When rostering for more than one site, you can be be alerted if you accidentally roster staff who have already been rostered at another site, without leaving the roster you are working on.
Biometrics uses secure technology for the automatic identification of a person, by using one or multiple physical characteristics. Biometrics can be used in systems which measure employees’ time and attendance, making it significantly more difficult for employees to clock in or out on behalf of one another, a practice known as buddy punching.
There are different types of biometrics currently available, with each type having its own advantages and disadvantages. Today, systems such as fingerprint, hand geometry, face geometry, voice, and even retinal scans are in use. With regards to systems used for keeping track of time and attendance, the most commonly used types are fingerprint and hand geometry.
False acceptance and false reject are biometric system errors. The first occurs when the system validates a user’s identity, despite the fact that another individual’s finger or hand was used for authentication. A false reject takes place when the system does not validate an employee’s identity, even when using their own fingerprint or hand.
Fingerprint-based biometrics operates by creating a digital template of an employee’s fingerprint, and associating that template with an ID number. When an employee’s fingerprint is first scanned, the software measures various physical points in the fingerprint, creating a virtual template. Every time the employee checks in or out using their fingerprint, the software measuring time and attendance validates that the fingerprint currently being scanned matches the virtual template for that employee’s ID. A punch is recorded if the match is positive.
Some staff may raise privacy concerns but they need not worry. WageLoch Software never stores an image of your fingerprint. Several reference points from your fingerprint are stored in the system, which are then used to identify your finger when it is placed on the scanner in future. This information is stored in an encrypted database that resides only on the computer that has the fingerprint scanner attached.
It is not possible to reconstruct an image of your fingerprint from the information stored by the WageLoch software. Your fingerprint information will never be shared by WageLoch with any other party.
In general terms, fingerprint biometric readers tend to be economically low-cost and are commonly deployed in entry-level systems. For businesses, these fingerprint readers provide a straightforward and inexpensive method to getting started with time and attendance systems that utilize biometric technology. Additionally, depending on system specifications, the occurrence of false acceptance errors tends to be lower than in other technologies.
Fingerprinting technology has been in use for 25 years, with no evidence that it can pose a risk to human health, and no reported incidents of health hazard. The methods employed for biometric identification are non-invasive and do not represent any health risks.
If the outer layer of the finger, known as the epidemic layer, has not been severely damaged, then the fingerprint’s wound will heal and return to its original shape. If this does not occur, then the leftover scar will be identified as a unique characteristic of the individual’s finger. In both cases, validation through the biometric system is still possible. It is strongly recommended to register at least 2-3 different fingers when creating employee records in the system, just in case the preferred finger cannot be used due to injury, for example.
No. Rather than using a traditional graphic format for storing fingerprint images, the system scans and captures several reference points from the fingerprint, and uses a specific algorithm to store the data as belonging to that specific person. Fingerprints which are retrieved from other sources will not be validated nor recognized by the system.
Fingerprint-based biometrics is currently the most popular, according to market research. There are multiple reasons for its popularity, including the small size of the device used for fingerprint scanning, the fact that users have the option of choosing which finger is scanned, and the validation process is less intrusive and straightforward.
Any of the hands’ ten fingerprints can be stored within the system. We do, however, recommended registering the index and thumb fingers, as the minutiae from these specific fingerprints are more easily identified and saved within the software.
A person’s fingerprints can be affected by factors such as age and the kinds of work they perform – for example, prolonged exposure to with chemicals or cleaning agents.
In these cases, a scanner may not be able to get a good read of the reference points of a person’s fingerprint. In these cases, there are usually back-up options available (such as pin-codes or passwords) or other biometric devices can be utilised (such as iris scanners and facial recognition units)
Most fingerprint scanners these days can are simple USB-A devices, which means they can be plugged into any device (pc or tablet) with a USB port.