Systems and Methods for Personnel Monitoring and Management
The systems and methods for providing an integrated means for monitoring, managing and auditing employees performance at a workplace or job site, such as monitoring the time worked by the employees, ensuring employee compliance with applicable laws and regulations, and coordinating and assigning duties to be performed by the employees. Each employee may be provided with a mobile wireless device in communication with the system to provide alerts of potential or actual violations, notifications of any change in duties or position, and notification of time clock status (i.e., time to take a break, time to clock in, etc.).
The present application is a continuation of U.S. application Ser. No. 12/794,615, filed on Jun. 4, 2010, which claims the benefit of U.S. Provisional Application No. 61/184,230, filed on Jun. 4, 2009. The foregoing applications are hereby incorporated herein by reference in their entirety.
FIELD OF THE INVENTIONThe present disclosure relates to systems and methods for monitoring and managing personnel and, more particularly, for monitoring and managing compliance with scheduling, business, and legal rules as it pertains to individual employees in the workplace.
BACKGROUNDTraditionally, time clocks, punch clocks and other mechanical or electronic timepieces have been used to assist employers in tracking the hours an employee worked. With respect to mechanical time clocks, this was accomplished by inserting a heavy paper card, called a time card, into a slot of the time clock and having the day and time information stamped directly on the card. The information collected on the time card allowed a timekeeper to have an official record of the hours an employee worked and to calculate the appropriate pay for the employee.
A significant problem with traditional time clocks is that there is no way to verify the identity of the person who is actually punching the time card and may be subject to abuse. For example, an employee may leave well before the end of his shift without punching out and have someone else punch out for him. Since traditional time clocks do not track the identity of the person actually submitting the card, there is no way to prevent against such abuses.
Biometric time clocks have been developed to address this problem. Biometric clock utilize a person's biological attributes to identify them, rather than using a card or other external device. Examples of such biological attributes include fingerprint and retinal scanning. Since these biological attributes cannot be separated from the associated person, biometric clocks are effective in reducing the types of timekeeping abuses associated with the traditional time clocks.
Both time clocks and biometric clocks, however, do not address the myriad of other employee monitoring and management issues in the work place, such as, for example, controlling the amount of overtime worked by employees, monitoring compliance with pertinent rules and regulations, and so forth. These duties are often performed by managers who supervise the employee's work. Thus, companies that have a large number of employees are required invest a significant amount of money hiring and training managers to properly supervise and manage these employees.
SUMMARYThe systems and methods disclosed herein provide for an integrated means for monitoring, managing and auditing employees performance at a workplace or job site, such as monitoring the time worked by the employees, ensuring employee compliance with applicable laws and regulations, and coordinating and assigning duties to be performed by the employees. Each employee may be provided with a mobile wireless device in communication with the system to provide alerts of potential or actual violations, notifications of any change in duties or position, and notification of time clock status (i.e., time to take a break, time to clock in, etc.).
A more complete understanding of methods and systems disclosed herein will be afforded to those skilled in the art, as well as a realization of additional advantages and objects thereof, by a consideration of the following detailed description. Reference will be made to the appended sheets of drawings which will first be described briefly.
Throughout the several figures and in the specification that follows, like element numerals are used to indicate like elements appearing in one or more of the figures.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTSA management device 190 may be in operative communication with the server 170 and may be any device capable of communicating with a computer network, such as a personal computer, a server computer, a laptop computer, a tablet computer, a personal digital assistant, a mobile phone, or a wireless communication device. The management device 190 may comprise a management application (not shown) which may be any program or application adapted to allow a user, such as, for example, an manager or supervisor, to view the data collected and stored in the database 180.
The management application may provide such data in a user-readable fashion, such as in tables. The management application may also provide functions to enable a user to sort or organize the data so as to prepare reports. For example, the management application may have a calendar function that shows each employee performance on the job over a specified time period that details the hours worked, compliance record, and duties performed. Such information provides concrete measurements of an employee's performance and is thus useful for providing performance evaluations of employees.
A plurality of mobile wireless devices, such as personal digital assistants 110, 120, and mobile telephones 130 may be provided to each employee. The mobile wireless devices 110, 120, 130 is preferably in communication with the employee interface 160, server 170 and/or management device 190 via the communication network 150 to provide alerts of potential or actual violations, schedule reminders (e.g., “time to take a 30 minute break”, “time to return to work”), notification of any changes in duties or position (e.g. “please report to the fry station”, “please report to the manager”), etc. The mobile device 110, 120, 130 may be specifically configured for use in connection with the system 100. Alternatively, mobile device 110, 120, 130 may simply be a mobile telephone, such as an iPhone, having an application which enables the mobile telephone to communicate with the system 100.
Mobile devices 110, 120, 130, employee interface 160, server 170, database 180, and management device 190 may be in communication with one another via a network 150. The network 150 may comprise the Internet, a cellular communications network, a satellite communications network, a radio communications network, a wide area network, a personal area network, a local area network, or a combination of these or other suitable networks.
Data from the employee card is read by the card reader 220 and transmitted to a processor which ascertains the identity of the employee and determines whether access to the functions of the employee interface 200 is to be granted. If access is to be granted, the touch screen 210 presents the employee with an array of relevant options.
