Read the latest news and blogs surrounding access control, time and attendance systems and integrated security solutions with Tensor plc.

Paid Sick Leave case study image

Paid Sick Leave

Starting on February 5, 2007, all employers must provide sick leave to each employee (including temporary and part-time employees) working within the geographical boundaries of San Francisco. More information can be found on the SFGov website. For employees in employment on or before February 5, 2007, paid sick leave begins to accrue on that date. For new employees hired after February 5, 2007, paid sick leave begins to accrue 90 calendar days after the employee’s first day of work. For every 30 hours worked, an employee shall accrue one hour of paid sick leave. Leave accrues only in hour-unit increments, not in fractions of an hour, and the maximum accrual is 72 hours of paid sick leave (effectively 9 days for employees working 8 hours per day). However, where an employer has fewer than 10 employees (whether full-time, part-time or temporary) the limit is 40 hours. Employers with paid sick leave provisions that are at least equivalent to the requirements of the ordinance are not required to provide any additional paid sick leave. The ordinance does not apply if the requirements are specifically waived under the terms of a bona fide collective bargaining agreement. There are a number of different circumstances under which sick pay can be used, including at times of illness or injury to either the employee concerned, family member or other designated person. Further regulations, as yet not approved, would have the effect of allowing employers to choose not to pay for sick leave used by employees between February 5, 2007 and June 5, 2007 until June 6, 2007, and removing any liability for penalties for a failure to pay for sick leave during this period. With changes in state regulation an inevitable part of the future, you may wish to consider investing in a time and attendance system, which automates the process of recording and paying sick leave to your employees.

One-In-Five case study image


E-leashes and hectic schedules are cutting into vacation time as increasingly wired workers are finding it hard to leave the office at home. Although an improvement from 27 percent in 2006, 20 percent of workers say they plan to stay in touch with the office during their vacation this year. Nearly 15 percent of the 6,800 workers surveyed said that they gave up at least one of their vacation days in 2006 because they didn’t have time to use it. Ten percent gave up four or more days. Some workers may not be able to get away at all in 2007. Twenty percent of workers report that they won’t take a vacation this year and one-in-four (27 percent) will take five days or less. In addition, nearly one-in-ten (9 percent) will limit themselves to weekend getaways. When it comes to time off, more than forty percent (43 percent) feel they don’t get enough paid vacation. The majority of workers (70 percent) get two weeks or more of paid vacation; nearly a quarter of workers receive four weeks or more. However, twelve percent of the workforce does not receive any paid vacation. If workers had their way, 69 percent say three weeks or more of vacation is appropriate. Comparing industries, IT workers are the most likely to work while on vacation with more than one-third (36 percent) checking in with the office on their days off. They are followed by Sales workers at 32 percent and Banking / Finance workers at 29 percent. While only nine percent of workers say their employers expect them to check voicemail or email on vacation, others may feel the pressure to do so anyway. There are a host of reasons why employees feel compelled to forgo a vacation or obsessively check in. Some may fear if they are gone and things go smoothly, it will send a message that they aren’t needed. However, the opposite can actually be true. If you prepare in advance and anticipate issues, it can positively reflect on your management and organization skills. Fourteen percent of workers feel guilty that they are not at work while on vacation. Those trying to climb the corporate ladder are the most concerned, with 25- to 34-year-olds reporting the highest level of guilt (20 percent). This guilt may lead some to lie about accessibility at their vacation destinations. Nearly one-in-ten (nine percent) workers have lied to their employers, claiming they couldn’t be reached on vacation. When planning a vacation, we recommend the following tips to make your time off work-free and stress-free: Leave a Roadmap. A few weeks before you leave, start recording important information, key contacts and any deadlines that will come up while you are gone. If you leave co-workers with a guide that will help them address questions that arise and keep things moving forward, they will be less likely to contact you on vacation and you will be less likely to walk into a war zone when you return. Stick to an Itinerary. While it’s best to leave the office at the office, if you must do work, set limits and boundaries for yourself and your co-workers. Don’t let activities on vacation be interrupted by work. Set aside a half hour each day to think about work and stick to it. Instead of having co-workers call you, tell them when you are going to check in, so you can control the time allotted. Think Big. If you have a big project and a great vacation planned for the same week you can expect one of the two to give. Schedule the dates before and after the big stuff to lighten your load and enjoy your time off. What if You’re the Boss? If you’re working for yourself, make sure you anticipate your busy seasons by reviewing your previous sales and current situation. Save vacation time for slower periods and make sure to notify customers in advance. You may wish to consider investing in a time and attendance system, which automates the process of recording and paying vacation leave to your employees.

