDEMIA recently hosted a travelling show where attendees were given an update on the companies, as well as the full value stack they offer.

Have biometrics changed the way mines operate?
ZKTeco Mining (Industry) Access Control & Identity Management
The mining industry continues to improve conditions for mine workers, striving for zero harm, however, innovations which improve worker safety and increase operational efficiency are still needed.

CathexisVision integrated with Suprema’s BioStar2
Technews Publishing News Access Control & Identity Management Integrated Solutions
This integration uses BioStar2 access control events to trigger automated actions on the CathexisVision system, including alerts, recording a camera and commands such as locking and unlocking doors, and clearing an alarm.

Linux-based biometric access control
ZKTeco Products Access Control & Identity Management
The SpeedFace M4 is a Linux-based multi-biometric access control and time attendance terminal with visible light facial recognition and palm verification.

Paxton promotes Dan Drayton
News Access Control & Identity Management Integrated Solutions
Dan Drayton has been promoted to divisional director – EMEA Sales Region for Paxton, the international security technology manufacturer.

Salient Systems manages campus security
Education (Industry) CCTV, Surveillance & Remote Monitoring Access Control & Identity Management
The University of Massachusetts Amherst relies on Salient Systems for video, access control operations for flagship campus as it standardises on IP surveillance.

QR Code passwordless authentication method
News Access Control & Identity Management Products
LogMeOnce introduces a patented QR Code passwordless authentication method allowing users to scan a code with their mobile device for secure authentication.

Improving biometrics to address privacy, scale and accuracy
Editor's Choice Access Control & Identity Management News
CryptoNets uses artificial intelligence and a new type of encryption; it is very fast, locating a face among countless others in milliseconds without the need to have any other data to narrow the search.

Gallagher announces ISO 27001 certification
Gallagher News Access Control & Identity Management
Gallagher has announced it has achieved ISO 27001 accreditation, a standard that ensures organisations protect their information in a systematic and efficient way, through a comprehensive Information Security Management System (ISMS).