Task planning applications for security companies




Main  features in mobile tasks planning application

a.       Report of urgent issues (emergency cases)

        i.            When recording incidents, the security officers will be able to either mark an incident as normal or emergency. In this case, an alert security officer who encounters an emergency case such as a break in or a sounding alarm is able to report the case fast and accurately.
      ii.            Here, the incident will automatically be followed by notifications via phone online and SMS. As such, the person at the control room is able to take the right response immediately.
    iii.            Also, the security officers is able to call the dedicated numbers added to the phone, which is fast and efficient. View demo reports here
    iv.            The technical team recommends having the first response number to be the patrol vehicles, who is able to determine the next course of response.

b.      Workplacce patrols.

The checkpoint is installed with NFC tags, especially at blind spots. The security officers is required to move around with the Task planning software phone and read the tags after every 30 minutes or one hour. At every point of reading the tag, the security officer is required to take image and gpss of the spot, which is compiled as a patrol report and immediately sent to the control room and area manager.

i.                    Missing security officers and tags

If the security officer fails to read a tag at the required time, the control room and area manger will get both email notification and online notification, showing that a tag has been skipped or the patrol has not been done. you need to view the demo report here

ii.                  Response to missing patrols

The control room will view the location of the missed tag, the responsible security officer as well as the detail of the history of patrols. Then, they will either send a direct message to the phone, such as “You are required to take patrol now!” Then, the security officers will see the message pop up on their phone, with a beeping sound. They will read, respond and then take the required patrol.

iii.                Response to missing security officers

a)      A security officer may be physically absent at the assignment. Thus there will be no patrols taken at the time set in the system. Also, a security officer may be physically present and sleep.
b)      If the security officer does not respond to the message, within about 5 minutes, then the control room will call the number directly. Here, if the security officer is physically present and sleeping, they will pick the phone and conduct the patrol. Also, the control room is able to record the flow of conversation and recommend response in future.
c)      If the security officer does not answer the phone, then the control room will forward the call to the area response team, which is the response patrol vehicle within the area. They will then go to the workplacce and evaluate the state of affairs.
Here, the response taken by the patrol vehicle is viewed on the area map, which includes the image and gps of the actual workplacce.

c.       Disciplinary responses

The manager at every area is able to recommend a disciplinary response directly through the event company managers system. For instance, a security officer who reports working drunk or without uniform is reported and the response to be taken recommended. Also, this report will include the image and gps of the given security officer. Thus the response to be taken will have valid evidence. find more information here

d.      Security officers population

Response to inadequate security officers at a station

The person logged in at a given time is able to record the number of security officers at the given shift. If there is a need to increase the number of security officers, then they will record the issue as inadequate security officers, a record number of security officers needed and the report is viewed directly by the operations company managers, where they will take the required response.
When the security officers are assigned to the station, then they will record their arrival to the station.

e.       Late cases.

The security officers are required to be at their required station at the beginning of their shift. Using the time attendance records, which are based on biometric data, the late cases are viewed at any time. Here, the specified company emails is receiving automated emails when security officers are late, and these will determine the required cause of response, according to company policies.

f.       General security officer company managers

General company managers roles, such as a request for uniforms and equipment is done on the tasks recording system as well. Here, the supervisor will feed the details of the worker and the items they wish to request. The department responsible is viewing these records directly from their platform, and they can either honor or reject them. This function will eliminate the need for physical visits, which may not be cost-effective. book a free demo here

g.      Salary generation.

The biometric attendance is meant to eliminate ghost workers, late and absenteeism.  Ghost workers is eliminated by having the registration done based on biometrics of the workers. Only the timesheeted workers will appear in the salary. 

h.      Late and absenteeism

The salary per security officer is calculated per hour, and if they are late, then they is deducted the respective amount, which is to accumulate on the record until the end of the salary period.
Then, the FINANCE DEPARTMENT will download the salary showing how much each worker earned and the amounts to be deduced due to late or absenteeism.

i.        Transfer of security officers

The Task planning software time attendance system also incorporates the transfer of security officers from one assignment to another. Here, the supervisors will transfer the worker from one assignment to another when logged into the Task planning software, web admin. Then, they will give a reason for the transfer as well, which is available all the time. Here, the transferred security officer will timesheet using their biometric at the new station, and they will no longer be active in their previous station.
This feature is important when tracking the worker achievement and behavior since the reasons for transfer is the basis of determining which security officer to assign a given role.
2.           Implementation strategy
a.       Every assignment is provided with a mobile phone, running the Task planning software Applications, which is managed by the supervisor.
b.      When a biometric-based time clock is necessary, a FinPoint biometric recorder is provided.
c.       The assignments whose supervisors have smartphones that can accommodate the software will not require additional phones.
d.      The security officers attendance records are recorded, where their ID numbers and names are used as unique ID.
e.      The security officers is trained on how to clock in and clock out using their biometric Fin point phone, so that time attendance is obtained on a daily basis.
f.        The records are sent to the server station on a daily basis, and the record processed. find out more information here and find the best task planning software for security guards that will change your management strategy. 






Comments

Popular posts from this blog