<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Guard Tour Patrol System Archives - Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</title>
	<atom:link href="https://www.uniguard.com.au/tag/guard-tour-patrol-system/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.uniguard.com.au/tag/guard-tour-patrol-system/</link>
	<description>Staff and asset tracking software to performance manage your workforce and improve the quality of services delivered</description>
	<lastBuildDate>Thu, 09 May 2024 04:32:01 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://www.uniguard.com.au/wp-content/uploads/2024/05/cropped-UniGuard-Light-Colour-Icon-32x32.webp</url>
	<title>Guard Tour Patrol System Archives - Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</title>
	<link>https://www.uniguard.com.au/tag/guard-tour-patrol-system/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Celebrating Over 25 Years in the Industry</title>
		<link>https://www.uniguard.com.au/celebrating-over-25-years-in-the-industry/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Mon, 17 Jul 2023 05:06:29 +0000</pubDate>
				<category><![CDATA[Cleaning]]></category>
		<category><![CDATA[Facilities]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[Guard Tour System]]></category>
		<category><![CDATA[iButton]]></category>
		<category><![CDATA[Security Guard Tracking]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=31016</guid>

					<description><![CDATA[<p>Over 25 years ago the Australian security industry was introduced to UniGuard with the&#160; Robust iButton Attendance Verification Wand. From the start, the focus of UniGuard has been to provide...</p>
<p>The post <a href="https://www.uniguard.com.au/celebrating-over-25-years-in-the-industry/">Celebrating Over 25 Years in the Industry</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Over 25 years ago the Australian security industry was introduced to UniGuard with the&nbsp; <a href="https://www.uniguard.com.au/products/robust-recorders/" target="_blank" rel="noreferrer noopener">Robust iButton Attendance Verification Wand</a>. From the start, the focus of UniGuard has been to provide indisputable proof of staff movements, asset tracking and attendance verification, thus delivering proof of service.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color">The Indestructible Robust</h2>



<p>Many guards didn’t like the Robust iButton wand, as it finally gave managers a way of seeing whether they were doing their rounds properly. Over the years guards have tried all sorts of things to damage the wands, including:</p>



<ul class="wp-block-list">
<li>Repeatedly bashing the wands as they do their rounds</li>



<li>Dropping the wands off tall buildings</li>



<li>Crushing and squeezing them</li>



<li>Driving over the wands</li>



<li>Throwing them into the sea.&nbsp;</li>



<li>Cooking and microwaving them</li>



<li>Hooking them up to a car battery</li>



<li>And a few things we’d prefer not to mention!</li>
</ul>



<div style="height:36px" aria-hidden="true" class="wp-block-spacer"></div>



<p>During all this, the recorders survived to live another day; they just kept going and going! Which is why some are still in use today. Watch for yourself:</p>



<figure class="wp-block-video"><video autoplay loop muted src="https://www.uniguard.com.au/wp-content/uploads/2022/03/Indestructible-Robust-Vs-Stairs.mp4"></video></figure>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>The Evolution of UniGuard</strong></h2>



<p>Since this time, the UniGuard software and hardware offering has evolved over the years as technology has improved and customer needs developed.</p>



<p><br>The original software that worked with the Robust iButton Wand was designed as a stand-alone system, with a server-based system coming later. The system works by guards physically touching the Robust wands to an <a href="https://www.uniguard.com.au/products/checkpoints/#iButton" target="_blank" rel="noreferrer noopener">iButton checkpoint</a>. The time and checkpoint number is recorded. At the end of a shift the information is manually downloaded onto the computer where the data can be viewed.</p>



<p><br>Over time it was recognised that connectivity would help streamline business operations and enable growth. With improving technology, our first web-based platform, UniGuard 12 was created in 2011. UniGuard 12 was designed to work with our <a href="https://www.uniguard.com.au/products/real-time-recorder/" target="_blank" rel="noreferrer noopener">Real-Time Recorders</a> that use mobile phone cell-tower connectivity to deliver tracking information in real-time to a central computer. An added benefit was that Real-Time Recorders can work with <a href="https://www.uniguard.com.au/products/checkpoints/#Passive" target="_blank" rel="noreferrer noopener">RFID checkpoints</a>, which don’t need physical contact with the recorder to work.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Smartphone Apps, Bluetooth and NFC</strong></h2>



<p>The emergence of smartphones has widened the opportunities for what could be achieved with our attendance verification systems. From this we have developed the <a href="https://www.uniguard.com.au/products/staff-tracking/" target="_blank" rel="noreferrer noopener">UniGuardX app and Dashboard</a>.<br>The UniGuardX smartphone app works in a similar way to real-time recorders but using <a href="https://www.uniguard.com.au/products/checkpoints/#NFC" target="_blank" rel="noreferrer noopener">NFC checkpoints</a> and <a href="https://www.uniguard.com.au/products/checkpoints/#BLE" target="_blank" rel="noreferrer noopener">Bluetooth beacons</a> instead of RFID. Like Real-Time Recorders, apps do not require the phone to physically touch the checkpoint, and send the data in real-time across the phone networks.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Why Use Phone Apps Over iButton Recorders?</strong></h2>



<p>The main reason is the technological improvements; smartphone apps can do so much more than the Robust iButtton Wands. The benefits of using an app include:</p>



<ul class="wp-block-list">
<li>A clean fresh design that works on the latest operating system and multiple devices such as tablets in the field, with updated data security features.</li>



<li>The software is continually being improved with feature updates that align with the current trends within the industry.</li>



<li>Data is collected, sent to the dashboard, viewed, analysed and reported on in real-time, allowing for timely responses and better resource management.</li>



<li>Integrated workflows using <a href="https://www.uniguard.com.au/solution/digital-forms/" target="_blank" rel="noreferrer noopener">in-app forms</a>, which can be set up to collect additional data to time and location, such as text, photos and signatures. Great potential uses include task checklists and incident forms.</li>



<li>Digital form data is easier to store, retrieve and analyse than paper forms. Idea for both legal and business performance uses.</li>



<li>Customisable and flexible to fit your business requirements and those of your clients.</li>



<li>Doesn’t require specialist hardware, and is easy to set up and start using.</li>



<li>Can be used on any phone so a new staff member can download the app on the way to a job, negating the need to go to the office first to collect the Robust wand.</li>



<li>For staff safety and compliance, UniGuardX apps offer man-down alerts in real time. When pressed, an alert pops up on the dashboard map, and can also be sent as a text or email.</li>
</ul>



<div style="height:36px" aria-hidden="true" class="wp-block-spacer"></div>



<p>The industry has gone a long way in the past 25 years, and UniGuard has been there for every step of the journey. Something we will continue into the future.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Want to know more about how UniGuardX can improve your business outcomes? <a href="https://www.uniguard.com.au/contact/">Contact our sales team today</a>.</strong></p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/celebrating-over-25-years-in-the-industry/">Celebrating Over 25 Years in the Industry</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.uniguard.com.au/wp-content/uploads/2022/03/Indestructible-Robust-Vs-Stairs.mp4" length="12194526" type="video/mp4" />

