- 1 Functionalities
- 2 Benefits
The system comprises a central supervision and management module, as well as a mobile component using an assisted investigation module to guide investigators through onsite work, meeting their projected goals. This mobile assistant leverages the Activity concept as a potent tool to link actions and tasks with site investigators’ schedules.
The design of Axional Mobile AES is based on the fundamental premise of security.
The system is equipped with maximum safety guarantees in the transmission and handling of information:
- It allows investigators to work completely offline, with the activity schedule already received. When communication with the system is reestablished, newly entered data is transmitted and the investigator receives an updated schedule.
- In case of device damage or theft, the user can log in on another device and regain access to all their information. The point of contact for the system can both block access and send SMS messages destroying locally-stored data on damaged or stolen devices.
- User profiles and data access levels based on entity rules.
- Complete compliance with regulations.
In general, security plans are required to track activities performed and confirm that inspections are carried out in agreement with established protocol. The functionalities of Axional Mobile AES make it possible for heads of security to guarantee that activity is performed according to regulations.
- Ease of use.
- Simple and intuitive interface. The learning curve for users is virtually nonexistent.
- Remote access to textual and graphic information on inspection- or investigation-related data.
Axional Mobile AES possesses all the features necessary to ensure that investigation processes are effective from a security as well as a cost perspective. Features are grouped into the following modules:
All onsite activity is organized into actions assigned to the investigators of specific employees. An action consists of a series of tasks which requires a polyvalent set of data to be completed. Actions may be one-time or habitual.
The scheduler or system administrator sets investigation actions and schedules a calendar of execution. These actions are assigned either manually or automatically in the form of Investigation Files.
Investigation files can be generated from two sources, based on an ‘investigation proposal’. The system possesses an inspection process which periodically indicates which employees are due for screening. This process generates proposals from two possible mechanisms:
- Random: the system randomly proposes which employees to inspect according to certain system rules, such as proposing more checks in higher-risk worksites.
- Rotating: employees to be checked will be selected on a rotating, periodic basis.
Based on this report, the head of security will definitively decide which employees to inspect, and the system will create corresponding investigation files.
- Directly from an Inspection Notice: If suspicious behavior has been observed, anonymous tips have been received, etc., an Inspection Notice will be generated for the specific employee in question. This Notice will include the identifying data of the employee and the reason for suspicion, in order to help determine how low- or high-priority the investigation is. The corresponding investigation file is created based on the data in the Inspection Notice and the assigned priority level. In this way, the system interlinks notices with investigations. For example, when performing a background check on a relative or known contact, an Inspection Notice may be derived for another employee as a result.
Assigning an Investigator
The moment that an investigation file is opened, an investigator can be assigned. The system allows users to see the projected workload for each investigator in order to assign files with optimal efficiency. The investigator’s task planner is built automatically from the routes assigned. When their mobile device is turned on, it will automatically synchronize and update their investigation schedule.
Onsite investigators can, in turn, add their own tasks. Under certain conditions they may be able to modify the timeline of execution in order to adapt to situational needs as they unfold.
From their mobile device, investigators can see all information in an employee’s file, all associated data, and any attached documents (Word, Excel, certificates, photos, videos, audio, etc.)
The schedule is automatically synchronized both to receive new tasks and assignments and to notify the central system of completed tasks.
From the central system, administrators have constant access to reliable information on how onsite operations are developing, and possess the tools to act on this knowledge. Axional Mobile AES offers the following functions:
- Real-time schedule modification. Urgent activities can be scheduled from the central system and sent to the assigned investigator, whose schedule will be instantly updated. No need to return to the office to pick up documentation.
- The system shows the degree of completion of assigned investigation routes; it is also capable of managing interrupted or pending routes in case of unforeseen issues.
- Visualization of various statistics on work completed, such that the investigator can track their degree of progress in meeting indicated goals.
Other functions key to aiding the scheduling process include:
- Multi-person route scheduling. The schedule administrator can combine multiple investigators’ or other support staff’s schedules to set one unified investigation route.
- Automatically calculate the most efficient route to the next activity via mapping.
- The scheduling module helps managers and users follow the status (completed, pending, canceled, rescheduled, etc.) of each assigned activity.
- The system maintains a record of the physical location of each investigator (GPS coordinates, speed, time). The basic purpose of this record is to track onsite operations, though it can also be used for other goals, e.g.:
- Creating travel expense reports (mileage, etc.).
- Assigning tasks to the closest investigator online.
- Checking the location of vehicles and people.
Route Maps Based on Schedules
The system tracks the geographic position of user mobile devices at all times. This information is utilized to facilitate the scheduling of each investigator’s day-to-day work on various sites, supporting the following features:
- Visualization of the route to each work center from investigator’s current location.
