How biometric devices assist in reducing payroll cost

February 2007 Access Control & Identity Management

By using biometric technology CFOs, payroll administrators and controllers can eliminate the headaches of tracking employee's time and attendance.

From manufacturing to hospitality and hospitals, biometric terminals verify people, not cards or tokens. The multiple benefits of a hand geometry biometric system outweighs the costs associated to purchasing it.

Unlike badges, punch cards or other employee tracking devices, a biometric reader ensures that no employee can clock in or out for someone else. This guarantees that time fraud is eliminated and payroll costs are reduced. Because every person's hand, fingerprint, eye and face is unique, a biometric time clock provides a quick, accurate and reliable way to record in and out punches for each employee.

Payroll accuracy is ensured, as biometric readers require each employee to be present when signing in or out. As no cards or other credentials are needed, this mechanism eliminates 'buddy punching'. As a result, some companies report savings from 5% to 20% of total payroll cost. Using scheduling restrictions, unauthorised early in-punches and late out-punches are eliminated. Moreover, the hardware is typically less than 10% of the overall cost of a time and attendance system. This means that biometric readers can be affordably placed in multiple locations.

Many companies choose hand geometry because it eliminates buddy punching, eradicates the hassle and expense of lost or stolen ID cards and removes the cost of producing replacement cards. In addition, employees appreciate the fact that others cannot see their timecards and that their records will not become lost or stolen.

Biometrics ensures employees earn a day's pay only when they are present to do a day's work. Readers can be more than a simple time clock; the employee's in and out transactions can be transmitted to a company's time/attendance/payroll software. Multiple units can be networked into a central time and attendance record keeping system. Interface software can be tailored to meet multiple record keeping needs, including payroll and human resource management applications.

According to Frost & Sullivan's 2002 World Biometric Report, hand geometry readers continue to be the dominant biometric technology for access control and time and attendance applications.

There are many reasons for this:

1. Hand geometry readers positively identify users by analysing well over 90 separate measurements of the hand's length, width, thickness, and surface area. This information is compared against a previously stored ‘template’ in the reader's memory. As a result, the reader combines the flexibility of a full function data collection terminal with the sophistication of the most accurate identification technology available.

2. Hand geometry causes no resentment from employees because it is considered less intrusive than biometric devices that read fingerprints or scan the eye. Since the devices require only periodic cleaning, maintenance costs are low.

3. It is critical that any biometric terminal is designed to meet the needs of time and attendance. Systems can be as simple as a single clock, or multiple units can be connected at a variety of sites via RS485 cabling, Ethernet connections, various GSM, GPRS and dial-up modems as well as wide area networks.

4. Companies can elect to employ a full function time and attendance terminal that includes feature sets unavailable on other biometrics-based time and attendance terminals.

Hand geometry technology is so accurate and dependable that it is also used for security access at nuclear plants, critical government agencies, and at leading airports and harbours around the world.

Raymond Noppe is the MD of Uniclox.

Raymond Noppe
Raymond Noppe

For more information contact Uniclox, +27 (0)11 439 2000.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...