Vehicle Access Control System for an Industry

Vehicle Access Control System

Vehicle Access Control System – All incoming cargo to be checked at the gate during entrance by the on duty security guards as per challan either the goods is Rio Fashion’s raw materials or not. Please see our Access Control Solutions Software

  • The security personnel will enquiry the goods and to be informed to the admin authority in details. After necessary check with store authority the admin authority will give entrance permission.
  • Store will check the list according to prior noticed given by the purchase department regarding material purchasing & in housing time, transport, quantity, name of goods etc.
  • All the visitor’s Vehicle Access Control System to be checked during entrance by the security personnel and required to take permission from admin authority for entrance of vehicle.
  • No employees are permitted to enter into the factory without having identity card. If the employees service length is less than one month one gate pass (Temporary Identity Card) to be provided from the first day of their joining.
  • All the employees must check on the gate during entrance by the security personnel & admin authority according to their Identity Card / Gate pass.
  • No workers are allowed to enter into factory floor with matches, cigarette, explosive materials, bags etc which is to be checked during access.
  • After positive identification of all workers are allowed to work in the production floor.
  • Employees are permitted to enter into the factory after having checked with the metal detector if conflict arises. 
  • After loading the covered van immediately with the presence of store authority the door of the van should be locked and the lock should be sealed by the admin officer.
  • The number which is given on the seal should be maintained by admin authority of the company.
  • The seal no. given on packing list by admin authority with authorized signature is to be verified by shipping agent during receiving of goods.
  • 4. A register should be maintained for seals no. and according to the cartoon   no for which truck / covered van is carrying the goods for shipment.
  • The seal no. and seal to be remained under the control of admin authority   as confidential. The seal no. which is fixed to the door of truck / covered van is required    to take snap as documents.         
  • Visitor’s car must be checked by metal detector. The Vehicle Access Control Systemto be escorted up to the location of visitor’s car parking area.
  • Car no., name of visitors in the car, drivers name must be recorded in the register as records.The car to be parked only where the visitor’s car parking area is located (which is separated from other area).
  • All the management vehicles to be checked by the security personnel whether there is any unauthorized persons or not.
  • After positive identification all management personnel through identity card to be permitted to enter into the factory complex.
  • The vehicles to be parked in the predetermined car parking area. During the disembarkation the Vehicle Access Control System to be checked properly.
  • The security personnel will register the name of goods, quantity of goods, nature of goods, supplier name, truck no, driver name, incoming time etc after approval for entering the goods from administration.
  • The incoming cargo will be escorted by security personnel where the goods to be unloaded.
  • Before loading the covered van that must be inspected by the security personnel & store authority jointly to its interior, posterior, lateral, roof & surface of container for ensuring strengthen of the wall and If there is any hole or not.
  • The goods to be loaded in presence of security personnel & store officer and the door of covered van is sealed after immediate accomplishment of loading.
  • Security personnel will maintain a register for shortage or overages of cartoons. If there is any discrepancy.
  • Seal no. is required to maintain and that is to be posted on seal to the covered van as well as packing list & truck challan (Delivery Challan) which is given by the admin authority.
  • Packing list having seal no. to be send to the shipping agent who will check the packing list seal no. as well as covered van seal no.
  • After verification of seal no. the shipping agent will receive the goods and the receiving copy of Delivery Challan to be back to the factory management as document so that factory management can ensure about the goods reach safely.

Vehicle Maintenance 

SMI shall ensure that a comprehensive vehicle maintenance program is put in place for all vehicles operated in the project. All vehicles shall be maintained in accordance with the manufacturer’s recommended maintenance program, which be detailed in the vehicle documentation. In the absence of any documentation the vehicles shall be service in intervals of at least every three months. And the service will include mandatory checks of the vehicle safety systems and equipment, such as tires, brakes, steering and lights.

     The effectiveness of the maintenance program will be ensured by regular and specific inspection performed by the HSE Manager. The frequency of the inspection shall not be less than every six months.

    At anytime, either during the regular maintenance program, daily checks or random inspection, that a vehicle should be discovered to be not in good roadworthy condition, or any of its safety equipment is not functioning properly, will be immediately withdrawn from service. Any vehicles withdrawn for these reasons shall not be re-instated for the project until a full comprehensive vehicle examination has been performed and the vehicle is declared to be roadworthy and safe.

   The project shall formally define a program of technical control of the vehicles which will be in accordance with host country regulations; however in the absence of such, recognized regulations and standards shall be used. The frequency of the regular technical controls shall not exceed two years.

