Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Business requirement checklist

504 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Business requirement checklist

  1. 1. Business Requirement Checklist (BRC) Project Name Date INSERT COMPANY LOGO
  2. 2. Page 2 of 6 DOCUMENT CONTROL Document Version History Date Author Version Change Reference Document Owner Name Department Email Contact # Document Purpose Purpose User Community The purpose of this document is to confirm the business requirements for the <Name> project within the <Name> deparment. This document provides a checklist of identified requirements that will be used as inputs to a detailed Business Requirement Document. <NAME>, Analysts
  3. 3. Page 3 of 6 Table of Contents DOCUMENT CONTROL........................................................................................................................2 BUSINESS REQUIREMENT CHECKLIST ..................................................................................................4 BR1.0.0 - DATA MANAGEMENT ......................................................................................................................4 BR2.0.0 - INFORMATION SECURITY ..................................................................................................................5 NOTES ...............................................................................................................................................6
  4. 4. Page 4 of 6 BUSINESS REQUIREMENT CHECKLIST BR1.0.0 - DATA MANAGEMENT Provide a common platform to manage data. The platform can: Priority 1  Create backup and recovery structures to mitigate data loss disasters from hardware failures, fire, flood, etc.  Allow for the sharing and collaboration of data between different users (Clarify whether check in check out policies needed)  Enforce security access and protect confidential information based on security permissions by security group  Accept multiple software file types (i.e. FEMAP, NASTRAN, AQWA, NASTRAN, AQWA)  Enable access to analysis software requiring different license schemes  Allow an unlimited number of file downloads/uploads  Two factor authentication to access storage area  Centralize, store and archive all files (including terabytes of data)  Perform Drag and Drop functionality Priority 2  Provide an audit trail of all user activity  Accommodate file downloads to preapproved locations  Optimize the performance of data uploaded and downloaded from any location  Set reminders to notify users of unused data sets on local machines Actors <NAME> <NAME>
  5. 5. Page 5 of 6 BR2.0.0 - INFORMATION SECURITY Prevent security breaches, data vulnerability and unauthorized access to the following:  Active drawings saved to hard drives  Hard copy drop-offs or cd's  Customer or <NAME>' FTP sites  Advanced Analysis data  Application (uploads and downloads)  3rd Party Project Collaboration Portals  Emails Actors <name> <NAME>
  6. 6. Page 6 of 6 NOTES NOTE ID DESCRIPTION 1 2 3

×