Effective rostering improves ­security, reduces costs

April 2016 Asset Management, Security Services & Risk Management

The degree of success of a guarding company is largely determined by the degree of efficiency with which the company’s guard force is applied to the requirements of the company’s clients. The process of ensuring the efficiency may be called workforce management.

EasyRoster is a very important tool which can be used to provide the information which is required by workforce managers to achieve their efficiency objectives.

It is almost impossible to achieve 100 percent efficiency because of ever-changing client requirements and guard complements, as well as varying degrees of unpredictability with regard to personnel behaviour. However, the closer a company can get to achieving the 100 percent efficiency target, the happier its clients will be and the lower the wage bill will be.

In order to achieve maximum efficiency with regard to guard force utilisation, it is necessary to consider the following points:

• Contract management.

• Legislation with regard to wage determination.

• Number of guards needed to meet client requirements,

• Complement of excess or spare guards.

• Tendering.

• The rostering cycle.

• Operational control.

• Payroll.

Contract management

It is essential that client contracts are initiated and maintained with the utmost care and accuracy. The current state of contracts determines the number of guards that are required at the current point in time. If contracts are not maintained, then either rosters or invoices, or both, could be incorrect. This could be that either too many or too few guards are posted to sites, or in extreme cases, that guards are posted to sites where contracts have lapsed.

It is equally important to ensure that all applicable staff members are notified of any contract changes.

Wage legislation

Wages are by far the biggest cost driver in the guarding industry and should therefore be given the most attention when it comes to controls. The current legislation should be used to determine the most efficient shift pattern that should be used to roster and post guards. The most efficient shift pattern is the one according to which no overtime as well as no non-productive time is accumulated.

Number of guards required

It is important to determine the correct number of guards (by grade and skill level) needed to meet the requirements of all client sites. The reasons for this are twofold.

Firstly, if there are too few guards then it would mean that some of the existing guards would have to work overtime in order to meet client requirements. This obviously has a negative effect on wage costs.

Secondly, if there are too many guards then the company carries unnecessary costs with regard to basic wages, uniforms, provident funds, etc.

Naturally, the shift pattern used to roster guards determines the number of guards that are needed to cover all sites.

Complement of excess or spare guards

It is desirable to have a complement of excess or spare guards (usually by area, depending on the level of operational control). These excess guards should also be rostered according to the most efficient shift pattern. The reasons for the excess complement are threefold.

a. Firstly, to be used as relievers when guards go on leave.

b. Secondly, to take the places of guards that are AWOL or sick during a specific shift.

c. Thirdly, to be used to cover ad hoc or temporary requirements that occur from time to time.

It is important that the company decides on an acceptable percentage of guards that should fulfil this role. It is also important that these rostered excess guards be posted when there is a shortage of any nature, because that is what they are rostered to do. It is silly, and expensive, to post guards that are on their off shifts to fill shortages when there are rostered excess guards available for this purpose.

Tendering

When preparing a tender or quotation for a specific client, it is obviously necessary to consider the following:

a. What exactly the client requires in terms of numbers of posts, grade requirements and shift patterns to be used?

b. What the actual cost to company would be to meet these requirements as efficiently as possible?

c. What the required wage-to-revenue percentage should be on the site?

The rostering cycle

Historically, rostering has been carried out as a manual process without taking all the components of efficiency into account. Total efficiency with regard to guard force utilisation would mean that the correct numbers of guards, of the correct grades, are rostered and posted for the correct number of hours to the correct sites. Furthermore, there should be no overtime, no non-productive time, and each site should deliver the required percentage of profit.

Rostering should really be carried out in a cycle with each iteration of the cycle being used to increase the efficiency of the roster. This means that after the first iteration of the roster, checks should be done to determine whether there are any inefficiencies on the roster in terms of:

a. Under- or over-postings.

b. Under- or over-gradings.

c. Overtime.

d. Non-productive time.

e. Required profitability.

Once this is done, the above checks should be done again. And so the iterations should continue until the most efficient rosters have been created. Once this has been achieved, the master schedule should be saved and used again the next time rostering takes place so that the next rosters are already efficient, and only typically need to be checked and fixed in one iteration of the process.

Operational control

All the above-mentioned steps which should be followed to plan for maximum efficiency in the utilisation of a guard force would be worthless if a company did not have effective operational control. Rostering or planning is only one step in the operational process. Once an efficient roster has been compiled, it is imperative that operational managers at all levels ensure that the roster is followed by guards as much as is possible. This includes ensuring that sites are neither over-posted nor under-posted. Otherwise, the effect of all the efficiency planning would be negligible.

Making use of biometric devices, either mobile in supervisory vehicles, or static at sites, makes the registration of attendance far more accurate than relying on manual reporting procedures. Other than that, this technology enables real-time reporting which obviously enables operational management to rectify any attendance issues immediately.

Payroll

Ideally, the payroll should be generated from the attendance details that have been captured and checked for accuracy by operational managers who have also ensured that there are no over- or under-postings at sites. In this way, ‘ghost guards’ would be eliminated and the correctness and minimisation of the payroll can be ensured.

As can be determined from the discussion above, there are quite a number of issues that should be taken into account when managing a workforce in a guarding company.

Some guarding companies seem to be of the opinion that a simple time-and-attendance system would solve their wage problem. This is definitely not the case. The main contributors to a minimised wage bill are efficient planning and operational control (which obviously includes time and attendance).

EasyRoster is used by a large number of guarding companies throughout Africa and the Middle East to ensure that guarding operations are planned and controlled efficiently. EasyRoster Deployment Manager (ERDM) may be used as the interface between biometric devices and EasyRoster.

For more information contact EasyRoster, +27 (0)12 809 4270, info@easyroster.net, www.easyroster.net





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
What you can expect from digital identity in 2024
Access Control & Identity Management Security Services & Risk Management
As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur.

Read more...