Information Security Tips case study image

Information Security Tips

Small businesses and organizations may be daunted by the perceived resources it takes to secure their systems; however, not making cyber security a priority could be a costly decision. The following six tips represent key security principles that we recommend implementing and are intended to provide a starting point for a more comprehensive information security plan. For more detailed information on how to create a more robust security plan go to Ensure that all employees use effective passwords, and when possible, stronger authentication technology. Encourage passwords that are comprised of different upper and lower case letters characters and change them every 60 to 70 days. In many cases, passwords may not provide you with enough protection and security – for a more secure and reliable way to authenticate users and prevent hackers from stealing passwords, you may consider implementing a multi-factor authentication process*. Protect your systems by installing and using anti-virus programs, anti-spyware programs, and firewalls on all computers in your business. Ensure that all computer software is up-to-date and contains the most recent patches (i.e. operating system, anti-virus, anti-spyware, anti-adware, and firewall). Most security and operating systems contain automatic updates, but make sure that the function is turned on and sign up for security notifications from the software company. Without updates, your systems will not be well protected against new cyber threats. Make regular (weekly) back-up copies of all of your important data/information. Store a secured copy away from your office location and use encryption to protect any sensitive information about your company and customers. Regularly creating back-ups better ensures that your critical data is not lost in the event of a cyber attack or physical incident, like a fire or flood. Be prepared for emergencies by creating a contingency plan for your business, and include provision so that you can continue business operations at an alternate location if necessary. Test your plan annually. Protect your customers’ data from hackers and thieves by encrypting it. Encryption programs encode data or make it unreadable, until you enter a password or encryption key that unlocks it. Some encryption programs are built into popular financial and database software and some broadband providers now include encryption for wireless networks as a part of their service. In some cases you may need an additional program to properly encrypt your sensitive data. Locate and join an organization of your peers for information sharing purposes. If you suspect fraud or criminal intent, report it to the local law enforcement agencies, the local Federal Bureau of Investigation, Secret Service, or State Attorney Genera’s offices. Moreover, some states require you to notify your customers if hackers or thieves steal or could have stolen your customers’ unencrypted personal information, including data residing on a computer stolen in the offline world. *Multi-factor authentication is like putting a deadbolt on your front door. The extra “lock” or layer of security makes it more difficult for hackers to view or steal sensitive data. Multi-factor authentication can be a software program or a device that is used in addition to your regular login and password method. Biometrics, such as a fingerprint scanner, is an example. Some organizations also use “risk-based” authentication technology that looks at a number of metrics – such as behavioral patterns, or the IP address – to verify a user’s identity without asking the user for any specific input. In each case, the user can gain access to sensitive data only if the correct information is received (the random number, the right fingerprint, or the expected usage metrics).

Workers On Military Leave case study image

Workers On Military Leave

A recent survey has indicated that only 4% of HR executives surveyed reported a “significant impact” within their organizations when Reservists or National Guard members were deployed, while almost two in 10 (19%) said their workplaces have been impacted to “some” extent. The survey also found that almost four out of 10 (38%) respondents said the call-ups had “little” impact and about the same number (39%) said there was no impact at all on their organization. Fewer than 1% of respondents reported having between 11% and 15% of their employee populations deployed by the military. The majority (62%) reported having between 6% and 10% involved in active-duty military operations, while about one-third (34%) reported that none of their employees have been called up for active duty. Of those organizations with employees on active duty, 2% indicated that their employee(s) had been killed while serving in the military, with 1 percent of respondents reporting the death of one employee and an additional 1% reporting the death of 3 employees. One percent of HR executives polled reported having 3 employees wounded so severely while on duty that they were unable to return to work. Three percent reported having 1 employee wounded that severely. Just over half the respondents (54%) indicated that the work of absent Guard members or Reservists was distributed among existing employees. Just over one-quarter of respondents (26%) hired temporary or permanent employees to do the work of absent military personnel. As for pay and benefits, almost four of 10 (38%) employers offered employees additional pay to make up the difference between the employee’s military compensation and his or her salary with the company, while the remainder did not. Six of 10 (61%) employers continued to offer health benefits to employees while they were away on active duty, while 30% did not and 9% were not sure. With the number of workers on military leave increasing, it is vital that organizations make the appropriate arrangements in order to cope with employees having to take long-term absences from employment. To keep track of the changing circumstances of your part-time and full-time employees, you may wish to consider investing in a time and attendance system, which automates the process of recording and paying salaries to your employees.

