Functional and Technical Specification for Customization Customer Requirement Document Mod. Tracking #: Design # – Conversion 2 Initial Specification Approval Customer Requirement Document Prepared: Amie Salamido Prepared By: Peralta Technical Lead Approval: Initial: Date Prepared: Initial: Date Reviewed: Initial: Date Reviewed: Initial: Date Reviewed: Initial: Date Approved: Initial: Date Approved: Minh Lam Reviewed By: Peralta Functional Lead 2008-07-21 David Betts Approval: Michelle Lenh Reviewed By: Peralta User Approval: Michelle Lenh Reviewed By: Peralta Sponsor Approval: Thomas Smith Approved By: CIBER Project Manager Approval: Kim Groshek Approved By: Completed Modification Acceptance Customer Requirement Document Prepared: Amie Salamido Prepared By: Peralta Technical Lead Approval: Approval: Date Prepared: Initial: Date Reviewed: Initial: Date Reviewed: Initial: Date Reviewed: Initial: Date Approved: Initial: Date Approved: Minh Lam Reviewed By: Peralta Functional Lead Initial: David Betts Michelle Lenh Reviewed By: Peralta User Approval: Michelle Lenh Reviewed By: Peralta Sponsor Approval: Thomas Smith Approved By: CIBER Project Manager Approval: Kim Groshek Approved By: Document Control Change Record Date Author Version Change Reference 2008-07-21 Amie Salamido 1.0 n/a Reviewers Sign-Off Date Reviewer Name Copy No. Name Position Sign-Off Distribution Version #:1.0 (Ju1 2008) CIBER Confidential Page 2 Last saved: 2016-06-28 Functional Specifications Detailed Business Requirements Peralta has over 800 regular employees. In order to allow better budget control with limited maintenance, positions will be created and budgets established by position. A portion of these 800 regular employees have amounts paid to them using additional pay. With the entry of the budget string (combo code) at the budget level, it will no longer be necessary to enter the combo code on additional pay. Because of the large volume, a solution should be developed that will insert a row in additional pay that removes the combo code currently entered rather than performing this update manually. This will be a one-time load. On going maintenance will occur on-line. For each employee having additional pay rows, new effective-dated rows will be inserted in ADDL_PAY_EFFDT and ADDL_PAY_DATA tables. All data from the current row will be copied forward onto the newly inserted effective-dated row except for the EFFDT (which will be set to the specified implementation date) and the ACCT_CD (Combination Code), which will be set to blank. When processing, the conversion program will produce an exception report (EmplID, Name, exception message(s) ) for the following conditions: 1. Future dated additional pay data exists 2. The value in the ACCT_CD field on ADDL_PAY_DATA differs from that found on the current row on the JOB_EARNS_DIST table for the same ee. Business Justification Using position management will reduce on-line maintenance as employees move into and out of positions. Using an automated load for initial implementation will reduce time required and possible data entry errors. An automated load can be re-used consistently in multiple environments. Risks Testing required to ensure that data loaded by automated means behaves like data entered on-line. Alternative Work Around (Not requiring customization) Enter rows in additional pay data manually on-line Disadvantages of the Alternative Work Around Manual entry is time consuming, prone to user error and cannot be re-used in multiple environments. Stakeholders Stakeholders are individuals or groups with an interest in the project that are not users of the project deliverables. List and describe the stakeholders along with their responsibilities as they relate to this project. Name Version #:1.0 (Ju1 2008) CIBER Confidential Description Responsibilities Page 3 Last saved: 2016-06-28 Name Description Responsibilities Users Briefly describe the users, including their responsibilities to the project, their affiliation, and how they will use the software. When possible, refer to roles rather than individual names. If necessary, use real names. Name Version #:1.0 (Ju1 2008) CIBER Confidential Description Responsibilities/Interests Page 4 Last saved: 2016-06-28 Assumptions All amounts paid under additional pay are distributed exactly as regular pay. Who will be using this modification Payroll functional users Process Flows/Frequencies One-time data load at go-live What are the inputs and outputs of the modification in terms of business processing N/A Capabilities Capabilities statements describe functionality of the software including reports and interfaces with other systems. They are extracted from users stories. If a capability describes a report or interface, place an X in the appropriate box. The modification will be tested against these capabilities during acceptance testing. No. Capability Report Interface Security N/A Dependencies N/A Acceptance Criteria Queries on target tables show that data has been successfully loaded in the correct fields and formats. On-line transactions using the loaded data complete successfully. Glossary