Deputy Controller Examination

Health Science | Engineering

Full Time



As per Qualification & Experience




Master Degree

No. of Vacancies



5 Years +

Job Level


Job Description

Responsibilities & Duties:

Following principles needs to be considered by Deputy Controller Examinations.

  • The examination process, which is inherently stressful, should be managed in such a way as to minimize extraneous sources of confusion and uncertainty
  • The examination environment in which examinations are conducted should be one in which students are able to concentrate, reflect and generally demonstrate what they have learned, with a minimum of disruption and distraction
  • The integrity of the examination process may depend upon the willingness of everyone involved to respect some basic rules of conduct and to accept certain responsibilities, and to do so in a consistent manner
  • Every effort should be made to ensure that the responsibilities, rules of conduct and regulations governing the administration of examinations are well published so that the responsibilities of students, invigilators, Head of Departments and the University as a whole are clearly understood before the start of examinations
  • Suggest action under student code of conduct in cases where the examination policy is breached, whether by cheating, disruptive behaviour, or in any other way

Make every effort to ensure that examination room are:

a. Quiet and free from unnecessary and unreasonable disruption

b. Suitable in terms of temperature, work space and cleanliness

c. Provide students well before the examinations period with clear information of exams, locations, time and length


  • Identify and notify leading dates at the beginning of each semester
  • Contact the external examiners where necessary
  • Coordinate with head of departments to get examination papers at least 15 days before the commencement of the examinations
  • Checking examination papers from contents, grammar and spelling errors
  • Sending draft examination papers to external examiners where necessary
  • Make arrangements for printing of papers
  • Develop and notify the date sheet for the examination of various disciplines
  • Arrange invigilation schedules for the examinations
  • Agree and arrange marking schedule with course coordinators
  • Receive marked scripts from the markers and final checking of marks
  • Prepare and enter the final result into computer
  • Discussion of result with concerned faculty members
  • Make sure that all process of the examination papers, marking, editing, computer entry is confidential/secret
  • Issue the result transcripts to the students
  • Make sure that all the record of the examinations is safe with no access to unauthorized persons
  • Apply checks under which no person can change the results/marks
  • Adequate authentication and authorization functions must be provided, commensurate with appropriate use and acceptable level of risk
  • Appropriate controls must be employed to protect physical access to resources/computers, commensurate with the identified level of acceptable risks
  • Application must be designed and computers must be used so as to protect the privacy and confidentiality of the various types of electronic data they process or store
  • Users who are authorized to obtain data must ensure that it is protected to the extent required after they obtain it. For example, when sensitive date (examination results) is transferred from a well secured main frame system to a users’ location, adequate security measures must be in place at the destination computer to protect this slow stream data
  • Adequate checks may be applied to ensure the authenticity of data to avoid any change at any stage
  • The prints discarded from the sensitive data should not be placed in dust bin but should be destroyed through a shredder
  • The entry of the unauthorized persons should be prohibited in the room where the examination system has been installed
  • The data entry should be carried out by responsible persons and necessary checks should be applied for the safety of the data
  • Access to electronic record system should be managed by unique passwords issued to individuals
  • Passwords must not be shared, nor to be written down on visible place
  • Security software should enforce random style passwords (e.g. minimum of eight characters, to include numbers, mixed case letters and special characters)
  • Passwords should be changed on regular intervals
  • It will be appropriate for edit/access logs to be set up with in electronic systems, so that data editing and system access activities can be traced to individual members of staff
  • Access to data processing machine/server should be strictly controlled, with access restricted by keys distributed only to relevant staff
  • Electronic data, whether held on PC or server or mainframe technology should be backed up regularly
  • Electronic system should be secured, as far as possible against virus corruption. All PCs and terminal and mainframe should run anti-virus software that regularly scans from infection
  • Electronic system should also be secured against backing
  • Interfering with, tampering with or disrupting with resources and data
  • Intentionally transmitting any computer virus or other malicious software
  • Attempting to access, accessing, or exploiting resources which are not authorized to access
  • Knowingly enabling inappropriate levels of access or exploitation of resources by others
  • Downloading sensitive or confidential electronic data/information to computer that is not adequately configured to protect it from unauthorized access
  • Disclosing any information/data which is otherwise secret.


MS/MPhil/Master’s or equivalent with minimum 5 years relevant experience in a University


Recent Jobs

QEC Officer

Last Date: 04-Dec-21

Data Analyst

Last Date: 04-Dec-21

Manager TQM

Last Date: 04-Dec-21