Keeping Watch

Biometric technology eases attendance reporting costs for government facilities

In an era of declining tax revenues, how can government bodies wring every cent of efficiency out of their tightening budgets? With biometric technology, payroll administrators can eliminate the headaches and costs of accurately tracking employee time and attendance. That's because biometric terminals verify people, not cards or tokens. The difference in the bottom line is often surprising.

While private sector job figures are on the decline, the opposite is happening with government employees. Federal, state and local governments are hiring new workers at the fastest pace in six years, helping to offset private industry job losses.

However, while more private sector employers are deploying new computer-based time-and-attendance systems with biometric front-ends, many government offices use time-and-attendance systems that were created a half century ago.

An Outdated, Costly System

Many government employees still depend on manual calculation of paper sign-in sheets with all their associated costs and inaccuracies. Others collect data with outmoded electrical-mechanical time recorders and time cards but still rely on the manual calculations of payroll figures. However, the costs of these older systems and the inaccuracies they cause are just the tip of the iceberg when it comes to creating budget havoc. The budget buster is buddy-punching—when one employee punches in for another. On average, 19 percent of employees admit they have buddy punched at least once in the past year and 74 percent of all companies report that they have experienced a loss from buddy punching. It's bad enough that the company misses out on the expected labor of the missing employee, but according to the American Payroll Association, this practice also costs companies between 5 to 7 percent in payroll costs.

The Shape of Things to Come

Thus, wouldn't it be nice to verify employees' identities in less than one second, based on the size and shape of their hands? Many government entities use this technology, from larger employers, such as the city of Buffalo, N.Y., the Port Authority of New York and New Jersey, the Los Angles Unified School District and the city of Houston, to smaller bodies, such as the towns of Mt. Vernon, N.Y., and Prairie Village, Kan., and the Oxford Community Schools in Michigan.

Indeed, more than 250,000 biometric hand readers have been installed in all types of businesses and agencies in more than 80 countries. On any normal workday, more than 6 million people throughout the world clock into work with a Schlage HandPunch, saving their employers millions of dollars.

For instance, Chicago expedited the conversion of the former card-based time-and-attendance system to one deploying the biometric hand readers. Approximately 830 HandPunch terminals with external bar code scanners will be used by more than 40,000 streets and sanitation, water, aviation, library, and parks and recreation employees.

The city of New York's CityTime project is one of the largest single applications of biometric terminals used for time-and-attendance recording. CityTime is a city-wide automated timekeeping system for all New York mayoral agencies that will ultimately lead to the deployment of thousands of HandPunch terminals being used by more than 300,000 employees. The rollout began years ago with the New York Law Department being among the initial users.

"The products are very solid," said Mal Higgins, director of administration at the Law Department. "With our old system of sign-in books, it was difficult to verify who was working and when. Using this system, the hand geometry readers do the work for us. Plus, there are no more administration costs for replacing lost or stolen cards.

"Initially, we got the machines to monitor time and attendance. Then, we realized we also could use them to control building access. They have allowed our facilities to become much more secure than ever before. Access cards can be passed around and handed off to others, but with this system, only the authorized person can enter the facility."

Across the river, the city of Hoboken, N.J., is following in the footsteps of its larger neighbor. Its hand geometry biometric system has already been used by its police department for three years and by the parking utility for more than a year.

"We are working hard to ensure that the hand scanner is an effective tool used by the city of Hoboken to maintain the daily records of public employees," said Hoboken Mayor David Roberts. "It is another way we are working to modernize the management of the city's work force."

However, biometric-based time-and-attendance gathering is not limited to only larger government entities. The city of Tahlequah, Okla., uses 11 HandPunch terminals to track and manage the city's 129 employees. Eight of the hand geometry terminals reside on the city's network while three remote locations use the dialup mode to transfer time-and-attendance data from the HandPunch time clocks directly to human resources.

"Having the HandPunch terminals working in tandem with our time-and-attendance software has made this aspect of my job much easier and less time consuming," said Sue Stacy, Tahlequah's human resources director. "The system calculates everything, including hours, sick leave and vacation. It provides better management and tracking of our employees. If a department head can't find an employee, they simply call me and I let them know which clock the employee most recently used."

