Reseller Sign-In/Apply

Reseller Zone


Get access to your Reseller Dashboard today and explore our Knowledge Base, Downloads, Assets and Support Tickets.

Login to your account

Reseller Sign-In/Apply

Reseller Zone


Get access to your Reseller Dashboard today and explore our Knowledge Base, Downloads, Assets and Support Tickets.

Login to your account

How to setup random deactivation of employees

There might be occasions where it’s desired to temporarily deactivate employees at random, for various reasons such as security searches, or health and safety checks.

Jarrison Time includes a dedicated feature for this purpose, provided Jarrison Time is directly controlling biometric devices. Below are the steps to be followed for the setup of the Random Selection feature.

1) From the Jarrison Time home screen, navigate to Setup > System Configuration > General-1 tab. Under the General Options section, select the checkbox next to Use Random Selection and click Save.


Once this is enabled a new Planned Event type called Random Selection will become available. Planned Events are used to facilitate the random deactivations.

2) Navigate to Setup > Planned Events, and add a new event by clicking the Add button on the lower left. Then in the dropdown next to Event Type, select Random Selection.


The Start Time setting will determine when the deactivation should occur.

The Max Selection setting will determine how many employees should be disabled.

The Activate after selected minutes setting will determine the duration for which the random selections remain deactivated, before being automatically activated again. If this value is left on 0 there will not be any automatic reactivation.

3) At the bottom-centre of the Planned Events view, there will be a Select Devices button available to choose the device(s) on which the deactivations should occur.

4) Click Save and the event will be ready for use. Please remember the JT Engine must be running and the selected device(s) online in order for successful communication of activations/deactivations.

Confirming Random Selection status of employees

1) Navigate to View > Random Selection. This opens a screen which allows for employees to be searched for, and activated if need be.


2) Type in a name to search for in the available field in the upper left of the screen, then click Check Status. The Status field close to bottom-right will advise if the employee is currently deactivated for Random Selection.

3) To activate the person again, click the Activate button on the lower-left. The Status will update to Active (as seen below) and the employee will be reactivated on the device(s).


Related How to setup random deactivation of employees Articles

Still a bit stuck?

Send us a support message below.

Glossary of Terms

.Net Framework

(known as “dot net”) .Net is a software development framework for building and running applications on Windows.

Access Control

Access control refers to the restriction of people’s ability to clock on biometric devices based on location and/or time. Advanced access control includes anti-passback and zone sequencing.

Access Groups

Access Groups in Jarrison Time are combinations of Devices and Time Zones, used to determine on which devices and at which times members of the Access Groups may clock. Access Groups also facilitate restrictions based on too much or too little clocking in specified time-frames.

Access Groups can by synchronized or imported by Third-Party Import, or by users.

Access Zone

In Jarrison Time an Access Zone is how devices are grouped together to form logical zones for the purposes of access control. The option is available with the JT Live module.

Adjustments (Manual Adjustments)

Adjustments are the method of covering absence of time by employees in Jarrison Time. Examples of adjustments would be Annual leave and Sick leave. Adjustments are typically applied by a user via Daily Details as needed, or can be imported from file. It’s very important that Adjustments are correctly configured and applied as paid or unpaid. (Unpaid will result in Short Time.)

Anti Passback

Anti Passback is a form of access control where people are restricted from clocking on the device most recently clocked on, until they have clocked at another device.

Approval Bypass

Approval Bypass is a feature of Jarrison Time Approvals that allows for the first approval tier to be approved without any exceptions being cleared.


Approvals are a system-wide setting that forces users to correct Exceptions and then lock periods from further editing, ready for submission to payroll.

Jarrison Time allows for up to three tiers of Approvals: Daily Summary (timesheet), Pay totals, Department totals. Starting at timesheet level, each tier needs to be approved before the next one can process.


An Area in Jarrison Time refers to a GPS location with a set radius, which designates a permitted T&A clocking area for JT Clock users.

Area Schedule

The Area Schedule is used in conjunction with JT Clock to determine where JT Clock users should clock on a given day.


Authentication in the context of access control or T&A is the means by which a person identifies themselves to biometric devices for clocking purposes.


In Jarrison Time it is possible to allow employees to earn unapproved overtime when working additional hours. The unapproved time must then be authorized (to change to payable OT) or declined by a user. Authorization categories are setup so the system knows where to send approved or declined time.

Biometric Device (Reader)

A biometric device is a type of device (also known as a reader), usually wall-mounted but can be handheld, used to authenticate a person’s identity by recognizing some part of their body. Jarrison Time is directly compatible with a wide range of biometric devices covering the following means of authentication: Fingerprint, Face, Palm. Tags and PINs can also be accepted if the device supports it.

Bouncing (Shift Sensing)

Bouncing is a system-based method of assigning Day Programs to employees based on their clocking times. The selection of Day Programs the system can apply and when to apply them needs to be configured.