Uploaded by Mohammad Shehriyaar F

CIE1 Emp bck verification

advertisement
PROJECT SCOPE:
Overview
Background checks are getting adopted by more and more companies. Every
company wants to hire the best talent in the market. The recruitment process is all
about checking if the candidate is right for the company. A huge part of their skillset
and qualification is learned from the resume they submit to the company during the
process. Recruitment is not just extensive but also expensive, and you can’t afford to
hire the wrong candidates. A general employee background verification process check
may include educational qualifications and work experience. The verification can
ensure that the candidate has the qualifications that company policies ask for a
particular position. The employee’s criminal record background checks are connected
with bad notions. Conducting a check for the criminal record does not necessarily
mean that you doubt their character. But there are a few responsibilities in the
organization where you need to conduct the employee’s criminal records to ensure
that they are right for the responsibility. Now days terrorist activity occur more &
more, few cases unknown peoples travel from other states, apply job & work in
companies. So if we maintain criminal details & terrorist details in application based
on AadharNo verify/check before hiring employee’s & also give information to
respective police station.
Objectives:
 Verify academic credentials and work history for position relevance.
 Confirm certificate and degree authenticity through educational institutions.
 Conduct thorough checks for specific roles with increased responsibilities.
 Focus on ensuring candidates have no compromising criminal history.
 Use AadharNo as a unique identifier for streamlined verification.
 Establish a secure system linking Aadhar numbers to criminal records.
 Collaborate with law enforcement for terrorist databases access.
 Implement screening to cross-reference candidate details, mitigating risks.
 Conduct prompt background checks to avoid recruitment delays.
 Implement a system for real-time updates to facilitate quick decisions.
 Establish compliance with local and national laws.
 Communicate background check purpose and scope, obtaining candidate consent.
 Implement measures for candidate information confidentiality.
 Adhere to data protection laws and industry standards.
 Foster collaboration with local police by sharing relevant information.
 Create a channel for police input or concerns during verification.
Deliverables:
 Verification reports confirming academic credentials and work history.
 Authenticated certificates and degrees from relevant educational institutions.
 Comprehensive reports on criminal history for each candidate.
 Clearances for candidates with no compromising criminal records.
 System for streamlined background verification using AadharNo.
 Secure database linking Aadhar numbers to criminal records.
 Reports on terrorist activity screening for candidates.
 Mitigation plans for potential risks identified during screening.
 Real-time updates on background verification progress.
 Timely reports for quick decision-making in the recruitment cycle.
 Documentation ensuring compliance with local and national laws.
 Signed consent forms from candidates, clearly outlining the purpose and scope of
background checks.
 Reports on shared information with local police stations.
 Documentation of channels created for police input or concerns during the
verification process.
Constraints:
 The background verification process must adhere to local and national laws,
ensuring privacy rights and avoiding any discriminatory practices.
 Compliance with data protection laws may limit the extent to which certain
information can be accessed or shared, affecting the depth of background checks.
 Budget constraints may impact the depth and frequency of background checks,
potentially limiting the use of certain verification tools or services.
 Collaboration with law enforcement agencies may be subject to their availability
and willingness to share certain information, impacting the effectiveness of
terrorist activity screening.
 The need for a timely recruitment process may limit the depth and thoroughness
of background checks, potentially affecting the accuracy of the information
gathered.
Assumptions:
 It is assumed that candidates provide their consent for background checks and
share accurate information during the hiring process.
 It is assumed that relevant information, such as educational records and criminal
history, is available and accessible for verification.
 The effectiveness of terrorist activity screening relies on the accuracy and
completeness of databases provided by law enforcement agencies.
 The success of AadharNo integration assumes the reliability of technology
systems and secure data storage mechanisms.
 It is assumed that police stations are willing to collaborate and share relevant
information about potential hires, contributing to the effectiveness of the
background verification process.
 It is assumed that there will be ongoing monitoring and adjustments to the
background verification process to ensure continued compliance with evolving