Such systems are not limited to government bodies in the United States. At the Ministries of Justice and Information, along with the Beirut Judicial Court in Lebanon, employees clock in with biometric terminals. So do workers at the Defense Ministry and Ministry of Labour and Social Affairs in the United Arab Emirates. In the Ministry of Defense in Singapore, as well as at the VAT Department, you will see HandPunch terminals.

Biometrics Versus Manual

Because every person's hand, fingerprint, eye and face is unique, a biometric time clock provides a quick, accurate and reliable way to record punches for each employee. Using scheduling restrictions, unauthorized early-in punches and late-out punches are eliminated. That's why so many government bodies now employ biometric time-and-attendance solutions. After all, it is impossible to fake another's hand with one's own, and there are no tickets or badges to print, distribute or lose.

There also are no paper trails to maintain. In fact, for those government agencies leading the charge to "green," a computer- based time-and-attendance system with a biometric front end provides a paperless solution.

Best of all, the hardware is typically less than 10 percent of the overall cost for a time-and-attendance system. As a result, biometric readers can be affordably placed in multiple locations.

For these organizations, biometrics ensure employees earn a day's pay only when they are present to do a day's work. However, a biometric reader is more than a simple time clock. It transmits the employee's in and out transactions to the entity's time/attendance/payroll software. Multiple units can be networked into a central time-and-attendance record keeping system. Interface software can be tailored to meet multiple record keeping needs, including programmable data management keys that collect specific data when employees' hands are verified.

Why Hand Readers?

Hand geometry readers continue to be the dominant biometric technology for access control and time-and-attendance applications. There are many reasons people frequently choose hand geometry readers, including low cost of implementation, easy installation, low-light performance, a problem with bar codes and even manual timekeeping. Since verification takes only a second, they handle large user populations easily and offer a low false accept and reject rate.

For time/attendance/payroll use, employees use the keypad—or a bar coded, proximity or smart card—to enter their ID number and then place their right hand in the hand reader. The readers identify users by the shape and size of their hands by analyzing more than 90 separate measurements of length, width, thickness and surface area. The image of their hand is compared to the template stored in the system's memory. If the image matches the template, the employee's identity is verified. Total time required for verification is less than one second. Because every person's hand is unique, the hand reader provides a quick, accurate and reliable way to record in and out punches for each employee.

Systems can be as simple as a single clock, or multiple units can be connected at a variety of sites via RS- 485 wiring, optional Ethernet or dial-up modems. Using biometric hand readers, supervisors can override user restrictions and input missed punches, planned vacations, sick time and other information. This password-protected mode lessens the need for computer edits while audit trails for use of those functions ensures security. Bell schedules can be programmed to signal shift starts, stops and breaks.

Terminals can be programmed to meet multiple data collection and management needs, allowing administrators to send messages to employees, which can be viewed when they punch in. Lastly, hand geometry technology is so accurate and dependable that it also is used for security access at nuclear plants, in government agencies, for the military and at leading airports, such as San Francisco International.

Privacy Issues are Eliminated

Biometric readings are private. They do not identify; they authenticate. When considering the privacy concerns associated with biometrics, an important distinction must be made between identification, which is a one-to-many match, and authentication, which is a one-to- one match.

A system designed to identify a person compares a biometric presented by a person against all biometric samples stored in the database. The system identifies the person if the presented biometric matches one of the many samples on file. This is called a one-to-many match. This is the type of system used by the police to identify criminals and by governments for benefit programs and registration systems.

The authentication process used in time and attendance, however, is very different, involving a one-to-one search. The live biometric presented by the user is compared to a stored sample, and the match is confirmed. The user's hand geometry or fingerprint is not stored in a database or on an ID card. Instead, an algorithm is created with points measured on the finger or hand. The resulting template is all that is stored.

When the user presents an ID card or enters an assigned PIN, only the template is transmitted. When the employee presents his or her hand or finger, the reader runs the authentication process to determine if the template that is stored matches the biometric being presented. If there is a match, the person is authenticated.

Whether the organization has 50 employees or thousands, biometric-based time-and-attendance terminals will provide more accurate payrolls and reduce labor costs. They also will reduce operating costs and increase employee convenience by eliminating the need for badges, all of which makes this growing trend a quick way to enhance the bottom line.

This article originally appeared in the issue of .

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3