Task planning applications for security companies
Main features in mobile tasks planning application
a. Report of urgent issues (emergency
cases)
i.
When recording incidents, the security
officers will be able to either mark an incident as normal or emergency. In
this case, an alert security officer who encounters an emergency case such as a break in or a sounding alarm is able to
report the case fast and accurately.
ii.
Here, the incident will automatically be
followed by notifications via phone online and SMS. As such, the person at the
control room is able to take the right response immediately.
iii.
Also, the security officers is able to
call the dedicated numbers added to the phone, which is fast and efficient. View demo reports here
iv.
The technical
team recommends having the first response number to be the patrol vehicles, who
is able to determine the next course of response.
b. Workplacce patrols.
The
checkpoint is installed with NFC tags,
especially at blind spots. The security officers is required to move around
with the Task planning software phone and read the tags after every 30 minutes
or one hour. At every point of reading the tag, the security officer is required
to take image and gpss of the spot, which is compiled as a patrol report and
immediately sent to the control room and area manager.
i.
Missing security officers and tags
If
the security officer fails to read a tag at the required time, the control room
and area manger will get both email
notification and online notification, showing that a tag has been skipped or the patrol has not been done. you need to view the demo report here
ii.
Response to missing patrols
The
control room will view the location of the missed tag, the responsible security
officer as well as the detail of the history of patrols. Then, they will either
send a direct message to the phone, such as “You are required to take patrol
now!” Then, the security officers will see the message pop up on their phone,
with a beeping sound. They will read, respond and then take the required
patrol.
iii.
Response to missing security officers
a) A
security officer may be physically absent at the assignment. Thus there will be no patrols taken at the time set in
the system. Also, a security officer may
be physically present and sleep.
b) If
the security officer does not respond to the message, within about 5 minutes,
then the control room will call the number directly. Here, if the security
officer is physically present and sleeping, they will pick the phone and
conduct the patrol. Also, the control room is able to record the flow of conversation and recommend response in future.
c) If
the security officer does not answer the phone, then the control room will
forward the call to the area response team, which is the response patrol vehicle within the area. They will then go to
the workplacce and evaluate the state of affairs.
Here,
the response taken by the patrol vehicle is viewed
on the area map, which includes the image and gps of the actual workplacce.
c. Disciplinary responses
The
manager at every area is able to recommend a disciplinary response directly
through the event company managers system. For instance, a security officer who
reports working drunk or without uniform is
reported and the response to be taken recommended. Also, this report will
include the image and gps of the given security
officer. Thus the response to be taken
will have valid evidence. find more information here
d. Security officers population
Response to inadequate security
officers at a station
The
person logged in at a given time is able to record the number of security
officers at the given shift. If there is
a need to increase the number of security officers, then they will record the
issue as inadequate security officers, a record
number of security officers needed and the report is viewed directly by
the operations company managers, where they will take the required response.
When
the security officers are assigned to the
station, then they will record their arrival to the station.
e. Late cases.
The
security officers are required to be at their required station at the beginning
of their shift. Using the time attendance records, which are based on biometric data, the late cases are
viewed at any time. Here, the specified
company emails is receiving automated emails when security officers are late, and these will determine the required
cause of response, according to company policies.
f. General security officer company
managers
General
company managers roles, such as a request for uniforms and equipment is done on
the tasks recording system as well. Here, the supervisor will feed the details
of the worker and the items they wish to request. The department responsible is
viewing these records directly from their platform,
and they can either honor or reject them. This function will eliminate the need
for physical visits, which may not be cost-effective. book a free demo here
g. Salary generation.
The
biometric attendance is meant to eliminate ghost workers, late and
absenteeism. Ghost workers is eliminated by having the registration done
based on biometrics of the workers. Only the timesheeted workers will appear in
the salary.
h. Late and absenteeism
The
salary per security officer is calculated
per hour, and if they are late, then they
is deducted the respective amount, which is to accumulate on the record until
the end of the salary period.
Then,
the FINANCE DEPARTMENT will download the salary showing how much each worker
earned and the amounts to be deduced due
to late or absenteeism.
i.
Transfer
of security officers
The
Task planning software time attendance system also incorporates the transfer of
security officers from one assignment to another. Here, the supervisors will
transfer the worker from one assignment to another when logged into the Task planning software, web admin. Then, they
will give a reason for the transfer as well, which is available all the time.
Here, the transferred security officer will timesheet using their biometric at
the new station, and they will no longer
be active in their previous station.
This
feature is important when tracking the worker achievement and behavior since the reasons for transfer is the
basis of determining which security officer to assign a given role.
2.
Implementation
strategy
a.
Every assignment is provided with a mobile phone,
running the Task planning software Applications, which is managed by the
supervisor.
b.
When a biometric-based
time clock is necessary, a FinPoint biometric recorder is provided.
c.
The assignments whose supervisors have
smartphones that can accommodate the software will not require additional
phones.
d.
The security officers attendance records are recorded, where
their ID numbers and names are used as
unique ID.
e.
The security officers is trained on how to clock in and clock out using their biometric Fin point
phone, so that time attendance is obtained
on a daily basis.
f.
The records are
sent to the server station on a daily basis, and the record processed. find out more information here and find the best task planning software for security guards that will change your management strategy.
Comments
Post a Comment