File size: 16,676 Bytes
53aae8e
655e14b
 
 
c86cf3c
0933a90
 
 
 
 
 
 
 
 
 
 
 
 
 
f0b3dfb
5000c5e
 
 
f0b3dfb
5000c5e
 
 
798642f
 
20299ea
 
798642f
20299ea
 
dea5935
798642f
dea5935
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
,question,answer
0,Policy Search,Login to the application with valid credentials. Verify user is navigated to the search screen successfully. Enter the valid search criteria and click on search. Search results should be displayed on the screen successfully.
1,Policy Creation from Underwriting workbench,"On receiving the request from customers the insurance agent will mail the customer details to the FD. FD will update all the details in the admin system like insurer, reinsured, broker, coverage, LOB etc and submission id is generated out of it and is flown into the underwriting system. In Underwriting system the request review and risk assessment are done with the help of experienced risk engineers and the details are sent to admin system. Through admin system data is passed to costing system where premium calculation is carried out. Post premium calculation quote is generated and shared with the customer. Once customer acknowledges the quote the policy is generated and is in inforce. From document system policy document is generated and mailed to the customer."
2,Policy Decline from Insurer,If any fraudulent actions are verified by risk engineer then the submission id gets turned down in underwriting system. Equivalent policy in admin system also gets rejected.
3,Policy rejection from customer,"On receiving the request from customer the insurance agent will mail the customer details to the FD. FD will update all the details in the admin system like insurer, reinsured, broker, coverage, LOB etc and submission id is generated out of it and is flown into the underwriting system. In Underwriting system, the request review and risk assessment are done with the help of experienced risk engineers and the details are sent to admin system. In Underwriting system, the request review and risk assessment are done with the help of experienced risk engineers and the details are sent to admin system. Post premium calculation, quote is generated and shared with the customer. Customer might not accept the quote incase of various reasons i.e., Premium too high or insufficient cover etc. Then the policy is turned down and the closed policy document is shared with the customer."
4,Policy Creation,"Pre Requisites: Sufficient Access to the Application. Login to the application with valid credentials. Verify user is navigated to the application home page. Verify the fields are displayed as per the expected criteria. Verify user is able to edit the fields. Verify user is able to enter the Premium values for the Policy. Verify user is able to enter the required Share % for the Policy. Verify user is able to add corresponding Deductions to the Policy. Verify user is able to add corresponding taxes to the Policy. Verify user is able to select the Respective category required for the Policy. Verify user is able to select the applicable coverages required for the Policy. Verify the Premium Total is calculated by considering the Share , Deductions and Taxes. Verify the respective error messages for mandatory fields in case the user kept the fields blank. Verify the Policy."
5,Copy Policy,Verify user is navigated to the application home page. Open any existing policy. Verify if copy option is available for the user to copy the policy. Click on copy policy. Validation of popup message for confirmation. Validation of the fields getting copied to the policy.
6,Terror Policy,Login to the application with valid credentials. Verify user is navigated to the application home page. Open any existing policy. Verify if Terror option is available for the user. Click on terror line. Validation of popup message for confirmation. Validation of the fields getting copied to the policy.
7,Policy Cancellation,Pre Requisites: Sufficient Access to the Application. An Existing Policy should be available to make the cancellation. Open the Policy mentioned as per the Pre requisite 2. Verify the Policy is in Verified Status and user is not able to edit any changes. Verify the option for Policy Cancellation is present. Cancel the Policy by Providing the Cancellation Effective date and Cancellation Reason. Verify the Refund Premium calculation in case the Policy is cancelled before the End Date of the existing Policy and the Premium is paid. Verify the Premium Due calculation in case the Policy is cancelled after the End Date of the existing Policy and the Premium is due. Verify the Cancelled status is reflected in the Policy including the Premium Refund or Due status whichever is applicable.
8,Policy Deletion,Pre Requisites: Sufficient Access to the Application. An Existing Policy should be available to delete. Open the Policy mentioned as per the Pre requisite 2. Verify the option for Policy delete is present. Click on Delete option. Validation of popup message for confirmation. Verify the policy is deleted after clicking on OK.
9,Policy Endorsements,Pre Requisites: Sufficient Access to the Application. An Existing Policy should be available to make the changes. Open the Policy mentioned as per the Pre requisite 2. Verify the Policy is in Verified Status and user is not able to edit any changes. Verify the option for Policy Endorsement is Present. Endorse the Policy by making changes and Finish. Verify the changes are reflecting correctly in the Policy. Verify the Endorsement Status is reflected in the Policy.
