Access control systems bring increased safety and security to a facility. They do this by controlling who may enter the premises by use of identifiers such PINs, credentials or biometrics, and permitting the exterior doors to remain locked, thereby discouraging unauthorized entries...
To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login
Register in seconds by connecting with your preferred Social Network.
Complete the registration form.
Access control systems bring increased safety and security to a facility. They do this by controlling who may enter the premises by use of identifiers such PINs, credentials or biometrics, and permitting the exterior doors to remain locked, thereby discouraging unauthorized entries.
Frequently the access control function is further enhanced by monitoring the doors for forced, propped and locked status. By monitoring for forced door, break-ins can be annunciated. Propped door conditions are commonly caused by employees who intentionally leave a door ajar so they can step out for a smoke without being locked out or being required to use their credential to re-enter the facility. Monitoring a door for locked/unlocked status provides security management with the ability to determine if a door is properly secured.
Many electronic access control systems (EACs) maintain user lists and activity logs. Each system user is on the list, along with relevant personal information such as their name and department, the unique identifier of the credential they were issued, and perhaps their image.
Often users are assigned access privileges, as to when they may access and which doors they can enter.
The specific system design determines what features the system provides, and if monitoring and system management is performed in real time or manually as required.
Time & Attendance systems have a lot in common with EAC systems. With the convergence of technologies, numerous Time & Attendance systems are hitting the market which are easy to implement, and inexpensive enough to make them attractive to small to mid-size companies who have a need to track their employee’s arrival and departure, as well as streamline the accounting and payroll process.
There are a few differences between EAC and time and attendance systems. For one thing, if an access control system is used to monitor both entry and egress, two readers are required for each door and the door is locked from both directions, otherwise people will forget to log out or they will deliberately circumvent the system.
Inhibiting free egress on a door in this fashion is problematic from a life safety standpoint. The Golden Rule of door control is that the safety of a system can never be sacrificed for security. Therefore it follows that safety cannot be sacrificed to streamline payroll accounting.
Another issue which applies to both EAC and Time & Attendance is adequately verifying the identity of each user. Traditional cards and fobs continue to persist in the majority of applications for EAC. Credentials, especially those with Photo-ID, are readily accepted as security management tools by Facility and Security, but not as readily by the accountants.
While sneaking out for a smoke might be handled as a relatively harmless prank, payroll fraud is not. Therefore, automating the data collection process for payroll purposes falls under the scrutiny of more eyes within the organization.
Biometrics eliminates system abuses associated with PIN (personal Identification number) and credential single authentication based systems.
Enroll and manage up to 90 users right at the reader using the hand-held programmer. Use with a door control module to create a stand-alone door access control system