4. Round Management

NFC round management. Image : yacobchuk / 123RF

To make it clear, this isn’t about making sure you get your drinks at the bar – although there has been a NFC drinks ordering promotional campaign for this using NFC tags.

Round management is a term generally used to describe a person that, as part of their job, is required to visit specific locations. Obvious examples might be a healthcare worker who will travel from home to home checking on patients or a security guard who will do a round every few hours checking doors and windows.

Proof of compliance

However, round management is starting to spread to related but interesting areas. NFC.Today recently saw a project where tags were being placed on industrial machinery and the user was required to check all the points before the machine could be used. This variation of round management is a rapidly growing area in many instances because it ties in with proof of compliance, perhaps with fire regulations or health and safety.

The concept is simple and effective. In the past, a worker might have had a clipboard and a list of items to check, for example, fire extinguishers. The difficulty is that there was no proof that the user had physically moved from their desk and seen each fire extinguisher in place. With NFC tags attached to each fire extinguisher, the user would be required to walk around with their mobile and actually scan each tag in place. This serves two purposes. First, the reporting function has moved from paper to digital meaning it’s both realtime and more efficient. Secondly, there’s a stronger proof of compliance.

However, where we are today is only the first step. Current NFC tags can be cloned and in some circumstances that might be a risk. However, the increase in authentication NFC tags will change all that meaning that a tag can be unique and not able to be copied. Combine that with the new tamper proof tags and you have a very powerful proof of compliance system – a long way removed from a pencil and clipboard.


 < Product Information   Asset Tagging >