10,Policy Renewal,Pre Requisites: Sufficient Access to the Application. An Expired Policy should be available to make the Renewal. Open the Policy mentioned as per the Pre requisite 2. Verify the Policy Status is expired. Verify the option for Policy Renewal is present. Renew the Policy by providing new Start date and End date. Verify the Premium Calculations are based on the new dates provided. Verify the Policy status is updated after Renewal.
11,Document Generation,Pre Requisites: Sufficient Access to the Application. Open a policy. Click on the document screen. Select the document to be generated. Click on generate button.
12,Document Validation,"Open the generated document either in word or PDF. Verify the document that to be in the format of specification document given by business. Validate the document for the static content. Validate the format, spacing, spelling, font size, data displayed to be correct as expected. Validate the dynamic data flown from policy. Verify the dynamic values entered is flown same into the document. If special characters, numbers, alphabets and email formats are given then also the document should the business standards."
13,Add Form,Open a package. Click on Add form button. Select the applicable form to be added. Click on add button.
14,Add Manuscript,Open a package. Click on Add manuscript button. Enter the description. Click on add button.
15,Upload attachment,Open a package. Click on upload attachment button. Enter the description value. Click on chose file and select file from local. Click on add.
16,Finalize Document,Open a package. Select all the forms. Click on generate. Click on merge. Click on finalize.
17,Deactivate Package,Open a package. Click on Deactivate package button. Select a reason and click on deactivate.
18,Non text content should have a text alternative that serves the equivalent purpose.,"Open the web application in the browser. Check the web application for non-text content, such as images. Ensure each piece of non-text content has an associated text alternative. Verify Decorative Images."
19,"For all pre-recorded audio-only and video-only content, provide a text transcript for audio-only presentations, and a text transcript or audio track for video-only presentations.",Launch the web application in the browser. Verify that captions and or text transcripts is available for audio only content of pre-recorded audio-only and video-only content. Verify that audio track is available for video only presentations.
20,Provide captions for all pre-recorded media content.,"Open the application in the browser. Verify if the web application contains live or recorded video content, ensure this content is captioned."
21,"Provide captions for all synchronized media containing live (real time) audio (e.g. teleconferences, gameplay). Synchronized media content that is also made available under general license to other companies (for example, television shows, sports events) is not covered by this requirement unless the content comes accompanied with captions under the terms of the license.","Launch the web application in the browser. Verify if the web application streams synchronized media containing live (real time) audio (e.g., live product announcements or teleconferences), Ensure that captions are available."
22,Provide audio descriptions for all new pre-recorded media content.,"Open the web application in the browser. If the web application contains live or recorded video content, ensure video description/descriptive narration/audio tracks is available as an alternative."
23,"Ensure that information and relationships that are implied by visual or auditory formatting are preserved when the presentation format changes. For any product, service, tool or content, functionality and navigation of the content and user interface (UI) components must be programmatically exposed and operable.","Open the web application in the browser. Ensure that any visual information on the page can be obtained through auditory means, or by reading the text present on the page. Ensure all audible information on the page is also available in a visual format. Verify if the web application contains tables, ensure all table row/column headers use the <th> tag. Row headers require the scope=""row"" attribute, and column headers require the scope=""col"" attribute. To verify table properties take help of JAWS and verify table specific keystrokes provided for screen reader."
24,Ensure content is rendered in the proper order. ,"Open the web application in the browser. Check the web application for sections of content whose meaning is affected by the order materials are rendered in (i.e., a paragraph of text, a table or an ordered list). Use a screen reader  to navigate the page. Ensure that the order-dependent sections of data are presented in an order which does not change or confuse their meaning. (i.e., a table or numbered list which reads items out of order or a section of text which is interrupted by the screen reader reading unrelated content partway through)."
25,"Ensure instructions do not rely solely on sensory characteristics.  Sensory characteristics include shape, location, size, orientation, and sound.","Open the web application in the browser. Verify any instructions presented in the web application do not rely solely on sensory characteristics, including sound and the shape, location, size, and orientation of objects. (i.e., do not  use phrases like 'click the link below' , or distinguish between two links by the shape of their graphics). Verify that text alternative should be provided to the element which convey information only through shape and layout. Ex: floppy icon used for save functionality does not provide complete information, text alternative such as 'Save' tool tip, or text embedded inside the floppy element would resolve the issue."