			</item>
		<item>
		<title>How To Do a Good Security Guard Patrol Tour</title>
		<link>https://www.uniguard.com.au/how-to-do-a-good-security-guard-patrol-tour/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Fri, 23 Jun 2023 09:15:49 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[Guard Tour System]]></category>
		<category><![CDATA[Security Guard Tracking]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=30978</guid>

					<description><![CDATA[<p>Security guard patrol tour management is a system of planning, organisation, and supervision of security guard patrols, along a route or within a facility. Processes and tools are executed to...</p>
<p>The post <a href="https://www.uniguard.com.au/how-to-do-a-good-security-guard-patrol-tour/">How To Do a Good Security Guard Patrol Tour</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security guard patrol tour management is a system of planning, organisation, and supervision of security guard patrols, along a route or within a facility. Processes and tools are executed to ensure that security guards carry out their assigned patrols effectively and efficiently.</p>



<p>The main goal of managing a security guard patrol tour is to improve the security and safety of a premises by maintaining a visible security presence to deter potential threats to individuals or the property. Through the implementation of a well-structured patrol system, security guards can monitor and protect the area more effectively, respond promptly to incidents, and provide a sense of security to occupants and visitors. Key aspects are detailed below.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Training and Communication</strong></h2>



<p>The correct training is critical for security guards involved in patrol tour management. They should be trained on patrol procedures, emergency response protocols, and the use of any technology or tools such as UniGuardX that are used in the process. Regular communication with supervisors help keep guards informed about any changes or updates in security protocols.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Patrol Planning</strong></h2>



<p>Initially a comprehensive plan of the site or route to be patrolled needs to be created. The patrol routes, the frequency and duration of patrols, and the checkpoints or key areas to be covered need to be determined. The plan should be tailored to the specific needs and vulnerabilities of the facility.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Patrol Scheduling</strong></h2>



<p>Successful patrol tour management involves instituting a well-defined schedule that outlines when each patrol should take place, the duration of each patrol, and the security officers who should be assigned to each patrol. A reliable tracking system helps guarantee that the facility is consistently protected, and there are no gaps in security coverage.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Checkpoint Locations</strong></h2>



<p>Checkpoints need to be placed at important locations where security guards are required visit during their patrols. These checkpoints in the form of NFC tags, RFID tags or Bluetooth beacons should be placed in entrances, exits, or other critical areas. Alternatively, a geofence or virtual checkpoints that relies on GPS can be used. Checkpoints help ensure that guards follow the designated route and complete their patrols as required by the contract.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Real-Time Monitoring</strong></h2>



<p>In 2023, patrol tour management systems such as UniGuardX incorporate the latest technology like mobile apps, GPS tracking, and real-time reporting. These tools enable supervisors to monitor the progress of patrols in real-time, making sure that the guards are following the set routes and schedules. It also allows for immediate incident reporting and quick response to emergencies.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Incident Reporting</strong></h2>



<p>A part of a security guard’s duty should be to document any incidents or problems they encounter during the patrols. Using the UniGuardX app, this information can be recorded in a custom-made incident report, which includes details such as the time, location, nature of the incident, and any actions taken, photographs and the guard’s signature. Incident reports are an essential tool for maintaining an accurate record of security events and assisting with investigations if needed. Collecting and keeping this information in digital form makes storing and reporting such information easy.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Performance Monitoring</strong></h2>



<p>Regular evaluation and feedback is essential for maintaining a high standard of security. UniGuardX makes it easy for supervisors to conduct periodic assessments of patrol performance, reviewing reports, analysing patrol data, and providing constructive feedback to security personnel. This process helps identify areas for improvement and ensures that security guards are effectively fulfilling their duties.</p>



<h2 class="wp-block-heading"><strong>Management and Client Reporting</strong></h2>



<p>Using automatically scheduled and generated reports, supervisors can easily keep senior management informed of their operations. For the maintenance of contract, custom reports can also be scheduled to be sent to clients with the important information they need to know, in an easy-to-read format.</p>



<h2 class="wp-block-heading"><strong>Summing Up</strong></h2>



<p>Overall, security guard patrol tour management is an essential component of an effective security scheme. By implementing proper planning, using the UniGuardX app, and maintaining regular supervision, organisations can enhance the effectiveness and efficiency of security patrols, contributing to a safer and more secure environment for everyone.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>If you are looking for a high-quality guard tour management system that meets your needs, <a href="https://www.uniguard.com.au/contact/">contact our sales team today</a>.</strong></p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/how-to-do-a-good-security-guard-patrol-tour/">How To Do a Good Security Guard Patrol Tour</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Technological Solutions for the Security Industry</title>
		<link>https://www.uniguard.com.au/technological-solutions-for-the-security-industry/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Fri, 06 May 2022 01:44:28 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[Security Guard Tracking]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=30245</guid>

					<description><![CDATA[<p>Local and global events have presented numerous challenges to security industry operators that have resulted in rapid changes to various aspects of the industry. The pandemic has pushed security staff...</p>
<p>The post <a href="https://www.uniguard.com.au/technological-solutions-for-the-security-industry/">Technological Solutions for the Security Industry</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Local and global events have presented numerous challenges to security industry operators that have resulted in rapid changes to various aspects of the industry.</p>



<p>The pandemic has pushed security staff to the frontline, many of whom have become sick and been absent from work. Some have subsequently left the industry.</p>



<p>At the same time economic pressures have simultaneously pushed up the costs of running a business and driven staff to want higher wages while customers expect better value for money. Some businesses have gone into liquidation as a result.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong><strong><strong>The Pressure of Doing Business</strong></strong></strong></strong></strong></strong></h2>



<p>Company managers now need to more than ever, consider the value and cost of every aspect of their business. In such an environment it can be tempting to cut all costs to a minimum. But doing so may cause unforeseen problems in other areas of operation.</p>



<p>So, how do you decide what is worth spending money on and what is vital to maintaining a viable operation into the future?</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong>Finding Value for Money in Technology</strong></strong></strong></strong></h2>



<p>For many successful businesses in the security industry, the answer to this question lies in the increase adoption of advanced technologies to compliment or replace traditional methods.</p>



<p>Such technologies satisfy the customer need for proof of service and transparency of operations, while at the same time give the security operator an edge over their competitors when tendering for and maintaining contracts.</p>



<p>In fact, nowadays, many customers expect that security providers will use the latest technology and won’t work with a company that doesn’t.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>A Blended Solution</strong></h2>



