Pay for hours worked

November 2017 Access Control & Identity Management, Products & Solutions

While various controls can be employed to regulate attendance, they are often simple to manipulate. Signing on and off duty on behalf of a colleague and recording inflated working hours are two methods which can lead to a loss of profits, excessive overtime pay-outs and reduced productivity.

This widespread problem can be addressed by the simple implementation of an FPX10 biometric device. Historically, the fingerprint recognition of many biometric devices could not consistently positively identify staff members. This resulted in confusion and an often inaccurate recording of time and attendance. This shortfall has been overcome by the FPX10’s advanced 21-point fingerprint recognition, which identifies staff, and records their clocking on and off duty, in real time.

The data is recorded and accessible in real time, owing to the GPS and GSM functionality of the FPX10. The user can access the data remotely, from the dedicated online support platform, at any time of day. From the online portal, the user can control the movements of its staff. Depending on the intended application and site, the user can limit access to various areas to select personnel, and can alter permissions to clock on and off duty between sites – where multiple devices are used across a number of sites.

The technology has been designed to integrate into almost any payroll management system, with the aim to ensure that one only pays for actual hours worked. Additional benefits of this function are that it provides an objective record of attendance, which can be used to resolve disputes regarding pay and as a key document in disciplinary proceedings; and acts as a tool to improve overall staff performance.

The functionality of the FPX10 can be extended by implementing site-specific parameters and alarm conditions. This allows for automated notifications to be sent to the user when a parameter is breached or an alarm event is triggered. These events could include the failure to report for duty, or the late arrival by a staff member. In addition to being brought to the attention of the user in real time, these events are automatically recorded in the user’s payroll management system, ensuring that the employee in question is not paid for the period of his/or her absence.

While the benefit of improved control over staff is clear, the FPX10 provides a support and safety element in the form of emergency, medical and fire panic buttons. The panic buttons can be activated by staff at any time, which will notify the user of the distress situation and trigger the necessary assistance.

The device has been designed to suit a vast range of industries. It boasts a rugged casing to withstand the conditions of labour-intensive industries, but is sleek enough to suit to an office environment. The FPX10 is portable, owing to it battery life of up to 72 hours, and can consequently be used in locations without dedicated power supplies.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...