Make Up Punch
Punch Mode > Make Up Punch
When you miss a punch-in, you can use the make-up punch feature to submit a request. After the request is submitted, the system will notify the make-up punch reviewer for approval. Once approved, the make-up punch record will be officially added to your punch-in record to ensure the integrity of attendance data.
Tip: If you cannot find this feature, it means the administrator has disabled the make-up punch function. If needed, please contact the administrator to learn more or enable this feature.
Notes
When making up a punch, please make sure the punch-in date matches the schedule date. A common mistake is having a mismatch between the punch-in date and the schedule date, which may lead to incorrect attendance records, affecting subsequent statistics and reports.
Process for Making Up a Punch
If the organization has enabled the make-up punch feature, employees can follow these steps to submit a make-up punch request:
- In
Punch Mode
, selectMake Up Punch
- On the make-up punch page, select the
Make Up Punch
button at the bottom - Fill in the following details:
Reason for Make-up Punch
,Status
,Punch-in Date
,Shift Time
,Punch Time
, andUpload Photo
Please note, the upload photo feature requires the organization creator to subscribe to the
1GB Cloud Storage Monthly Plan
or10GB Cloud Storage Monthly Plan
to upload photos. - After filling out the information, click
Submit for Review
to submit your make-up punch request for administrator review.Please note, if there are restrictions on the number of make-up punches, pay attention to the
Remaining Make-up Punches
above theSubmit for Review
button. If the remaining make-up punches are 0, you will not be able to submit the make-up punch request.
This manual strives for accuracy and completeness, but we do not assume any liability for errors, omissions, or updates. The content may be modified at any time without prior notice. We are not responsible for any damages arising from the use of this manual or downloading its contents, including but not limited to system failures, data loss, or infringement of rights. Users assume full responsibility and risk.