<p>Savvy operators have also found that the best solution is a mixture of the old and the new. One such example is with the replacement of mobile security patrols with high resolution cameras. On the surface, this initially seems to be a better value alternative.</p>



<p>Unfortunately, as good as these cameras are, even the best placement cannot allow every part of a site to be covered, and many issues are missed as a result. As well, a visible presence of a security guard is still a good deterrent that many customers appreciate.</p>



<p>A mixture of in-person mobile patrols and cameras combines the best of both to give the greatest overall coverage to meet the customers’ needs.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Guard Tour Management Systems</strong></h2>



<p>Advanced technologies like Guard Tour Management Systems (GTMS) should also be used to get the best out of mobile patrols while increasing the customer satisfaction with the service.</p>



<p>GTMS work by tracking the movement of the guard through the interaction of a recording device carried by the guard with checkpoints placed around a site. Checkpoints can come in many forms but the most durable and secure use RFID, NFC or Bluetooth technologies.</p>



<p>When UniGuard introduced GTMS to the Australian market over 20 years ago, the recorders were purpose built for the industry. Purpose built recorders are still in use, while in recent years a new method of using apps on smartphones has also become available.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>The Benefits of Using a GTMS</strong></h2>



<p>The main benefit of using a Guard Tour Management System is accountability. GTMS allow supervisors to track their guard performance and use this information to better manage and improve the efficiency of the workforce, which can ultimately save on costs.</p>



<p>Customers like the transparency as they can easily see that they are getting the service they are paying for. Proving good service helps to retain customer contracts.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>What Makes GTMS Apps Better?</strong></h2>



<p>Guard tour management apps have several advantages over other systems. This helps make the app more versatile and better suited to operating environment many businesses find themselves in today.</p>



<p>More recently developed systems, including apps and some purpose-built recorders, operate in real-time. This means that the position and time of the guard is sent back to the supervisor via the cellular phone network. The supervisor can then view guard activity, including incident alerts, live using the application dashboard.</p>



<p>A good GTMS app also offers the flexibility of choice between IOS and Android phones. This allows the security company to either install the app on a company phone or allow the guard to use their own phone. The system can even be installed on a Push-To-Talk radio such as the UG-725.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong>Digital Forms, the Special Feature</strong></strong></strong></strong></h2>



<p>The standout feature that really sets the UniGuardX GTMS app apart from other systems are the digital smart forms. These do much more than simply track the time and location of the guard.</p>



<p>With smart forms, guards can carry useful paperwork with them in their phone. These forms can collect additional site information such as checklists, comments, photos and signatures. Smart forms are fully flexible and can be customised to the requirements of the security business. Potential uses include:</p>



<ul class="wp-block-list">
<li>Security and safety checklists</li>



<li>Vandalism or incident reports</li>



<li>Entrances/exit lock up checks</li>



<li>Run sheets</li>



<li>Contract, ASIAL and SLED compliance</li>



<li>Visible proof of service.</li>
</ul>



<p>   </p>



<p>   </p>



<p>When a guard submits as form, the information is sent directly to the dashboard, where the supervisor is alerted. Data can be collected for analysis, secure storage, easy retrieval, and automatic scheduled reporting to customers, all of which saves both time and money in the long term. Ultimately, enhanced tracking means better business outcomes.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Why Should Security Companies Use UniGuard?</strong></h2>



<p>In a rapidly changing industry, businesses need to adapt and become more agile to survive. Using the latest technological innovations will give any business the edge over their competition.</p>



<p>Unlike other businesses that sell similar services, UniGuard has been working closely with the Australian security industry for over 20 years finding innovative technological solutions to the unique challenges of the industry. &nbsp;With an understanding of the industry, along with local personalised service and support, UniGuard has enabled our valued customers to grow their businesses.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>If you are looking for a high-quality guard tour management system that meets your needs, <a href="https://www.uniguard.com.au/contact/">contact our sales team today</a>.</strong></p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/technological-solutions-for-the-security-industry/">Technological Solutions for the Security Industry</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Do iButton Checkpoints Work?</title>
		<link>https://www.uniguard.com.au/how-do-ibutton-checkpoints-work/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 23:52:00 +0000</pubDate>
				<category><![CDATA[All Industries]]></category>
		<category><![CDATA[Cleaning rotation]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[iButton Checkpoints]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=29301</guid>

					<description><![CDATA[<p>For over 2 decades UniGuard has been supplying Robust wands and iButton checkpoints to the Australian market. With a variety of staff attendance tracking systems available, and new technologies entering...</p>
<p>The post <a href="https://www.uniguard.com.au/how-do-ibutton-checkpoints-work/">How Do iButton Checkpoints Work?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>For over 2 decades UniGuard has been supplying <a rel="noreferrer noopener" href="https://www.uniguard.com.au/products/robust-recorders/" target="_blank">Robust wands </a>and iButton checkpoints to the Australian market. With a variety of staff attendance tracking systems available, and new technologies entering the marketplace all the time, a good question to ask is, why do some people still like using the Robust system? This is answered in the following paragraphs, but first it’s good to know a bit of the background.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong>What are iButtons?</strong></strong></strong></h2>



<p>Essentially, an iButton is a computer microchip encased within a small 16mm diameter stainless-steel case. iButtons (which also go by the name Dallas Key), are a type of 1-Wire device in a self-contained format. 1-Wire is a simplified data communications system between compatible devices, that allows low-speed data, signalling, and power over a single power/data wire, although technically the device also has a ground wire.</p>



<p>Both 1-Wire and iButtons were originally developed by the Dallas Semiconductor Corporation several decades ago.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong>How Do iButtons Work?</strong></strong></strong></h2>



<p><a href="https://www.uniguard.com.au/products/checkpoints/#iButton" target="_blank" rel="noreferrer noopener">iButtons</a> are similar to NFC, RFID and BLE checkpoints in that the iButtons contain a small memory chip where a small amount of data, usually a unique ID number is stored. The main difference is in the way iButtons transfer information to the recorder.</p>



<p>This is achieved through a physical connection that is initiated when a user touches an iButton with the reader head of the recorder, long enough to hear an indicator beep and blue light. While connected the battery in the recorder powers the chip inside the iButton that then sends the ID number to the recorder for storage within the recorder memory chip, along with the time and date. A similar process can be used to transfer this information to a computer for analysis and reporting, or alternatively the data can be sent in real time using the cellular telecommunications networks.</p>



<p>The case of the iButton acts as both a strong protective shield for the memory chip and the terminals that connect and transfer power and data between the chip and the recorder device. The lid acts as the data/power terminal, the base acts as the ground, and are separated by a polypropylene grommet.</p>



<p>Due to the presence of a chip some iButtons have the ability to both read and write as well as sorting different types of data, however the iButtons used for the staff attendance tracking checkpoints only need to read-only.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong>Why Are They Still In Use?</strong></strong></strong></strong></h2>



