Professional Documents
Culture Documents
A project proposal
Presented to
Capstone I
Submitted by:
Sean Umlas
INTRODUCTION
The term "Monitoring" has come to represent effective information management in the
quickly developing digital age across a range of business sectors including offices, enterprises,
structured and secure repository for storing important data like employee records, client
information, and administrative data. Although databases have proved helpful in increasing
organizational effectiveness, we think they have a lot more potential. By employing the "
applications. Our goal is to develop a dynamic and user-friendly platform that raises the idea of
a database from a generic office tool to a profoundly intimate and revolutionary one.
We, the proponents: Nico Paolo P. Velez, Yves Owen A. Bonita, Sean Umlas, and Jinel
Hanz A. Anacite are prepared to offer a solution to the current predicament of our client. The
advocates are PHINMA College 3rd year BSIT students from Cagayan de Oro City.
The client for this project is the The Rover Eagle Security Agency Inc. is a security agency
led by Mr. Julius P. Ramos, an Operational Manager (OM). The agency’s policy is to safeguard
and secure people, stuff, and establishments from potential threats and dangers by providing
innovative and comprehensive security solutions provided with the utmost professionalism,
Monitoring System”, a smart and efficient solution we’re going to develop to streamline and
acts as a centralized repository for storing and retrieving critical employee information such as
more. HR administrators and authorized workers may simply input, amend, and retrieve data
using its interface, assuring accuracy and timeliness in record-keeping. To protect sensitive
information, the system prioritizes data security by providing strong encryption and access
controls. The Data Manage System greatly improves workforce management by automating
regular processes, creating informative data, and promoting easy interaction across their
different clients, allowing the business to make data-driven decisions and optimize overall
productivity.
Statement of the Problem
The problem with their existing system is that they are utilizing the Microsoft Access
software, which does not auto-size when transferring their database to another device's display.
They are employing the basic app Microsoft Access because it is easier to store personnel data.
- The administrator is unable to locate their own data, particularly when doing
-The administrators inaccurate records the time for computing or the time when they’re
start processing just using note pad for file reporting on daily, weekly, monthly, and
yearly
-The process for filing the personal records only one device to store the data
even though it may have a chance for multiple users at the same time to access
their database.
Incomplete Data Disposal
-The database can’t guarantee sure for their data deletion especially if there are
unknown personnel who may chances to view or even try to steal or exposed the
- They don’t have backup data for their own files and their current system, so
that can also be prepared, especially the personnel data, which might be at loss.
And for the monitoring the data access are not specific data when they want to
find in details.
Objectives:
The Monitoring System will ensure the User/Admin can access specifically “Detailed and
can even “Stored” the data properly. So that they can also make the Users/Admins comfortable
accessing the System doesn’t that make them broad or even confused when they are storing
the data.
-The administrator can trace out faster and surely locating their own data by just
reading and finding the “primary keys” and can also specifically determine
-the system is now neatly arranged for their storing the file data and make to
reduce Time for consuming and also reliable information for minimizing
confusing comparability.
-They have their own access system for the personnel records with proper filing
and it can automatically adjust and also for the other devices.
-The system will ensure “disposed” the data or any information that the
administrator can freely decide and once it’s disposed it will never retrieve anymore.
Data Backups File Supports
-It will be assured that the backup files must always be prepared and it must be
compatible with other devices, that can also trace the important data files when
you retrieve access or restoring the old data for saving process.
SCOPE AND LIMITATION
The purpose of this Rover Eagles Security Agency Inc. Record Monitoring System
project for the security agency is to create and implement a safe, consolidated, and efficient
system for managing and maintaining security staff personnel records within the agency. The
primary focus will be on developing a comprehensive database that will hold critical information
records, and job history etc. Within the security agency, the project intends to simplify HR
Capture and store information about security employees such as full name,
identification data, contact information, and emergency contacts. Keep track of and manage
your job history, which includes the start date, position, department, and any transfers or
promotions.
Keep track of the training programs that security employees have attended, as well as
the certificates they have received. Implement systems for tracking certification renewals and
Maintain a record of each security personnel's security clearances and licenses to ensure
compliance with regulatory standards. Set up reminders for licensing and clearance renewals.
Performance Evaluations
sensitive employee data. Use role-based access control to restrict access to certain information
Keeping track of leave request and records, and that also to ‘notify’ the contracts and the for
The database is only for Local Area or Lan address area, that only purpose of this system
is a private access for use for the agency, for preventing exposed all sensitive in formation
Because our client doesn’t need the payroll system, what they want first is how to stored and
organize the data records. This System is for only for adding, updating, stored, viewing and
records access. Just to make the data info safe. But soon, it may access payroll system leaving
for the other batch who have similar client so that will recommend for add improving for
features.
CHAPTER 2
The review of related literature is discussed in this chapter, which also looks at local and foreign
sources. Along with concepts, generalizations, conclusions, techniques, and others are included in
this. Additionally, it establishes the framework for further research, supports the need for replication,
sheds light on the study's viability, and identifies data gathering limitations. Those that are mentioned
in this chapter aid in familiarizing readers with material that is both pertinent and analogous to the
present.
LOCAL
FOREIGN