Vigilant NFC Profesional

10K+
Downloads
Content rating
Everyone
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

VIGILANT NFC PROFESSIONAL is an App of the Vigilant Web system to control the presence of operators in real time, location, route, security patrols, incidents and reports.

App and System Features:
1. Identification of the operator
2. Presence control in real time.
3. Visualization of the operator's position and route.
4. Presence registration with geolocation.
5. Insertion of observations at the point visited.
6. Control of rounds or presences at the points.
7. Notice that the service, round or route has NOT started.
8. Notice of NON-presence at the scheduled point.
9. Control News and Notice of NO data.
10. Part of work on presences and observations.
11. Incident Report via email to those responsible with description, image and position.
12. Presence reports by work center, by point, by operator, rounds, incidents by work center, by type...
13. Customer portal with record viewer, and presence and incident reports.
14. Deadman control configurable from the web platform. Motion detection.

The System provides a real-time presence control formula with position control and notifications of incidents or events.
A simple application that DOES NOT require manipulation by the operator, you only have to bring the phone close to the identification point, when it recognizes it it vibrates and emits a sound.
Each event is recorded with date, time and position data, this is displayed on a cartography.

The application will be operational after contracting the service with Radiobit Sistemas.

Descriptive example of operation.
1. START. The application requests that the operator identify himself
2. START IN THE WORK CENTER. Upon arrival, the device passes through the identification point, the start of activity is recorded, the reception of the data prevents the NOT START notice.
3. CONTROL OF PRESENCE IN ROOMS. As in the previous procedure, when you arrive at the room you will proceed to read the identification point, the data represents the beginning of your presence, the event sent to the database hosted on the web servers again unites the presence of the operator in a place determined with date and time, when finished it performs the reading again, closing the presence time. This must be done in all rooms that require proof of presence and that obviously contain TAG.
NOTE. In case of lack of coverage, the equipment continues collecting and storing the information, as soon as it is restored it will send everything stored to the servers.
5. NOTE OF TASK IN THE ROOM. On the device the operator will find a menu of tasks, events and incidents, which they will use as appropriate. There will be a record of the task or tasks carried out at the place of presence.
6. NOTICE OF INCIDENTS. In the events menu the operator will find a menu with the most common incidents, events or warnings. If during the presence an anomaly is detected that must be reported, the operator will choose the appropriate one and accompany it with a descriptive image. The result will be the record of what happened in that room that day at that time and by the operator in question. Furthermore, if it has previously been planned that each time it happens, a responsible person will be notified, he or she will receive the notice in an email; each incident can notify different managers.

In the aforementioned procedure, all the presences, work times and linked routes remain, as well as the incidents or events found.

Startup.
Quick, simple and always advised.
The support manager will contact you to guide you, you will be provided with electronic labels to identify the places, these are registered on their platform with the name and place to which they are destined.
They will create work routes just by selecting the place to go between the planned hours and days.
The teams must have an internet connection, it can be through Wi-Fi.
Updated on
Sep 23, 2024

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
This app may collect these data types
Location, Personal info and 2 others
Data is encrypted in transit
Data can’t be deleted