Identity & role control
Every action requires verified identity, role permissions, and two-person approval for sensitive steps.
Mfumo huu unaunganisha auditors, taasisi, suppliers, field inspectors, oversight bodies, citizen complaints na public transparency summary katika workflow moja inayorekodi kila hatua.
Score inapanda evidence ikitimia, COI ikipungua, na procurement pattern zinapokuwa safi.
Every action requires verified identity, role permissions, and two-person approval for sensitive steps.
Invoices, tenders, photos, delivery notes, GPS checks and approvals are stored before any conclusion.
The system ranks risky transactions using pricing variance, supplier history and missing documents.
Every edit, upload, approval, rejection and escalation creates an immutable accountability log.
Assigned to Auditor Amina • ATZ-2026-001
PCCB referral package generated
Auditors, suppliers and approving officers are checked for relationship, repeated patterns and risky overlaps.
Departments are compared by unit price, supplier concentration, emergency procurement and delayed evidence.
Changes do not overwrite history; they create a new version with user, time, reason and approval trail.
Sensitive evidence remains protected, while citizens can see non-confidential audit progress and outcomes.
Demo hii inaweza kuendelezwa kuwa Laravel/PHP, Node.js au Python backend yenye database, authentication, evidence upload, risk engine na dashboards za auditors, admin na public transparency.