Impact Of Minimum Wage Hike case study image

Impact Of Minimum Wage Hike

Though long-awaited and much discussed, the first increase to the federal minimum wage in 10 years will likely have little effect on the employment world. The provision, which also includes some corrections and adjustments to the Pension Protection Act of 2006, will increase the federal minimum wage from $5.15 to $7.25 per hour in three separate phases over two years. Despite the more-than-$2-an-hour increase overall, many states already have higher minimum wages than the federal government. In addition, many industries already have higher-than-minimum wages just to stay competitive and the legal minimum has actually been falling over the last several years in comparison to the overall wage level. In short, the increase will benefit an estimated 4 percent to 5 percent of the workforce who earn less than $7.25 an hour, with the vast majority of employees and employers affected being small businesses and those in the restaurant and retail industries. The increase may have the impact of increasing the lowest-paid jobs in an organization, particularly if they are close to but above the minimum wage. Other jobs that are compared to these close-to-minimum-wage jobs may also be affected as people compare employment opportunities with pay levels. This creates a ‘ripple effect’, which raises pay for many employees, not just the lowest-paid. Businesses may respond by raising prices, reducing labor hours and changing the mix of part-time and full-time employees. However, these actions must also be balanced by increased turnover, which is costly. As big a jump as more than $2 seems, it’s really not a huge increase. What could be significant is the level of fear out there that these kinds of increases will get pushed up the ladder into higher-paying jobs. Though that wouldn’t normally be that much to worry about, in today’s environment, with the price of gasoline so high, people just might be more likely to demand higher wages for skilled positions as well as lower-level ones after this. There is also a prevailing notion that boosting the minimum wage could increase or decrease employment figures. This hike may accelerate the machine-over-people replacement factor, particularly in places such as fast-food restaurants; however, there again, this is likely to be negligible. What’s more, boosting the minimum wage can actually have positive impacts on employers and employees. A recent study showed states that raised their minimum wages above the federal level performed better than low-wage states in terms of retail-payroll growth and overall employment figures. Impact or not, positive or negative, the change to the minimum wage has been a long-awaited victory for many Americans across the country. With changes in state regulation an inevitable part of the future, you may wish to consider investing in a time and attendance system, which automates the process of recording and paying wages to your employees.

Contingent Workforce Growing case study image

Contingent Workforce Growing

A new report predicts that within two years, 10 percent of the entire U.S. workforce will be made up of contingent workers, with pharmaceutical, biotech, and retail sectors experiencing the largest growth in temporary and contract workers. According to the survey, Fortune 1,000 companies will expand the use of contingent workers to manage variable or unpredictable workloads. They will also be required to handle the strong overall growth at many companies and to cope with the difficulty of finding quality workers in a low-unemployment environment. As the contingent workforce grows, corporations will need to be much more sophisticated in managing this increasingly large expense. They must look closely at crafting a well-conceived contingent-workforce program, leveraging technology, and assigning talented managers to oversee this area of operations. According to the report, 77 percent of the companies surveyed expect to grow their contingent workforce in the coming years. It also found that decision-making about the contingent workforce is currently dispersed across several different corporate levels, and the typical manager with responsibility for contingent labor decisions spends only 20 percent to 39 percent of his or her time on this task. The report also found that procurement managers, rather than HR professionals, will increasingly control the management of contingent-labor programs – a notion that could lead to trouble. Procurement managers approach buying people in the same way they approach buying pencils. While a contingent workforce allows companies to put elasticity in the budget, organisations leak millions of dollars annually because they do not effectively manage their contingent workforce. Companies must also focus on the “three Cs” of cost, compliance and control in order to achieve the best possible returns from their contingent workforce. In order to achieve this, you may wish to consider investing in a time and attendance system, which automates the process of recording and paying your contingent workforce.

Building Control and Automation case study image

Building Control and Automation

Why is the security industry showing increased interest in building control and automation? How do such systems relate to what we recognize as standard access control systems? Security is increasingly challenged to create solutions that are both cost-effective and provide much-needed ROI (return on investment), while also reducing the total long term investment in the overall security operation. Security system integration and convergence have made a dramatic impact on creating these efficiencies and enhancing the overall capabilities of the security operation. For some time, there has been integration at basic levels to the building control and automation systems by using mechanical and some serial interfacing. But the increased pace of convergence into the IT/IS space and the use of TCP/IP as a form of communication have opened a new world of possibilities and provided a mean to streamline cumbersome and costly tasks. System Integration with Access Control With heating, ventilation and air conditioning (HVAC) systems accounting for nearly 40 percent of the energy used in commercial buildings in the United States, they are clearly an important opportunity for greater control of both cost and performance. Like all formerly standalone systems, ubiquitous access control systems are converging and integrating into new and expanded areas of control and facility management, including HVAC. This new integration paradigm offers advantages and efficiencies that are now becoming apparent, thus prompting considerable investment. As intelligence and capabilities migrate to edge devices, a period is emerging in which we can integrate and control just about every aspect of a business – telecommunications, network and internet access, HVAC control, elevator control, physical access and video surveillance. The list is limited only by the end-user’s needs and the designer or integrator’s knowledge and abilities. Pushing intelligence to the edge devices will be the future of convergence in the security sector. Access Control: You Have Only Just Begun In addition to providing substantial cost, security and convenience benefits, there are other benefits from automating physical security and building control. Scheduled maintenance of all security and building control systems can be combined, thus ensuring maximum return on investment, lower operational costs and reduced system downtime.