It is understood that the card reader 220 may be any device that is capable of reading a credential in determining whether to allow access to the features of the touch screen 210. Accordingly, a PIN pad, such as the one depicted in
Biometric identification reader 320 receives a scan of the employee's biometric feature (i.e., an employee's fingerprint, handprint, hand geometry, face recognition, voice recognition, iris or retinal recognition) and compares it to a stored template. If the probability that the template in the memory and the live scan belong to the same person is high enough, the identification number of that person is sent to the touch screen 210 and the touch screen 210 then checks permissions of the employee and makes the decision whether to grant access or not. Biometric identification reader 320 significantly increases the security level of systems because it eliminates such problems as lost, stolen or loaned ID cards and forgotten or guess PINs.
The employee identification logic 410 is configured to receive identification data and perform a comparison or analysis with stored data in determining whether or not to grant access to the system. As describe above in connection with
Employee identification logic 410 may comprise additional functionalities, such as the ability to enable or lock out an employee from all devices and computers from a workplace. This may be useful in instances in which immediate action is required to lock out an employee from accessing the system, such as when an employee is determined to be a security risk. The employee identification logic 410 may communicate with other associated devices and computers in the network to lock that employee from having access to all systems, devices and computers. As will be described in further detail below, employee identification logic 410 may also control an employee's access to various devices and computers in less drastic situations, based on the employee's compliance, schedule, or performance status.
Scheduling logic 420 performs the necessary timekeeping determinations and calculations. For example, scheduling logic 420 records the time that an employee reports to work when the employee clocks in, the hours the employee has been working, the number and duration of breaks taken, the amount of overtime worked, and so forth. Upon the determination by the employee identification logic 410 to grant access to an employee, the scheduling logic 420 determines the status of the employee and provides the relevant options to the employee, such as clock-in, break start, break end, clock out, etc.
Compliance logic 430 performs the functions to determine whether an employee is in compliance with applicable laws, regulations or rules. Applicable laws may include federal and state labor and employment laws, which may regulate the number of hours an employee may work per day or week in a particular field or vocation, required break and lunch breaks, limitations on the amount of overtime worked, etc. In addition, compliance logic 430 may also take into consideration union and other workplace regulations and rules. Compliance logic 430 is therefore tailored to the jurisdiction and the requirements of a particular workplace or job site.
Scheduling logic 420 and compliance logic 430 may cooperate to direct an employee's options. For example, if an applicable law requires employees to take a 30 minute break after working 5 hours, the scheduling logic 420 and compliance logic 430 may keep track of an employee's status and send an alert to the employee via the mobile device to take a break. The employee will not be able to end the break or clock back in until after 30 minutes has elapsed.
Thus, the relevant options determined by the scheduling logic 420 may be made in cooperation with the compliance logic 430 and the performance logic 440. For example, if the scheduling logic 420 determines that the last access from the employee was a “break start”, the options available to the employee upon the next access may be “break end” or a “clock out”. If an applicable law requires an employee to take a minimum break of 30 minutes, the compliance logic disables the “break end” feature until 30 minutes have elapsed from the time when the employee selected the “break start” feature.
Performance logic 440 performs the functions to determine the appropriate tasks, duties or positions assigned to the employee. For example, in a restaurant setting, an employee may be responsible for a number of different duties, such as prep work, food preparation, cash register, waiting tables, etc. Performance logic 440 may therefore be configured to keep track of the various duties assigned to the employees and reassign employee duties as necessary.
Thus, an employee may clock in and receive a message directing the employee to report to the prep station. While the employee is working in the prep station, the system may send a notification to the employee's mobile device instructing the employee to report to the food prep station. Performance logic 440 accomplishes the coordination of personnel and assignment of duties typically performed by an onsite manager or supervisor. Performance logic 440 also takes in to consideration an employee's availability or available time. For example, performance logic 440 does not assign further duties to an employee who is on break or is in danger of working overtime.
A significant advantage to requiring an employee input information in specified fields as a condition to clocking out is that it provides further controls and monitoring over the employee's activities. For example, in the restaurant context, rules may be in place as to tip reporting, e.g., that each employee's reported tip be at least 8% of cash sales. Once the employee completes the clock out process, the system may communicate with other devices and computers in the restaurant, such as cash registers and order systems, to log that employee out and prevent the employee from having further access to the systems without first clocking in.
If a match is found, then at 516, then the employee schedule is retrieved and the relevant rules which guide compliance with applicable laws and regulations are applied. At 518, an additional assessment is made to determine the current status of all duties and jobs being performed by all employees in the workplace. Based on the employee schedule, the relevant rules with which the employee must comply with, and the current status of employees on the floor, at 520, relevant options are presented to the employee.
For example, if the employee is checking in for the first time, such options may include CHECK IN and a selection or instruction to report to a particular duty or station. Once the employee reports to the appropriate duty or selection, a mobile device which the employee continues to further update the employee as to applicable warnings and instructions.
While the present invention has been illustrated and described with particularity in terms of preferred embodiments, it should be understood that no limitation of the scope of the invention is intended thereby. Features of any of the foregoing methods and devices may be substituted or added into the others, as will be apparent to those of skill in the art. It should also be understood that variations of the particular embodiments described herein incorporating the principles of the present invention will occur to those of ordinary skill in the art and yet be within the scope of the invention.
As used in this application, the terms “component,” “module,” “system,” and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components can communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal).
It is understood that the specific order or hierarchy of steps in the processes disclosed herein in an example of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged while remaining within the scope of the present disclosure. The accompanying method claims present elements of the various steps in sample order, and are not meant to be limited to the specific order or hierarchy presented.
Moreover, various aspects or features described herein can be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer-readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips, etc.), optical discs (e.g., compact disc (CD), digital versatile disc (DVD), etc.), smart cards, and flash memory devices (e.g., Erasable Programmable Read Only Memory (EPROM), card, stick, key drive, etc.). Additionally, various storage media described herein can represent one or more devices and/or other machine-readable media for storing information. The term “machine-readable medium” can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
Those skilled in the art will further appreciate that the various illustrative logical blocks, modules, circuits, methods and algorithms described in connection with the examples disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, methods and algorithms have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
Claims
1. A computer system for monitoring and managing an employee at a workplace, the computer system comprising:
- an electronic memory storage configured to store modules;
- a computer processor configured to execute the modules comprising: an employee identification module configured to receive employee identification data, perform a comparison of the received employee identification data with stored credential data of the employee, and determine whether or not to grant the employee access to the system; a scheduling module configured to receive time data from the employee related to an employee clock-in time and an employee clock-out time, wherein the employee clock-in time indicates an employee start time for working and the clock-out time indicates an employee stop time for working; a compliance module configured to access applicable regulations from a regulations database, the compliance module further configured to determine whether the employee is in compliance with the applicable regulations; and a performance module configured to coordinate assignment of duties, wherein the scheduling module, compliance module, and performance module are further configured to communicate with each other to enable the performance module to ensure the employee is not assigned a duty that would result in the employee violating the applicable regulations based on the received time data, applicable regulations, and anticipated time requirements of the duty.
2. The computer system of claim 1, wherein the employee identification module is configured to receive employee identification data from at least one of: a touch screen, a card reader, a key pad, a biometric identification device, or combinations thereof.
3. The computer system of claim 1, wherein the scheduling module, based on a determination that a duty is assigned to the employee, is further configured to electronically transmit an alert to the employee to inform the employee of the duty assigned to the employee.
4. The computer system of claim 1, wherein the performance module is further configured to reassign a duty originally assigned to the employee, based on a determination that continued assignment of the duty to the employee would result in the employee violating the applicable regulations.
5. The computer system of claim 1, wherein the applicable regulations comprises government workplace regulations.
6. The computer system of claim 1, wherein the applicable regulations comprises business rules.
7. The computer system of claim 1, wherein the applicable regulations comprises government workplace regulations and business rules.
8. The computer system of claim 1, wherein the applicable regulations comprises a frequency of breaks and a length of breaks required.
9. The computer system of claim 1, wherein the applicable regulations comprises a quantity of overtime allowed.
10. A computer system for managing and automatically recording an employee clock-out time, the computer system comprising:
- an electronic memory storage configured to store modules;
- a computer processor configured to execute the modules comprising: an employee time management module configured to access time data of an employee related to an employee clock-in time and an employee clock-out time, wherein the employee clock-in time indicates an employee start time for working and the clock-out time indicates an employee stop time for working; and a compliance module configured to access applicable regulations from a regulations database, the compliance module further configured to determine whether the employee is in compliance with the applicable regulations, wherein the employee time management module and compliance module are further configured to communicate with each other to determine whether the employee is required to clock-out at a point in time based on the received time data and applicable regulations, wherein the employee time management module, based on the determination that the employee is required to clock-out, is further configured to automatically record a clock-out time.
11. The computer system of claim 10, wherein the scheduling module, based on a determination that the employee is required to clock-out, is further configured to electronically transmit an alert to the employee to clock-out.
12. The computer system of claim 10, wherein the applicable regulations comprises government workplace regulations.
13. The computer system of claim 10, wherein the applicable regulations comprises business rules.
14. The computer system of claim 10, wherein the applicable regulations comprises government workplace regulations and business rules.
15. The computer system of claim 10, wherein the applicable regulations comprises a frequency of breaks and a length of breaks required.
16. The computer system of claim 10, wherein the applicable regulations comprises a quantity of overtime allowed.
17. The computer system of claim 10, further comprising a performance module configured to coordinate assignment of duties, wherein the performance module is further configured to not assign additional duties to the employee based on the determination that the employee is required to clock-out.
18. The computer system of claim 10, further comprising a display module configured to graphically present on a display hardware to a manager whether the employee is in compliance with the applicable regulations.
Type: Application
Filed: Dec 18, 2012
Publication Date: Sep 19, 2013
Inventor: Mitesh Gala (Santa Ana, CA)
Application Number: 13/719,072
International Classification: G06Q 10/10 (20120101);