Effective rostering improves ­security, reduces costs

April 2016 Asset Management, EAS, RFID, Security Services & Risk Management

The degree of success of a guarding company is largely determined by the degree of efficiency with which the company’s guard force is applied to the requirements of the company’s clients. The process of ensuring the efficiency may be called workforce management.

EasyRoster is a very important tool which can be used to provide the information which is required by workforce managers to achieve their efficiency objectives.

It is almost impossible to achieve 100 percent efficiency because of ever-changing client requirements and guard complements, as well as varying degrees of unpredictability with regard to personnel behaviour. However, the closer a company can get to achieving the 100 percent efficiency target, the happier its clients will be and the lower the wage bill will be.

In order to achieve maximum efficiency with regard to guard force utilisation, it is necessary to consider the following points:

• Contract management.

• Legislation with regard to wage determination.

• Number of guards needed to meet client requirements,

• Complement of excess or spare guards.

• Tendering.

• The rostering cycle.

• Operational control.

• Payroll.

Contract management

It is essential that client contracts are initiated and maintained with the utmost care and accuracy. The current state of contracts determines the number of guards that are required at the current point in time. If contracts are not maintained, then either rosters or invoices, or both, could be incorrect. This could be that either too many or too few guards are posted to sites, or in extreme cases, that guards are posted to sites where contracts have lapsed.

It is equally important to ensure that all applicable staff members are notified of any contract changes.

Wage legislation

Wages are by far the biggest cost driver in the guarding industry and should therefore be given the most attention when it comes to controls. The current legislation should be used to determine the most efficient shift pattern that should be used to roster and post guards. The most efficient shift pattern is the one according to which no overtime as well as no non-productive time is accumulated.

Number of guards required

It is important to determine the correct number of guards (by grade and skill level) needed to meet the requirements of all client sites. The reasons for this are twofold.

Firstly, if there are too few guards then it would mean that some of the existing guards would have to work overtime in order to meet client requirements. This obviously has a negative effect on wage costs.

Secondly, if there are too many guards then the company carries unnecessary costs with regard to basic wages, uniforms, provident funds, etc.

Naturally, the shift pattern used to roster guards determines the number of guards that are needed to cover all sites.

Complement of excess or spare guards

It is desirable to have a complement of excess or spare guards (usually by area, depending on the level of operational control). These excess guards should also be rostered according to the most efficient shift pattern. The reasons for the excess complement are threefold.

a. Firstly, to be used as relievers when guards go on leave.

b. Secondly, to take the places of guards that are AWOL or sick during a specific shift.

c. Thirdly, to be used to cover ad hoc or temporary requirements that occur from time to time.

It is important that the company decides on an acceptable percentage of guards that should fulfil this role. It is also important that these rostered excess guards be posted when there is a shortage of any nature, because that is what they are rostered to do. It is silly, and expensive, to post guards that are on their off shifts to fill shortages when there are rostered excess guards available for this purpose.

Tendering

When preparing a tender or quotation for a specific client, it is obviously necessary to consider the following:

a. What exactly the client requires in terms of numbers of posts, grade requirements and shift patterns to be used?

b. What the actual cost to company would be to meet these requirements as efficiently as possible?

c. What the required wage-to-revenue percentage should be on the site?

The rostering cycle

Historically, rostering has been carried out as a manual process without taking all the components of efficiency into account. Total efficiency with regard to guard force utilisation would mean that the correct numbers of guards, of the correct grades, are rostered and posted for the correct number of hours to the correct sites. Furthermore, there should be no overtime, no non-productive time, and each site should deliver the required percentage of profit.

Rostering should really be carried out in a cycle with each iteration of the cycle being used to increase the efficiency of the roster. This means that after the first iteration of the roster, checks should be done to determine whether there are any inefficiencies on the roster in terms of:

a. Under- or over-postings.

b. Under- or over-gradings.

c. Overtime.

d. Non-productive time.

e. Required profitability.

