{"id":359,"date":"2011-01-05T16:00:41","date_gmt":"2011-01-05T21:00:41","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=359"},"modified":"2022-11-16T04:17:19","modified_gmt":"2022-11-16T09:17:19","slug":"the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/","title":{"rendered":"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale &#8211; Reason #9 &#8211; Role Based Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11480\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/01\/Solidify-Role-Based-Security-1-1280x720.jpg\" alt=\"Solidify-Role-Based-Security\" width=\"800\" height=\"445\" \/><\/p>\n<p>Blog Series \u2013 \u201cThe Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale\u201d<\/p>\n<p><em>Leading up to our participation in the <\/em> National Retail Federation\u2019s 2011 \u201cRetail\u2019s Big Show\u201d <em>from January 9 \u2013 12 in New York city, <\/em><a href=\"https:\/\/www.m2sys.com\/\"><strong><em>M2SYS Technology<\/em><\/strong><\/a> <em>is publishing a blog series on the top 15 reasons that biometrics is a smart choice for retail organizations to consider as an authentication technology in <\/em><a href=\"https:\/\/m2sys.com\/biometric_time_clock.htm\"><strong><em>workforce management<\/em><\/strong><\/a> <em>and <\/em><a href=\"https:\/\/m2sys.com\/biometric_time_clock.htm\"><strong><em>retail point of sale<\/em><\/strong><\/a> <em>applications.<\/em><\/p>\n<p>In case you missed it, here are the links to our prior posts in the series:<\/p>\n<p>Reason #1 \u2013 <a href=\"https:\/\/www.m2sys.com\/blog\/?p=273\"><strong>Stop Buddy Punching<\/strong><\/a><strong><br \/>\n<\/strong>Reason #2 \u2013 <a href=\"https:\/\/www.m2sys.com\/blog\/?p=290\"><strong>Increase Productivity<\/strong><\/a><strong><br \/>\n<\/strong>Reason #3 \u2013 <a href=\"https:\/\/www.m2sys.com\/blog\/?p=314\"><strong>Enhance Loss Prevention<\/strong><\/a><br \/>\nReason #4 \u2013 <a href=\"https:\/\/www.m2sys.com\/blog\/?p=324\"><strong>Establish Accountability<\/strong><\/a><br \/>\nReason #5 \u2013 <a href=\"https:\/\/www.m2sys.com\/blog\/?p=328\"><strong>Going Green<\/strong><\/a><br \/>\nReason #6 \u2013 <a href=\"https:\/\/www.m2sys.com\/blog\/?p=338\"><strong>Build Customer Loyalty<\/strong><\/a><strong><br \/>\n<\/strong>Reason #7 \u2013 <a href=\"https:\/\/www.m2sys.com\/blog\/?p=347\"><strong>Achieve Higher Return On Investment<\/strong><\/a><br \/>\nReason #8 \u2013 <strong><a href=\"https:\/\/www.m2sys.com\/blog\/?p=353\">Airtight Access Control<\/a><\/strong><\/p>\n<p>And now on to our next post\u2026<\/p>\n<p>Reason #9 \u2013 Solidify Role Based Security<\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/RightPunch-Biometric-Time-Clock-Software-kronos-adp-m2sys.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>RightPunch\u2122<\/span><\/h2>\r\n\t\t\t<h3>Affordable Biometric Time Clock Software for Kronos and ADP<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Key Features: <\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>\u00b7 Increase Accountability and Boost Productivity<\/p>\r\n\t\t\t\t<p>\u00b7 Eliminate Time Theft | Reduce Payroll Expenses <\/p>\r\n\t\t\t\t<p>\u00b7 Prevent buddy punching<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/rightpunch-biometric-time-clock\/?utm_source=The+Top+15+Reasons+To+Use+Biometric+Technology+In+Workforce+Management+And+Retail+Point+Of+Sale+%E2%80%93+Reason+%239+%E2%80%93+Role+Based+Security&amp;utm_medium=RightPunch%E2%84%A2&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<p><strong><span style=\"text-decoration: underline;\">The Role Based Access Control Model<\/span><\/strong><\/p>\n<p>Role based access control (RBAC) is defined as the strategy that is used to restrict system access to authorized users.\u00a0 In our last blog post, we discussed <strong><a href=\"https:\/\/www.m2sys.com\/blog\/?p=353\">using biometrics to achieve airtight access control<\/a><\/strong> in the context of securing inventory and physical assets.\u00a0 In this post, we are going to cover establishing a solid RBAC model as it relates to system access and transactional authorization.<\/p>\n<p>Almost all retail establishments develop a hierarchal model for their business based on the roles of their employees.\u00a0 This model delineates permission based system access and acts as a guide for the processing and rectification of transactions.\u00a0 Most organizations are very stringent about developing a comprehensive model for this purpose but fail to employ the proper system technology that essentially ensures that the permissions set forth in the model are followed and not abused for criminal purposes.\u00a0 Similar to physical inventory access control, the feasibility of ensuring that RBAC will work successfully and not be exploited is directly tied into the strength and security of the system technology.<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Some Technologies Make Audit Trails Impossible To Follow<\/span><\/strong><\/p>\n<p>Most often, employees take advantage of loopholes in a system by swapping barcode ID cards to authorize transactions or sharing PIN\u2019s to override the authorization level that their current status provides.\u00a0 This system manipulation is commonly used to enter phantom transactions, falsify returns and comp items or services for customers or employees who should actually be paying for them.<\/p>\n<p>Problems arise when you employ more antiquated system technologies that offer no assurance that the individual who traces back to the illegal transaction was actually the person who committed the crime.\u00a0 You think that you have narrowed down your list of perpetrators to one or perhaps a few employees who fit within a particular window or timeframe but realistically, you have no way of truly knowing that the suspects were acting alone or perhaps in conjunction with other employees by swapping ID cards or PIN\u2019s.\u00a0 Even though you had good intentions to put a system in place that limits transactional authority based on an employee\u2019s role, it\u2019s virtually impossible to establish a concrete audit trail due to the uncertainty that the technology itself creates.