Department of Veterans Affairs Veteran’s Enterprise Management System



Download 321.93 Kb.
Page7/12
Date conversion29.04.2016
Size321.93 Kb.
1   2   3   4   5   6   7   8   9   ...   12

2.2.Overview of the Business Process


The full Verification process, along with other CVE processes such as Risk, Customer Service, and Quality Assurance processes, will be fully defined in the To-Be Process documentation. However, this section defines the Verification Process and serve as a baseline for the major changes and enhancements that will be delivered in VEMS.

verification process overview

Figure : Verification Process Overview

Application Process


The Application process covers the activities taken by the Veteran or Business Owner to complete an application for verified VOSB or SDVOSB status.

application process overview

Figure : Application Process Overview

VEMS will significantly enhance the Application process with the goal of providing a clean data application once submitted for verification. This will reduce the requests for documents and information that go back to the Veteran and will increase the chances of success for verification in a timely manner.

Improvements are anticipated in the following areas:


  • Automated information retrieval from VA Systems of Record such as BIRLS, CORP, and DMDC for validation of service completion, character of service, and VA and/or DoD service disability

  • Automated information retrieval from SAMS, Dun & Bradstreet, and/or the Small Business Administration to verify business existence and status (may not be present in early releases)

  • Automated information retrieval from IRS to verify financial records (may not be present in early releases)

  • Validation of required documents before submission is allowed

  • Application will be electronically signed so that fewer paper forms must be exchanged

  • Risks can be identified during the application process based on the information retrieved from the various data sources

  • Problems identified with the Business Owner or the Business itself will be flagged and highlighted for CVE team members to focus on in the verification process

By requiring the Veteran to resolve data validation and omission issues with the submitted application earlier in the process, thereby reducing the probability of problems after the application is submitted.

Initiation Process


The Initiation process covers the activities that ensure the application is complete so it can begin the actual verification process. With the enhanced application process in place, the Initiators can focus more on red flags and risks already identified instead of gathering data that will now be retrieved automatically from data sources.

initiation process overview

Figure : Initiation Process Overview

Improvements are anticipated in the following areas:

Assignments are automated through the CRM workflow engine, removing the manual assignments using spreadsheets

Examination Process


The Examination process verifies the work does by the Initiation process and performs an initial analysis of the verification recommendation.

examination process overview

Figure : Examination Process Overview

Improvements are anticipated in the following areas:



  • Assignments are automated through the CRM workflow engine, removing the manual assignments using spreadsheets

  • Data validation is automated, removing manual logins to separate systems (some systems may not be automated in early releases)

  • Automated process time tracking and reminders, removing the manual tracking using spreadsheets

  • Reports are automated, removing manual reporting using spreadsheets

  • GCC contractors will use the same system as other CVE team members, removing cut and paste and other manual data transfers

Evaluation Process


The Evaluation process verifies the work does by the Examination process and performs a final legal analysis and makes the legal verification recommendation.

evaluation process overview

Figure : Evaluation Process Overview

Improvements are anticipated in the following areas:



  • Assignments are automated through the CRM workflow engine, removing the manual assignments using spreadsheets

  • Data validation is automated, removing manual logins to separate systems (some systems may not be automated in early releases)

  • Automated letter generation and distribution

  • Automated process time tracking and reminders, removing the manual tracking using spreadsheets

  • Reports are automated, removing manual reporting using spreadsheets

  • GCC contractors will use the same system as other CVE team members, removing cut and paste and other manual data transfers

Determination Process


The determination process is responsible for finalizing letters to the Veteran and obtaining executive signatures for those letters.

Improvements are anticipated in the following areas:



  • Assignments are automated through the CRM workflow engine, removing the manual assignments using spreadsheets

  • Automated letter generation and distribution

  • Automated process time tracking and reminders, removing the manual tracking using spreadsheets

  • Reports are automated, removing manual reporting using spreadsheets

Risk Process


The risk process is responsible for investigating fraud tips and hot line referrals, responding to OIG document requests, and managing site visits.

Improvements are anticipated in the following areas:



  • Integrate fraud protection processes into VEMS system

  • Assignments are automated through the CRM workflow engine, removing the manual assignments using spreadsheets

  • Data validation is automated, removing manual logins to separate systems (some systems may not be automated in early releases)

  • Automatically acquire updated company information prior to starting investigations

  • Automated letter generation and distribution

  • Automated process time tracking and reminders, removing the manual tracking using spreadsheets

  • Reports are automated, removing manual reporting using spreadsheets



1   2   3   4   5   6   7   8   9   ...   12


The database is protected by copyright ©essaydocs.org 2016
send message

    Main page