Showing posts with label Biometric Attendance. Show all posts
Showing posts with label Biometric Attendance. Show all posts

Friday, September 1, 2023

Security Integration management systems

Security Integration Management Systems 

Security systems are changing at an ever-increasing pace and are becoming standard Information Technology (IT) products running over a Local Area Network (LAN) or Wide Area Network (WAN). As a result of using standard protocols such as Transmission Control Protocol/Internet Protocol (TCP/IP), the manufacturers to develop new generations of integrated systems. These systems are called System Integration as they bring together the management of all aspects of an organisation’s security. In recent years, the market for security equipment has realized the immense merits of integrating different components in a security system. However, true integration may be offered by all the manufacturers in the field today. A truly integrated security system combines the various components and yet they are all part of a more sophisticated and bigger system.

Some people use the term 'integrated' to describe a multiplexer combining full screen and multi screen images. Or a control desk containing an integrated intruder alarm PC, an integrated fence alarm PC and an integrated CCTV PC sitting next to one another. This is not true integration.

It is possible to integrate components like a public address system, CCTV, fence alarms, intruder alarms, fire alarms (life safety) and access control system within a single system. The system can be multi-station networks or even a single PC. All these components should interact with one another as a single entity. For example, whenever the fire alarm gets activated, the screen of the Visual Display Unit should pop up a new text window where detailed instruction should be given on what to do next. Simultaneously, the integrated system may release the doors meant for fire exit and display those CCTV cameras, through which the operator can view the affected area so that the operator in question can engage in a communication with the other staff and do not have to take the help of any public address system.

It is not always necessary to purchase all of the components of a system from one supplier. Manufacturers of Security Management Systems realise that the customer wants choice and will often link to components from other specialist manufacturers. Many manufacturers provide integration modules and protocols such as BACnet and OPC, and data integration methodologies such as eXtensible Markup Language (XML), ActiveX and others, which can in theory link to almost any business system. You will need to talk to individual suppliers to discover what development tools such as Software Development Kits (SDK) and Application Programming Interfaces (API) are available for integrating systems. Yes, the system should be able to function with the help of a battery backup though the duration of this backup time may vary according to the type of panels used within it. In my experience this has not been an issue, but some manufacturers are very cautious to whom they release this information. If you are a competitor it is almost impossible.

Even when protocol has been received 90% of the time it is either incorrect, incomplete or even misleading! It is essential to test product before installation, I know it is an old fashioned idea but it is really nice to see the system actually working.

Opportunities of System integration

There are a number of advantages to be gained in both the security and commercial aspects of designing and adopting an integrated system. This section lists some of the advantages that may be considered when combining separate systems into an integrated solution.

Access Control Systems (ACS)

Access Control is typically specified to provide protection to both property and employees. Generally it is thought of in terms of managing doors. However, it often extends to public areas when coupled with turnstiles, gates and barriers, or highly sensitive areas when coupled with biometrics.  If the access control and intruder alarm systems are linked together, the access control system can be programmed to automatically change, based on the type of alarm that sounds. By integrating Access Control with other systems many advantages may be realized. For example:

Fire Alarm mustering – know where your employees are at a given time.

Know which doors / areas employees are entering, or trying to enter.

Link CCTV images with access control events.

Link Time & Attendance monitoring using the same badge / token software.

Link Visitor Monitoring with Access Control & CCTV using badge / token software.

Increase security through systems such as dual card access or access using a biometric technology.

Intruder & Hold up alarm system control functions can be managed by the Access Control system.

Logical Security

Logical access control is the brother of physical access control but is often limited to secure PC logon. Integrating these two elements can significantly increase your security. For instance, you can restrict PC access to only those who have a smart card and use this to logon to your IT network. Alternatively, you can inhibit network logon if the person is not in the building, further enhancing your security.

One example is to use the CCTV system and access system to monitor and lock doors during a denial of service (DOS) attack at the same time as sending a message to the security guards. Quite often physical and logical attacks go hand in hand.

