PROJECT SCOPE: Overview Background checks are getting adopted by more and more companies. Every company wants to hire the best talent in the market. The recruitment process is all about checking if the candidate is right for the company. A huge part of their skillset and qualification is learned from the resume they submit to the company during the process. Recruitment is not just extensive but also expensive, and you can’t afford to hire the wrong candidates. A general employee background verification process check may include educational qualifications and work experience. The verification can ensure that the candidate has the qualifications that company policies ask for a particular position. The employee’s criminal record background checks are connected with bad notions. Conducting a check for the criminal record does not necessarily mean that you doubt their character. But there are a few responsibilities in the organization where you need to conduct the employee’s criminal records to ensure that they are right for the responsibility. Now days terrorist activity occur more & more, few cases unknown peoples travel from other states, apply job & work in companies. So if we maintain criminal details & terrorist details in application based on AadharNo verify/check before hiring employee’s & also give information to respective police station. Objectives: Verify academic credentials and work history for position relevance. Confirm certificate and degree authenticity through educational institutions. Conduct thorough checks for specific roles with increased responsibilities. Focus on ensuring candidates have no compromising criminal history. Use AadharNo as a unique identifier for streamlined verification. Establish a secure system linking Aadhar numbers to criminal records. Collaborate with law enforcement for terrorist databases access. Implement screening to cross-reference candidate details, mitigating risks. Conduct prompt background checks to avoid recruitment delays. Implement a system for real-time updates to facilitate quick decisions. Establish compliance with local and national laws. Communicate background check purpose and scope, obtaining candidate consent. Implement measures for candidate information confidentiality. Adhere to data protection laws and industry standards. Foster collaboration with local police by sharing relevant information. Create a channel for police input or concerns during verification. Deliverables: Verification reports confirming academic credentials and work history. Authenticated certificates and degrees from relevant educational institutions. Comprehensive reports on criminal history for each candidate. Clearances for candidates with no compromising criminal records. System for streamlined background verification using AadharNo. Secure database linking Aadhar numbers to criminal records. Reports on terrorist activity screening for candidates. Mitigation plans for potential risks identified during screening. Real-time updates on background verification progress. Timely reports for quick decision-making in the recruitment cycle. Documentation ensuring compliance with local and national laws. Signed consent forms from candidates, clearly outlining the purpose and scope of background checks. Reports on shared information with local police stations. Documentation of channels created for police input or concerns during the verification process. Constraints: The background verification process must adhere to local and national laws, ensuring privacy rights and avoiding any discriminatory practices. Compliance with data protection laws may limit the extent to which certain information can be accessed or shared, affecting the depth of background checks. Budget constraints may impact the depth and frequency of background checks, potentially limiting the use of certain verification tools or services. Collaboration with law enforcement agencies may be subject to their availability and willingness to share certain information, impacting the effectiveness of terrorist activity screening. The need for a timely recruitment process may limit the depth and thoroughness of background checks, potentially affecting the accuracy of the information gathered. Assumptions: It is assumed that candidates provide their consent for background checks and share accurate information during the hiring process. It is assumed that relevant information, such as educational records and criminal history, is available and accessible for verification. The effectiveness of terrorist activity screening relies on the accuracy and completeness of databases provided by law enforcement agencies. The success of AadharNo integration assumes the reliability of technology systems and secure data storage mechanisms. It is assumed that police stations are willing to collaborate and share relevant information about potential hires, contributing to the effectiveness of the background verification process. It is assumed that there will be ongoing monitoring and adjustments to the background verification process to ensure continued compliance with evolving legal and regulatory requirements. Work Breakdown Structure: This WBS provides a structured breakdown of tasks and activities involved in the implementation of the enhanced background verification process, ensuring a systematic and organized approach to the project. Project Management: Define project scope, objectives, and stakeholders. Establish a project team and allocate roles. Legal and Compliance Framework:Research and document local and national laws governing background checks.Develop documentation for candidate consent and compliance. Resource Allocation:Identify and allocate budget for background verification tools