<p>Basically, because they are very tough. Of all the different types of staff attendance systems available, iButtons and the Robust recorders are the most durable and long lasting.</p>



<p>The iButton casing is designed to withstand harsh and demanding environments and can survive large mechanical stresses such as being dropped, scratched, stepped on or repeatedly hit. Additionally, it is also water resistant and can endure being immersed in sea water and most common chemicals. Robust recorders are equally tough. Due to the rugged design the iButton is guaranteed for 10 years but in reality, last much longer.</p>



<p>Being built to operate in a temperature range of -40 to 70°C, the metal casing protects the ID number on the microchip from damage or changed due to radiation from magnetic fields such as from metal detectors. This also includes radio and microwave signals. Along with the mechanism of use, this means that the iButton is not prone to potential interference from Wi-Fi and Bluetooth.</p>



<div style="height:100px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-video"><video autoplay loop muted src="https://www.uniguard.com.au/wp-content/uploads/2022/03/Indestructible-Robust-Vs-Seawater.mp4"></video></figure>



<div style="height:100px" aria-hidden="true" class="wp-block-spacer"></div>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong>What Are Some of the Uses For iButtons?</strong></strong></strong></strong></h2>



<p>Because the chip within the iButton has a unique identifier code or number, is secure and small enough to fit on a key fob, the iButton can be used for a range of applications. Uses include access control, locks, manufacturing controls, time clocks, smart transport tickets, and checkpoints for time and attendance verification.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong>The Good and the Bad of iButton Checkpoints</strong></strong></strong></strong></h2>



<p>As has already been explained, the biggest advantage of iButtons over other checkpoints is durability. Apart from being almost indestructible, the checkpoint does not require a battery and is very secure because they can only be read by specialist equipment. This also means that it is functionally impossible to copy or spoof the checkpoints, something some staff do to avoid having to do their rounds.</p>



<p>The need for specialist hardware can also be seen as a downside for people looking for a staff attendance tracking system that can be run on the staffs’ smartphones. The other potential disadvantage is that the hardware must make contact with the checkpoint to be read. This also mean that the reading may not work if either the checkpoint or recorder are wet or dirty, therefore the checkpoint may need cleaning occasionally.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong><strong>Summing Up</strong></strong></strong></strong></strong></h2>



<p>Robust recorders and iButton checkpoints are the ideal attendance tracking system for business operating in harsh environment and are particularly suited for mobile security patrols of isolated outdoor locations. UniGuard also offers a real-time system for managers wanting to transition from a Robust system without the hassle of replacing all the iButton checkpoints with RFID or NFC checkpoints.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>If you are looking for the toughest staff attendance tracking system in the marketplace, <a href="https://www.uniguard.com.au/contact/">contact our sales team</a> today.</strong></p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/how-do-ibutton-checkpoints-work/">How Do iButton Checkpoints Work?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.uniguard.com.au/wp-content/uploads/2022/03/Indestructible-Robust-Vs-Seawater.mp4" length="44564403" type="video/mp4" />

			</item>
		<item>
		<title>How Do NFC Checkpoints Work?</title>
		<link>https://www.uniguard.com.au/how-do-nfc-checkpoints-work/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Mon, 16 Aug 2021 00:47:00 +0000</pubDate>
				<category><![CDATA[All Industries]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[NFC Checkpoints]]></category>
		<category><![CDATA[Rotation compliance]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=29295</guid>

					<description><![CDATA[<p>Two technologies can be used as checkpoints in conjunction with smartphone apps to track staff and assets. One of these is Bluetooth Low Energy, the other is NFC. What is...</p>
<p>The post <a href="https://www.uniguard.com.au/how-do-nfc-checkpoints-work/">How Do NFC Checkpoints Work?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Two technologies can be used as checkpoints in conjunction with <a href="https://www.uniguard.com.au/products/staff-tracking/" target="_blank" rel="noreferrer noopener">smartphone apps </a>to track staff and assets. One of these is Bluetooth Low Energy, the other is NFC.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong>What is NFC?</strong></strong></strong></h2>



<p>Near Field Communication or NFC is one of many different types of RFID technology, and as such, is not considered to be a separate, or newer technology. Instead, NFC is a communication standard for RFID developed specifically for incorporating RFID technology into mobile phones.</p>



<p>The NFC standards were first set out in 2004, by the NFC Forum, a consortium formed by Nokia, Sony and Philips. Since this time, further adjustments have been made to the NFC standards. As with all new ideas, it has taken time for the standard to be fully adopted by the telecommunications industry. As a result, many phones, particularly older and less expensive phone, do not incorporate the chip and are not NFC enabled.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>How Does NFC Work?</strong></h2>



<p>Inside an NFC checkpoint can be found a memory chip with a small amount of storage which is attached to an antenna. The memory chip is activated using inductive coupling. Basically, this works in the following way.</p>



<ul class="wp-block-list">
<li>NFC enabled smartphone is held near the NFC checkpoint and a user selects to read the checkpoint.</li>



<li>The phone generates an electromagnetic field which then generates a current in the checkpoint antenna through a phenomenon called induction.</li>



<li>This powers the chip which sends a short signal, with information such as an ID number to the phone via the antenna.</li>
</ul>



<p>   </p>



<p>   </p>



<p>Because the <a href="https://www.uniguard.com.au/products/checkpoints/#NFC" target="_blank" rel="noreferrer noopener">NFC checkpoint </a>is powered by the phone, it does not need a battery and can be fully enclosed in a durable casing.</p>



<p>To be able to read an NFC checkpoint, a smartphone needs to both have an NFC chip embedded into the phone and an NFC reading app installed. Users activate the checkpoint read through the app on the phone.</p>



<p>NFC signals are transmitted at a frequency of 13.56 MHz, which is different from the more commonly used frequency used by Bluetooth and Wi-Fi. As a result, signal interference and disruption are much less of an issue.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Are There Different Types of NFC Tags?</strong></h2>



<p>Currently there are 5 different types of NFC tags available, which offer different data capacities and transfer rates depending on the required use. Some are read-only, while others are capable of being re-written. All of these features affect both the size and cost of the tags.</p>



<p>NFC tags used for checkpoints in staff tracking systems tend to be smaller and read-only and are therefore very cost effective.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>What Are Some of the Uses For NFC?</strong></h2>



<p>The increasing adoption of NFC chips in the latest smartphones has resulted in a range of uses for NFC tags, particularly in situations where only a quick exchange of a small amount of digitised information is required. One of the most common is credit card tap and payment. Other uses include ticketing, airline boarding passes, and the tracking of staff or assets.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>The Good and the Bad of NFC Checkpoints</strong></h2>



<p>NFC is much the same as RFID with the added bonus of being usable with smartphone apps. This can make a system using NFC a relatively cheap option as you can get your staff to use their own phones, as long as they have an NFC enabled phone.</p>