Time & Attendance (TA) monitoring

The same badge/token used to identify a person in Access Control can register them on and off work with Time & Attendance monitoring. Also as more integrated software systems become available, use of the same software to handle Access Control, Time & Attendance and Visitor Monitoring can be achieved. Remember however, that just because a person went through an Access Control door does not mean they are registered for work, especially under Working Time Directive (WTD) rules. You will need separate T&A clocking stations, albeit on the same network, to monitor working hours and software to calculate employee hours, monitor absences and WTD hours and infringements.

Human Resources (HR) / Payroll

Why enter data twice? When a new employee joins a company his personnel details are often entered into both the appropriate HR system and then again into the security system. By integrating these two systems, a subset of the employee data can automatically be transferred into the Access Control System when an employee joins. Alternatively, when an employee leaves, his rights can be automatically deleted from the Access Control System, again reducing effort and increasing security.

CCTV Systems

By integrating CCTV and other systems such as Access Control, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. IP camera can be integrated with Motion Sensor not only that If IP camera has I/O port you can integrate with other systems like, Hooter, Auto dialer etc. Through Video management intelligent Software you can get face reorganization, license plate reorganization etc.  For example:

Live camera views can be integrated with the Access Control Software, equally Access Control or other data can be integrated with the CCTV system.

Access Control and other security detection systems can initiate pre and post-event video recording, linking the video recording with the event information. This makes searching for events on the DVR/NVR more effective as only the event needs to be searched, for example ‘Door forced – Stores Door’ or ‘Zone 1 – Perimeter breached.’

Track individuals and record their access details against the recording to track suspect users or stolen card users.

Initiate camera presets when specific pre-determined events occur, e.g. when entering a room in a bank, switch the camera to zoom into the door to identify the individual.

Use CCTV with Time & Attendance system to detect / eradicate ‘buddy-clocking’, a practice where employees clock each other on and off work.

Intruder Alarms Systems (IAS)

By integrating intruder with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

Set / unset the intruder system using an access reader. No need to use the intruder keypad.

No entry delay time if main door forced. The entry timer is bypassed thus providing an instant alarm.

Disabling of access readers when the intruder system is in the armed state, to prevent false alarms due to unauthorised entry into an armed area.

Using an occupancy count from another system, the Intruder & Hold Up Alarm system can be notified that there may be persons present in the building when the system is being set.

External Perimeter Detection

One of the fundamental objectives of a security system is to provide protection at the outermost perimeter of a property. A perimeter intruder detection system can be used, linked with CCTV to provide early warnings and increased security through verification in the event of a breach. For example, external doors could be automatically locked if the perimeter system detects an abnormal event.

Fire Detection & Alarm Systems

Fire protection / Detection systems have traditionally been isolated from other building management and security systems. By integrating fire with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

In the event of a fire all emergency exit doors on the fire escape route need to be automatically released from an electrical point of view, but physical quick release locks may be in place to maintain security and still allow people to escape. It is common practice to install a relay in series with the electric locking mechanism controlled by the fire panel. An alternative is to feed a fire input into the Access Control System, which then automatically releases the appropriate electric locking mechanisms. The proposed link between the Access Control System and the fire system should be evaluated as part of the fire risk assessment.

In addition to providing hardware control during a fire situation, it may be necessary to provide a ‘roll call’ or ‘muster’ report to list all people in the building at the time of the fire alarm.

PA system (PAS)

In general IP paging and intercom systems are used to direct people in emergencies, control doors and control other situations such as crowd control. However, integrating such systems with others leaves the door open to new uses and can push a technology to its full potential. For example, integrating a campus’ PA system with security systems such as video surveillance could give campus security operators more control over emergency communication. Paging can be integrated with IP camera systems. Small amplifiers are used to power speakers that can be used with the cameras.

It is also important that the video management software (VMS) supports the audio. Some VMS will provide an alert if they detect a button activation from the IP camera. The VMS then allows the security person to see what is happening and then talk to the person near the IP camera.

The Digital Acoustic intercom system is independent of the VMS and uses its own Windows paging software. In this case, the security person can receive an alert from an intercom and be notified on their Windows computer. The software also allows the security person to view a nearby IP camera. This is not quite as integrated as the first method, but can provide additional security.

PA Controller should be integrate with Fire Detection system, in case of fire PA system automatic start announcement to evac said area.

Visitor Management Systems (VMS)

For many companies and organizations, a manual paper-based VMS will suffice, providing visual identity of visitors. However, computerized systems linked to Access Control and Time & Attendance systems are the natural bedfellows for integrated security systems. These not only print ID passes, but can also incorporate biometric identification and the scanning of visitor/contractor documentation, licenses, certificates and insurance certificates.

Lift Control

By integrating lift control with the access control system, access to certain floors in a building may be

Restricted, particularly outside normal working hours or in multi-tenanted buildings. To monitor of lift you can fix CCTV Camera which is integrate with Access Control.

Car Park Management (CPM)

Where access to a car park is restricted, the ISMS can automatically monitor the number of spaces left for each tenant or department and regulate access accordingly. For example:

Visually through CCTV.

Audibly through an intercom system.

Automatic number plate recognition.

Access Control tokens.

Guard Tour System (GTS)

By using a guard tour package that integrates with the access door readers can be used to define and monitor a tour by a specific guard, providing a real time indication if the guard does not reach a set point in time (or even if he arrives too early) – equally integration with the CCTV system can provide visual verification of the guard’s location and wellbeing. Many Time & Attendance systems incorporate Guard tour functions as part of their software package.

Building Management Systems (BMS)

Building management systems are responsible for monitoring and controlling the environment of a building, for example lighting control, heating and ventilation (HVAC). In the current climate of energy saving, why leave lights on when an area is unoccupied? By integrating Access Control Systems with BMS systems, the lighting can be automatically controlled by recording when people access an area. The system can also be configured to control the heating by reducing the room temperature when no one is present rather than leaving it on all day and off at night.

Electronic Point of Sale (EPOS)

The logic of integrating security systems together is evident, however if information from systems such as EPOS can be interfaced then a powerful security solution for applications in the retail market and casinos can be deployed.

Data sent from an EPOS system can be overlaid on a live video display, allowing operators to view the camera feed and till transaction simultaneously. The transaction information and alarms enerated by the EPOS system can be bookmarked and recorded alongside the video. This facilitates visual identification of an incident in both real time and through post-event analysis. Powerful transaction analysis can be undertaken on the stored data, for example, finding out when a particular credit card was used by searching every till in a store or across all stores from the head office.

Conversely, recorded video can be searched using a thumbnail feature, which displays a video still image for every transaction, allowing the operator to quickly identify the relevant footage. Evidential quality video clips and associated transaction data can be exported for investigation or use in court.

Alarms generated by the EPOS system, such as ‘register drawer left open’, ‘refund’, or ‘large dollar amount’ can automatically trigger a number of events, including displaying the nearest camera to the specific till and pinpointing the alarm on an interactive map.



Sunday, March 5, 2017

Access control in education sector

Access Control in Education Sector

Controlling access to school campuses and buildings is an important issue for school administrators. They need to maintain a user-friendly, welcoming school climate while ensuring that the facility is safe and secure, both when school is in session and when the buildings are unoccupied.

What is access control?
Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building or site.

Access control is essential for all businesses to protect people and assets and has the added benefit of being expanded from controlling, for example, a single entrance door, to a large integrated security network. There are also huge potentials in terms of integrating HR and other systems, such as Time and Attendance, Visitor Management, ANPR, Fire, Intruder and CCTV, which can cut costs and streamline administration costs.
What risks does the average office face and how can these be countered by access control?
Electronic access control systems are increasingly being used to enhance safety and security in educational establishments.

The average educational establishment has a transient population with many high value goods such as computers and IT equipment, not to mention the personal possessions of staff and students, which are extremely attractive for thieves.
Access control systems are all designed to allow access only to people with the necessary authority to ensure that goods and people are protected.

Educational establishments have a duty of care to provide a safe environment for pupils and staff and the application of access control can therefore help manage known or anticipated threats.

Generally systems comprise three component parts:
1. The physical barrier – to physically restrict access to a building or location via such methods as:
• Doors: secured by either a electromagnetic or strike Lock or can be revolving or sliding.
• Turnstiles and speedgates: designed to limit access to one person for one card presented.

2. The identification device – There are a number of different technologies used to identify users of an access control system, such as:
• A proximity card and reader using RFID – cards can either work at a short read range or a long read range.
• A smart card and reader.
• A swipe card and reader.
• PIN pads.
• Biometric (fingerprint, iris scanning).

