Features

HRMS is uniquely positioned to deliver your requirements and is designed to have minimize risk and produce maximum value for your project, by ensuring & giving pre-configured and pre-built solution.

Home Page Dashboard


It provide the ability to add (through favorites) quick links to search results, reports, and other items so that users do not have to perform those actions over and over.

The home page is further completely configurable and customizable with links that are relevant for a given role or with actions that are expected to be taken by a given role

Graph Enlarged:

Organizational Structure


The system allows the definition of Organization (or Department) and enables the maintenance of organizational hierarchy. Currently an organization can have many child organizations and if matrixed reporting structure is needed it can be created. An employee is typically assigned to one organization, but if needed he can be configured to be in multiple organizations.

Organizational structure modifications are easy, these modifications are controlled by who has the privileges to perform such modifications.

Position Management


The system tracks all positions, all changes to any position, and position status.

System has ability to set head count standards

The system tracks any change made to all of the important objects in the system – including position.

Job Assignments Associated with a position

The Journaling tab:


Employee Self-Service


System provides area which allows employees to view documents, policies, messages, their own information such as job history, leave history, compensation, etc.

Listing of all Employees:

The edit button is be available only on records that belong to the employee.

Human Capital Management


System has ability to maintain historical data for current and former employees, and tracks every change to an employee record, both with the previous and the new values.

Items are tracked for each employee:

System has build in ability to maintain all job-related details:

Learning Management


System has ability to track and maintain all necessary details of an staff / employee’s development.

Leave Management


System has ability to support multiple leave types such as annual leave, family-personal leave, sick leave, military leave, floating holidays, etc. and different kinds of leave can be configured.

Time & Attendance


System has ability to provide electronic time cards which allows for customization of data so only pertinent data is showing for each employee.

The system has field level security, thus restricting what an employee can edit or see. Each day’s timecard (or week’s) (and all historical ones) are attached to the employee’s record.

Employee Relation/Case Management


System has ability to track employee disciplinary actions

System shall has ability to schedule and remind of any event.

System can be configured to track complaints and investigations and associated statements, comments, witnesses, actions, documents, etc.

Performance Management


All records and data of performance review is recorded and tracked and attached to each employee.

Succession Management


System has ability to store succession documents. The succession plan can be performed for any employee of interest.

System has in build capability to track and report on critical roles and critical talent.?

Workflow


The system provides configuration capabilities to define workflow that is specific for each scenario and then records the transitions on that workflow.

Anyone with the right privileges can create an appropriate transaction or change request. The change request can be also be triggered by a value selection in a field.

Home Page


Home Page consists of Dashboard, Use information, About Company/Product and it provide the ability to add (through favorites) quick links to search results, reports, and other items so that users do not have to perform those actions over and over.

The home page is further completely configurable and customizable with links that are relevant for a given role or with actions that are expected to be taken by a given role

Graph Enlarged:

Integrate with Active Directory and allow Single-Sign-on


The product is already developed in such a way that this integration is available out of the box.

Once the system is deployed there is a configuration screen (see below) that can be used to establish the single sign on with active directory. These usernames are then used to define roles, which again, can either be in the system or in Active Directory. Finally, the permissions against those roles are defined in the system to keep the performance high. Also, Google or Facebook can be used for single sign on.


Data Import


From Excel Spreadsheet

Every entity in the system has the capability to import from Excel. When uploaded, the application will match the properties and column headers of excel sheet. All the records of excel sheet will be imported to entity in generated application.
The associations of entity (e.g. Type of Case) can be mapped with existing value of associated entities by selecting the appropriate column. If the two values are identical, the existing records will be mapped with respective records. In else case, the new records will be created.

If the upload process is going to be ongoing (e.g. if you have a process that is going to remain in EXCEL and then that data has to come into this new system), you can save the mapping, so that you do not have to do the individual column mapping each time.

JSOn and OData Services

You can use the records of Turanto application in any third party application directly without giving access to your database. Through OData service, the records are published in JSON format. OData services should be enabled by admin before the third party application could consume this data. The OData service is available only when selected ‘True’ while launching the application.

Configurable Field labels & Messages


Software is configurable such that field labels and messages can be altered to match the organizations standard terminology.
This is configurable at two levels:

  • During the initial discovery phase we will pre-configure the system in Turanto before deploying it. There is significant luxury available in this case, not just on the labels, but also on the display (e.g. do you want it displayed as a checkbox or a dropdown).

  • Thereafter, the labels can be easily changed from the admin area of the case management system – a sample screen is included below:

All information accessible and editabale


Software allow all information from the complaint should be accessible and editable from the investigation

The above is a simple screen (not fully configured) for case – the icon next to the case allows the user to navigate to the complaint directly and edit that information.

Audit Trail


The system provides three kinds of logging trail:

  • View – This captures the information (who / when) viewed the record.
  • Change – This captures who and when modified a record and more importantly, the previous and new value. This information is captured for every field that was touched during the edit.
  • Delete – This captures who and when deleted a record. ( In some scenarios, some customers have had us customize Delete such that while the record is removed from the primary table, it remains in the system in a “Deleted Records Table.”)
    These journal or logging entries are available to anyone with view privileges on a particular record. (Ex. You may be able to view changes on a Complaint, but may not be able to view changes to a Case). Or, as an administrator, you may be able to view all changes that have occurred in the system and search them by a specific person.

Adhoc Reporting Capabilities


The reporting is built with SQL SERVER REPORTING SERVICES (SSRS) and the included reports builder provider a quick way to create those reports. Further, once those reports are published anyone can have access to those from the reports menu available on every page.

System is capable of producing statistical reports based on but not limited to such things as days in status, investigator hours spent, spin-off cases and financial information.

Security


System providse the ability for a system administrator to access system security controls for the purpose of changing a user’s access level. The system provides significant security controls through configuration alone.

image1

Role Based Security

A role can be used to control the functionality available to end users through screens such as the ones below. An administrator is the only one who can access these screens and configure accordingly.

image1

Set User Based Security

User based security targets the entities that are directly or indirectly associated with user. If security is applied, the records will be visible only to respective user and admin only. (E.g. an Investigator may be allowed to edit an case – but only if he is the assigned investigator for that case).

Security Based on Hierarchy

When Hierarchy is selected, Turanto application uses the reference assignment to create an exception in user based security. This exception allows other users to see the record of another users who comes at lower levels of hierarchy.

This hierarchy when applied in one entity, all user sensitive entities (associated directly or indirectly with users) follows the hierarchy rule as exemption to user based security. On every else thing, conventional security rules follow.
• In generated application, while defining user based security will show ‘Enable Hierarchy’ check box if selected entity has self-association(s).
• Enable Hierarchy column will not show if entity does not have any self-association.
• If Enable Hierarchy not selected at the time of setting user based security then it will not show children in hierarchy and will show only the records owned by user.
• Enable/Disable of Hierarchy security can be done from generated application itself.

image1

Role Based Security

Role Based Security filters the record of an entity based on the value of different entity associated with it directly or indirectly. For example, an organization has two offices but keeps the database in a centralized database. If office is the entity on which application security is applied, then users of both office can see the records of their office only. In terms of Turanto, an entity say Management Docs contains documents of both offices but users of one office can see only the records belonging to them.

BusinessRules


Configurable Business Rules

image1

System provides ability for a system administrator to access system security controls for the purpose of changing a user’s access level. The system provides significant security controls through configuration section.