Asset Management System Requirement

  • Uploaded by: rita
  • 0
  • 0
  • October 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Asset Management System Requirement as PDF for free.

More details

  • Words: 503
  • Pages: 3
Asset Management System Requirement 

Security: Asset management systems are should only authorized users can access stored items. Permission levels can be established for each user code such as time of day when access is granted or number of hours the item is allowed to be in use and so on.



Monitoring: System managers can monitor data from any desktop connected to the network.



Tracking: A tracking system records who accessed the locker, when and for how long an item was removed. The system software can run activity reports and sort based on different criteria making it possible for system managers to generate useful and practical management reports, then analyze the information to maintain maximum control of access and security issues.



Scalability: Systems can be tailored to individual requirements both now and in the future. This allows organizations to prepare for and adapt to change with minimal or no disruption to the daily operation. Locker modules and key control cabinets can be added where and when needed to support organizational growth while the overall system maintains high reliability and performance including the common usage of data bases and programming. Each additional module can be controlled by a single console and monitored by the software.



Convenience: A key control and asset management system is easy to use and can accommodate a variety of items. Items can be returned to any open locker in the system, and if they are not returned, the software can send an e-mail alert to the system manager.



Integrity: Rugged stainless steel construction and tamper-proof alarms enhance the reliability of the system. Any time the locker is opened, the event is recorded. If a door is left open, force is used to gain access, there is a power failure or the keypad is misused, the action will trigger an alarm and record the event in the log file.



Access: PINs, access control cards, biometrics or any combination of the three are the most commonly used methods for accessing keys. Where protection of the locker module itself is mission-critical, a remote box configuration provides an additional layer of protection. The locker is installed in a secure room and requires a second individual’s PIN input and verification in order for an authorized employee to access items from the locker.



Integration: Compatibility with other security systems and network access offer added richness and usability to a system and integration with existing data bases saves time and money.



Asset tracking throughout the lifecycle including move, add, change and delete (MACD) activities



Providing a unified view of asset health—anytime and anywhere.



Using advanced analytics models to predict equipment failures before they occur.

Asset Management Asset Accounting Asset Performance Management Asset Transactions Lifecycle Monitoring Contract Management Asset Monitoring Item Classification Material Allocations Part Reservation Status Updates Regulatory Compliance Management Template Creation Fault Management

Warranties Preventive Maintenance Vehicle Maintenance Repair Standards (VMRS) Preventive Maintenance Asset Consumption and Condition Maintenance Component Management Pooled Inventory Reverse Logistics Parts Management

Related Documents


More Documents from ""

Posbindu.doc
May 2020 27
Ibn Rushd
July 2020 37
May 2020 38
Tandatangan.docx
June 2020 33
July 2020 28