Professional Documents
Culture Documents
1.0 Introduction
In this phase gives a general overview of the Risk, Monitoring, and Management Plan
for the Payroll Management.
Payroll management is concerned with all aspects of the arrangements that are in
place to ensure that employees of an organization receive remuneration which is in
accordance with their terms of employment, is lawful and is appropriately recognised in
the financialstatements of the organisation.
.
The payroll activity includes all processes required to pay salaries and wages in
accordance with organization policies, by its nature, payroll processing is considered
by management as a lower risk area given the prevalence of routine transactions
associated with such processing. Notwithstanding this risk assessment, payroll
management arrangements have not been exempt from the drivers of change within
the public sector which present challenges for Chief Executive Officers (CEOs),
relevant management and other staff concerned.
Editor/Tester
/Maintenance
100
80
60
40
20
0
REG DESIGN CODING DEV. TEST SYSTEM TEST SYTEM FIELD
In these phase it show the risk how to deal with the problems during developing the
project.
2.1 Risk Table
The following tablbe describes the risks associated with the project.
Fairly reasonable.The project deadline was established before the project was
undertaken. The initial planning for payroll management was executed with the
deadline in mind. The scope of the project was limited to keep the project “doable”
within the allowed period of time.
None known.
Late delivery will prevent the customer from issuing a letter of acceptance for the
product, which will result in an incomplete grade for the course for all members of the
organization
This is a potential risk found in all consumer-oriented products, that a product not
meetingquality standards will pass undetected though the manufacturer's quality
control system and enter the consumer market place.
Development Risk:
If the client failed to provide equipment that appropriate for the execution of the
software this will cause the software become failure.The costumer should need to
give time and resourses for the software development team.If the costumer did not
comply all the requirements for the execution of the software this is automatically
failed.
Process Risk:
Involving all the risk in developing the software.If the development team could not
meet the standard of the costumer the software become failure.
Product Size:
Is a distinct item, such as a product or service, as it is offered for sale that embodies
all attributes associated with the item and that distinguish it from all other items.
Technology Risk:
Corruption risks
A risk assessment of payroll in a public sector agency may identify some or all of
the following corruption risks:
1. An employee obtaining payments to which they are not entitled, for example by:
fraudulently claiming on their timesheet for hours not worked or allowances to
which they are not entitled
failing to provide a leave form for leave taken
Employee Risk:
The following is the sorted version of the above table by probability and impact:
1 Catastrophic
2 Critical
3 Marginal
4 Negligible
Above is the table that categorized the risk involved in software development. It gives
brief description of the risk column and also provides the probability of the risks
occuring in percentage s in probability column and also the impact column.
Risks are potential problems that might affect the successful completion of a software
project. Risks involve uncertainty and potential losses. Risk analysis and
management are intended to help a software team understand and manage
uncertainty during the development process. The important thing is to remember that
things can go wrong and to make plans to minimize their impact when they do. The
work product is called a Risk Mitigation, Monitoring, and Management Plan (RMMM).
Risk mitigation is all about understanding those risks that can impact the objectives of
the organization, and taking the appropriate steps to reduce the risks to an
acceptable level.
The practice of managing risks related to the use, processing, storage, and
transmission of information or data and the systems and processes used for those
purposes.While focused dominantly on information in digital form, the full range of IA
(INFORMATION ASSURANCE) encompasses not only digital but also analog or
physical form.
Identifying and evaluating the impact of disasters on business provides the basis for
investment in recovery strategies as well asinvestment in prevention and mitigation
strategies.
3.1.3 Customer (User) Risks
Oracle Financial Services Know Your Customer assesses the risk associated with a
customer by considering different attributes of the customer. The attributes differ
based on the customer type. The workflow of COMPANY enables financial
institutions to perform Due Diligence, Enhanced Due Diligence, and continuous
monitoring of customers.
While assessing customers using the workflows described above, KYC performs the
following processes:
Identification of Customers
IT risk has historically been dismissed as the sole responsibility of the IT department,
and has not been considered a strategic business risk requiring an enterprise-wide
focus. However, as the pervasive use of IT tools and technology continues to grow,
impacting virtually every aspect of business function, it is becoming increasingly clear
that managing IT risk is less about just IT, and more about managing risks for the whole
business. Organizations must now include IT Risk Management (ITRM) within their
overall enterprise-wide risk management approach.Over the years, our annual Global
Information Security surveys1 have revealed that board members and audit committees
are increasingly interested in information security. This is one of the most important
measures an organization can take to potentially reduce IT risk
3.1.6 Development Risks
In reviewing the scope of the assessment stage of the risk management process we
looked at:
The tools and techniques used within the risk assessment process.
