Sie sind auf Seite 1von 12

Calculate Client Security Hash

Process Definition Document- (PDD)


ACME Systems Inc
NOTE:

This version of the document and its current content is meant to serve as an example for
business users (e.g. process SME) and it is intended to help with the creation of the process
design documentation for RPA.
The current example`s content is fictive or adjusted to remove real confidential data and it should
not be replicated to the automation of other business processes. All the process steps and
screenshots in the PDD should be captured entirely from scratch and included here for the
automation of the process is scope.
The list of examples is not exhaustive. Additional entries may be added or removed, case by case,
as required to provide relevant data for RPA.

Document History
Date Version Role Name Organization (Dept.) Function Comments

01.02.2018 1.0 Autho Maria CoE Business Created document v


r Ionescu Analyst 1.0
03.02.2018 2.0 SME Andre Finance & Business Updated according
w Lloyd Accounting Process to SME feedback
Owner
04.02.2018 3.0 James CoE Dev/RPA Updated according
Peterso Solution to Solutions
n Architect Architect feedback

Document Approval Flow


Version Flow Role Name Organization (Dept.) Signature and Date:

4.0 Document Business Maria CoE


prepared by Analyst Ionescu
4.0 Document Head of Ion Finance & Accounting
Approved by: Accounting Popescu
4.0 Document CoE John CoE
Approved by: Manager Smith
Contents
1. Introduction ................................................................................................................................ 4
1.1 Purpose of the document ................................................................................................... 4
1.2 Objectives ............................................................................................................................ 4
1.3 Process key contact ............................................................................................................. 4
1.4 Minimum Pre-requisites for automation ............................................................................ 5
2. As IS process description ............................................................................................................. 5
2.1 Process Overview ................................................................................................................ 5
2.2 Applications used in the process ......................................................................................... 6
2.3 AS IS Process map................................................................................................................ 6
2.4 Detailed AS IS Process Steps ............................................................................................... 7
2.5 Input data description ......................................................................................................... 8
3. To BE Process Description ........................................................................................................... 8
3.1 TO BE Detailed Process Map ............................................................................................... 8
3.2 Parallel Initiatives/ Overlap (if case) ................................................................................... 9
3.3 In Scope for RPA .................................................................................................................. 9
3.4 Out of Scope for RPA ........................................................................................................... 9
3.5 Business Exceptions Handling ............................................................................................. 9
3.6 Application Error and Exception Handling ........................................................................ 10
3.7 Reporting ........................................................................................................................... 11
4. Other Observations ................................................................................................................... 12
4.1 Additional sources of process documentation ................................................................. 12
I. Introduction

I.1 Purpose of the document

The Process Definition Document outlines the business process chosen for automation using UiPath
Robotic Process Automation (RPA) technology.

The document describes the sequence of steps performed as part of the business process, the conditions
and rules of the process prior to automation and how they are envisioned to work after automating it,
partly or entirely. This specifications document serves as a base for developers, providing them the details
required for applying robotic automation to the selected business process.

I.2 Objectives

The process that has been selected for RPA is part of the larger project ACME processes conducted within
the ACME Systems Inc, Finance and Accounting department.

The business objectives and benefits expected by the Business Process Owner after automation of the
selected business process are:

 Reduce processing time per item by 80 %


 Better Monitoring of the overall activity by using the logs provided by the robots

I.3 Process key contact

The specifications document includes concise and complete requirements of the business process and it is
built based on the inputs provided by the process Subject Matter Expert (SME)/ Process Owner.

The Process Owner is expected to review it and provide signoff for accuracy and completion of the steps,
context, impact and complete set of process exceptions.The names have to be included in the table below.

Role Name Contact details Notes


(email, phone number)
Process SME Andrew Lloyd andrew.lloyd@acme-test.com Point of contact for questions related
Mobile: 44 0735 325 209 to process details & exceptions
Process John McDonald john.mcdonald@acme-test.com Point of contact for questions related
Reviewer Mobile: 44 0735 325 209 to process details & exceptions
Process Ion Popescu ion.popescu@acme-test.com Escalations, Delays,etc
Owner/
Approver for Mobile: 44 0735 325 209
production
I.4 Minimum Pre-requisites for automation

1. Filled in Process Definition Document


2. Test Data to support development
3. User access and user accounts creations (licenses, permissions, restrictions to create accounts for
robots)
4. Credentials (user ID and password) required to logon to machines and applications
5. Dependencies with other projects on the same environment

II. AS IS process description

II.1 Process Overview


General information about the process selected for RPA prior to automation.
# Item Description
1 Process full name Calculate Client Security Hash
2 Process Area Security
3 Department Finance and Accounting
4 Process short description Generate the Security Hash for each Client based on their personal
(operation, activity, information.
outcome)
5 Role(s) required for ACME System 1 – Role name Fin ACC:
performing the process Module “ Work Items” – Rights “ Read &Write”

