Sanitizing for Enrollment and Scanning on Fingerprint Readers

Use Best Practices for Hand Sanitation of Users

Instruct users to thoroughly clean their fingers and hands with an alcohol-based sanitizer. Alterantively wash with soap and water for at least 20 seconds. This must be done BEFORE and AFTER touching the device.

Ensure that the fingers and hands are completely dry before touching the device.

During enrollment or  verification phase for instance

Use Personal Protective Equipment when Touching the Hands of a User.

When touching the hands of individuals that need to be enrolled/verified, follow your local Health Agency protocols for the use of Personal Protective Equipment (PPE).


Sanitizing Fingerprint Readers

The following advice has been provided for the cleaning and sanitizing of Idemia (Sagem/Morpho) biometric fingerprint readers. A similar approach can be used for most other brands as well.

First, please note that it is NOT necessary to unplug the device to clean it.

  • Thoroughly clean your hands with an alcohol-based rub or wash with soap and water BEFORE and AFTER cleaning the biometric device.
  • Always use a new pair of gloves when cleaning the device, and immediately dispose of the gloves once finished.
  • Regularly clean and disinfect the fingerprint sensor, especially after someone exhibiting COVID-19 symptoms touches the device.

From the US Environmental Protection Agency list[2] of disinfectants for use against the Coronavirus, IDEMIA recommends either:
Windex® Multi-Surface Disinfectant or another similar product containing L-Lactic acid; or
Hydrogen peroxide : apply the disinfectant to a non-abrasive wipe.

IDEMIA recommends either:
Economizer® Wipers; or 3M Scotch-Brite® High Performance Cloth
Wipe the device surface and leave the surface wet with disinfectant for at
least 5 minutes.


  • Do not apply products containing bleach to the fingerprint sensor. This may
    permanently damage and affect the performance of the device
  • Do not use abrasive cloths or wipes (e.g., paper towels)
  • Do not spray liquid directly onto the sensor. Always spray cleaning solution onto a
    non-abrasive cloth, and then use it to wipe the sensor.

Other manufacturers suggest spraying a light coating of sanitizer on the readers and leaving it to dry for a few minutes. It is important that you do not put so much on, that liquid actually runs into the device.

Clockwatch Time-and-Attendance Software

Time-and-Attendance systems are a low-cost, customizable time-tracking solution. *Anviz* hardware features keypad, LCD display and your selection of proximity, or biometric options. Hardware also includes features for optional access control at a door or gate.

Some readers may also be used in dual reader applications. Dual card-readers permit the use of separate card-reader devices for ENTRY and EXIT.


Time-and-Attendance readers feature a card-reader option.
The readers can also utilize an Ethernet TCP/IP interface for communication with a host computer. Using your Windows software or other application software, the host computer can perform actions such as adding employees; configuring terminals; monitoring card access; viewing hours; and more. Optional access control is available for controlling access to doors and/or gates. The system is customizable to suit your needs. The low-cost *ANVIZ* terminal may be purchased directly from the supplier – *Itatec*.

The terminal …

  •  is compatible with dual-reader applications and comes with optional door or gate access control
  •  is completely customizable
  •  has an on-board, battery-backed employee database
  • offers CSV output files which are compatible with database and spreadsheet applications

There is also a biometric fingerprint reader option, proffering:

  • selectable access modes – either card-and-fingerprint fingerprint only or card-only
  •  communications options
  •  firmware upgrade capability

Most of these systems, at a fraction of the cost, offer features found in more sophisticated end products. This low initial outlay is made possible because terminal units are purchased directly from the core-partner and South African distributor. So you will be purchasing the best at a very reasonable price. This is a huge advantage!.

Biometric Access Control Systems

In earlier days, password systems were introduced mainly for security. Over time, hackers found ways to break the password security systems. Subsequently, identity cards were developed. In some companies this system is still being used. However, security issues arise when restricted locations or confidential resources require careful control. Identity card readers cannot fulfill this need. Thus more secure security systems are needed. Market demand has moved toward biometric access control systems based on physical and behavioral characteristics. Physical traits appertain to the shape of one’s body; fingerprints; palm print; and face recognition (face recognition includes the distance between the two eyes, the distance between the nose and ear, the size of the nose, any facial blot or blemish etc.). The latest technology uses eye retina scanners.
Behavioral traits include typing rhythm which requires the person to type some words, thereby identifying the person based on his/her typing rhythm. Another behavioral trait is voice. There are many systems that utilize physical and behavioral traits.

How Biometric Access Control Systems Operate

The biometric access control system works on verification. A single system can consider more than one trait, which means that the system verifies all physical criteria. The biometric access control system identifies the person who wants to access secure resources then matches this with data stored in a database.  On the basis of this data, the system verifies who the person is. If this data is not verified, the person is allowed access to the secure premises or resources. Biometric systems can also identify a particular person in a group of people, verifying data in the same way as above. When a match occurs, the system alerts the administrator.

Great Investment

This system is a great investment. It only requires a once-off payment and no maintenance is necessary – no hidden costs! This system requires the end-user creates a database by first entering the data of authorized persons. This data must match that on the database to allow authorised persons access to the secure resource(s). The security level of biometric access control systems is very high compared to systems based on password or identity cards. Biometric systems would require duplicating biometric traits to hack, which is very hard, in-fact nearly impossible. Therefore this type of system provides the highest level of security.

These days biometric access control systems are popular worldwide. Even biometric passports have become a trend. Biometric access control systems are very fast and great to use in areas that are always filled with people.