Mitigation and planning strategies to reduce or remove the effects of a realized risk
Transferring risk, that is the passing of risk to the other areas of the organization
who are perhaps better placed to address it.
The name of the game in HR is consistency. Everyone in the same position and
under the same circumstances must be treated the same. Deviate from this simple
norm and some employee will take notice and, when it serves their interests, remind
you and the appropriate company or governmental authorities of the fact. The first
sentence of this article aside, here are the areas where inconsistency is most notable
and can be the most problematic: The hiring process is very much an indicator of how
well the entire HR process works within a company. At a minimum, the selection
process should be formalized, involve multiple hiring agents and entail a variety of
pre-hire screening criteria. These fundamentals will not guarantee every employee is
a “keeper” but it will eliminate the worst applicants. In addition, it generates a level
playing field in case of any EEOC complaints. Similarly, compensation and benefits
packages should be as nearly identical as possible for similar positions. Many
companies stretch these limits to hire employees away from competitors but a
compelling case can be made that staying within the competitive compensation rates
is far better in the long run.
3.1.8 Corruption Risk
As the financial markets continue to evolve, financial institutions are working to grow
and maintain profits while adjusting to ever-changing regulations and the downturn’s
effects on profitability and performance. Successful institutions will need to reassess
their operating models and address the effects of regulatory reform, competitive
dynamics, evolving markets and increased expectations from stakeholders.
The Greek financial services industry practice is a member of the Deloitte global
financial services industry (GFSI) offering a wide array of services that are specifically
designed for financial institutions in the banking, securities, insurance, and investment
management sectors. In addition to attest and tax, we offer services in areas such as
risk management, regulatory compliance, and technology solutions.
GFSI organizes conferences and other events as well as produces surveys, report,
guides and articles on many of the key issues that the industry is currently facing.
Saving Check-lists:
Login
Software Configuration Management Plan
1.0 Introduction
The SCM team will oversee these activities, and any changes to existing code or
architectural design must pass their inspection before they are carried out.
Identify change
Control change
Ensure that change is being properly implemented
Also have a way to document the change
1.2 SCM organizational role
SCM Organizational Role
The SCM team will work closely with the SQA (Software Quality Assurance) team,
cross-examining many of the submitted documents and software change requests.
Software Engineers will submit change requests directly to the SCM team for their
inspection and approval.An SCM leader will be appointed to oversee all SCM
activities. He will receive all change requests, and will make any final decisions
regarding those changes,including which software engineer will carry out
approved changes. The SCM leader also keeps a library of all submitted requests,
even those that have been denied.
Adviser the person involve by giving guideline to be followed by the studets who
develop an information system to meet the customer sarisfaction this three person
involves in developing a project.
Work Products
An SCI document will contain the breakdown of subsystems and how they are
interrelated. Any approved changes will be returned to the software engineer with
an change approval sheet, a listing of all possible affected subsystems, and any
additional information the software engineer may need before he begins changing
code
2.1 Identification
To control and manage configuration items, each must be named and managed
using an object-oriented approach
Basic objects are created by software engineers during analysis, design, coding, or
testing
Aggregate objects are collections of basic objects and other aggregate objects
Configuration object attributes: unique name, description, list of resources, and a
realization (a pointer to a work product for a basic object or null for an aggregate
object)
2.1.1 Description
The SCM leader will analyze all current design specifications and break down the
software into subsystems. All subsystems will consist of major software functions
or interface components. Any submitted changes will be connected to its
corresponding subsystem, which will be traced backwards though the system to
determine its impact.
Identify change
Approve change
After identifying the change, all team members must agree for the change
fot thr implementation of the change. all team member must be agree the
permission is required for the approval to change.
The change must be documented to time the team member is suggest .To
approve a change we will be using change report forms which will be
submitted to the control panel(remaining member of the software
development team.
An SCI document will contain the breakdown of subsystems and how they are
interrelated. Any approved changes will be returned to the software engineer with
an change approval sheet, a listing of all possible affected subsystems, and any
additional information the software engineer may need before he begins changing
code
Identify change
After identifying the change request form will be produced to the client
who suggest for the change.
