You are on page 1of 11

Rover Eagle Security Agency Incorporation

RECORD MONITORING SYSTEM

A project proposal

Presented to

Mr. Riel Jun Cainglet

Capstone I

Submitted by:

Nico Paolo P. Velez

Yves Owen A. Bonita

Sean Umlas

Jinel Hanz A. Anacite


CHAPTER 1

INTRODUCTION

The term "Monitoring" has come to represent effective information management in the

quickly developing digital age across a range of business sectors including offices, enterprises,

and organizations. The foundation of digital documentation is a database, which offers a

structured and secure repository for storing important data like employee records, client

information, and administrative data. Although databases have proved helpful in increasing

organizational effectiveness, we think they have a lot more potential. By employing the "

Monitoring System", a creative undertaking that uses databases to go beyond common

applications. Our goal is to develop a dynamic and user-friendly platform that raises the idea of

a database from a generic office tool to a profoundly intimate and revolutionary one.

We, the proponents: Nico Paolo P. Velez, Yves Owen A. Bonita, Sean Umlas, and Jinel

Hanz A. Anacite are prepared to offer a solution to the current predicament of our client. The

advocates are PHINMA College 3rd year BSIT students from Cagayan de Oro City.

The client for this project is the The Rover Eagle Security Agency Inc. is a security agency

led by Mr. Julius P. Ramos, an Operational Manager (OM). The agency’s policy is to safeguard

and secure people, stuff, and establishments from potential threats and dangers by providing

innovative and comprehensive security solutions provided with the utmost professionalism,

integrity, and quality.


The goal of the project system for “Rover Eagle Security Agency Incorporation Record

Monitoring System”, a smart and efficient solution we’re going to develop to streamline and

optimize personnel record administration within an organization. This comprehensive database

acts as a centralized repository for storing and retrieving critical employee information such as

personal information, employment history, training records, performance assessments, and

more. HR administrators and authorized workers may simply input, amend, and retrieve data

using its interface, assuring accuracy and timeliness in record-keeping. To protect sensitive

information, the system prioritizes data security by providing strong encryption and access

controls. The Data Manage System greatly improves workforce management by automating

regular processes, creating informative data, and promoting easy interaction across their

different clients, allowing the business to make data-driven decisions and optimize overall

productivity.
Statement of the Problem

The problem with their existing system is that they are utilizing the Microsoft Access

software, which does not auto-size when transferring their database to another device's display.

They are employing the basic app Microsoft Access because it is easier to store personnel data.

 Difficulty In Organizing the Data

- The administrator is unable to locate their own data, particularly when doing

searches, viewing, auto-sizing adjustments, updating, and deleting processes for

their own data.

 Difficulty For Their Data Reporting

-The administrators inaccurate records the time for computing or the time when they’re

start processing just using note pad for file reporting on daily, weekly, monthly, and

yearly

That can waste time consuming.

 Outdated Data Storage

-The process for filing the personal records only one device to store the data

even though it may have a chance for multiple users at the same time to access

their database.
 Incomplete Data Disposal

-The database can’t guarantee sure for their data deletion especially if there are

unknown personnel who may chances to view or even try to steal or exposed the

information they look.

 Lack of Data Back-up and Data Access Monitoring

- They don’t have backup data for their own files and their current system, so

that can also be prepared, especially the personnel data, which might be at loss.

And for the monitoring the data access are not specific data when they want to

find in details.
Objectives:

The Monitoring System will ensure the User/Admin can access specifically “Detailed and

can even “Stored” the data properly. So that they can also make the Users/Admins comfortable

accessing the System doesn’t that make them broad or even confused when they are storing

the data.

 Organizing The Data Information

-The administrator can trace out faster and surely locating their own data by just

reading and finding the “primary keys” and can also specifically determine

especially on search and views.

 Accurate Data Reporting

-the system is now neatly arranged for their storing the file data and make to

reduce Time for consuming and also reliable information for minimizing

confusing comparability.

 Automatic Storage Processing

-They have their own access system for the personnel records with proper filing

and it can automatically adjust and also for the other devices.

 Implementation Secure Data Deletion

-The system will ensure “disposed” the data or any information that the

administrator can freely decide and once it’s disposed it will never retrieve anymore.
 Data Backups File Supports

-It will be assured that the backup files must always be prepared and it must be

compatible with other devices, that can also trace the important data files when

you retrieve access or restoring the old data for saving process.
SCOPE AND LIMITATION

Scope of the study

The purpose of this Rover Eagles Security Agency Inc. Record Monitoring System

project for the security agency is to create and implement a safe, consolidated, and efficient

system for managing and maintaining security staff personnel records within the agency. The

primary focus will be on developing a comprehensive database that will hold critical information

about security employees, such as personal information, qualifications, certificates, training

records, and job history etc. Within the security agency, the project intends to simplify HR

processes, improve data security, and improve personnel management.

Employee Data Management

Capture and store information about security employees such as full name,

identification data, contact information, and emergency contacts. Keep track of and manage

your job history, which includes the start date, position, department, and any transfers or

promotions.

Training and Certification Records

Keep track of the training programs that security employees have attended, as well as

the certificates they have received. Implement systems for tracking certification renewals and

updating data as needed.


Security Clearance and Licenses

Maintain a record of each security personnel's security clearances and licenses to ensure

compliance with regulatory standards. Set up reminders for licensing and clearance renewals.

Performance Evaluations

Facilitate the process of conducting security personnel performance evaluations and

save evaluation results for future reference.

Access Control and Security

Strong security measures should be implemented to prevent unauthorized access to

sensitive employee data. Use role-based access control to restrict access to certain information

based on the user's function and responsibilities.

Leave Requested and Notifications

Keeping track of leave request and records, and that also to ‘notify’ the contracts and the for

the employees especially on nearly expired contracts.


Limitation of the Study

Unable to Access Online Data Conversation

The database is only for Local Area or Lan address area, that only purpose of this system

is a private access for use for the agency, for preventing exposed all sensitive in formation

especially for the competitors.

Unable to Access Payroll System

Mostly of the “Agencies” are always including the Payroll Systems.

Because our client doesn’t need the payroll system, what they want first is how to stored and

organize the data records. This System is for only for adding, updating, stored, viewing and

records access. Just to make the data info safe. But soon, it may access payroll system leaving

for the other batch who have similar client so that will recommend for add improving for

features.
CHAPTER 2

The review of related literature is discussed in this chapter, which also looks at local and foreign

sources. Along with concepts, generalizations, conclusions, techniques, and others are included in

this. Additionally, it establishes the framework for further research, supports the need for replication,

sheds light on the study's viability, and identifies data gathering limitations. Those that are mentioned

in this chapter aid in familiarizing readers with material that is both pertinent and analogous to the

present.

LOCAL

FOREIGN

You might also like