SlideShare a Scribd company logo
1 of 1
Download to read offline
How to Identify and Develop Valuable Business Rules for Advanced Products
Business Policies
Behavioural
Rules
Business Rules
Structural
Rules
P.E.S.T.L.E.
Factors
Business
Strategy
Customer
Feedback
Foundational
Rules of Data
Structure
Example: Each customer is
allowed 10 credits per month
Example: The widget application number is a global
unique identifier for the widget applicant process
Note: Constraints which are not
imbedded in rules
Copyright© Stephen Downer, Down2BAskills Inc. 2020 Inspired By CISSP resources, Covey’s 7 Habits, www.scrumalliance.org and www.iiba.org
Structure of Org
Knowledge
Definitions
Calculations Inferred Rules
Structure of Org
Knowledge
Definitions
Calculations Inferred Rules
Process Flows
Inferences
Event Condition
Actions
Guidelines
Decisions
Constraints
Core Principles
Assumptions
Technical
Constraints
Business
Constraints
Assumptions
Technical
Constraints
Business
Constraints
Be Proactive
Begin with the End in Mind
Prioritize; Put First Things First
Think Win-Win
Seek to Understand as 1st
Step
Collaborate & Calibrate
Balance Agility & Compliance
Simplify Complexity if Possible
Confidentiality (i.e. Security)
Integrity (i.e. Security)
High Availability/Performance
Digitize Trust If Possible
Automate If Possible
Continuous Delivery
Continuous Improvement
High Quality
• Political
• Economic
• Social
• Technological
• Legal
• Environmental
• a.k.a. Operative Business Rules
• Enforced as a matter of policy
• Govern behaviour
• Must be possible to violate
• Help determine when something is true or not
• Govern organizational knowledge
• Describe how information may be interpreted or
calculated based on other available data
• A calculation = a transactional rule
Limited to rules that make up
foundational data structure

More Related Content

Similar to How to develop valuable business rules for advanced products

Cash Management Strategies During Economic Turmoil Aicpa
Cash Management Strategies During Economic Turmoil AicpaCash Management Strategies During Economic Turmoil Aicpa
Cash Management Strategies During Economic Turmoil Aicpaguest8f464d
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chaukeMayk Campelo
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategyMaarten BOONEN
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Developing a business case for intranet investment and measuring ROI
Developing a business case for intranet investment and measuring ROIDeveloping a business case for intranet investment and measuring ROI
Developing a business case for intranet investment and measuring ROIIntergen
 
Developing an IT Scorecard Using the Balanced Scorecard Approach
Developing an IT Scorecard  Using the Balanced Scorecard ApproachDeveloping an IT Scorecard  Using the Balanced Scorecard Approach
Developing an IT Scorecard Using the Balanced Scorecard ApproachSenaka Ariyasinghe
 
What is business analysis - Slideshare
What is business analysis  - SlideshareWhat is business analysis  - Slideshare
What is business analysis - SlideshareInvensis Learning
 
Making Money Out of Data
Making Money Out of DataMaking Money Out of Data
Making Money Out of DataDigital Vidya
 
Data Warehouse - a Fit-For-Purpose Approach
Data Warehouse - a Fit-For-Purpose ApproachData Warehouse - a Fit-For-Purpose Approach
Data Warehouse - a Fit-For-Purpose ApproachJohn Bao Vuu
 
Enterprise Business Intelligence From Erp Systems V3
Enterprise Business Intelligence From Erp Systems V3Enterprise Business Intelligence From Erp Systems V3
Enterprise Business Intelligence From Erp Systems V3guest3be51a
 
Ten top tips to successfully grow your business
Ten top tips to successfully grow your businessTen top tips to successfully grow your business
Ten top tips to successfully grow your businessAnthonyCasey
 
2014.01.30 Innovation overview by Glenn Wintrich
2014.01.30 Innovation overview by Glenn Wintrich2014.01.30 Innovation overview by Glenn Wintrich
2014.01.30 Innovation overview by Glenn WintrichNUI Galway
 
What CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data GovernanceWhat CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data GovernanceDATAVERSITY
 
Cash Management Strategies During Economic Turmoil_AICPA
Cash Management Strategies During Economic Turmoil_AICPACash Management Strategies During Economic Turmoil_AICPA
Cash Management Strategies During Economic Turmoil_AICPABob Tormey, CPA, CTP, CIRA
 
Introduction to the Decision Model - Larry Goldberg
Introduction to the Decision Model - Larry GoldbergIntroduction to the Decision Model - Larry Goldberg
Introduction to the Decision Model - Larry GoldbergIIBA UK Chapter
 
