T&A the right way

September 2016 Access Control & Identity Management, Integrated Solutions, Industrial (Industry)

Time and attendance (T&A) systems track and manage employee check-in and check-out times, meal-time, vacations and absences. Traditional T&A systems were based on a manual recording process, where employees recorded their time and schedule information on various manual recording devices from paper to punch cards and even computers.

The data gathered from such records would be processed by managers and then salaries calculated based on this information. This process is deemed very inefficient due to the long hours it takes for managers to process such data. Furthermore, such processes suffered from inaccuracy and lack of reliability from data input errors, calculation errors or scamming activities that arise from using human resources.

The implementation of an automated time and attendance system resolves the previously mentioned issues by greatly reducing errors that may occur during the collection and calculation stages. It allows for simpler management of the workforce as they can easily be grouped and attendance rules such as work hours, breaks, absences, meal time etc. can be applied accordingly. Furthermore, reports can be generated on demand as processing and calculation of such data is done automatically.

The largest threat to your T&A system is ‘buddy punching’, which means another person records time for a person. Workforce waste, overpaid payroll, and cheating the clock is increasing annually across the globe because of buddy punching. Buddy punching means that a fellow employee records time in place of the actual employee, and an ordinary time and attendance system, which uses credentials such as cards, PIN, or passwords, cannot prevent buddy punching because credentials can be shared.

By combining the T&A system with biometric technology, buddy punching is prevented resulting in efficient management with associated decreases in costs. Furthermore, it provides more security than card, FoB, PIN and passwords. Suprema’s BioStar 2 linked with Suprema’s latest fingerprint recognition devices allow you to efficiently and professionally manage an organisation’s human resources. You can also prevent authorisation using forged fingerprints if you use the Live Finger Detection (LFD) feature on some of Suprema’s latest fingerprint recognition devices.

T&A redesigned

BioStar 2’s T&A management system features Pay Codes, Shifts, Schedules, Schedule Templates, and Overtime Rules. The Time Card and Report features can be used to edit or print out individual time and attendance records as reports.

Structure-wise, BioStar 2 T&A and BioStar 1 T&A may look similar. However, BioStar 2 T&A simplifies the complicated configuration of BioStar 1 T&A and increases the flexibility of the functions to allow for diverse configurations.

BioStar 2’s T&A System isn’t merely an employee check-in and check-out tracking system. It also allows for other employee payroll events to be tracked, for example; work, breaks, meals, leave types and times. Furthermore, time and attendance records edited by the administrator can be seen in a single glance.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...