legal and regulatory requirements.
Work Breakdown Structure:
This WBS provides a structured breakdown of tasks and activities involved in the
implementation of the enhanced background verification process, ensuring a
systematic and organized approach to the project.
Project Management: Define project scope, objectives, and stakeholders. Establish a
project team and allocate roles.
Legal and Compliance Framework:Research and document local and national laws
governing background checks.Develop documentation for candidate consent and
compliance.
Resource Allocation:Identify and allocate budget for background verification tools
and services.Assess and allocate human resources for the verification process.
Technology Infrastructure Setup:Implement secure systems for AadharNo integration
and data storage.Ensure technology reliability for real-time verification and reporting.
Educational Qualifications Verification:Establish processes for verifying academic
credentials.Develop communication channels with educational institutions for
confirmation.
Work Experience Verification:Design protocols for confirming work history and
experience.Establish communication channels with past employers for verification.
Criminal Record Checks:Develop procedures for conducting thorough criminal record
checks.Implement systems for secure storage and retrieval of criminal history
information.
AadharNo Integration:Create a system for utilizing Aadhar numbers as unique
identifiers.Establish secure linkages between Aadhar numbers and criminal records.
Terrorist Activity Screening:Collaborate with law enforcement agencies for access to
terrorism databases.Design and implement a screening process for cross-referencing
candidate details.
Real-time Verification and Reporting System:Develop a system for real-time updates
on background verification progress.Implement reporting mechanisms for quick
decision-making.
Candidate Communication and Consent:Develop communication materials outlining
the purpose and scope of background checks.Obtain candidate consent and provide
necessary information.
Confidentiality and Data Security Measures:Establish protocols for safeguarding
candidate information. Ensure compliance with data protection laws and industry
standards.
Collaboration with Police Stations:Initiate collaboration with local police stations.
Establish communication channels for sharing information and addressing concerns.
Continuous Compliance Monitoring:Implement mechanisms for ongoing monitoring
of legal and regulatory changes.Ensure continuous compliance with evolving
requirements.
Project
Closure:Conduct
a
project
review
to
assess
outcomes
against
objectives.Complete final documentation and handover any ongoing responsibilities.
Time-line Schedule
A project timeline is a visual list of tasks or activities placed in chronological
order, which lets to view the entirety of the project plan in one place.
Sl,
No
01
Task Name
Duration
Start Date
End Date
27/02/2024 04/03/2024
Project
management
1 Week
02
06/03/2024 11/03/2024
Analysis
1 Week
03
13/03/2024 03/04/2024
Design
3 Week
04
04/04/2024 02/05/2024
Developing
4 Week
05
03/05/2024 25/05/2024
Testing and
Production
3 Week
Cost Breakdown Structure
Assigned
Software and Hardware Costs: Encompasses expenses for software licenses,
development tools, server hardware, networking equipment, and user devices if
needed.
Training Costs: Covers development of training materials, facilities for training
sessions, and fees for external trainers if utilized.
Security Measures: Includes costs for security software licenses, audits, penetration
testing, and implementation of security protocols.
Documentation Costs: Encompasses tools for technical documentation, printing and
distribution of user manuals, and expenses related to documentation review.
Testing Costs: Includes testing tools and software, potential external testing services,
and expenses for user interface usability testing.
Implementation Costs: Covers deployment services and user support during the initial
rollout.
Miscellaneous Costs: Includes a contingency fund and expenses related to project
management tools and software.
Training and Professional Development:Encompasses continuous training for staff on
system updates and professional development for IT personnel.
Travel and Accommodation (if applicable): Includes expenses related to project
meetings, training sessions, or any necessary travel.
PHASES in - Employee background verification Management
System
Cost distribution
Phase1: Strategy Document preparing
3k
Phase2: Higher level design and specification
4k
Phase3: Front end, UI &UX
4k
Phase4: Coding
7k
Phase5: Database designing
4k
Phase6: Testing and maintenance
4k
Phase7: Deployment
7k
Total amount
33k
Risk Analysis
Risk Analysis in project management is a sequence of processes to identify the factors
that may affect a project’s success. These processes include risk identification,
analysis of risks, risk management and control,
Risk Identification
It is the procedure of determining which risk may affect the project most. This
process involves documentation of existing risks.
The input for identifying risk will be

