Business requirement checklist

297 views
185 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
297
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Business requirement checklist

  1. 1. Business Requirement Checklist (BRC) Project Name Date INSERT COMPANY LOGO
  2. 2. Page 2 of 6 DOCUMENT CONTROL Document Version History Date Author Version Change Reference Document Owner Name Department Email Contact # Document Purpose Purpose User Community The purpose of this document is to confirm the business requirements for the <Name> project within the <Name> deparment. This document provides a checklist of identified requirements that will be used as inputs to a detailed Business Requirement Document. <NAME>, Analysts
  3. 3. Page 3 of 6 Table of Contents DOCUMENT CONTROL........................................................................................................................2 BUSINESS REQUIREMENT CHECKLIST ..................................................................................................4 BR1.0.0 - DATA MANAGEMENT ......................................................................................................................4 BR2.0.0 - INFORMATION SECURITY ..................................................................................................................5 NOTES ...............................................................................................................................................6
  4. 4. Page 4 of 6 BUSINESS REQUIREMENT CHECKLIST BR1.0.0 - DATA MANAGEMENT Provide a common platform to manage data. The platform can: Priority 1  Create backup and recovery structures to mitigate data loss disasters from hardware failures, fire, flood, etc.  Allow for the sharing and collaboration of data between different users (Clarify whether check in check out policies needed)  Enforce security access and protect confidential information based on security permissions by security group  Accept multiple software file types (i.e. FEMAP, NASTRAN, AQWA, NASTRAN, AQWA)  Enable access to analysis software requiring different license schemes  Allow an unlimited number of file downloads/uploads  Two factor authentication to access storage area  Centralize, store and archive all files (including terabytes of data)  Perform Drag and Drop functionality Priority 2  Provide an audit trail of all user activity  Accommodate file downloads to preapproved locations  Optimize the performance of data uploaded and downloaded from any location  Set reminders to notify users of unused data sets on local machines Actors <NAME> <NAME>
  5. 5. Page 5 of 6 BR2.0.0 - INFORMATION SECURITY Prevent security breaches, data vulnerability and unauthorized access to the following:  Active drawings saved to hard drives  Hard copy drop-offs or cd's  Customer or <NAME>' FTP sites  Advanced Analysis data  Application (uploads and downloads)  3rd Party Project Collaboration Portals  Emails Actors <name> <NAME>
  6. 6. Page 6 of 6 NOTES NOTE ID DESCRIPTION 1 2 3

×