3. The door controller and software – The door controller and software are at the heart of the system and are used to decide who can gain access through which access point at what time of the day. These can vary dependent on the size of the system and how many readers or sites you are trying to control from one point.
Some of the options include:
• A standalone door controller linked to a single door with no software.
• A number of door controllers all linked together to a single PC to control one site.
• A number of sites all interlinked together over a wide network area.

What added benefits can access control systems bring to educational establishments?
Protection during school hours is paramount, and the following added benefits come from access control:

Visitor monitoring
In an environment where visitors can blend in with the staff and pupils, the use of PC and computer networks should be considered. These systems can print photographic ID and allow access to be restricted to certain areas within the office. Moving to a software solution for visitor management is an easy and inexpensive solution and can provide a number of added benefits.

The system was designed to ensure the smooth operation of a 100,000 square metre complex, spread over five buildings with both students, staff and visitors accessing the different facilities sometimes at high volumes. A Smart Card system was developed which provides not only access to designated areas, but also allows all sites to be linked via a modem, allowing administration from a central point.

Automatic Number Plate Recognition
For college and university sites where students may be driving in and parking onsite, Automatic Number Plate Recognition may be a viable option. To monitor the entrance of vehicles on site, CCTV-style cameras and computer software can be used to identify number plates of vehicles. Some systems can also store photographs of the driver and vehicle for subsequent analysis. This sophisticated software allows critical information to be passed to the police to assist in the pursuit, identification and capture of offenders.

What key considerations should be taken into account when considering access control?
The outcome of the risk assessment for your office will determine the level of security you require and in turn influence your choice of access control system to be used. BSIA access control members and professional security consultancies can assist with this.

BSIA members go through rigorous checks before they are admitted into membership, meaning you are selecting quality companies to achieve peace of mind. Below are just some of the reasons why you could benefit from using the services of a BSIA member:

·        Independently inspected to the quality standard ISO 9001 with a UKAS accredited inspectorate.
·        Compliant with relevant British and European Standards and codes of practice.
·        Financially sound.
·        Professional.
·        Staff vetting conducted (where appropriate).
·        Technically proficient.
·        Committed to quality training and development.
·        Up-to-date with the latest developments in British and European policy and legislation.

Is there any legislation I should be aware of?
The Disability Discrimination Act was amended in 2005 and has significant impact not only in terms of the design of new systems, but also means that many systems may need to be upgraded to ensure compliance. This is of particular importance also for educational establishments as employees, pupils and visitors will all need to have adequate and user-friendly access to the building.
The BSIA has created a guide to help design access control systems following the introduction of the revisions which can be downloaded from www.bsia.co.uk/publications

Other legislation to be considered in relation to educational establishments is:

National minimum care standards
Health and Safety at Work Act
Occupiers Liability Act
Management of Health and Safety at Work Regulations


Sunday, January 15, 2017

Access Control in the Retail sector

A guide to Access Control in the Retail sector

What is access control?
Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles in, out and around a building or site.

Access control is essential in the protection of people and assets and has the additional benefit of being expanded from controlling, for example, a single entrance door to a large integrated security network.
There are also huge potentials in terms of integrating access control with other systems, such as CCTV and intruder alarms, allowing for cost savings and greater security benefits.

What risks does the retail sector face and how can these be countered by access control?
The retail sector faces a variety of threats all year round, including shoplifting, organised retail crime and dishonest staff, and these risks can increase significantly during busy shopping periods such as seasonal sales.
Recently, the BSIA carried out a survey of its members to discover the trends in retail security over the last year. Over 50% of respondents felt that the use of private security measures in retail had increased over the past twelve months, with a further 65% anticipating this use to increase over the course of the next year.
Members perceived the biggest threat to retailers to be shoplifting and petty theft, with theft by employees following in second. Online theft and armed robberies were also considered to be risks.
Retail environments are full of valuable assets, both on the shop floor and in the stock room. Access control systems are all designed to permit access only to people with the necessary authority to enter a particular area, ensuring that goods and people are protected and helping to manage known or anticipated threats.
Generally, systems are comprised of three main components:
1. The physical barrier – to physically restrict access to a building or area. This can be achieved through methods such as:
Doors – secured by either a magnetic or strike lock, or can be revolving or sliding.
Turnstiles and speed gates – designed to limit access to one person per identification device.