Once this is done, the above checks should be done again. And so the iterations should continue until the most efficient rosters have been created. Once this has been achieved, the master schedule should be saved and used again the next time rostering takes place so that the next rosters are already efficient, and only typically need to be checked and fixed in one iteration of the process.

Operational control

All the above-mentioned steps which should be followed to plan for maximum efficiency in the utilisation of a guard force would be worthless if a company did not have effective operational control. Rostering or planning is only one step in the operational process. Once an efficient roster has been compiled, it is imperative that operational managers at all levels ensure that the roster is followed by guards as much as is possible. This includes ensuring that sites are neither over-posted nor under-posted. Otherwise, the effect of all the efficiency planning would be negligible.

Making use of biometric devices, either mobile in supervisory vehicles, or static at sites, makes the registration of attendance far more accurate than relying on manual reporting procedures. Other than that, this technology enables real-time reporting which obviously enables operational management to rectify any attendance issues immediately.

Payroll

Ideally, the payroll should be generated from the attendance details that have been captured and checked for accuracy by operational managers who have also ensured that there are no over- or under-postings at sites. In this way, ‘ghost guards’ would be eliminated and the correctness and minimisation of the payroll can be ensured.

As can be determined from the discussion above, there are quite a number of issues that should be taken into account when managing a workforce in a guarding company.

Some guarding companies seem to be of the opinion that a simple time-and-attendance system would solve their wage problem. This is definitely not the case. The main contributors to a minimised wage bill are efficient planning and operational control (which obviously includes time and attendance).

EasyRoster is used by a large number of guarding companies throughout Africa and the Middle East to ensure that guarding operations are planned and controlled efficiently. EasyRoster Deployment Manager (ERDM) may be used as the interface between biometric devices and EasyRoster.

For more information contact EasyRoster, +27 (0)12 809 4270, info@easyroster.net, www.easyroster.net



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Reducing identity fraud with a selfie
Access & Identity Management Handbook 2020, Technews Publishing , Asset Management, EAS, RFID
Authenticating your identity remotely via an app has become a reality with a new solution from South African company iiDENTIFii.

Read more...
From physical security to cybersecurity
Access & Identity Management Handbook 2020, Genetec , Cyber Security, Security Services & Risk Management
Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.

Read more...
Biometrics in identity
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Security Services & Risk Management
With multiple identity providers offering to manage digital identities for the general public, the root identity – the single sovereign trusted identity upon which all others are based – must start with government.

Read more...
Security enhancements at Sharm El-Sheikh
November 2019 , Asset Management, EAS, RFID
ADANI Systems supplied the X-ray screening equipment, including combined high-energy and low-energy systems, for Sharm El-Sheikh.

Read more...
ContinuitySA offers ISO 22301 Lead Implementer course
October 2019, ContinuitySA , Training & Education, Security Services & Risk Management, Transport (Industry)
ContinuitySA is once again offer its five-day Certified ISO 22301 Lead Implementer course on 18-22 November 2019 at the company's Midrand facility.

Read more...
Preparing your data for PoPI
September 2019 , IT infrastructure, Security Services & Risk Management
When it comes to protecting any information, the way data is secured across the value chain needs to be addressed.

Read more...
A balanced, fair industry
October 2019, PSIRA (Private Security Ind. Regulatory Authority) , Residential Estate (Industry), Security Services & Risk Management, Associations
PSiRA is focused on supporting the effective promotion and regulation of the private security industry.

Read more...
SOAR an essential part for security operations
October 2019 , Editor's Choice, Cyber Security, Security Services & Risk Management
MJ Strydom, MD of cybersecurity specialist company DRS discusses the challenges around the security incident response lifecycle.

Read more...
The importance of body-worn cameras in the workplace
October 2019 , CCTV, Surveillance & Remote Monitoring, News, Security Services & Risk Management
South Africans have far more agency over their security than they have realised in the past.

Read more...
Increase in Business Email Compromise (BEC) attacks
October 2019 , Cyber Security, Security Services & Risk Management
A new Mimecast ESRA report finds millions of spam, tens of thousands of BEC or impersonation attacks, dangerous file types and malware attachments being delivered to users' inboxes.

Read more...