business requirement checklist
TRANSCRIPT
Business Requirement Checklist(BRC)
Project NameDate
INSERT COMPANY LOGO
DOCUMENT CONTROL
Document Version History
Date Author Version Change Reference
Document Owner
Name Department Email Contact #
Document Purpose
Purpose User Community
The purpose of this document is to confirm the business requirements for the <Name> project within the <Name> deparment. This document provides a checklist of identified requirements that will be used as inputs to a detailed Business Requirement Document.
<NAME>, Analysts
Page 2 of 6
Table of Contents
DOCUMENT CONTROL..........................................................................................................................2
BUSINESS REQUIREMENT CHECKLIST....................................................................................................4
BR1.0.0 - DATA MANAGEMENT.....................................................................................................................4BR2.0.0 - INFORMATION SECURITY.................................................................................................................5
NOTES..................................................................................................................................................6
Page 3 of 6
BUSINESS REQUIREMENT CHECKLIST
BR1.0.0 - DATA MANAGEMENT
Provide a common platform to manage data. The platform can:
Priority 1 Create backup and recovery structures to mitigate data loss disasters from hardware failures,
fire, flood, etc.
Allow for the sharing and collaboration of data between different users (Clarify whether check in check out policies needed)
Enforce security access and protect confidential information based on security permissions by security group
Accept multiple software file types (i.e. FEMAP, NASTRAN, AQWA, NASTRAN, AQWA)
Enable access to analysis software requiring different license schemes
Allow an unlimited number of file downloads/uploads
Two factor authentication to access storage area
Centralize, store and archive all files (including terabytes of data)
Perform Drag and Drop functionality
Priority 2 Provide an audit trail of all user activity
Accommodate file downloads to preapproved locations
Optimize the performance of data uploaded and downloaded from any location
Set reminders to notify users of unused data sets on local machines
Actors
<NAME>
<NAME>
Page 4 of 6
BR2.0.0 - INFORMATION SECURITY
Prevent security breaches, data vulnerability and unauthorized access to the following:
Active drawings saved to hard drives
Hard copy drop-offs or cd's
Customer or <NAME>' FTP sites
Advanced Analysis data
Application (uploads and downloads)
3rd Party Project Collaboration Portals
Emails
Actors
<name>
<NAME>
Page 5 of 6
NOTES
NOTE ID
DESCRIPTION
123
Page 6 of 6