26,"Do not use color in a way that requires the user to discriminate between hues as the only means to convey information, indicate an action, prompt a response, or distinguish a visual element.","Open the web application in the browser. Verify color is never used as the sole means to indicate an action, distinguish a page element or convey a piece of information. (i.e., do not use green and red text to indicate good vs. bad practices, or distinguish links from one another by color alone)."
27,"When audio plays automatically (not initiated by the user) for more than 3 seconds, provide a way for users to pause or stop the audio, or to adjust the volume.","Open the web application in the browser. Check for audio elements that play for at least 3 seconds without user input. For each such element, Verify the user can pause/stop the video or adjust the volume. These controls must be reachable and usable via keyboard."
28,"By default, visible text must have a minimum luminosity contrast ratio of 4.5:1 against the background.",Open the web application in the browser. Verify all small scale visible text (below 18 point regular/14 point bold) has a brightness ratio of at least 4.5:1 a with its background. Verify all large scale text (18 point/14 point bold) has a text/background brightness ratio of at least 3:1.
29,Ensure text can be resized.,"Open the web application in the browser. Verify that text can be resized up to 200% of its default size without the use of assistive technology. Use Zoom option in IE browser settings/ can be done by Control ++ through keyboard. Verify resizing text does not interfere with the content visibility or functionality (i.e., elements enlarging so they overlap each other, elements getting pushed out of frame). Verify scrollbars are provided wherever text size is increased to accommodate zoom% and they are accessible through keyboard and also ensure focus indicator is also visible in increased zoom mode."
30,"Ensure text is used instead of images of text when technology allows, unless it is essential. Logotypes (text that is part of a logo or brand name) are considered essential and thus can remain images.","Open the web application in the browser. Verify all text on the page is real text, as opposed to images of text. An exception can be made if an image of text is used in a logo or brand name. Verify any logo/brand name images of text have alt text which provides all information the image of text contains."
31,Ensure that users can move focus out of a control by using a method consistent with the method used to move focus into the control. Ensure keyboard focus is not trapped.,"Verify the browser's focus does not become trapped in any element or jump to unexpected page areas during this navigation. Try all the below before confirming it�s a keyboard Trap Forward Navigation, Backward Navigation, Esc."
32,"For any feature that requires users to complete an action within a set period of time, provide a way for people to disable or adjust the time limit (e.g., by increasing the time limit by a minimum of 10 times the default limit). Exceptions include activities where time limits are essential for security or real-time activities, such as gameplay or a live auction.","Open the web application in the browser. Check for elements that require the user to complete an action within a set time limit (i.e., an exam with a 2 hours time limit, or a script which logs users out after 5 idle minutes). Verify that the user can turn off the time limits or extend them to at least ten times their default duration. This includes the ability to extend duration mid-activity. (i.e., a warning modal should appear if a secure session is nearing expiration, with a button that extends the session and closes the modal)."
33,"Ensure that any auto updating content that starts automatically and is provided with other content provides a method for users to pause, stop, hide, or to control the frequency of the update.","Open the web application in the browser. Check for visual elements which update or refresh automatically without user input (i.e., auto scrolling carousels, auto play videos, chat windows which update when new messages come in). Verify that the user can stop or control update/refresh frequency with a pause button or similar control. These controls must be reachable and usable via keyboard."
34,"Do not create hardware, content, products, services, or tools that are likely to cause seizures due to UI or content that flashes at a rate greater than 3 times per second.","Open the web application with a browser. Check the web application for videos or blinking/flashing content. Verify If any such content is found, use the Photosensitive Epilepsy Analysis Tool (PEAT) to ensure visual content blinks 3 or fewer times per second."
35,"Expose visual groupings and the semantic structure of controls and content programmatically so that users can identify and navigate to, or through, them. Additionally, provide ways for users to activate, or navigate directly to, controls and content with as few interactions as possible (for example, they can bypass UI elements by using keyboard shortcuts or link to content links).",Open the web application in the browser. Identify repetitive elements on the page. Verify that user can bypass these repetitive blocks of content and controls using navigational elements.