You are on page 1of 6

IT Capstone Project – PROBLEM DEFINITION

Name of Students: Nico Paolo P. Velez, Yves Owen A. Bonita, Sean Umlas, Jinel Hanz A. Anacite, Cliven Q. Pajal

Title: Rover Eagle Security Agency Incorporation RECORD MONITORING SYSTEM

Context of Capstone Project, Problem Statement, Research Questions General Objective, Specific Significance of the Study, Scope and
Research Area, Client Objectives, Proposed Solutions Limitations, Definition of Terms
 The goal of the project GENERAL PROBLEM GENERAL OBJECTIVES SIGNIFICANCE OF THE STUDY:
system for “Rover Eagle The problem with their existing system is that they are The Monitoring System will ensure The purpose of this Rover Eagles
Security Agency utilizing the Microsoft Access software, which does the User/Admin can access Security Agency Inc. Record
Incorporation Record not auto-size when transferring their database to specifically “Detailed and can even Monitoring System project for
Monitoring System”, a another device's display. They are employing the basic “Stored” the data properly. So that the security agency is to create and
smart and efficient app Microsoft Access because it is easier to store they can also make the implement a safe, consolidated, and
solution we’re going to personnel data. Also The they are difficult to Users/Admins comfortable accessing efficient system for managing and
develop to streamline organizing the data the System doesn’t that make them maintaining security staff personnel
and optimize personnel broad or even confused when they records within the agency.
record administration are storing the data. SCOPE:
within an organization.  Employee Data
 ZONE 1 CARMEN, PATAG SPECIFIC PROBLEMS: SPECIFIC OBJECTIVES: Management
 CAGAYAN DE ORO CITY  Difficulty In Organizing the Data  ORGANIZING THE DATA Capture and store information about
 The client for this project The administrator is unable to locate their own data, INFORMATION security employees such as full
is the The Rover Eagle particularly when doing searches, viewing, auto-sizing The administrator can trace out name, identification data, contact
Security Agency Inc. is a adjustments, updating, and deleting processes for faster and surely locating their own information, and emergency
security agency led by their own data. data by just reading and finding the contacts. Keep track of and manage
Mr. Julius P. Ramos, an  Difficulty For Their Monitoring Reporting “primary keys” and can also your job history, which includes the
Operational Manager The administrators inaccurate records the time for specifically determine especially on start date, position, department, and
(OM). computing or the time when they’re start processing search and views. any transfers or promotions.
just using note pad for file reporting on daily, weekly,  ACCURATE DATA  Training and Certification
monthly, and yearly That can waste time consuming. REPORTING Records
 Outdated Data Storage The system is now neatly arranged Keep track of the training programs
The process for filing the personal records only one for their storing the file data and that security employees have
device to store the data even though it may have a makes to reduce Time for consuming attended, as well as the certificates
chance for multiple users at the same time to access and also reliable information for they have received. Implement
their database that will create lagging. minimizing confusing comparability. systems for tracking certification
 Incomplete Data Disposal  Automatic Storage renewals and updating data as
The database can’t guarantee sure for their data Processing needed.
deletion especially if there are unknown personnel They have their own access system  Security Clearance and
who may chances to view or even try to steal or for the personnel records with Licenses
exposed the information they look. proper filing and it can automatically Maintain a record of each security
 Lack of Data Back-up and Data Access adjust and also for the other devices. personnel's security clearances and
Monitoring  Implementation Secure licenses to ensure compliance with
They don’t have backup data for their own files and Data Deletion regulatory standards. Set up
their current system, so that can also be prepared, The system will ensure “disposed” reminders for licensing and
especially the personnel data, which might be at loss. the data or any information that the clearance renewals.
And for the monitoring the data access are not administrator can freely decide and  Performance Evaluations
specific data when they want to find in details. once it’s disposed it will never Facilitate the process of conducting
retrieve anymore. security personnel performance
 Data Backups File Supports evaluations and save evaluation
It will be assured that the backup results for future reference.
files must always be prepared and it  Access Control and Security
must be compatible with other Strong security measures should be
devices that can also trace the implemented to prevent
important data files when you unauthorized access to sensitive
SPECIFIC QUESTIONS: retrieve access or restoring the old employee data. Use role-based
 What are the problems for your data for saving process. access control to restrict access to
“computerize” for storing the record data? certain information based on the
PROPOSED SOLUTIONS: user's function and responsibilities.
 What specific way to process your  We suggest that we will  Reporting Monitoring
“computerize” for your documentation and make a database system not Records
data stored? just using “computerize” but Create reporting features that will
an advanced method. generate file monitor insights on
 When they also access the “computer  We suggest making a “web worker demographics, training
devices” at the same time, what will happen? based” for storing and can compliance, and performance
access through online. indicators. Enable data analytics
features to assist HR managers in
 We suggest that we will making data-driven choices.
create a system that it  Leave Requested and
compatible to access, proper Notifications
filing and auto adjust. Keeping track of leave request and
records, and that also to ‘notify’ the
contracts and the for the employees
especially on nearly expired
contracts.

LIMITATION OF THE STUDY

 Unable to Access Payroll


System
Mostly of the “Agencies”
are always including the Payroll
Systems.
Because our client doesn’t need the
payroll system, what they want first
is how to stored and organize the
data records. This System is for only
for adding, updating, stored, viewing
and records access. Just to make the
data info safe. But soon, it may
access payroll system leaving for the
other batch who have similar client
so that will recommend for add
improving for features.

Definition of Terms:
This is the private security firm
known as "Rover Eagle Security
Agency," which offers security
services and utilizes the Record
Monitoring System for
administrative needs.

A security agency must be officially


constituted and recognized as a legal
body by a government agency
through the process of
incorporation, which is commonly
accomplished by registering as a
company.

System for tracking, managing, and


maintaining records pertaining to
many areas of the operations of the
security agency. It may be digital or
software-based. Data on employees,
customers, incidents, and more
might be included.

Operations of the Security Agency:


The actions and solutions offered by
the security
Draw a Conceptual Framework/Model Diagram for your proposed MIT Capstone Project:

You might also like