   Spare parts required as part of the maintenance program or as normal replacement, shall be supplied by a reputable supplier. And ideally the parts should be  the manufacturer’s specialized parts.

   Tire replacement shall only use high quality, international standards, tires which are the size and type specified in the vehicle documentation.

Vehicle Generalities

    It is contractor requirement that all vehicle documentation shall be valid and current for the subject vehicle , and shall be kept with the Vehicle. Copies of the vehicle documentation shall be retained by the HSE Manager and Vehicle maintenance section. SMI shall ensure that all vehicles are provided with valid insurance with full coverage of the potential risks that passengers may be exposed to during transportation. In the operation of the project. Vehicles that are not roadworthy, or in unsafe condition, or are not being used for the intended purpose shall not be used. And not be re-instated for use in the project until a full and comprehensive vehicle examination has been performed, and the vehicles is declared to be roadworthy and safe.

   Under no circumstances that are motorcycles permitted for use in the project construction.

Summery

Without having “hazardous chemicals” mark upon the container no hazardous chemicals carrying Vehicle Access Control System are permitted to enter into the factory.

Network Access Control PG-2750 Installation Procedures

Network Access Control PG-2750 Installation Procedures

Network Access Control PG-2750 Installation

  1. Insert PG network access control installation CD into CDROM for security solutions
  2. On WINDOWS screen, move the mouse to “My Computer” and double click left key of the mouse.
  3. Move the mouse cursor to the CD driver for installing and then double click the left key
  4. Then search forward point to the SETUP and the move the double click the left key of mouse, then the screenshown as figure 1-1
network access control
Figure 1-1
access systems
Figure 1-2
  • If the Exit Setup selection bar is clicked, then will quit installation, otherwise, if ok selection bar is clicked, then the screen shown as figure 1-3
  • access control policy
    Figure 1-3
  • Now, if you select the Exit Setup bar, then the installation will be stopped, if Change Directory bar is selected, it will change installation path. Otherwise, it will accept the default path.
  • If the upper left corner of computer is clicked, then the screen 1-3 will be display prompt the message the user shall be to change the succeeding diskette and then press “Enter” key or click the bar to continue the installation
  • If every installation procedure is smoothly, then the following screen will display to completed successful of installation.
  • To click bar, and the installation is completed Remark:Once the program is well installed, if you want to install it again, then you must delete the installed program at first, please refer to chapter 8 for further instruction for deleting the system of network access control
  • Execution Procedures of Access Systems:

    1. As enter into WINDOWS, then select Start and then PGAccess as in Fig 2-1 illustration for access systems  of electronic security management.
    electronic security
    Figure 2-1
  • Now if click left key, then screen as Fig 2-3 will display as follow: you shall to enter the user name and password to ensure electronic security
  • access control technology
    Figure 2-3
  • Now the user must key name and password to enter the system, The system default values are: User : P e g a s u s ( The capital and small character must be coincident) and Password: P o n g e e   ( The enter words will be display as * * to hide the real password)
  • Security Solutions of Access Systems Technology

    Once first entered the system of rfid attendance system technology as Fig 2-4 shown, please add one more manager into the system at least ( please refer to chapter 6 “password operation”) and must delete the original default user name to prevent illegal infinitude. Once enter the system, you could use the system right now.  This system could separate three level : one is manger, another is the most user, the last is general user. According to the different states will choose different items. (please refer the chapter 6). First entrance the system, please use the state of manager then set the reader’s address for access control policy

    security solutions
    Figure 2-4

    If the reader can’t receive the data, please check as follow step:

    1. At p.15, 3-6 reader address, the wiring between the RFID card reader address and actual hardware are difference.
    2. At p15,3-6 reader address, the reader address don’t re-order the door no. as sheet all.
    3. If run this program on the pcp-832-2 red light don’t flashes, that don’t connect well the wiring of reader with PC.
    4. If the wiring connect well between pc and reader that maybe the serial port of window95 don’t work, could use ( start, setup,control panel, system ) , check the serial port ( COM& LPT ) if show red X (means in vain) if show yellow ! ( means conflict with another install).
    1. The wiring of card reader connect error
    2. If the reader type of access control policy is PG-707, please refer p57”PG-707 and PCP-832-2 connect method, Notice: reader and multi-channel controller do common ground, if not, then the “Data ready” signal won’t be transfer to multi-channel controller effective and the transmission will be intermission. Sometime the PC can collect the data and sometime not.
    3. To check whether the reader be in the polling mode ( polling mode, function 4, 1701 ) . You may check by pressing the “9” key, then the LCD Display show as Pxx , ( P is 1701, if no P that be defined 1700 ) .
    1. In Polling Mode, this program can identify the reader address, security solutions, contrary, in Direct mode doesn’t receive the command. (the define way in Polling mode: PG-2750 , slide the master card, press 4, and press 1701., PP-3750: press 01234, press 4, press 1701)
    2. Check whether the address for each reader in the same port is unique, such as PCP-832-2 two port controller. No same address are set repeated for each port, If same address are set in the same port, then there will have Data contention, you should adjust the system
    3. If interface is RS-232, also need to define the function4, 1701, and card reader address be define to 00.
    4. Check the basic setup the receive data, choose the cancel, close the function for receive data.
    5. The user press carelessly the database, cause the data missing.
    6. The System was defaults as collecting the data from reader automatic calling, once enter system, the PC will collect the data immediately, if there are any data exist in any reader, you don’t need set any command

