"All functions for access control are handled by the application software, including user verification, door lock/unlock, scheduling and more, however, the ACIM can also operate independently when the network is unavailable or not responding." . . . . .