2. The identification device – there are a number of different technologies available to identify users of an access control system, including:
A proximity card and reader via Radio-Frequency Identification (RFID) – these cards can be programmed to work at a short or long read range
A smart card and reader
A swipe card and reader
PIN pads
Biometric devices such as fingerprint or iris scanning

3. The door controller and software – these are at the heart of the access control system and are used to decide who can gain access through which entry point and at what time of the day are they permitted. These can vary depending on the size of the system and how many readers or sites you are trying to control from one point. Some of the options include:
A stand-alone door controller linked to a single door with no software
A number of door controllers all linked together to a single PC to control one site
A number of sites all interlinked together over a wide network area

The added benefits of access control
Retail environments often incorporate large numbers of staff working varied shift patterns. Access control systems can offer a wide range of benefits, including Human Resource management and integrated security systems.

Time and attendance
Retail security does not necessarily just offer protection for the shop floor itself, but can encompass all stages of the supply chain – including staff offices, warehouses and even the delivery process. Naturally, various different employees and outside visitors are involved in these processes and access control systems can assist with staff management.

Badge/token technology can be used to record employee hours and monitor visitor movement within a specific site. If appropriate, these can be processed against working hours, applicable for both temporary and permanent staff – this can be useful for busy shopping periods when additional seasonal staff are employed temporarily. This can work in real time to feed transactions through to the company’s payroll. Time and attendance systems also accurately help keep employers on the right side of the European Working Time regulations and manage holidays and absences effectively. Fast, accurate and easy-to-use, these systems are suitable for businesses employing just a few people, right up to large multinational companies.

Automatic Number Plate Recognition
To monitor the movement of vehicles around an area, CCTV-style cameras and computer software can be used to identify number plates of vehicles. Some systems can also store photographs of the driver and vehicle for subsequent analysis.
This sophisticated software allows critical information to be passed to the police to assist in the pursuit, identification and capture of offenders should an incident occur. For example, if a shoplifter flees the scene of a crime via a vehicle, ANPR cameras situated around an area could help identify the criminal. Visual proof of parking offences with the corresponding time and date information is provided as evidence and to avoid disputes. Using a Driver and Vehicle Licensing Agency (DVLA) link, monitors are then able to identify the owner of a vehicle and process the offence automatically.

Fire roll call
Health and safety is a key consideration for any business. Since retail environments involve multiple staff members with varying shift patterns, it can be difficult to keep track of all employees during an emergency. Fire roll call technology generates a report containing crucial information in relation to who is within the building and potentially where they are. This software operates via the access control smart card or fob that an employee uses to gain access to or exit a building. In the event of an emergency, the fire roll-call software alerts occupants to the emergency whilst simultaneously activating the report at a safe pre-determined remote point.

Please note: In order for the fire roll call software to effectively carry out its function, employees and visitors must always present their card or badge. The use of smart card or RFID controlled turnstiles can help in this situation.

Integrated security systems
For maximum security, retail environments can benefit from a fully integrated access control system with CCTV, intruder alarms, fire detection and building management systems. One way to attain this is by adopting the use of Internet Protocol (IP) technology, which allows these systems to communicate with each other to maximise their effectiveness.
Separate access control and intruder alarm systems, for example, could allow an employee to access an area that is set with an alarm.

However, unless the employee has the authority to unset the system, the access would result in a false alarm being activated – potentially causing panic in a retail environment. An effectively integrated system would recognise that the user does not have the authority to unset the system, so would not allow them in the area to begin with.

What else should you know when considering access control?
An initial risk assessment of an area can determine the level of security required and subsequently influence the access control system you choose. BSIA access control members and professional security consultancies can assist with this.
BSIA members are subject to rigorous checks before they are admitted into membership, meaning that you are selecting a quality company. Below are just some of the reasons why BSIA members can offer you peace of mind:
They are independently inspected to the quality standard ISO 9001 with a UKAS accredited inspectorate
They comply with relevant British and European Standards and codes of practice
Are financially sound
Professional
Staff vetting has been conducted where necessary
They are technically proficient and committed to quality training and development
They are up-to-date with the latest developments in British and European policy and legislation

What legislation should you be aware of?
The Disability Discrimination Act was amended in 2005 and has a significant impact not only in terms of the design of new systems, but also means that many systems may need to be upgraded to ensure compliance and adequate, user friendly access to the building for all staff and visitors.