    This Technology is developed by Pongee

    Access Control & Attendance Solutions

    Access Control & Attendance Solutions

    Silicon Controlled Rectifier

    SCR is stands for silicon controlled rectifier. Silicon controlled rectifier consist by diode and biometric technology. RFID based attendance system maintain attendance policy.  For any queries, please Contact Us.

    We Also Sale

    Advantages

    SCR 100 is access control system with proximity reader which is also known as EM. It is capable to connect for access control software by Local Area Network or RS232/485 port. It is operated on standalone mode and  data is downloaded by pen drive. In addition, this terminal includes embedded web server software. Access control allows time zones as well as groups holidays sytem, anti passback functions and the relay should be connected for locking or external siren. PG 2750 attendance monitoring system is designed base on RFID card. We also sale HR and Payroll Software for Clothing Industry

    It also  includes special port for connecting external proximity reader and it can be used as a controller for external reader using that port. The attendance monitoring system most has been designed with modern and flexibility also our software support to On-line system.  Please read this manual carefully and the user will like to show the system operation on which feature has been implemented for your application.  For more information inquiry please contact with us

    diode

    Features of RFID Based Attendance System :

    1. Access control is a semiconductor equipment.
    2. It is four layer semiconductor devices
    3. It is EM reader use radio frequency
    4. Stores up to 30000 users and cards
    5. RFID based attendance system stores up to 50.000 log records without PC download
    6. RFID based attendance system device make communication with PC through Ethernet as network access control
    7. Media access control device includes as web server function
    8. Time zones, groups and holidays management
    9. It has USB interface to download log records
    10. Installation procedure of RFID attendance system is very simple.

    Functions of RFID Attendance System:

    Access Control
    Access Control
    1. RFID attendance system support 95% memory warning
    2. Anti pass back system for RAC-900
    3. Able to connect external slave reader
    4. Duress card, duress code, secret duress alarm and silicon controlled rectifier
    5. Memory capacity of biometric access controller is 4,096 card holders / 2,048 events.
    6. Standalone or network operation, expandable to 255 sets.
    7. Limitation of unsuccessful swipe card attempts for RAC-900.
    8. Audio tone facility of  the biometric or biometrics system
    9. Dual function for Access Control
    10. Basic Time & Attendance solution.
    11. RTC ensures accurate time power system.
    12. Biometric technlogy works with rfid attendance system, USB and network access control
    13. Swipe card, pin code and card + pin code access mode, slave reader or exit button .
    14. Able to connect TCP/IP Converter for network system  for network access control for real time alarm notification
    access control biometrics
    Access Control

    Insert Photo:

    If you want add personal photo into access control system then, you must scan the personal photo into computer by scanner or digital camera. And then edit by image processing software to suitable size and then save in bmp or JPG format.

    Program Holiday Authorization: 

    Not authorized during holiday notice, besides SATURDAY and SUNDAY others define must be in real mode.  Allowed authorized during holiday of course, you may change the authorized status under the system.

    Download Automatic Attendance Monitoring System :

    In such mode, it will execute quote down loading on “ issue date “ or “ validity date” please set auto down loading personal data

    Download Manual Attendance Monitoring System :

    That is to down load personal data to reader under “Down loading personal data “ of “ set card reader parameters” to manual

    Reading Rfid Based Attendance System Data From Readers:

    This purpose of this function is for selecting whether collecting the stored data from the reader automatically. If it is enabled for automatic collecting, then, once the system is started, the PC will read stored data from readers. If disabled, then it won’t collect the data from reader automatically.

    Communication protocol is defined the card reader’s interface, if the interface is RS-422 card reader and need to match the Multi-channel control transfer the RS-422 into RS-232 then connect with PC. Each channel can connect with 10 sets card readers(reader address is P00~P09), if the interface is RS232 that can connect with PC directly, because each PC just connect with one reader, seldom to use it.  Please select the RS422or RS232 interface through communication protocol as your purchase type.

