It is better to take preventive actions than constantly having to correct faults and shortcomings. In other words – it is better to do things right from the start. The hard part is knowing what to do, when and how. With Easit Deviation™, you get a tool to identify errors or problems in the business and its processes. This enables you to take action before something serious happens.
Easy to use
Easit’s Deviation Management System is easy to use and guarantees that no deviations will fall between the cracks. Identified mistakes can then be used to change and maintain quality assurance – whether in large or small companies, government agencies, counties or municipalities.
In addition to improved quality, Easit Deviation™ contributes to increased security and enhanced risk awareness. This creates an improved structure and control of defects in the organization.
Easit is happy to help with planning the introduction of Deviation Management in the business and in training employees and managers.
How to use Easit Deviation™
Deviations are registered easily via self-service. The registering contacts can easily monitor their deviations themselves. This saves time for the manager because feedback is provided automatically. The manager can register deviations efficiently using quick actions and templates.
Supervisors can carry out all activities in the process themselves, or appoint another manager. All that is documented in the handling of the deviation is time stamped with name, and is always searchable in history. Emails are sent automatically to the supervisor and to the manager. The feedback to the registering contact is automatic.
In order to take advantage of past experience and create more efficient ways of working, the Action plan activity provides access to previous similar deviations whose actions have been efficient. The statistics and information which can be accessed via the system’s search functions will be a good basis for preventive work.
- The contact registers the deviation via the self-service page or via email. The deviation is sent to the nearest supervisor.
- In the Analysis activity, the deviation is classified – the cause is assessed along with consequence and probability, and a decision on further processing is made.
- An Action plan is drawn up, with suggested measures to be taken. The action plan is approved by the nearest supervisor in the Decision activity.
- The measures taken are described in the Actions activity.
- In the Follow-up activity, an assessment is made as to the effect of the actions taken.
Examples of processes
• Environment deviations
• Work environment deviations
• Delivery deviations
• Production deviations
• Safety deviations
• Audit deviations
• Improvement suggestions
• Customer feedback
The system views show current deviations. A specific deviation is quickly found through the system’s Super search function. Deviations can be listed per unit/contact, category, status, etc.
All deviations are stored in a database. The manager can quickly find solutions to problems by searching for similar deviations.
End users are notified of specified or selected deviation events via email.
Tasks and Notes
The Tasks function can be used to create personal to-do lists, or to-do lists for co-workers. The Notes function can be used to make simple notes. Tasks and Notes can be connected to organizations and deviations.
Reports can be created for follow-up of deviations, and for organizations and contact persons. Using Excel integration, you can upload Excel templates directly into your own reports. With Easit Data Warehouse, data is exported to MS SQL, to be analyzed by external reporting tools.
Login via Single Sign-on is supported, e.g. via MS AD, SAML etc.
Event handlers allow you to build simple workflows and dynamic controls. For example, some fields may be changed to mandatory in a certain phase of the work process.
The organization and department registry stores information about organizations and contacts. The organizations can be categorized, making it easy to select desired groups. LDAP import imports this registry from standardized directory services and other sources such as databases.
The access system is role based, and there are four preconfigured access levels:
• Full access
• Access to create, but not edit
• Read access
• No access
The system supports signing with password on update/approval.
Build sophisticated workflows that automate much of the deviation handling process.
Escalation allows you to monitor configured limits or deadlines.
The Email history function provides full traceability of all email correspondence for a particular deviation, incoming as well as outgoing.
History log and traceability
All events are logged with a timestamp and detailed information about which user did what in the system. Changes are displayed in a history log.
System Requirements – Recommendations for own operations
Microsoft Server 2003/2003 R2, 2008/2008 R2 and 2012.
The architecture that Easit products are based on can store data in the following relational databases: Microsoft SQL Server 2005, 2008, 2008 R2, 2012, 2012 R2 och 2014 (not Express Edition).
Microsoft Internet Information Server (IIS) (Requirements for Single sign-on via Windows Authentication).
We are currently testing the application in the following browsers:
• Internet Explorer (ver 9, 10, 11)
• Mozilla Firefox (latest version)
• Google Chrome (latest version)
• Safari (latest version)
However, certain functionality might not work, since new browser updates are frequently released.
For other operating systems and databases, contact Easit.
The following recommendations of hardware and software are based on the client computer not being heavily used by other software. If the connection to the network or the Internet has low bandwidth or high load, performance will be negatively affected.
The server recommendations apply when the server is only used for Easit applications and is connected to a network that has satisfactory available bandwidth. Web server and database should be running on the same server.
For other operating conditions, such as virtualized environments or in split installation of application and database server, contact Easit for further consultation.
Proper configuration for 25 Administrators, based on a physical, dedicated Easit server
Disk System: RAID system with at least 2GB of space
Internal memory: > 4GB
CPU: > 2 GHz Mutiple Core
Proper configuration for 50 Administrators
Disk System: RAID system with at least 3GB of space
Internal memory: > 6GB
CPU: > 2GHz Quad Core
Proper configuration for 100 Administrators
Disk System: RAID system with at least 5GB space
Internal memory: > 12GB
CPU: > 3 GHz Quad Core
Add some other Easit products to your installation
Easit Add-On Modules™
Web-based modules for increased functionality – put together a system that suits your business.
Easit Self Service™
Let your customers and employees register deviations and improvement suggestions through our self-service portal.
Integrate Easit’s products
with your existing systems.
Easit product philosophy
Easy to use
All Easit’s products are easy to implement and use. Many features can be configured by our customers.
Easit offers all customers an efficient training of the system. Customers can then manage, administer and configure the software on their own.
Our products are licensed per company and manager. The number of end users is therefore unlimited.
Buy or rent
Choose whether you want to rent the software as a cloud service or purchase the software and take care of operation yourself.