Other considerations to be aware of:
National minimum care standards
Health and Safety at Work Act
Occupiers Liability Act
Management of Health and Safety at Work Regulations.

Friday, June 3, 2016

Attendance System based on Biometrics

Attendance System based on Biometrics

If you are still using paper and calculator to prepare the salary of the employees then you are wasting your valuable time and missing the benefits of biometric attendance systems. In this era of modern technology, monitoring attendance of each employee to payroll activity has become seamless.
What is Biometrics Technology?
The Biometrics technologies used to measure and analyze personal characteristics, both physiological and behavioral. These characteristics include fingerprints, voice patterns, hand measurements, irises and others, all used to identify human characteristics and to verify identity. These biometrics or characteristics are tightly connected to an individual and cannot be forgotten, shared, stolen or easily hacked. These characteristics can uniquely identify a person, replacing or supplementing traditional security methods by providing two major improvements: personal biometrics cannot be easily stolen and an individual does not need to memorize passwords or codes. Since biometrics can better solve the problems of access control, fraud and theft, more and more organizations are considering biometrics a solution to their security problems. Biometrics gives you an alternative and higher security compared to passwords or pin identification due to the fact that passwords and pin #s can easily be compromised.

Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience. Biometric devices, such as fingerscanners, consist of:
Ø A reader or scanning device
Ø Software that converts the scanned information into digital form and compares match points
Ø A database that stores the biometric data for comparison

To prevent identity theft, biometric data is usually encrypted when it's gathered. Here's how biometric verification works on the back end: To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.

What is Biometric Attendance System?
Biometric time attendance system used to track each and every person coming to your place is actually who he claims to be or not with its time and other details. It uses finger and face recognition system to verify person's identity and record its time-in and time-out with all required details.

Benefits of Biometric System
Ø It has many advantages over conventional time tracking used at organizations. Typically such organizations maintain a register book, where people entry their name, time-in, time-out and other required details but the problem with this manual system is inaccuracy, time consuming, unreliable and most important is less secure.
Ø Biometric time attendance is very user friendly and easy to use; any person can use it very easily. It is very fast also, user has to see once in front of system and all details including its time will be recorded automatically. In this way it saves lot of time and still record details very accurately. One can avoid early punching, late punching and buddy punching very easily.
Ø Many schools, college used Biometric Time Attendance to track their student's attendance. The Biggest advantage of Biometric Time Attendance over manual tracking is better security. Many shops and shopping mall use biometric time attendance for security purpose and it really works a lot.
Ø If someone wants to use it for business or organization, then they can easily integrate it to payroll systems, account systems and billing systems. So in that way it is very flexible also and it also shows that time attendance system can be used for all type of business and organizations with great flexibility.
Ø In a nutshell biometric time attendance solution permits you to focus on your core business by giving quickest and easiest way to overcome your time tracking issues.

Return on Investment in Biometric System Installations..

Biometric time clocks, which are used to record employee start and end times, are popular in organizations where security is an issue, or where employees may falsely record their time worked. Because biometric technology is more expensive than other forms of time clock identification, such as magnetic badges or personal identification numbers, it is important to evaluate the potential return on investment should biometric devices be installed. In service environments where employees punch in and out to work, return on investment can be considerable because biometric devices virtually eliminate the ability of employees to “buddy punch.” 


In buddy punching, an employee either types a tardy employee’s PIN or swipes the tardy employee’s badge earlier than he arrives to work or after he leaves work. The organizational costs of this kind of time theft can be enormous. The company loses money a few minutes at a time compounded across departments and locations. Biometrics makes it almost impossible for employees to defraud a time and attendance system. 



Other returns on investment can be gained through the use of the biometric system as a security access monitor, as well. In this case, the biometric system is used to grant or deny access to restricted areas. The cost of purchasing and maintaining magnetic or proximity identification cards, which do not prevent fraudulent access, can be eliminated.