Business Intelligence Challenges 2009
Business Intelligence Challenges 2009Business Intelligence Challenges 2009
Business Intelligence Challenges 2009Lonnell Branch
 
Inside The Buyers Head Tim Clark May 4
Inside The Buyers Head   Tim Clark May 4Inside The Buyers Head   Tim Clark May 4
Inside The Buyers Head Tim Clark May 4SIIA12
 
Webinar Bowles
Webinar BowlesWebinar Bowles
Webinar Bowlesrsuthar
 

Similar to How to develop valuable business rules for advanced products (20)

Cash Management Strategies During Economic Turmoil Aicpa
Cash Management Strategies During Economic Turmoil AicpaCash Management Strategies During Economic Turmoil Aicpa
Cash Management Strategies During Economic Turmoil Aicpa
 
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke2  -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
2 -governanca_de_tic_-_uma_visao_do_mercado_gartner_-_claudio_chauke
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Developing a business case for intranet investment and measuring ROI
Developing a business case for intranet investment and measuring ROIDeveloping a business case for intranet investment and measuring ROI
Developing a business case for intranet investment and measuring ROI
 
Developing an IT Scorecard Using the Balanced Scorecard Approach
Developing an IT Scorecard  Using the Balanced Scorecard ApproachDeveloping an IT Scorecard  Using the Balanced Scorecard Approach
Developing an IT Scorecard Using the Balanced Scorecard Approach
 
What is business analysis - Slideshare
What is business analysis  - SlideshareWhat is business analysis  - Slideshare
What is business analysis - Slideshare
 
Sas business analytics
Sas   business analyticsSas   business analytics
Sas business analytics
 
Making Money Out of Data
Making Money Out of DataMaking Money Out of Data
Making Money Out of Data
 
Data Warehouse - a Fit-For-Purpose Approach
Data Warehouse - a Fit-For-Purpose ApproachData Warehouse - a Fit-For-Purpose Approach
Data Warehouse - a Fit-For-Purpose Approach
 
Overcome barriers to good req mgmt
Overcome barriers to good req mgmtOvercome barriers to good req mgmt
Overcome barriers to good req mgmt
 
Enterprise Business Intelligence From Erp Systems V3
Enterprise Business Intelligence From Erp Systems V3Enterprise Business Intelligence From Erp Systems V3
Enterprise Business Intelligence From Erp Systems V3
 
Ten top tips to successfully grow your business
Ten top tips to successfully grow your businessTen top tips to successfully grow your business
Ten top tips to successfully grow your business
 
2014.01.30 Innovation overview by Glenn Wintrich
2014.01.30 Innovation overview by Glenn Wintrich2014.01.30 Innovation overview by Glenn Wintrich
2014.01.30 Innovation overview by Glenn Wintrich
 
What CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data GovernanceWhat CDOs Need to Know: Foundations of Data Governance
What CDOs Need to Know: Foundations of Data Governance
 
Cash Management Strategies During Economic Turmoil_AICPA
Cash Management Strategies During Economic Turmoil_AICPACash Management Strategies During Economic Turmoil_AICPA
Cash Management Strategies During Economic Turmoil_AICPA
 
Introduction to the Decision Model - Larry Goldberg
Introduction to the Decision Model - Larry GoldbergIntroduction to the Decision Model - Larry Goldberg
Introduction to the Decision Model - Larry Goldberg
 
Business Intelligence Challenges 2009
Business Intelligence Challenges 2009Business Intelligence Challenges 2009
Business Intelligence Challenges 2009
 
Inside The Buyers Head Tim Clark May 4
Inside The Buyers Head   Tim Clark May 4Inside The Buyers Head   Tim Clark May 4
Inside The Buyers Head Tim Clark May 4
 
Webinar Bowles
Webinar BowlesWebinar Bowles
Webinar Bowles
 

More from Steve Downer

Generic family weekly steam learning activities v2.0
Generic family weekly steam learning activities v2.0Generic family weekly steam learning activities v2.0
Generic family weekly steam learning activities v2.0Steve Downer
 
The Future of Global Business and Trade is Digitized Trust
The Future of Global Business and Trade is Digitized TrustThe Future of Global Business and Trade is Digitized Trust
The Future of Global Business and Trade is Digitized TrustSteve Downer
 
Pandemic Root Cause Analysis & Process Improvement Tool™
Pandemic Root Cause Analysis & Process Improvement Tool™Pandemic Root Cause Analysis & Process Improvement Tool™
Pandemic Root Cause Analysis & Process Improvement Tool™Steve Downer
 
Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...
Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...
Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...Steve Downer
 