and services.Assess and allocate human resources for the verification process. Technology Infrastructure Setup:Implement secure systems for AadharNo integration and data storage.Ensure technology reliability for real-time verification and reporting. Educational Qualifications Verification:Establish processes for verifying academic credentials.Develop communication channels with educational institutions for confirmation. Work Experience Verification:Design protocols for confirming work history and experience.Establish communication channels with past employers for verification. Criminal Record Checks:Develop procedures for conducting thorough criminal record checks.Implement systems for secure storage and retrieval of criminal history information. AadharNo Integration:Create a system for utilizing Aadhar numbers as unique identifiers.Establish secure linkages between Aadhar numbers and criminal records. Terrorist Activity Screening:Collaborate with law enforcement agencies for access to terrorism databases.Design and implement a screening process for cross-referencing candidate details. Real-time Verification and Reporting System:Develop a system for real-time updates on background verification progress.Implement reporting mechanisms for quick decision-making. Candidate Communication and Consent:Develop communication materials outlining the purpose and scope of background checks.Obtain candidate consent and provide necessary information. Confidentiality and Data Security Measures:Establish protocols for safeguarding candidate information. Ensure compliance with data protection laws and industry standards. Collaboration with Police Stations:Initiate collaboration with local police stations. Establish communication channels for sharing information and addressing concerns. Continuous Compliance Monitoring:Implement mechanisms for ongoing monitoring of legal and regulatory changes.Ensure continuous compliance with evolving requirements. Project Closure:Conduct a project review to assess outcomes against objectives.Complete final documentation and handover any ongoing responsibilities. Time-line Schedule A project timeline is a visual list of tasks or activities placed in chronological order, which lets to view the entirety of the project plan in one place. Sl, No 01 Task Name Duration Start Date End Date 27/02/2024 04/03/2024 Project management 1 Week 02 06/03/2024 11/03/2024 Analysis 1 Week 03 13/03/2024 03/04/2024 Design 3 Week 04 04/04/2024 02/05/2024 Developing 4 Week 05 03/05/2024 25/05/2024 Testing and Production 3 Week Cost Breakdown Structure Assigned Software and Hardware Costs: Encompasses expenses for software licenses, development tools, server hardware, networking equipment, and user devices if needed. Training Costs: Covers development of training materials, facilities for training sessions, and fees for external trainers if utilized. Security Measures: Includes costs for security software licenses, audits, penetration testing, and implementation of security protocols. Documentation Costs: Encompasses tools for technical documentation, printing and distribution of user manuals, and expenses related to documentation review. Testing Costs: Includes testing tools and software, potential external testing services, and expenses for user interface usability testing. Implementation Costs: Covers deployment services and user support during the initial rollout. Miscellaneous Costs: Includes a contingency fund and expenses related to project management tools and software. Training and Professional Development:Encompasses continuous training for staff on system updates and professional development for IT personnel. Travel and Accommodation (if applicable): Includes expenses related to project meetings, training sessions, or any necessary travel. PHASES in - Employee background verification Management System Cost distribution Phase1: Strategy Document preparing 3k Phase2: Higher level design and specification 4k Phase3: Front end, UI &UX 4k Phase4: Coding 7k Phase5: Database designing 4k Phase6: Testing and maintenance 4k Phase7: Deployment 7k Total amount 33k Risk Analysis Risk Analysis in project management is a sequence of processes to identify the factors that may affect a project’s success. These processes include risk identification, analysis of risks, risk management and control, Risk Identification It is the procedure of determining which risk may affect the project most. This process involves documentation of existing risks. The input for identifying risk will be Risk management plan Project scope statement Understand and prepare detailed requirement and specifications Prepare high level and detailed design specifications of the system Prepare Test Plan and Test cases Perform unit testing, integration and system testing Demonstrate a bug free application after suitable modification if needed. Cost management plan Software Requirement Analysis:25% Data Base:16% Front End :17% Coding : 18% Testing : 13% Documentation: 11% Schedule management plan Software Requirement Analysis:1week Data Base:1week Front End :2week Coding : 4week Testing : 2week Documentation: 2week Human resource management plan Activity cost estimates Activity duration estimates Stakeholder register Project documents Perform quantitative risk analysis Plan risk responses Monitor and control risks Control Risks Control risk is the procedure of tracking identified risks, identifying new risks, monitoring residual risks and evaluating risk. The inputs for this stage includes Software Project management plan Risk register Work performance data Work performance reports The output of this stage would be Work performance information Change requests Project management plan updates Project