<p>The downside with staff using their own phone is the potential distraction from completing work tasks. This problem can be reduced by using a company supplied phone, but this will add to the cost. Mobile phones are also not as durable as purpose-built hardware and are also subject to updates of the operating system.</p>



<p>Comparing NFC with <a href="https://www.uniguard.com.au/products/checkpoints/#BLE" target="_blank" rel="noreferrer noopener">Bluetooth LE</a>, which can also be used with smartphones, NFC works at significantly shorter range, shorter even than most other RFID. This means that NFC is a contactless technology but must still be swiped at close range. This is an advantage in situations where the time and location of staff members need to be accurately determined. NFC checkpoints also work well in small rooms such as toilets where Bluetooth signals can leak between rooms.</p>



<p>The other big advantage NFC has over Bluetooth LE is that NFC checkpoints don’t actively send out signals and therefore don’t need batteries, are relatively simple to make, thus cheaper, and can be fully encased making them more durable and weatherproof.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Summing Up</strong></h2>



<p>NFC tags are the cheap and versatile checkpoints for staff verification and tracking <a href="https://www.uniguard.com.au/products/mobile-apps/" target="_blank" rel="noreferrer noopener">mobile phone apps</a>, as they can be used both indoors and outside. Well-designed tags can be placed on any surface including metal, making them suitable to be placed on walls, doors or inside items like bins.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>If you are using a smartphone-based staff attendance tracking system, there a plenty of good reasons to use NFC checkpoints. Want to find out more <a href="https://www.uniguard.com.au/contact/">contact our sales team</a> today.</strong></p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/how-do-nfc-checkpoints-work/">How Do NFC Checkpoints Work?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Do Bluetooth Beacons Work?</title>
		<link>https://www.uniguard.com.au/how-do-bluetooth-beacons-work/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Mon, 09 Aug 2021 05:03:53 +0000</pubDate>
				<category><![CDATA[All Industries]]></category>
		<category><![CDATA[Bluetooth Beacons]]></category>
		<category><![CDATA[Cleaning Rototion]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=29293</guid>

					<description><![CDATA[<p>Staff and asset tracking systems work through the interaction of portable tracking devices and stationary checkpoints. For smartphone systems, these checkpoints either use BLE or NFC technology. What is BLE?...</p>
<p>The post <a href="https://www.uniguard.com.au/how-do-bluetooth-beacons-work/">How Do Bluetooth Beacons Work?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="https://www.uniguard.com.au/products/staff-tracking/" target="_blank" rel="noreferrer noopener">Staff and asset tracking systems </a>work through the interaction of portable tracking devices and stationary checkpoints. For smartphone systems, these checkpoints either use BLE or NFC technology.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong>What is BLE?</strong></strong></h2>



<p>Bluetooth Low Energy (BLE) is a set of technological standards for allowing different hardware devices to communicated wirelessly and is one of several systems that do this. BLE works by sending a series of packets of information over the microwave frequency range of 2.4000 to 2.4835 GHz. This is the same frequency range for similar systems such as Wi-Fi, classic Bluetooth, some active RFID devices, and microwave ovens.</p>



<p>Bluetooth Low Energy has been around since 2009 and was named by the Nordic engineers that created the standard after the Danish King Harard Bluetooth who united Denmark with parts of Norway in the 10<sup>th</sup> century. King Harard also had a problem with tooth decay.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong>Why Use the Same Frequency as Wi-Fi?</strong></strong></h2>



<p>Developers have intentionally created systems that operate specifically in this range because these frequencies have been set aside by international agreement for the use of industrial, scientific and medical devices (ISM). This makes these frequencies free to operate within, unlike other frequencies that are reserved for special use, or require expensive licences to use.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong>How Does Bluetooth Work?</strong></strong></strong></h2>



<p>Bluetooth works by two devices pairing, in a process where the devices make contact and verify trust though the use of security keys. Usually, one device sends out signals “advertising” its intent to pair for a particular reason, with the other device scanning for the advertised signal.</p>



<p>When an advertised signal is found the user is asked if they want to pair the devices. Once paired, a stream of information packets (that can be encrypted for extra security), are sent between the devices.</p>



<p>Data is sent using adaptive frequency hopping that reduces, although not eliminates interference from other devices operating in the same frequencies. This process also reduces battery usage.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong>What Are Some of the Uses For BLE?</strong></strong></strong></h2>



<p>The uses for Bluetooth Low Energy have started to explode in recent years particularly as a way of connecting smart devices with each other, or with smartphones. Uses include medical and fitness devices, along with portable speakers and wireless headphones. Staff attendance verification and tracking is another area of increasing use.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong>The Good and the Bad of Bluetooth Checkpoints</strong></strong></strong></h2>



<p>From the perspective of a user, <a href="https://www.uniguard.com.au/products/checkpoints/#BLE" target="_blank" rel="noreferrer noopener">Bluetooth beacons</a> behaves in a similar way to active RFID beacons with some slight differences. The most noticeable is that Bluetooth is natively supported by newer smartphone devices such as iOS, Android, Windows Phone and Blackberry, unlike RFID which is not. The benefit of this is that BLE can be used with downloadable apps, which can be cheaper to set up. The downside of this is more with the phone which are not as durable as purpose-built hardware. </p>



<p><a href="https://www.uniguard.com.au/products/checkpoints/#NFC" target="_blank" rel="noreferrer noopener">NFC checkpoints</a> can also be used with smartphones, are much cheaper, more durable, and don’t require batteries, while Bluetooth beacons are battery operated. Staff location is also more accurately pin-pointed with NFC checkpoints over Bluetooth beacons because the staff need to actively swipe the checkpoint with their phone. </p>



<p>BLE therefore mostly used in indoor situations where you need to record staff movement without them interacting with the checkpoints, or when the checkpoints need to be placed out of the reach of vandalism.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong>Summing Up</strong></strong></strong></strong></h2>



<p>Bluetooth beacons are the idea checkpoint for use with smartphone app-based <a href="https://www.uniguard.com.au/products/mobile-apps/" target="_blank" rel="noreferrer noopener">tracking systems</a> where it is more convenient for staff to not swipe the checkpoint such as cleaners, who need to keep their hands free for other duties. Often beacons are used in conjunction with NFC checkpoints to maximise the advantages of each type of checkpoint.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>If you are using a smartphone-based staff attendance tracking system, there a plenty of good reasons to use Bluetooth beacons. Want to find out more <a href="https://www.uniguard.com.au/contact/">contact our sales team</a> today</strong>.</p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/how-do-bluetooth-beacons-work/">How Do Bluetooth Beacons Work?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Ways That Guard Tour Systems Help the Security Industry</title>
		<link>https://www.uniguard.com.au/5-ways-that-guard-tour-systems-help-the-security-industry/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Tue, 29 Jun 2021 02:13:32 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ASIAL Code of Practice]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=28506</guid>

					<description><![CDATA[<p>Over the past two decades guard tour management systems have revolutionised the way security companies manage their businesses. As the industry has evolved, and technology has improved the systems have...</p>
<p>The post <a href="https://www.uniguard.com.au/5-ways-that-guard-tour-systems-help-the-security-industry/">5 Ways That Guard Tour Systems Help the Security Industry</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Over the past two decades guard tour management systems have revolutionised the way security companies manage their businesses. As the industry has evolved, and technology has improved the systems have changed with them.</p>



<p>What are the 5 key ways that guard management systems have enhanced the security industry?</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Run Sheets</strong></h2>



<p>An integral element of any business is managing staff workflows and performance. For the security industry this is made more difficult because the guards need to work in locations that are remote to the main office, with some guards required to move from site to site during a shift.</p>



<p>Using software to plan and schedule the time and location of security guard patrols not only makes it easier and more efficient but eliminates many of the problems associated with doing this manually. Patrol routes, visit intervals and tasks can be mapped out and sent to the guard, eliminating mistakes and confusion.</p>



<p>Supervisors can watch the progress of patrols live, giving them the opportunity to fix issues as they occur before it’s too late.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Cost Saving</strong></h2>



<p>A reduction in expenses is a natural benefit of increasing the efficiency of any operation. Apart from making sure that time and money isn’t wasted by sending people to the wrong location at the wrong time, and freeing up the supervisor’s time for other duties, electronic systems give you the ability to stand back and look at the bigger picture.</p>



<p>Data collected over time can be analysed showing managers when and where services are most needed, and how operations can be performed in the most efficient way possible. Over time, trends can be assessed with the possibility of making future prediction that allow the business to get ahead of the opposition.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Guard Safety</strong></h2>



<p>Many guards are reluctant to use attendance recorders even though there are clear benefits. Guard tour systems incorporate safety features such as free fall motion, shock, and idle detection.</p>



<p>In addition, activating the request call-back button sends an alert to the supervisor via the web dashboard, email or SMS message. Incidents such as vandalism can also be reported by entering written descriptions, photographs, and signatures into custom built forms.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Contract Compliance</strong></h2>



<p>Recent changes in economic conditions have resulted in a rethink from many people who contract security services. There is now an increased expectation that security companies demonstrate when services have been delivered in the agreed manner. Electronic tracking provides indisputable proof of service.</p>



<p>Industry bodies such as ASIAL also aim to improve the image of the security sector through standards in industry behaviour. These codes of practices list out the preferred ways that security companies can achieve these goals. Adhering to industry best practice can then become an excellent selling point for any business.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong>Client Satisfaction</strong></h2>



<p>Another good selling point, arguably the best, is word of mouth from satisfied customers. The best way to get satisfied customers is demonstrating that you have delivered your service to your customers expectation, or better. Proving great service is central to guard tracking systems.</p>



<p>A good guard tour system makes this easy by automatically sending reports to you managers and clients at a pre-scheduled time that is convenient for everyone. Electronic reporting also saves on physical paperwork, making it easier to store and manage, and allow reports to reach your clients faster and cheaper.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>To learn more about how the UniGuard guard tour management system can help your business get ahead, <a href="https://www.uniguard.com.au/contact/">contact us today</a>.</strong></p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/5-ways-that-guard-tour-systems-help-the-security-industry/">5 Ways That Guard Tour Systems Help the Security Industry</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Working in Remote Locations</title>
		<link>https://www.uniguard.com.au/working-in-remote-locations/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Fri, 19 Mar 2021 05:44:16 +0000</pubDate>
				<category><![CDATA[All Industries]]></category>
		<category><![CDATA[Cleaning Rototion]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[Lighthouse Staff Tracking]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=28057</guid>

					<description><![CDATA[<p>What is Isolated and Remote Work? Working in isolated and remote locations present certain unique challenges. A lone worker could be anyone who works out of sight of another person,...</p>
<p>The post <a href="https://www.uniguard.com.au/working-in-remote-locations/">Working in Remote Locations</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong>W</strong></strong>hat is Isolated and Remote Work?</h2>



<p>Working in isolated and remote locations present certain unique challenges. A lone worker could be anyone who works out of sight of another person, this can include the receptionist of an office building, or even, someone working from home.</p>



<p>Although working in isolation can present difficulties for teams and is particularly hard for the more sociable amongst us, risks are increased when working in locations that are considered remote from towns, cities and other community centres. These risks can be further exacerbated if the work undertaken is also inherently dangerous regardless of the location. The combination of all these risks can present real challenges to both workers and their managers.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color">Lessons From the Past</h2>



<p>Historically, some remote work included working in places such as mines, farms, oil rigs and lighthouses. As difficult as these occupations are, they are all in their own way essential to the rest of society, and therefore necessary. Stories abound about the dangers and hardships face by the people who chose to work in these environments.</p>



<p>In the past, it was a lot harder to remain totally safe working in dangerous occupations in remote locations. Risks varied according to the job and location. For example, it was common for lighthouse keepers to drown or be badly injured trying to reach the lighthouse located on an isolated island, or retrieving supplies brought to the island by boat. There are even stories of <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Flannan_Isles_Lighthouse#1900_crew_disappearance" target="_blank"><strong>lighthouse keepers mysteriously disappearing</strong></a> during stormy weather.</p>



<p>Likewise, outback workers on remote farms in central Australia have occasionally succumbed to the conditions and later been <a rel="noreferrer noopener" href="https://www.dailymail.co.uk/news/article-7065113/How-two-boys-16-17-disappeared-Outback-cattle-station-1986.html" target="_blank"><strong>found dead</strong></a>, if at all. However, it is more common for farms workers to be <a rel="noreferrer noopener" href="https://www.safeworkaustralia.gov.au/system/files/documents/1702/work-related-injuries-fatalities-farms.pdf" target="_blank"><strong>badly injured or even killed</strong></a> by accidents involving the heavy machinery needed to work a farm. Often the injuries are <a rel="noreferrer noopener" href="https://www.abc.net.au/news/2016-12-16/queensland-coal-miner-awarded-1.25m-after-crashing-on-drive-home/8127274" target="_blank"><strong>life changing</strong></a>, making it difficult to return to the work force. In the same way, mining and oil rig accidents involving heavy machinery, explosions or the collapse of the mine are also devastating, not just for those involved, but for <a rel="noreferrer noopener" href="https://www.mtkembla.org.au/the-disaster" target="_blank"><strong>entire communities</strong></a>.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color">The Dangers Summarised</h2>



<p>Potential dangers that can be faced by people working in remote locations include:</p>



<ul class="wp-block-list">
<li>Accidents, including those involving machinery</li>



