Underlying all the steps in the deployment methodology is the need to ensure appropriate governance for the success of the project. Communication channels, escalation procedures and reporting processes all need to be developed as part of the project plan. Executive sponsorship is also a necessary element of the project’s success.
Step 1 - Business and IT Requirements Definition
This step is to identify business processes and technical infrastructure relevant to the deployment of the application. A gap analysis will be conducted. The goal is to develop an understanding of the client’s business and IT requirements to provide recommended deployment best practices based on Accuity’s industry expertise and understanding of the requirements. Secondarily, the scope and approach of the engagement will be validated and the project plan defined. The project plan will include major milestones, user acceptance testing and training procedures, cost estimates and required resources for the remainder of the project.
Step 2 - Data Cleanse
The purpose of this step is to review the input data to be screened with the objective of eliminating redundancies and incomplete data where possible. Strategies for cleansing of the data will be developed and executed as appropriate. Data cleanse can involve ensuring the right input data is selected to tools to merge input data. By ensuring the data is clean, the number of false positives resulting from screening will be reduced.
Step 3 - Installation and Base-Level Configuration of Screening Application
This step is to ensure the application is functioning as expected. If the screening application is to be hosted by Accuity, we will ensure that the hosted solution is set up on a physical server prior to any on-site visits. Secondarily, client User Acceptance Testing (UAT) procedures and scripts will be developed at this stage.
Step 4 - Design and Customization of Screening Application
The purpose of this step is to design and develop specific code related to the client’s unique business or technical requirements that are not met by the base application. This step is optional and is dependant on the results from Step 1. Any specific User Acceptance Testing planning for the customized application
may also be conducted during this step.
Step 5 - Specific Configuration Activities Related to Client Requirements
This step includes configuration of the screening tool based on identified requirements from Step 1. Configuration activities typically include user administration, input file specifications, folder and assignment rules, and case management. Technical integration to front or back office systems via the Web Service may also be required. If specific customization of the application has been conducted as part of Step 4, the customized code will also be deployed.
Step 6 - Technical and Business User Training for Application
Related to basic product functions, training may be a “train the trainer” approach or as defined during Step 1. Training will cover topics from regulatory requirements to product usage and client defined processes. Training can be delivered in a live classroom setting or over Web conference sessions. Training typically includes live sessions of the application alternated with concept discussion. Training materials are provided.
Step 7 - False Positive Reduction Techniques Workshop
Tasks in this step include analysis and definition of the most frequent matches, by cumulative frequency, proposed conditions to remove them and review of any risks associated to them with the client. The goal of this step is to ensure operational efficiency of the application against the regulatory risk requirements associated with the client’s AML policies.
Step 8 - Assist Client with Deployment of Solution in a Production Environment
This step includes overall User Acceptance Testing (UAT) of the application, deployment planning and any general support issues during the initial production period. The deployment process will be dependant on the client’s typical deployment process.