Access control and T&A in education­

January 2015 Education (Industry), Access Control & Identity Management

In the modern day and age that we live in, certain aspects of daily life have become important to control, monitor and measure. Two of those aspects are who has access to our education facilities and whether our educators and students are attending to their responsibilities in the education system.

To be able to achieve this we utilise systems and procedures to manage these processes. Historically this would consist of attendance registers and clock card systems, but due to the unique challenges we face and the advancement of technology it has become necessary to deploy newer and more advanced systems that negates many of the possible loopholes as well as automating management and reporting to a large degree.

This management is done in three basic ways. First would be something that we have – a key or a proximity card of some type. Second would be something that we know – typically a password or key pin. Third and last is something that we are – biometric measurements of unique physical attributes of the human body.

The first and second (something we know or something we have) is problematic as the knowledge or device can be shared with a third-party person. In time and attendance (T&A) parlance, we speak about buddy-clocking. This is not a uniquely South African issue, but it certainly is rife with both government and commercial entities reporting massive financial losses due to ghost employees and buddy-clocking.

The advantage that biometrics have over these systems are that a fingerprint or facial characteristic cannot be shared with another person thereby nullifying the buddy-clocking phenomenon. This however does not mean that biometrics are immune to any form of fraud or circumvention.

As with anything in life, not all devices are equal. Facial recognition systems are prone to rejecting users due to facial changes that occur in the course of daily life i.e. spectacles, facial hair etc. Generally, facial recognition is not seen as a mature stand-alone technology.

Fingerprint biometrics too has a vulnerability of being by-passed. The reasons for this are mainly two-fold.

Firstly, fingerprint scanners are divided into levels. Level 1 being very basic in its operation therefore they have a massive vulnerability to spoof or fake fingerprints. They are however, cheap and very inviting to the end user because of this.

Level 2 fingerprint scanners are much more intrinsic with technologies built into them to stop the use of fake or spoof fingerprints and also processes that determine whether a fingerprint belongs to an actual living breathing human being. Level 2 fingerprint scanners are much more expensive but they tend to last longer than their cheaper counterparts do, and over the long run amortises the capital expenditure better than Level 1 scanners. Secondly, build quality is an issue. Cheaper units tend to have a very limited operational lifespan resulting in false rejections, frustrations by users and eventually, replacement of the units.

When considering a biometric system the end-user must look at build quality, technologies and processes built into the device to minimise weaknesses and loopholes, but, as important as the previous, that the devices adhere and conform to labour relations and privacy legislation. The end-user must ensure that the device complies with the POPI Act (Protection of Personal Information Act 4 of 2013). Once the aforementioned conditions are met, the end-user will have a system that is correct for his application.

For more information contact Deon van Rensburg, Virdi Distribution, +27 (0)82 820 0887, deon@virditech.co.za, www.virditech.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Wireless access control technology
Residential Estate Security Handbook 2020, Salto Systems Africa , Products, Access Control & Identity Management
SALTO has released the NEO Cylinder for doors where fitting an electronic escutcheon is not possible or required.

Read more...
Secure touchless access
Residential Estate Security Handbook 2020, Suprema , Products, Access Control & Identity Management
Suprema’s facial biometric terminals bring no-touch access into secure residential estates, high-rise apartments and luxury homes. Secure touchless access.

Read more...
Frictionless fingerprint access
Residential Estate Security Handbook 2020, IDEMIA , Products, Access Control & Identity Management
The MorphoWave Compact acquires four fingers in 3D for maximum accuracy, with one pass of the hand over the sensor.

Read more...
New products from Boomgate
Residential Estate Security Handbook 2020, BoomGate Systems , Products, Access Control & Identity Management
Boomgate Systems has capitalised on its 21 years of design and manufacturing experience and come up with a range of new products.

Read more...
Facial and palm verification terminal
Residential Estate Security Handbook 2020 , Products, Access Control & Identity Management
Upgraded touchless terminal supports both facial and palm verification with large capacity and speedy recognition, as well as improved performance.

Read more...
Outdoor access terminals
Residential Estate Security Handbook 2020, Suprema , Products, Access Control & Identity Management
Most residential estates require rugged, dust- and weather-proof access control solutions that provide exceptional durability and superior performance in extreme conditions.

Read more...
The future of biometrics
Issue 3 2020, ViRDI Distribution SA , Access Control & Identity Management
Deon Janse Van Rensburg discusses the impact of COVID-19 on the biometric market and how it may change biometrics in the future.

Read more...
Round table: Secure identification and authentication
Issue 3 2020, Technews Publishing, Dahua Technology South Africa, Suprema, neaMetrics, ViRDI Distribution SA, ZKTeco , Editor's Choice
Hi-Tech Security Solutions hosted a round-table specifically to look at what is happening in the world of secure identity verification and authentication.

Read more...
Keeping up with technology
Issue 2 2020, Vox Telecom , Education (Industry)
Security transformation is just as important as digital transformation in the education sector.

Read more...
Obtain intelligence from cameras
Issue 2 2020, Secutel Technologies , Education (Industry)
The SecuVue platform can turn ordinary cameras into intelligent sources of information and also extend the ability to detect potential intrusion.

Read more...