Control change
After the request has change and identify the change they inform the client
for the request they suggest.
Ensure that change is being properly implemented
Ensure that the change is properly implemented
Document the change
After the approval of the request we will document the changes and we
will change the software version number.
2.2.1 Description
Software engineers will submit a change request to the SCM leader. The
SCM leader will then analyze the request, using the SCI document, the project design
document, and the current prototype of the software. He will base his decision on how
severely the change will impact the entire system and, more importantly, on the
corresponding subsystem.
Once his decision has been made, he must submit the change to the software engineer
of his choice, as well as updating the SCI document to accommodate the change, and
the SCM library to record the change request and decision
The system must be having a version or a buck up when the company request
for some changes into the system the system will change the version only and keep the
old version.
2.3.1 Description
As a result of changes, the old version will upgrade to higher version and keep
the old version.
Database Upgrade
Minor Update
For some form that enough for gathered data it will need a minor update
Major Update
When the form is not meet the company needed it need a major update
By Creating a new version you must to document all changes that will be request
2.4.1 Description
ISO 9001 is the quality assurance standard that applies engineering. The
following are the 20 requirements delineated by them.And we are try to follow
them as our quality assurance plan
-Management responsibilities
-Quality System
-Contract Review
-Design Control
-Purchasing
-Process Control
-Training
-Servicing
-Statiscal Techniques
3.4.2 Responsibilities
1. Table of Contents
1.0 Introduction
Formal technical reviews that are applied throughout the software process
Ego-less structure
/Maintenance
(1)
Development/Trainer
(1)
RELATIVE COST OF CORRECTING OF ERROR
BAR CHART
In System Test, while the system is in the process of testing the error should
encounter in this Test it is one of the highest rate to check error.
-Voting System
It Describes how to Save Time , Lower Cost, Tracking of Problems and Describes the
flow of the data.
Voting System
Use to for Agreement on Changing a Version of Errors
Close Contarct with the client
In this part the problems is Identified and also the solutions.
Meeting Schedule Table
In this case the Client must review the system to Finalized the Request and
Team mates must Test the System to Ensure that the system is no errors.
Creating a Questionare before meeting the Client, Creating Reports for recording
the encoutered Problems.
3.2 Formal Technical Reviews
- WALKTHROUGHS A walkthrough is ‘a static analysis technique in which a designer
or programmer leads members of the development team and other interested parties
through a software product, and the participants ask questions and make comments about
possible errors, violation of development standards, and other problems
We will use “Jasper Viewer” for Report, Generate Report, Transaction Report, to
allow all to see the transaction process of their own salary.
4.2 Responsibilities
Checking
Attendance
Update Salary
Rate
Add employee
Daily Rate
Set Payroll
Admin Accountant
Schedule
Accountant
Print Paysilp
Print Reports
Cost Center
Mandatory Deduction
PK, FK1 Employee_ID
PK, FK1 Company_ID
PK, FK1 payperiod
Pk
Deduction
Employee info Deduction
PK Emp_ID Deduction
Company Info PK FK1 Com_ID
PK Company ID
Emplyee_name
Company _name Position
BIR_Stat
SSS_ID
Acct_No Employee_Netpay Attendance deduction
PHIC
HDMF Pk PayPeriod Pk, FK1 Employee_ID
Basic_Salary Pk,Fk2 Employee_ID Pk, FK1 Company_ID
FK2 Cost Center_ID Pk, Fk2 Company_ID Pk, FK1 Payperiod
Employee_Type FK2 Basic_salary
Rate per Minute Net_pay
Daily_Rate Attendance deduction
TotalminLate
TotaldayAbsent
TotalminsUndertime
Overtime
Leave Credit
Data
Pk, Fk1 Employee_ID
Pk period applicable PK, Fk1 Company_ID Pk, Fk1 Emp_ID
No_Days_Credit Pk, FK1 Payperiod Pk, FK1 Com_ID
Credit_amount
Pk, FK1 Payperiod
Overtime_Hours
Overtime_Pay Data_amount
Overtime_type Period Application
START
LOG-IN STOP
NO
YES
PAYROLL SYSTEM
Payroll Process
HR/reports
Calculation/Deduction
Pay Reports/
PaySlip
Cash on hand
End