Include any terms or acronyms unique to this project, the district, or the department. Term Version #:1.0 (Ju1 2008) CIBER Confidential Definition Page 5 Last saved: 2016-06-28 Version #:1.0 (Ju1 2008) CIBER Confidential Page 6 Last saved: 2016-06-28 Technical Estimates Approach Describe the approach Estimates Estimate the technical effort required implementing this approach. Include the following where appropriate: Number of PeopleSoft objects involved and the nature in which it is used (modified, cloned, new) Number of lines of code modified or created Number and type of resources are required Any other useful estimates Hours Estimate 8 hours 24 hours 40 hours 80 hours est’d hours = ### Risks List any risks particular to this approach Risk Mitigation Discuss means to limit or eliminate the impact of risks identified above. Assumptions List any assumptions particular to this approach. Constraints Include anything outside of the control of the technical team that will affect technical decisions (schedule, resources, etc) Version #:1.0 (Ju1 2008) CIBER Confidential Page 7 Last saved: 2016-06-28 Impacted Objects Impact Type (New, Modify, or Delete) Add a new field to the existing record Object Type (Record, View, Page, PeopleCode, etc) Record Obect Name Comment PS_PERSONAL_DATA DATE SUBMITTED: Date Required By: Version #:1.0 (Ju1 2008) CIBER Confidential Page 8 Last saved: 2016-06-28 Technical Specifications Modified Online Objects: Project Name Project Information Comment: Name: Portal Registry Structure Name: Portal Registry Structure Definition Type (Folder or Content): Label: Sequence: Parent Folder: Object Owner ID: Product: Long Description: *Menu: *Component: Permission Lists: * For Content Reference portal registry structures only Menu Menu Group Modify New Menu Bar Component Component Component New Modify Search Record Add Search Record Actions Allowed (Add, Update/Display, etc.) Pages Page: Record New Modify Field Name Component: Type Display Only Invisi ble Disp Cntrl Rel Disp Lvl Component/Page Security Component New Modify Version #:1.0 (Ju1 2008) CIBER Confidential Page Permission List Display Only (Y/N) Actions (Add, Upd, Upd/Disp, Corr) Page 9 Last saved: 2016-06-28 Records Record: New Field Name Modify Key Dir Req Src Key Alt Src List Box Default Value Table Edits Indexes Record: Field Name Index: Column Position Unique (Y or N): A/D Fields Field Name New Modify Type Len Value Active Long Name Short Name Translate Values Translate Values Field Name New Modify Version #:1.0 (Ju1 2008) CIBER Confidential Eff Date Long Name Short Name Page 10 Last saved: 2016-06-28 Queries Query Name: Query Type: Records Record Name New Description: Owner: Modify Alias Fields Col Record.Fieldname Criteria Logical Format Expression 1 Order By Num Condition Type Agg Heading Text Expression 2 SQL *Paste Screenshot of Query Preview below HTML HTML: Record New Modify Field Name Message Catalog Message Set Number New Modify Message Number Severity Message Text *Paste Screenshot of new or modified message below. Version #:1.0 (Ju1 2008) CIBER Confidential Page 11 Last saved: 2016-06-28 PeopleCode Type (Record, Page, etc) New Modify Object Name (Record.Field, Page, etc) Event Processing Description Application Engine Program New Modify Section Step Action (Do When, Do While, Do Select, Do Until, PeopleCode, SQL, Call Section, or Log Message) Definition Qualifier Definition Delimiter File Layout Definition File Layout File Layout Format Default File Name: File Record/Segment ID Name Seq No Max Rec Length File Record ID ID Length Field Lengt h Start Positio n Field Qualifier Field Inheritance (REC.FIEL D) File Record/Segment ID Name Seq No Max Rec Length File Record ID ID Length Field Name Version #:1.0 (Ju1 2008) CIBER Confidential Default Qualifie r Field Delimiter Default Value Default Qualifie r Field Delimiter Page 12 Last saved: 2016-06-28 Field Name Field Len Start Positio n Field Qualifier Field Inheritance (REC.FIEL D) Default Value Process Definition Process Name: New Modify Process Definition Process Type: Description: Priority: API Aware: Long Description: Process Definition Options Recurrence Name: Server Name: Component Process Groups Job Definition Job Name: New Modify Job Definition Run Mode: Description: Seq Priority: Process Type Server Name: Component Version #:1.0 (Ju1 2008) CIBER Confidential Process List Process Name Run Always Job Definition Options Recurrence Name: Process Groups Page 13 Last saved: 2016-06-28 Images (Paste New or Modified Images Below) Page (Before Modification) Page Print 1 Version #:1.0 (Ju1 2008) CIBER Confidential Page 14 Last saved: 2016-06-28 Page (After Modification) Page Print 2 Version #:1.0 (Ju1 2008) CIBER Confidential Page 15 Last saved: 2016-06-28 Batch Objects Programs Program Name: New Modified Subprograms: New Modified Records include: Usage Type: (Read/Write/Delete) Suggested Unit Testing Approach Testing Scenarios (should cover ensuring that the process works correctly and that the process handles any unknown errors correctly) Version #:1.0 (Ju1 2008) CIBER Confidential Page 16 Last saved: 2016-06-28