Axa Assurance Maroc - Insurer Innovation Award 2024
HRMS Presentation
1.
2. Project Scenario System Admin About System Security Software Hardware Agenda :
3.
4.
5.
6. Integrated Human Resource Management System Employee personal database Contractor Employee database Loan, Adv., Increment Details for employee Category Details Report for PF/FPF/Society Reports for Bonus Contractor Module Reports Reports for Income Tax Training Recruitments New Recruitment Contract based Employees Category definitions Attendance System (Time Office) Administration Production Incentive Details Cost Office Time Office Rules H. R. Policies Production Incentive rules Company Rules & Regulation TOP VIEW
13. System Security Login Level Security Only the user whose User Name and Use Id has been created by the Administrator can login to the system. Application Level Security Oracle system privileges control a user’s access to the Oracle instance as a whole.The privilege sets that are available are as follows: The User Privileges : These privileges relate to the users who will Access the system, but not create any objects.
14. The Developer Privileges : These privileges relate to the creation of database objects. The “Any” Privileges : These are especially powerful set of privileges within oracle. They apply not only to objects that you own,but objects that other users own. The Database Maintenance Privileges : These privileges relate to the care and feeding of the database. The Monitoring Privileges : These privileges relate to keeping any eye on the Oracle database.
15. For database level there are three state of data Unlocked : It is the default status of the records.Only unlocked records can be updated and deleted. Locked : Active type of data can not be deleted or updated. Dead : The data on which no activities can be performed . Database Security: