Professional Documents
Culture Documents
Name of Students: Nico Paolo P. Velez, Yves Owen A. Bonita, Sean Umlas, Jinel Hanz A. Anacite, Cliven Q. Pajal
Context of Capstone Project, Problem Statement, Research Questions General Objective, Specific Significance of the Study, Scope and
Research Area, Client Objectives, Proposed Solutions Limitations, Definition of Terms
The goal of the project GENERAL PROBLEM GENERAL OBJECTIVES SIGNIFICANCE OF THE STUDY:
system for “Rover Eagle The problem with their existing system is that they are The Monitoring System will ensure The purpose of this Rover Eagles
Security Agency utilizing the Microsoft Access software, which does the User/Admin can access Security Agency Inc. Record
Incorporation Record not auto-size when transferring their database to specifically “Detailed and can even Monitoring System project for
Monitoring System”, a another device's display. They are employing the basic “Stored” the data properly. So that the security agency is to create and
smart and efficient app Microsoft Access because it is easier to store they can also make the implement a safe, consolidated, and
solution we’re going to personnel data. Also The they are difficult to Users/Admins comfortable accessing efficient system for managing and
develop to streamline organizing the data the System doesn’t that make them maintaining security staff personnel
and optimize personnel broad or even confused when they records within the agency.
record administration are storing the data. SCOPE:
within an organization. Employee Data
ZONE 1 CARMEN, PATAG SPECIFIC PROBLEMS: SPECIFIC OBJECTIVES: Management
CAGAYAN DE ORO CITY Difficulty In Organizing the Data ORGANIZING THE DATA Capture and store information about
The client for this project The administrator is unable to locate their own data, INFORMATION security employees such as full
is the The Rover Eagle particularly when doing searches, viewing, auto-sizing The administrator can trace out name, identification data, contact
Security Agency Inc. is a adjustments, updating, and deleting processes for faster and surely locating their own information, and emergency
security agency led by their own data. data by just reading and finding the contacts. Keep track of and manage
Mr. Julius P. Ramos, an Difficulty For Their Monitoring Reporting “primary keys” and can also your job history, which includes the
Operational Manager The administrators inaccurate records the time for specifically determine especially on start date, position, department, and
(OM). computing or the time when they’re start processing search and views. any transfers or promotions.
just using note pad for file reporting on daily, weekly, ACCURATE DATA Training and Certification
monthly, and yearly That can waste time consuming. REPORTING Records
Outdated Data Storage The system is now neatly arranged Keep track of the training programs
The process for filing the personal records only one for their storing the file data and that security employees have
device to store the data even though it may have a makes to reduce Time for consuming attended, as well as the certificates
chance for multiple users at the same time to access and also reliable information for they have received. Implement
their database that will create lagging. minimizing confusing comparability. systems for tracking certification
Incomplete Data Disposal Automatic Storage renewals and updating data as
The database can’t guarantee sure for their data Processing needed.
deletion especially if there are unknown personnel They have their own access system Security Clearance and
who may chances to view or even try to steal or for the personnel records with Licenses
exposed the information they look. proper filing and it can automatically Maintain a record of each security
Lack of Data Back-up and Data Access adjust and also for the other devices. personnel's security clearances and
Monitoring Implementation Secure licenses to ensure compliance with
They don’t have backup data for their own files and Data Deletion regulatory standards. Set up
their current system, so that can also be prepared, The system will ensure “disposed” reminders for licensing and
especially the personnel data, which might be at loss. the data or any information that the clearance renewals.
And for the monitoring the data access are not administrator can freely decide and Performance Evaluations
specific data when they want to find in details. once it’s disposed it will never Facilitate the process of conducting
retrieve anymore. security personnel performance
Data Backups File Supports evaluations and save evaluation
It will be assured that the backup results for future reference.
files must always be prepared and it Access Control and Security
must be compatible with other Strong security measures should be
devices that can also trace the implemented to prevent
important data files when you unauthorized access to sensitive
SPECIFIC QUESTIONS: retrieve access or restoring the old employee data. Use role-based
What are the problems for your data for saving process. access control to restrict access to
“computerize” for storing the record data? certain information based on the
PROPOSED SOLUTIONS: user's function and responsibilities.
What specific way to process your We suggest that we will Reporting Monitoring
“computerize” for your documentation and make a database system not Records
data stored? just using “computerize” but Create reporting features that will
an advanced method. generate file monitor insights on
When they also access the “computer We suggest making a “web worker demographics, training
devices” at the same time, what will happen? based” for storing and can compliance, and performance
access through online. indicators. Enable data analytics
features to assist HR managers in
We suggest that we will making data-driven choices.
create a system that it Leave Requested and
compatible to access, proper Notifications
filing and auto adjust. Keeping track of leave request and
records, and that also to ‘notify’ the
contracts and the for the employees
especially on nearly expired
contracts.
Definition of Terms:
This is the private security firm
known as "Rover Eagle Security
Agency," which offers security
services and utilizes the Record
Monitoring System for
administrative needs.