- Real-time route recalculation in case of schedule modification.
The corporate database stores employee-related information, part of which originates directly from Human Resources systems (name, address, etc.). Axional Mobile AES also handles complementary information such as:
- Complete and detailed employment history. Start and end date at each company where employee has worked, and reason for departure. Data on past salaries and positions/titles.
- Record of job position changes to facilitate tracking of all places where an employee has worked.
- Relationships: Tree structure including various types of personal connections (family, friends, colleagues, etc.). This structure can be displayed graphically to more easily visualize derived relationships (e.g., friends of family members, etc.). The system possesses comparison and cross-reference functions, showing personal contacts shared by multiple employees.
- Financial information: Banks habitually used, investments, companies in which employee holds shares, etc.
- Real estate: record of the property an employee or their partner/family owns. Scanned property documents may be attached.
- Vehicles: record of the vehicles an employee or their partner/family owns.
This information is obtained and updated via various sources, particularly the investigation processes managed by the Axional Mobile AES module. Changes to employee information defined as ‘critical’ will generate a notification to the system administrator. This advance notification can be converted into an Inspection Notice if the administrator so wishes.
The corporate database also stores, in as much detail as possible, investigative activities realized and results obtained. The system performs full tracking of completed investigative actions:
- Investigator responsible.
- Exact timestamp in which information entered the system.
- Full record of the investigator’s geographic location throughout their route. The system retains two types of routes:
- Hypothetical route which the investigator should have followed based on the assigned schedule.
- Actual route, based on investigation files and time spent on each inspection.
- People who have processed the data: Audit record of changes to each table in the system made by authorized staff. Information includes date and time of change, user IP address, the table and field modified, etc.
The investigation assistant module will guide the investigator during onsite checks. This assistant boasts a user-friendly, easy-to-master interface to help meet assigned tasks.
All scheduled tasks are grouped into Investigation Files. In order to adapt to the needs of a specific airport, files can register any type of information, such as:
- Numeric quantities
- Text fields to introduce information or comments
- Predefined lists of options, single-select or multi-select
- Checkboxes to report tasks completed, goals met, approvals granted, etc.
- Dates, timestamps, and time intervals
- Photo, video, and audio files
- GPS coordinates where the investigation was carried out
From their mobile device, investigators can consult a map of an employee’s property, and optionally view the property of relatives, friends, etc. The system can calculate a route if the investigator needs to perform a residence inspection.
The mobile device synchronizes with the central server such that your organization acquires information in real time, via one click from the investigator or via system automation.
With Axional Mobile AES, those responsible for security possess a real-time reporting system for investigative activities, both cumulative and individual (related to a specific investigator).
Because your company is dealing with real-time information, you can immediately manage unforeseen issues by modifying assigned tasks, as well as keeping special observations or factors in mind when scheduling new tasks.
The system includes a broad range of reports and statistics, with rich graphic features that are also mobile-friendly. Thanks to the Axional Mobile platform, services can be implemented within minutes, with new reports specifically adapted to your organization’s needs.
Axional Mobile AES allows users to access and modify system data both online and offline. When a connection is available, data modifications are synchronized automatically on both sides (user device and central server).
The synchronization tool allows the IT department to maintain terminal databases, check their status, and perform maintenance operations. A synchronization policy determines which tables and datasets should be synchronized for a specific user.
Due to the type of information managed by mobile devices in this area, a strong security system is required to avoid data leaks in case of device loss or theft. Axional Mobile AES contains the necessary security infrastructure to manage information, including:
- Database access control system, allowing administrators to define which users have access under which conditions.
- An entity rules system which defines access to data and lets you set which subsets of data are accessible, independently of the application.
- An entity rules user assignment system.
- An SOAP operations protection system, ensuring not all services are available to all users.
- Traceability: The logging system allows constant tracking of operations, queries, and even transactions, allowing users to view the data a specific person has consulted or the modifications they have made to a table.
In case of device loss or theft, the system administrator has the option to block access and even send an SMS destroying locally-stored data.
Axional Mobile AES offers support to any organization linked to airport management, aiding security work with exhaustive, fully-integrated features based on risk assessment.
Its most noteworthy benefits are:
- Effective risk mitigation
- Documents and audits staff risks.
- Increases the number of onsite inspections without increasing the number of staff.
- Sends alerts based on information cross-reference.
- Security aligned with risk management
- Minimizes the operating costs of inspections.
- Provides context and evidence in case of fraudulent behavior.
- Provides flexibility when setting the number of checks per employee, based on their past data.
- Enhanced use of information
- Performs followup on inspector efficiency, based on various parameters.
- Provides potent reporting and analysis tools.