Buddy-clocking - a thing of the past

Access & Identity Management Handbook 2004 Access Control & Identity Management

Project scope

Number of users: 300.

Number of buildings: One.

Number of enrolment stations: One Sagem MEMS.

Number of biometric readers: Six Sagem MorphoAccess.

Mode of biometric operation: Identification (1:MANY) - fingerprint only.

Number of turnstiles: Two.

Number of locations secured: Three.

The history

Wholesaler, Africa Cash & Carry, has a staff complement of about 300, and needed to control time and attendance and also security issues.

"We needed to control the movements of the staff members," explains Ebrahim Shaikh. "There was also a problem with buddy-clocking with the proximity card reader that was costing the company in terms of salaries paid but not earned."

The main problem was of buddy-clocking whereby one person would clock his friend in and the friend would not come to work, but still get paid. Also, there was no proper access control in areas where large amounts of consumables were held.

The new access control solution was strategically planned to preclude the problem with buddy-clocking and thus facilitate a more efficient cost control procedure.

The goal

The solution chosen was to use fingerprint readers to control buddy clocking and also as an access control measure. The goal was to control the buddy-clocking problem and access to areas where large amounts of stock are held.

The solution

Two bi-directional turnstiles using Impro IXP200 system and linked to Sagem fingerprint readers were installed. At the change-room doors, two Sagem readers linked to IXP200 were also installed to measure time taken in bathrooms as some abuse of paid off-duty periods was suspected. The IXP200 is seamlessly interfaced to the existing Clockwatch Time and Attendance software. The final output of hours worked was exported into Spectrum payroll.

The benefits

Shaikh explains that the chief expected benefits were that buddy-clocking would be eliminated and access to certain areas would be more strictly controlled.

Obstacles en route to a final solution

Before implementation, various companies were approached and other control methods were investigated, but these all proved very expensive in terms of the final cost to savings ratio.

No obstacles were encountered after installation of the fingerprint reader system - the system did everything that was promised and hardware and software support was available on-site until the staff members were entirely familiar with the new readers.

Tenders, specs, integrators and implementation

"We approached many different companies, looking at palm readers and optical retina readers. These solutions proved to be very costly," says Shaikh. "Timewatch Systems offered a cheaper solution and the fingerprint reader interfaced with our existing time and attendance software.

"The integrators offered solutions to our company's problems. Their consultants advised us on the most efficient design and the most cost-effective readers. All through the initial planning stages, the hardware set-up and the interface with the software, consultants were on hand to assist and supervise and finally train the end-user."

Measuring progress

The wholesaler checked the reports on the software and found that there were less 'bad' clockings. Thus, the time and attendance side of the project was successful in terms of fewer administrative functions having to be performed.

The result

Shaikh says the problem of buddy-clocking has also now been entirely eliminated, adding that the company achieved the initial goal as well as the rewards that it had hoped to reap.

Fact file

Key service providers, products and solutions:

System integrator: Timewatch Systems, Michael B. Horvitch, 011 640 1850.

Biometric products: Sagem Morpho range, distributed by Ideco Technologies, Gary Jones, 011 442 0064, info@ideco.co.za

Clockwatch Software: Clockwatch Distribution, Dani Taback, 0860 100 854.

Turnstiles supplied by Turnstar, Mark Eardley, 011 786 1633.

IXP200 system supplied by Impro Technologies, Barry East, 031 700 1087.

Africa Cash & Carry, Ebrahim Shaikh, 011 661 6600, rcc786@mweb.co.za



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.