A Reassuring Touch case study image

A Reassuring Touch

After years of trial-and-error experimentation, biometric identification is finally starting to see wide-scale adoption by corporations and government agencies. The technology is cropping up in systems used for everything from password and credit card replacement to military and law enforcement pursuits. Biometrics have been under development for a long time, both in the U.S. and abroad. But now, the technology is making the transition from curiosity item to the top of priority list. Opinions vary widely on the merits of various biometric approaches. But according to some experts, fingerprint technology is the most mature biometric technology available today, characterized by relatively easy usability and high accuracy. The use of increasingly capable sensor technology for rising accuracy in fingerprint recognition – especially in terms of reduced “false positives” – is credited for being the main force behind the increased implementation. By combining biometric identifiers with smart cards or key fobs, organizations benefit from an extra measure of security known as “two-factor authentication”. Not only does a user have to present their fingerprint to the scanner, they also have to produce a token identifier as well. Today’s regulatory climate is the biggest single driver toward corporate biometric applications, and as such has stemmed an increasing interest in biometric-enabled systems and software. Tensor is the leading manufacturer of time attendance and access control equipment, and as such have developed systems that incorporate fingerprint recognition technologies. Biometric Time and Attendance Buddy punching is a practice that has been around for as long as clocking in machines have been present in our workplaces. If all that is required to register an employee at their place of work is a clock card or attendance fob, then whoever is in possession of that device is able to “buddy punch” or clock in the owner. By implementing biometrics, an employee must scan their fingertip into the system in addition to presenting their clocking device in order to be clocked IN on a Tensor time attendance system. Biometrics virtually eliminates the occurence of buddy punching, enabling you to keep a firm track on who is at work and when. Biometric Access Control Organizations with secure areas on their site have been particularly keen to implement fingertip recognition capabilities. Access to pre-defined areas is no longer compromised as users must present both their access card or fob and their fingerprint. In addition, a log is generated that displays not only each successful access through a particular point, but also failed accesses along with the identity of the person who tried to gain access. Biometrics does not need to be installed at every access point within your Tensor access control network, so you can pick and choose the areas of your site, which require additional protection.

Contactless Smart Card Technology case study image

Contactless Smart Card Technology

Contactless smart card technology is used in applications that need to provide quick and accurate verification, for example access control. Contact smart card technology provides similar capabilities but does not have the RF interface that allows contactless smart cards to be conveniently read at a short distance from the reading mechanism. The smart card technology embedded in a Tensor access control or time attendance system provides the user with an extraordinarily fast read time, typically in under ¼ second. In addition, the read range of the RF readers used to scan the cards can reach 6 inches, even if it is covered in oil or grease. The contactless device includes a smart card secure microcontroller and internal memory, and has the unique ability to securely manage, store and provide access to data on the card, perform complex functions (for example, encryption or other security functions) and interact intelligently via RF with a contactless reader. Applications using contactless smart cards support many security features that ensure the integrity, confidentiality and privacy of information stored or transmitted. Mutual Authentication – for applications requiring secure card access, the contactless smart card-based device can verify that the reader is authentic and can prove its own authenticity to the reader before starting a secure transaction. Strong Contactless Device Security – contactless smart card technology is extremely difficult to duplicate or forge and has built-in tamper-resistance. Smart card chips include a variety of hardware and software capabilities that detect and react to tampering attempts and help counter possible attacks. The on-chip intelligence uniquely enables systems that use contactless smart card technology to comply with strong privacy and security guidelines, as well as deliver the speed and convenience of contactless communication.

Cant find what you're looking for?

Enter a search term below (e.g. "Time and Attendance") and we'll find all of our relevant content for you.

Tensor plc accreditations

Keep up to date with our latest news & developments.

Be the first to get product and software updates and other important information.