Access control and T&A in education­

January 2015 Education (Industry), Access Control & Identity Management

In the modern day and age that we live in, certain aspects of daily life have become important to control, monitor and measure. Two of those aspects are who has access to our education facilities and whether our educators and students are attending to their responsibilities in the education system.

To be able to achieve this we utilise systems and procedures to manage these processes. Historically this would consist of attendance registers and clock card systems, but due to the unique challenges we face and the advancement of technology it has become necessary to deploy newer and more advanced systems that negates many of the possible loopholes as well as automating management and reporting to a large degree.

This management is done in three basic ways. First would be something that we have – a key or a proximity card of some type. Second would be something that we know – typically a password or key pin. Third and last is something that we are – biometric measurements of unique physical attributes of the human body.

The first and second (something we know or something we have) is problematic as the knowledge or device can be shared with a third-party person. In time and attendance (T&A) parlance, we speak about buddy-clocking. This is not a uniquely South African issue, but it certainly is rife with both government and commercial entities reporting massive financial losses due to ghost employees and buddy-clocking.

The advantage that biometrics have over these systems are that a fingerprint or facial characteristic cannot be shared with another person thereby nullifying the buddy-clocking phenomenon. This however does not mean that biometrics are immune to any form of fraud or circumvention.

As with anything in life, not all devices are equal. Facial recognition systems are prone to rejecting users due to facial changes that occur in the course of daily life i.e. spectacles, facial hair etc. Generally, facial recognition is not seen as a mature stand-alone technology.

Fingerprint biometrics too has a vulnerability of being by-passed. The reasons for this are mainly two-fold.

Firstly, fingerprint scanners are divided into levels. Level 1 being very basic in its operation therefore they have a massive vulnerability to spoof or fake fingerprints. They are however, cheap and very inviting to the end user because of this.

Level 2 fingerprint scanners are much more intrinsic with technologies built into them to stop the use of fake or spoof fingerprints and also processes that determine whether a fingerprint belongs to an actual living breathing human being. Level 2 fingerprint scanners are much more expensive but they tend to last longer than their cheaper counterparts do, and over the long run amortises the capital expenditure better than Level 1 scanners. Secondly, build quality is an issue. Cheaper units tend to have a very limited operational lifespan resulting in false rejections, frustrations by users and eventually, replacement of the units.

When considering a biometric system the end-user must look at build quality, technologies and processes built into the device to minimise weaknesses and loopholes, but, as important as the previous, that the devices adhere and conform to labour relations and privacy legislation. The end-user must ensure that the device complies with the POPI Act (Protection of Personal Information Act 4 of 2013). Once the aforementioned conditions are met, the end-user will have a system that is correct for his application.

For more information contact Deon van Rensburg, Virdi Distribution, +27 (0)82 820 0887, [email protected], www.virditech.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Prioritising student safety and operational efficiency
Gallagher Education (Industry)
With an emphasis on student safety, cybersecurity, asset protection, and facility optimisation, Gallagher’s integrated security system provides a comprehensive solution for schools, ensuring the safety of students, staff, and visitors.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...
Paxton appoints Werner Geldenhuys as Country Sales Manager for South Africa
Paxton News & Events Access Control & Identity Management
Paxton has appointed Werner Geldenhuys as its new Country Sales Manager for South Africa; To lead the team to continue providing smart yet simple-to-use security systems in South Africa.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...
Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

Read more...
New generation of cyber-focused controllers
Gallagher News & Events Access Control & Identity Management Products & Solutions
The C7000 gives users an opportunity to leverage their hardware and firmware to build a platform designed to catapult their organisation into the future, with cybersecurity baked in from inception.

Read more...