6 Process schedule and Daily, Monday to Friday, 9 am – 6 pm


frequency
7 # of items processes ~450/ day business as usual
/reference period
8 Average handling time per 3 min
item
9 Peak period (s) Beginning of month, usually from 28th to 30th day of each month
10 Transaction Volume During 600
Peak period
11 Total # of FTEs supporting 3-4
this activity
12 Expected increase of volume Volumes will increase with 20%
in the next reference period
13 Level of exception rate No expected exceptions
14 Input data Client Data from ACME Systems 1
15 Output data Client Security Hash uploaded in ACME & task completed
*Add more rows to the table to include relevant data for the automation process. No fields should be left empty. Use
“n/a” for the items that don`t apply to the selected business process.
II.2. Applications used in the process

The table includes a comprehensive list all the applications that are used as part of the process
automated, at various steps in the flow.
# Application name System Thin/Thick Environment/ Comments
& version Language Client Access method
1 ACME System 1 EN Thick Client Web Browser Task management
2 Sha1-com EN Thick Client Web Browser Hash ID generator

*Add more rows to the table to include the complete list of applications.

II.3 AS IS Process map

High Level As-Is Process Map:


This chapter depicts the As Is business process at a High Level to enable developers to have a high-level
understanding of the current process.

Calculate Client Security Hash

Input: WI5 tasks Input: Client data Input: Security


Hash
& Task reference
Finance & Accounti ng

1. Extract
3. Update Task
Client data for 2. Generate
Start with Security End
tasks named Security Hash
hash
WI5

ACME System 1 Sha1-online ACME System 1

Output: Client data Output: Security Output: Client


Hash updated with
security hash
Detailed As-Is Process Map:

This chapter depicts the AS IS business process in detail to enable the developer to build the automated
process.

Calculate Client Security Hash

User
Credentials
Input: Client Hash
ID

2.Access Work 3. Search for task 4.Click on task 9. Update Hash Id in


1.Log in into 8. Click on 10. Click on
Items menu named Calculate named Calculate 5. Copy Client add Columns field Other similar Repeat
Finance & Accounti ng

Start ACME System 1 Task found? yes Update Work Update Work Yes
ACME System 1

from Home client security hash client security data & Status as tasks? steps 4-8
app Item button Item button
page in each page hash completed

NO
Output: Output:
Output: 1 Task All Tasks
Frequency: Each
- Client ID updated with updated with
day, starting No
Frequency: - Client Name hash ID hash ID
with 9 AM
Each day, - Client
twice per hour Country
Exceptions: Web
app not responding

Actions: report the Stop


issue to IT support

Input:
- Client ID
- Client Name
- Client Country
Finance & Accounti ng
Sha1-com

6. Open sha1.com
7. Copy
& enter client
Hash ID
data

Output:
1 hash ID

II.4 Detailed AS IS Process Steps

Detailed As-Is Process Steps


Step Input Description Details (Screen/ Exception Handling Possible Business Rules
Document/ Video Actions Library Index
recording Index)

See doc attached

WI5_Process_Detail
s.xlsx
II.5 Input data description

Step Sample Input type Location Inputs are Inputs are Data to be used from
(Printscreen) standard? structured?
(Yes/ NO)
6 See WI5_ Screen n/a YES YES Client Name
Detailed Client ID
Process Client country

* Inputs are standard if the content is positioned in the same place even if the input types are different.
Eg: a process that uses at each transaction the same template, so fields to be extracted are always fixed..
Inputs are structured if it is machine readable and digital. Scanned PDF Images/ Free flow texts in Emails are
unstructured inputs

III. To BE Process Description


This chapter highlights the expected design of the business process after automation.

III.1 TO BE Detailed Process Map

Highlight Bot interventions/ to-be automated steps with different legend/ icon (purple)
Calculate Client Security Hash

User
Credentials
Input: Client Hash
ID

2.Access Work 3. Search for task 4.Click on task 9. Update Hash Id in Repeat
1.Log in into 8. Click on 10. Click on
Items menu named Calculate named Calculate add Columns field Other similar steps 8-10
Start ACME System 1 Task found? yes Update Work Update Work Yes
from Home client security hash client security & Status as tasks? for all
app Item button Item button
page in each page hash completed clients
ACME System 1

NO
Output: NO
Frequency: Each - Client ID Output: Output:
day, starting Frequency: - Client Name 1 Task All Tasks
with 9 AM Each day, - Client updated with updated with
once per hour Country hash ID Stop hash ID
- Task ID