<li>Becoming lost and running out of food or water</li>



<li>Weather events, including extreme heat and cold</li>



<li>Drowning</li>



<li>Physical illness</li>



<li>Assaults from strangers</li>



<li>Attack from animals</li>



<li>Anxiety and depression</li>
</ul>



<p>   </p>



<p>   </p>



<p>As dangerous as these situations can be, they all have the added risk of being <a rel="noreferrer noopener" href="https://www.dmp.wa.gov.au/Safety/Guidance-about-working-in-remote-6723.aspx#:~:text=%20Guidance%20about%20working%20in%20remote%20areas%20,the%20use%20of%20satellite-based%20devices%20are...%20More" target="_blank"><strong>far from help</strong></a> when it is needed. This can exacerbate injuries and potentially result in people dying. The truth is, if something goes wrong in a remote area, help will take much longer to reach you, even today.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color">Solving the Problem Today</h2>



<p>In 2021, a lot of the risks can now be reduced or even avoided completely through the use of modern technology. For example. lighthouses are now mostly <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Lighthouse#Modern_lighthouses" target="_blank"><strong>operated remotely</strong></a>, with only a small number still crewed. However, there is still a need for people to <a rel="noreferrer noopener" href="https://www.abc.net.au/news/2020-02-10/lighthouse-maintenance-program/11934082" target="_blank"><strong>service and repair unmanned lighthouses</strong></a> from time to time, but this is generally during fine weather.</p>



<p>In many other industries there is still a need for people to be working in remote locations. However, telecommunications and tracking devices can be used to reduce the risks when incidents do occur. UniGuard offers a range of <a href="https://www.uniguard.com.au/products/gps-devices/"><strong>GPS trackers</strong></a> and <a href="https://www.uniguard.com.au/products/staff-tracking/"><strong>staff attendance verification</strong></a> systems, that help the manager know where their vulnerable staff are, allowing them to response quickly when problems occur.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>To learn more about how the UniGuard staff tracking system can help to keep your workers safe, <a href="https://www.uniguard.com.au/contact/">contact us today</a>.</strong></p>



<p></p>
</blockquote>
<p>The post <a href="https://www.uniguard.com.au/working-in-remote-locations/">Working in Remote Locations</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Guard Tour Tracking Software</title>
		<link>https://www.uniguard.com.au/uniguard-news-15th-december-2020/</link>
		
		<dc:creator><![CDATA[Justin Axiak]]></dc:creator>
		<pubDate>Tue, 15 Dec 2020 04:01:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[Staff Tracking App]]></category>
		<category><![CDATA[Staff Tracking Software]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=27836</guid>

					<description><![CDATA[<p>UniGuard News 15th December 2020 &#8211; 4 Ways Technology has Transformed the Security Industry The security industry has had its fair share of technological advancement over the past few years....</p>
<p>The post <a href="https://www.uniguard.com.au/uniguard-news-15th-december-2020/">Security Guard Tour Tracking Software</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">UniGuard News 15th December 2020 &#8211; 4 Ways Technology has Transformed the Security Industry</h2>



<p>The security industry has had its fair share of technological advancement over the past few years. In order to keep up with the demand of this ever-growing industry, certain technologies had to be applied to aid security companies execute their operations more effectively. Staff management software has revolutionised the way security companies operate, providing all the necessary features to be able to execute any appointed task in time and on the fly.</p>



<h2 class="wp-block-heading"><strong>Rotations</strong></h2>



<p>Before any of these technologies were introduced to the industry, all planning, mapping and time scheduling had to be done manually. This created many variables which could negatively affect the execution of the job at hand. With staff management software, the rotations and their intervals could be digitally mapped out, providing visual aid to the patrol officers through their phone, as well as their rotation intervals. This not only helps the patrol officer keep up with routine checks but also gives peace of mind to management that all locations are being monitored and are safe.</p>



<h2 class="wp-block-heading"><strong>Reporting</strong></h2>



<p>The days of manually reporting incidents or routine checks on pen and paper are way behind us. Software which caters for the security industries allows reporting to be done efficiently through the application itself. These reports can be customised to provide any required detail of a routine check or an accident. The best reporting systems also have photo capturing features as well as digital signatures to ensure the accountability of the patrol officer or security guard. Rotations are also converted into a report which allows the overseer to ensure that the patrols have been done correctly and on time. These reports are automatically uploaded to the server, eliminating the possibility of alterations or getting lost.</p>



<h2 class="wp-block-heading"><strong>Compliance</strong></h2>



<p>One of the issues that many companies were facing in the past, is being able to prove if their employees were being compliant with tasks at hand. The features within today’s software allow management to be able to see where their employees are live, as well as their rotational compliance. This is done through a series of checkpoints which have to be scanned by the patrol officer or guard at a specific time in order to prove that the area was checked. These checkpoint scans are then compiled into a report which provides information such as the time the checkpoint was scanned, as well as any missed checkpoints. This level of reporting assures management that their employees are executing their tasks correctly, on time and not deviating from their work which may cause a potential safety hazard.</p>



<h2 class="wp-block-heading"><strong>Efficiency</strong></h2>



<p>Staff management software has dramatically improved the efficiency of security guard operations, allowing reporting, task assignment, rotations and general employee compliance to be monitored or set remotely from a centralised computer system. This not only saves the company time and resources, but also enables the management of multiple operations to be handled with ease. This not only benefits the company, saving them both time and money, but also improves customer satisfaction by delivering the best possible service to their clients.</p>



<p><strong>Contact one of our UniGuard specialists on (02) 9671 7777 or <a href="https://www.uniguard.com.au/contact/">email us</a> for a tailored walkthrough of the UniGuard solution based around your challenges and business needs.</strong></p>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/uniguard-news-15th-december-2020/">Security Guard Tour Tracking Software</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Who Has Access to Your Data?</title>
		<link>https://www.uniguard.com.au/who-has-access-to-your-data/</link>
		
		<dc:creator><![CDATA[Nicola Baker]]></dc:creator>
		<pubDate>Mon, 26 Oct 2020 03:15:13 +0000</pubDate>
				<category><![CDATA[All Industries]]></category>
		<category><![CDATA[Cleaning Business Software]]></category>
		<category><![CDATA[Employee Tracking App]]></category>
		<category><![CDATA[Guard Tour Management System]]></category>
		<category><![CDATA[Guard Tour Patrol System]]></category>
		<category><![CDATA[Staff Tracking Software]]></category>
		<guid isPermaLink="false">https://www.uniguard.com.au/?p=25608</guid>