Risk management plan

Project scope statement
 Understand and prepare detailed requirement and specifications
 Prepare high level and detailed design specifications of the system
 Prepare Test Plan and Test cases
 Perform unit testing, integration and system testing
 Demonstrate a bug free application after suitable modification if needed.

Cost management plan
Software Requirement Analysis:25%
Data Base:16%
Front End :17%
Coding : 18%
Testing : 13%
Documentation: 11%

Schedule management plan
Software Requirement Analysis:1week
Data Base:1week
Front End :2week
Coding : 4week
Testing : 2week
Documentation: 2week

Human resource management plan

Activity cost estimates

Activity duration estimates

Stakeholder register

Project documents

Perform quantitative risk analysis

Plan risk responses

Monitor and control risks
Control Risks
Control risk is the procedure of tracking identified risks, identifying new risks,
monitoring residual risks and evaluating risk.
The inputs for this stage includes

Software Project management plan

Risk register

Work performance data

Work performance reports
The output of this stage would be

Work performance information

Change requests

Project management plan updates

Project documents updates

Organizational process assets updates
Conduct Procurement process
Conduct Procurement process involves activities like

Selecting a seller

Receiving seller responses

Awarding a contract
The benefit of conducting procurement process is that it provides alignment of
external and internal stakeholder expectations through established agreements.
The input of the conduct procurement process includes

Project management plan

Documents for procurement

Source selection criteria

Qualified seller list

Seller proposals

Project documents

Make or buy decisions

Teaming agreements
Literature survey
In the context of hiring processes, the focus is on implementing a robust and efficient
background verification system using Design Science Research Methodology. The
primary concern is the misrepresentation of information by job applicants, leading to
significant losses for employers globally. To address this issue, the project proposes
the use of a consortium blockchain to store hash values of application files from
multiple companies, providing a reliable and transparent method for historical
verification. Implement digital certificates using digital signature technology to
enhance user controls. Confirm users' identities and provide access authorization to
the network. Utilize a consortium blockchain to store hash values of application files.
Ensure the integrity and immutability of historical data related to job applicants.
adopts the Design Science Research Methodology, emphasizing practical solutions to
real-world problems. The use of blockchain technology, specifically a consortium
blockchain, ensures a decentralized and secure platform for storing hash values of
application files. This method allows for efficient and transparent verification of
historical data at any point in the hiring process.
The use of blockchain ensures transparency in the verification process, allowing
employers to access and verify historical data with confidence.By storing hash values
in a blockchain, the time required for document verification is significantly reduced,
leading to faster hiring processes.The proposed system offers a cost-effective
alternative to traditional background verification methods, making it accessible to
companies of all sizes.
Digital certificates and blockchain technology contribute to fraud prevention by
reducing the likelihood of misrepresentation in job applications.The decentralized and
secure nature of the blockchain builds trust between employers and job applicants,
fostering a more reliable hiring ecosystem.aims to revolutionize the background
verification process by leveraging digital certificates, digital signatures, and
blockchain technology. The proposed system aligns with the global transformation of
the job market, providing an efficient, time-saving, and cost-effective solution for
companies worldwide.
Methodology:
The proposed system aims to streamline the background verification process with a
focus on educational qualifications, work experience, criminal records, and terrorismrelated activities. The project will be developed using the Java Spring Boot
framework for the backend, HTML, CSS, Bootstrap, and React JS for the frontend,
and MySQL Server for the database. The following steps outline the methodology:
Requirement Analysis:Gather detailed requirements from stakeholders regarding the
desired features and functionalities of the background verification system.Identify
specific criteria for educational qualifications, work experience, criminal records, and
terrorism-related checks.
System Design:Design the database schema to store applicant details, educational
records, work history, criminal records, and terrorism-related information.
Plan the user interface using HTML, CSS, Bootstrap, and React JS to ensure a userfriendly experience.Define the workflow and interactions between different
components of the system.
Development:Set up the development environment with the specified hardware
requirements.Use Java Spring Boot for backend development, creating APIs for data
retrieval and processing.Develop the frontend using HTML, CSS, Bootstrap, and
React JS for a responsive and intuitive user interface.Implement the database schema
using MySQL Server.
Integration of AadharNo Verification:Incorporate AadharNo verification as a unique
identifier for applicants.Integrate AadharNo verification into the background
verification process to enhance accuracy and reliability.
Background Verification Algorithms:Develop algorithms to verify educational
qualifications and work experience, ensuring they meet the company's policies for
specific positions.Implement criminal record checks and terrorism-related activity
screening algorithms for thorough verification.
Real-time Updates and Reporting:Implement real-time updates to inform employers
of the progress of background verifications.Develop reporting functionalities to
provide comprehensive reports on each applicant's verification status.
Security Measures:Implement encryption techniques to secure sensitive data,
especially criminal and terrorism-related information.Incorporate authentication
mechanisms to ensure authorized access to applicant data.
Collaboration with Police Stations:Establish a secure channel for collaboration with
police stations to share relevant information and obtain inputs during the verification
process.
Testing:Conduct rigorous testing to identify and fix any bugs or issues in the
system.Perform verification tests with mock data to ensure the accuracy and
effectiveness of the background verification algorithms.
Deployment:Deploy the system on a server that meets the specified hardware
requirements.Ensure the system is accessible to authorized personnel within the
organization.
Download