    Set Company Name of Attendance Monitoring System:

    This function is setting up the company name, address and telephone no, it will show this data on the button of report list.

    Weekend Work and Overtime Policy:

    Applicable for: This policy is applicable for workers as well as for staff who work on holidays.

    Objective: To let the staffs and workers being aware of the Over Time (OT) rules

    Basis: The work load and targets often requires work beyond the normal schedule and sometimes also work during weekends and holidays. As weekends and holidays are rights of the employees, they need to be compensated when these are compromised. And therefore there should be a standard policy to ascertain the rate at which these compensations will be meted out.

    Policy: The workers working beyond the standard work time of 8 hours (except the lunch time), will be paid overtime at the rate of double their hourly basic salary, for every hour of work.

    1. The workers made to work on a government holiday which is not declared as a holiday in the company policy will not receive any overtime pay.
    2. Only when a worker is made to work on a government holiday that is declared as a holiday to be given, in the company policy, will they receive overtime pay for all the hours worked on that day.
    3. If a worker is made to work on a Friday or the designated weekly holiday, the worker will receive overtime pay for all the hours worked on that day.
    4. In addition, they will have 1 day added to their leave quota which they can enjoy or they can receive a day’s basic salary as a compensation for that at the end of that work year as per the labor law of Bangladesh.
    5. For staff who work on Fridays or government holidays, they will be compensated at the rate of a specific amount being paid to them as “holiday work allowance” which will be decided in a separate circular. OR, if they choose, they can be given 1 extra day of “compensatory leave” which will have to be availed within the next month or it will be elapsed. If they opt for the leave, (which can be taken on a day that does not conflict with work interest, and therefore depends on management approval), then they cannot take the cash.
    6. AGM and above rank holding persons will not receive any allowance for working on holidays or Fridays but will get an extra day of leave added to their leave quota, as a “compensatory leave” which they have to enjoy within the next month. If they do not avail that leave, then it will be elapsed and it cannot be compensated in money.

    As overtime work is costlier for the company than work in normal hours, all effort should be given from all levels to ensure that there is as less overtime work as possible and also that there should be as less work on Fridays or holidays.

    Regulations & Procedures: There will be a requisition for workers to work overtime according to section and justification of work load that will have to be submitted by production AGMs, and approved by Production Director and informed to MD and documentary evidence of such approvals on a daily basis will be maintained.

    • Attendance records both manual and software will be there to keep track of total overtime hours served by a person
    • There will be a separate register or form where all workers doing overtime work will sign every day that they do overtime indicating that it is done voluntarily.
    • The accounting software (the accounts department) will calculate all overtime dues according to the records and applying formulas derived from policies.
    • All workers who may still find a discrepancy from their calculated expectation and the payment received, can approach Admin for clarification and if an event is genuinely found to have occurred the worker will be compensated the discrepancy

    Responsible Parties: HR, Admin, Accounts.

    Communication & Implementation: Policy will be communicated through mail notifications to all and subsequent explanation by department heads to team members

    • Also will be explained by HR team members
    • Policy book will be provided to all department heads for reference

    Exceptions: If any department requires work to be done overtime or on a holiday, special application has to be made to the Director HR & the MD and can only proceed to do it on their written approval. There has to be ample justification for requiring this extra work.

    Feedback & Control: The overtime and holiday work is to be recorded through electronic attendance and verified by witnesses or manual signup sheet, if at any time the attendance machine is not functioning

    • HR will cross check the salary sheet against their records.
    • Compliance will also check salary sheet.
    • Workers
    • Admin will investigate into claims of discrepancies

    Set Time Zone of Attendance Monitoring System:

    This function is used to set the time zone data base once complete setting, the time zone data will be authorized at “door name setting” and for setting authorized time zone at “Clerk Data”. so that can accurately define that some person can be authorized for some time zones and control the access.  Please note that the time zone period can not overlap, otherwise it will confuse the reader, for example, if 0000~0500 is defined as time zone 1 and next time zone will succeed to time zone 1 then it should start at 0501 (not 0500).

    Because the reader will implement the authorized access for some specific time zones, according to “OR’ logic. That is if any time period is authorized by one time zone but negate by another time zone, then the authorized time zone will dominate and authorize the access.  For example, if time zone 0100~0500 is authorized and another time zone 0300~0330 is not authorized, then any time between 0300~0330 will be authorized for attendance monitoring system

    Please contact us by submitting a comment below on Leave a Reply box