documents updates Organizational process assets updates Conduct Procurement process Conduct Procurement process involves activities like Selecting a seller Receiving seller responses Awarding a contract The benefit of conducting procurement process is that it provides alignment of external and internal stakeholder expectations through established agreements. The input of the conduct procurement process includes Project management plan Documents for procurement Source selection criteria Qualified seller list Seller proposals Project documents Make or buy decisions Teaming agreements Literature survey In the context of hiring processes, the focus is on implementing a robust and efficient background verification system using Design Science Research Methodology. The primary concern is the misrepresentation of information by job applicants, leading to significant losses for employers globally. To address this issue, the project proposes the use of a consortium blockchain to store hash values of application files from multiple companies, providing a reliable and transparent method for historical verification. Implement digital certificates using digital signature technology to enhance user controls. Confirm users' identities and provide access authorization to the network. Utilize a consortium blockchain to store hash values of application files. Ensure the integrity and immutability of historical data related to job applicants. adopts the Design Science Research Methodology, emphasizing practical solutions to real-world problems. The use of blockchain technology, specifically a consortium blockchain, ensures a decentralized and secure platform for storing hash values of application files. This method allows for efficient and transparent verification of historical data at any point in the hiring process. The use of blockchain ensures transparency in the verification process, allowing employers to access and verify historical data with confidence.By storing hash values in a blockchain, the time required for document verification is significantly reduced, leading to faster hiring processes.The proposed system offers a cost-effective alternative to traditional background verification methods, making it accessible to companies of all sizes. Digital certificates and blockchain technology contribute to fraud prevention by reducing the likelihood of misrepresentation in job applications.The decentralized and secure nature of the blockchain builds trust between employers and job applicants, fostering a more reliable hiring ecosystem.aims to revolutionize the background verification process by leveraging digital certificates, digital signatures, and blockchain technology. The proposed system aligns with the global transformation of the job market, providing an efficient, time-saving, and cost-effective solution for companies worldwide. Methodology: The proposed system aims to streamline the background verification process with a focus on educational qualifications, work experience, criminal records, and terrorismrelated activities. The project will be developed using the Java Spring Boot framework for the backend, HTML, CSS, Bootstrap, and React JS for the frontend, and MySQL Server for the database. The following steps outline the methodology: Requirement Analysis:Gather detailed requirements from stakeholders regarding the desired features and functionalities of the background verification system.Identify specific criteria for educational qualifications, work experience, criminal records, and terrorism-related checks. System Design:Design the database schema to store applicant details, educational records, work history, criminal records, and terrorism-related information. Plan the user interface using HTML, CSS, Bootstrap, and React JS to ensure a userfriendly experience.Define the workflow and interactions between different components of the system. Development:Set up the development environment with the specified hardware requirements.Use Java Spring Boot for backend development, creating APIs for data retrieval and processing.Develop the frontend using HTML, CSS, Bootstrap, and React JS for a responsive and intuitive user interface.Implement the database schema using MySQL Server. Integration of AadharNo Verification:Incorporate AadharNo verification as a unique identifier for applicants.Integrate AadharNo verification into the background verification process to enhance accuracy and reliability. Background Verification Algorithms:Develop algorithms to verify educational qualifications and work experience, ensuring they meet the company's policies for specific positions.Implement criminal record checks and terrorism-related activity screening algorithms for thorough verification. Real-time Updates and Reporting:Implement real-time updates to inform employers of the progress of background verifications.Develop reporting functionalities to provide comprehensive reports on each applicant's verification status. Security Measures:Implement encryption techniques to secure sensitive data, especially criminal and terrorism-related information.Incorporate authentication mechanisms to ensure authorized access to applicant data. Collaboration with Police Stations:Establish a secure channel for collaboration with police stations to share relevant information and obtain inputs during the verification process. Testing:Conduct rigorous testing to identify and fix any bugs or issues in the system.Perform verification tests with mock data to ensure the accuracy and effectiveness of the background verification algorithms. Deployment:Deploy the system on a server that meets the specified hardware requirements.Ensure the system is accessible to authorized personnel within the organization.