Exceptions: Application Crash / Internal


Server Error

Actions: Recover & retry for maximum 3


times
Close the applications and run the sequence
again

Input:
- Client ID
- Client Name
- Client Country 6. Open sha1.com, & 7. Copy Hash
enter client data ID
&press hash
Sha1-com

Output:
1 hash ID

Exceptions: Hash ID <> 40


characters
Actions: Send email to
exceptions@acme-test.com

*Mention below if process improvements were performed on the TO BE design and detail them
Legend
Step number in the process. Referred in the details or Exceptions and Errors table
This process step is proposed for automation

This process step remains manual (to be performed by human agent)

III.2 Parallel Initiatives/ Overlap (if case)

This chapter captures the proposed Business, Process & System changes in near future and its impact

S.No Initiative Name Process Step(s) Impact on current Expected Contact


where it is identified automation request? How? Completion Date person for
more details
n/a

III.3 In Scope for RPA

The activities in scope of RPA, are listed here:

1. Steps 1-10

III.4 Out of Scope for RPA

The activities OUT of scope of RPA, are listed here:

Sub- Activity Reasons for Out of Impact on the TO BE Possible measures to be taken
process (step) scope* into consideration for future
(if case) automation
1.1 1.1.3 Input: handwritten After processing step 1.1.2, Collect the form in an editable
form an email is sent to the user to pdf format and electronically
perform step 1.1.3 in a csv signed
file
In order to go to step 1.1.4
the robot will read the csv file
*Add more rows to the table to reflect the complete documentation provided to support the RPA process.

III.5 Business Exceptions Handling

The Business Process Owner and Business Analysts are expected to document below all the business
exceptions identified in the automation process. These can be classified as:
Known Unknown
Previously encountered. A scenario is New situation never encountered before. It can be caused by
defined with clear actions and external factors. Cannot be predicted with precision, however
workarounds for each case. if it occurs, it must be communicated to an authorized person
for evaluation.

Known Exceptions
The table below reflects all the business process exceptions captured during the process evaluation and
documentation. These are known exceptions, met in practice before. For each of these exceptions, define
a corresponding expected action that the robot should complete if it encounters the exception.

BE # Exception Step Parameters Action to be taken


name
Send email with screenshot to exceptions@acme-
1 Hash ID <> 40 n/a Hash ID test.com
characters
“Hash ID <> 40 characters”
Go the next transaction

Unknown Exceptions
For all the other unanticipated or unknown business (process) exceptions, the robot should:

Send an email notification at exceptions@acme-test.com and error message screenshot attached.

III.6 Application Error and Exception Handling

A comprehensive list of all errors, warnings or notifications should be consolidated here with the
description and action to be taken, for each, by the Robot.

Errors identified in the automation process can be classified as:


Area Known Unknown
Technology/ Experienced previously, action plan or New situation never encountered before,
Applications workaround available for it. or may happened independent of the
applications used in the process.

Know Errors or Exceptions


The table below reflects all the errors identifiable in the process evaluation and documentation.

For each of these errors or exceptions, define a corresponding expected action that the robot should
complete if it is encountered.
# Error name Step Parameters Action to be taken

1 Application Any step Error Recover & retry for maximum 3 times
Crash / Internal message
Close the applications and run the sequence again
Server Error

Unknow Errors and Exceptions


For all the other unanticipated or unknown application exceptions/errors, the robot should:

Send an email notification at exceptions@acme-test.com and error message screenshot attached.

III.7 Reporting

# Report type Update Details Monitoring Tool to


frequency visualise the data

Kibana
1 Process logs Daily How many times was this process run since the
beginning of the month and what was the
average run duration?

2 Process logs Monthly How many robots worked on this process per Csv file posted daily
each month? on sharedrive

3 Transaction Daily How many transactions were run by this Kibana


logs
process since the beginning of the month and
what was the average transaction duration?

4 Error logs Daily Average number of errors by type per day Kibana

5 Error logs Daily All errors per month grouped by type Csv file posted daily
on drive
* For complex reporting requirements, include them into a separate document and attach it to the present
documentation
IV. Other Observations
Include below any other relevant observations you consider needed to be documented here.

Example: Specific Business monitoring requirements (audit and reporting) etc

V. Additional sources of process documentation


If there is additional material created to support the process automation please mention it here, along
with the supported documentation provided.

Additional Process Documentation


Video Recording of the process ACME-System1-Process-WI5-Manual- Insert any relevant
[Optional] Walkthrough comments
Standard Operating Procedure (s) Insert any relevant
(Optional) comments
Business Rules Library Insert link to Business rules library Insert any relevant
(Optional) comments
Other documentation Insert link to any other relevant process Insert any relevant
(Optional) documentation (L4, L5 process description, comments
fields mapping files etc)
*Add more rows to the table to reflect the complete documentation provided to support the RPA process.

Das könnte Ihnen auch gefallen