<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Biometrics Is The Only Way To Know For Sure<\/span><\/strong><\/p>\n<p>Upon implementing a <strong><a href=\"https:\/\/m2sys.com\/pos_software.htm\">biometric componen<\/a>t<\/strong> to your RBAC model, you can rest assured that the ability to identify an individual executing a transaction is virtually undeniable.\u00a0 If you elect to adopt a fingerprint biometric system, it\u2019s not feasible to think that an individual would conspire to figure a way to fool the system by replicating a mold of a supervisor or manager\u2019s fingerprint in order to override their own authority level.\u00a0 If you select a more sophisticated biometric modality such as <strong><a href=\"https:\/\/m2sys.com\/finger-vein-reader.htm\">finger vein<\/a><\/strong> or <strong><a href=\"https:\/\/m2sys.com\/palm-vein-reader.htm\">palm vein<\/a><\/strong> technology which relies on vascular biometric technology, then the chances of someone obtaining a vascular finger or palm pattern to use as a means to fool the system becomes virtually impossible.<\/p>\n<p>Therefore, the audit trail becomes concrete and you have implemented a system that solidifies your RBAC model and provides the peace of mind to know that if a problem were to arise, it would be handled swiftly and accurately.<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Biometrics Is One Spoke In The Wheel Of Effective RBAC<\/span><\/strong><\/p>\n<p>Simply deploying a RBAC model with a biometric system for authorization is not going to single handedly wash away any chance of your system being exploited.\u00a0 Although biometrics does offer a very powerful way to secure system access with a solid audit trail, it must be combined with other key ways to prevent employee theft.\u00a0 Check out <strong><a href=\"https:\/\/www.businessknowhow.com\/manage\/employee-theft.htm\">this article<\/a><\/strong> which describes some additional measures you can put in place to help prevent employee theft and mismanagement.<\/p>\n<p>We encourage you to read through some <strong>testimonials<\/strong> from our point of sale Integrators to see firsthand the value that a biometric component can inject into a retail environment.<\/p>\n<p>Do you think biometric technology would be a powerful way to establish a solid RBAC model?\u00a0 Why or why not?\u00a0 Please share your comments below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Blog Series \u2013 \u201cThe Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale\u201d Leading<\/p>\n","protected":false},"author":3,"featured_media":15812,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1834],"tags":[],"class_list":["post-359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-workforce-management"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale - Reason #9 - Role Based Security - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale - Reason #9 - Role Based Security - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Blog Series \u2013 \u201cThe Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale\u201d Leading\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2011-01-05T21:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-16T09:17:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/09\/swiping_card1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/09\/swiping_card.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\"},\"headline\":\"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale &#8211; Reason #9 &#8211; Role Based Security\",\"datePublished\":\"2011-01-05T21:00:41+00:00\",\"dateModified\":\"2022-11-16T09:17:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/\"},\"wordCount\":929,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Workforce Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/\",\"name\":\"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale - Reason #9 - Role Based Security - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2011-01-05T21:00:41+00:00\",\"dateModified\":\"2022-11-16T09:17:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale &#8211; Reason #9 &#8211; Role Based Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale - Reason #9 - Role Based Security - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/","og_locale":"en_US","og_type":"article","og_title":"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale - Reason #9 - Role Based Security - Digital Transformation of Government Services","og_description":"Blog Series \u2013 \u201cThe Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale\u201d Leading","og_url":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2011-01-05T21:00:41+00:00","article_modified_time":"2022-11-16T09:17:19+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/09\/swiping_card1.jpg","type":"image\/jpeg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/09\/swiping_card.jpg","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0"},"headline":"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale &#8211; Reason #9 &#8211; Role Based Security","datePublished":"2011-01-05T21:00:41+00:00","dateModified":"2022-11-16T09:17:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/"},"wordCount":929,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Workforce Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/","url":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/","name":"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale - Reason #9 - Role Based Security - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2011-01-05T21:00:41+00:00","dateModified":"2022-11-16T09:17:19+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-15-reasons-to-use-biometric-technology-in-workforce-management-and-retail-point-of-service-reason-9-role-based-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The Top 15 Reasons To Use Biometric Technology In Workforce Management And Retail Point Of Sale &#8211; Reason #9 &#8211; Role Based Security"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Shakib Khan","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/359"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":15,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/359\/revisions"}],"predecessor-version":[{"id":18885,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/359\/revisions\/18885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15812"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}