Rapid Aqua Life Save® Client Journey Map
Rapid Aqua Life Save®  Client Journey MapRapid Aqua Life Save®  Client Journey Map
Rapid Aqua Life Save® Client Journey MapSteve Downer
 
The Future of Cryptocurrency: From Brexit to Post Quantum Cryptography
The Future of Cryptocurrency: From Brexit to Post Quantum CryptographyThe Future of Cryptocurrency: From Brexit to Post Quantum Cryptography
The Future of Cryptocurrency: From Brexit to Post Quantum CryptographySteve Downer
 
Communitech app factory submission finalist steve downer_sept 2011
Communitech app factory submission finalist steve downer_sept 2011Communitech app factory submission finalist steve downer_sept 2011
Communitech app factory submission finalist steve downer_sept 2011Steve Downer
 
The Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaSThe Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaSSteve Downer
 

More from Steve Downer (8)

Generic family weekly steam learning activities v2.0
Generic family weekly steam learning activities v2.0Generic family weekly steam learning activities v2.0
Generic family weekly steam learning activities v2.0
 
The Future of Global Business and Trade is Digitized Trust
The Future of Global Business and Trade is Digitized TrustThe Future of Global Business and Trade is Digitized Trust
The Future of Global Business and Trade is Digitized Trust
 
Pandemic Root Cause Analysis & Process Improvement Tool™
Pandemic Root Cause Analysis & Process Improvement Tool™Pandemic Root Cause Analysis & Process Improvement Tool™
Pandemic Root Cause Analysis & Process Improvement Tool™
 
Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...
Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...
Wireframes, Mockups and Prototyping: Beyond 2D Web Page/App and Towards a 3D ...
 
Rapid Aqua Life Save® Client Journey Map
Rapid Aqua Life Save®  Client Journey MapRapid Aqua Life Save®  Client Journey Map
Rapid Aqua Life Save® Client Journey Map
 
The Future of Cryptocurrency: From Brexit to Post Quantum Cryptography
The Future of Cryptocurrency: From Brexit to Post Quantum CryptographyThe Future of Cryptocurrency: From Brexit to Post Quantum Cryptography
The Future of Cryptocurrency: From Brexit to Post Quantum Cryptography
 
Communitech app factory submission finalist steve downer_sept 2011
Communitech app factory submission finalist steve downer_sept 2011Communitech app factory submission finalist steve downer_sept 2011
Communitech app factory submission finalist steve downer_sept 2011
 
The Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaSThe Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaS
 

Recently uploaded

Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxJoão Esperancinha
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfTobias Schneck
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Incrobinwilliams8624
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesSoftwareMill
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.Sharon Liu
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptkinjal48
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorShane Coughlan
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeNeo4j
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesShyamsundar Das
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native BuildpacksVish Abrams
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadIvo Andreev
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdfMeon Technology
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageDista
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsJaydeep Chhasatia
 

Recently uploaded (20)

Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptx
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retries
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.ppt
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS Calculator
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security Challenges
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native Buildpacks
 
Salesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptxSalesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptx
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdf
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
 

How to develop valuable business rules for advanced products

  • 1. How to Identify and Develop Valuable Business Rules for Advanced Products Business Policies Behavioural Rules Business Rules Structural Rules P.E.S.T.L.E. Factors Business Strategy Customer Feedback Foundational Rules of Data Structure Example: Each customer is allowed 10 credits per month Example: The widget application number is a global unique identifier for the widget applicant process Note: Constraints which are not imbedded in rules Copyright© Stephen Downer, Down2BAskills Inc. 2020 Inspired By CISSP resources, Covey’s 7 Habits, www.scrumalliance.org and www.iiba.org Structure of Org Knowledge Definitions Calculations Inferred Rules Structure of Org Knowledge Definitions Calculations Inferred Rules Process Flows Inferences Event Condition Actions Guidelines Decisions Constraints Core Principles Assumptions Technical Constraints Business Constraints Assumptions Technical Constraints Business Constraints Be Proactive Begin with the End in Mind Prioritize; Put First Things First Think Win-Win Seek to Understand as 1st Step Collaborate & Calibrate Balance Agility & Compliance Simplify Complexity if Possible Confidentiality (i.e. Security) Integrity (i.e. Security) High Availability/Performance Digitize Trust If Possible Automate If Possible Continuous Delivery Continuous Improvement High Quality • Political • Economic • Social • Technological • Legal • Environmental • a.k.a. Operative Business Rules • Enforced as a matter of policy • Govern behaviour • Must be possible to violate • Help determine when something is true or not • Govern organizational knowledge • Describe how information may be interpreted or calculated based on other available data • A calculation = a transactional rule Limited to rules that make up foundational data structure