					<description><![CDATA[<p>The use of web-based services for business applications have increased rapidly in recent years as processes that were once done manually on paper in the past are now simplified and...</p>
<p>The post <a href="https://www.uniguard.com.au/who-has-access-to-your-data/">Who Has Access to Your Data?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The use of web-based services for business applications have increased rapidly in recent years as processes that were once done manually on paper in the past are now simplified and automated with computers. Instead of confidential information being locked up in filing cabinets or even on a computer hard drive within the business premises, this data is now being trusted to cloud-based services.</p>



<p>Naturally, there has been a rise in associated criminal activity to go along with this increase in the use of the internet, ranging from individual scammers and hackers, through to criminal gangs and state operators looking to steal secrets. It is little wonder then, that many businesses are starting to become more concerned about the security of their confidential information. &nbsp;</p>



<p>As a result, many business managers want to know more about the background of the software platforms that they are working with, where and how the data is being stored and the background of the companies that provide these services. Following are some key aspects to look for in a software service provider.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong>What to Look Out For</strong></strong></h2>



<p>Initially, when looking for an application to manage some aspect of their business such as attendance verification, business owners and operator are drawn to the cheapest product on the market. In difficult economic times this can be alluring. The problem with this approach is that cheapest doesn’t always equate to best value, and it doesn’t consider other factors that also need to be taken into account.</p>



<p>When a business has been tasked with collecting and storing confidential information, the most important characteristics to look for include:</p>



<ul class="wp-block-list">
<li>security and accessibility of client data</li>



<li>level of customer service</li>



<li>compliance to industry standards and regulations</li>



<li>recognition within the industry, whether formal or informal word of mouth</li>



<li>long term commitment to, and reliability within the industry</li>



<li>company structure and risk</li>



<li>affiliations with client&#8217;s competitors</li>



<li>and if hardware is involved, location of servicing and turn-around time for repairs.</li>
</ul>



<p>   </p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong>It’s All in the Clouds</strong></strong></strong></h2>



<p>Generally, cloud-based storage of data tends to be the industry standard for web-based services, as these services provide the most cost-efficient method to store information with the highest practical level of security. Better quality cloud storage, with a higher level of security are more expensive to access and therefore increase the cost of any web-based service. Many people are willing to pay extra for this peace of mind.</p>



<p>Another associated concern is where the cloud-based servers are located, because some countries have laws in place that allow their government agencies unimpeded access to any data stored within their jurisdiction. These laws are complicated and vary greatly from country to country adding to the confusion. Just for the record, UniGuard uses the highest quality Google servers in Sydney, Australia.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong>The Wizard Behind the Curtain</strong></strong></h2>



<p>Knowing more about the companies to which services are being outsourced is a critical concern for many business operators. They don’t simply want to know the names and faces of the sales representatives, but also the actual background of the company. This includes information on how long the business has been operating, the size of the business, where it is located and who owns and runs the business. The reality is that businesses come in many forms which have their benefits and drawbacks, with some types of businesses naturally more suited to some tasks than others.</p>



<p>Due to businesses needing to retain data for a number of years for legal reasons, which can vary depending on the jurisdiction, the long-term stability of the company is especially important, and one that people need to be particularly attuned to spotting in the current economic climate.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong><strong><strong><strong><strong>Dealing with Constant Disruptions</strong></strong></strong></strong></strong></strong></h2>



<p>The current fad of disrupter start-ups has flooded the software market with numerous similar looking duplicates of established systems. This has resulted in the crowding of the marketplace for some types of software applications and has caused confusion among potential customers. Although starting a business is perfectly legitimate when someone has a passion for the type of products and services they are offering, many people involved in disrupters have another goal in mind.</p>



<p>By their nature, the intention of disrupters is to take over a particular industry by offering services at prices well below the market rate which established operators can’t compete with. They achieve this by ignoring regulations, underpaying staff and procuring funds from investors eager to make money. Making large sums of easy money is also the intention of the founders of these companies. The goal is to build up the company rapidly and then sell to make a quick and easy profit.</p>



<p>Of course, all this can fall flat. Most of the time they don’t actually fulfill their goals, with the company dissolving leaving many creditors with unpaid debts. This may inspire them to start up another company in a different industry or jurisdiction.</p>



<p>Disrupters are not concerned with the long-term interests of either their customers or investors, and their efforts damage the marketplace for everybody, not just their competitors. Ultimately, the biggest disruption for many businesses is when a service they rely upon is suddenly no longer available, resulting in a loss of clients and reputation.</p>



<p>A good way to avoid the pitfalls of dealing with such a company is to look into the history of a company and then compare them to other companies offering similar services in the industry. Doing so, not only allows you to see if the company is likely to be around for a long time, but also whether they are selling their software at a reasonable price and if the claims they make are true, such as being industry leaders and innovators.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong>The Competition is Rigged</strong></strong></h2>



<p>Sometimes the problem is not so much the stability of the company behind the software platform, but other interests that the company, or one of their principle investors may have. It is becoming increasingly common for companies within a particular industry, for example a security company to invest in a software platform such as a staff attendance app that is commonly used within that industry. This can be done in a number of ways, for example the company;</p>



<ul class="wp-block-list">
<li>can contract a software developer to create some software in-house</li>



<li>can agree to be the authorised reseller of software platform developed by another, usually international or Chinese company</li>



<li>invest money and buy shares in a start-up that is developing the software</li>



<li>buy out the company developing the software and absorb it into their own.</li>
</ul>



<p>   </p>



<p>Sometimes a business does this with the intention of keeping the software platform for internal use with the aim of getting an edge over the competition. Unfortunately, software development is costly, and this creates an incentive to onsell the software to other businesses within the industry. Sometimes it is sold to subcontractors for consistency of service, sometimes to other unsuspecting businesses.</p>



<p>When companies sell services like these to other business within their own industry and don’t disclose the real owners of the software or other affiliations, this can create a conflict of interest. The potential risk is that confidential company data is then legally in the possession of other another business in the same industry.</p>



<h2 class="wp-block-heading has-very-dark-gray-color has-text-color"><strong><strong>What About UniGuard?</strong></strong></h2>



<p>Deltonic Pty Ltd started trading initially in the Australian market as ValuTronics Pty Ltd in 1997. More commonly known as UniGuard, we are one of the few companies that offers employee tracking and verification systems to the Australian market that is not in some way affiliated with any companies that offer security guard or cleaning services either in Australia or other markets like the USA. We are proudly fully privately and independently Australian owed. No other company owns shares in UniGuard, and we are upfront about only offering the products and services displayed on our website.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Would you like to know more about how UniGuard can help your business, </strong><a href="https://www.uniguard.com.au/contact/"><strong>click here</strong></a><strong> to find out more</strong>?</p>
</blockquote>



<p></p>
<p>The post <a href="https://www.uniguard.com.au/who-has-access-to-your-data/">Who Has Access to Your Data?</a> appeared first on <a href="https://www.uniguard.com.au">Staff &amp; Asset Tracking with Workforce Management Software by UniGuard</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
