2. Page 2 of 6
DOCUMENT CONTROL
Document Version History
Date Author Version Change Reference
Document Owner
Name Department Email Contact #
Document Purpose
Purpose User Community
The purpose of this document is to confirm the business
requirements for the <Name> project within the <Name>
deparment. This document provides a checklist of identified
requirements that will be used as inputs to a detailed Business
Requirement Document.
<NAME>, Analysts
3. Page 3 of 6
Table of Contents
DOCUMENT CONTROL........................................................................................................................2
BUSINESS REQUIREMENT CHECKLIST ..................................................................................................4
BR1.0.0 - DATA MANAGEMENT ......................................................................................................................4
BR2.0.0 - INFORMATION SECURITY ..................................................................................................................5
NOTES ...............................................................................................................................................6
4. Page 4 of 6
BUSINESS REQUIREMENT CHECKLIST
BR1.0.0 - DATA MANAGEMENT
Provide a common platform to manage data. The platform can:
Priority 1
Create backup and recovery structures to mitigate data loss disasters from hardware failures,
fire, flood, etc.
Allow for the sharing and collaboration of data between different users (Clarify whether check in
check out policies needed)
Enforce security access and protect confidential information based on security permissions by
security group
Accept multiple software file types (i.e. FEMAP, NASTRAN, AQWA, NASTRAN, AQWA)
Enable access to analysis software requiring different license schemes
Allow an unlimited number of file downloads/uploads
Two factor authentication to access storage area
Centralize, store and archive all files (including terabytes of data)
Perform Drag and Drop functionality
Priority 2
Provide an audit trail of all user activity
Accommodate file downloads to preapproved locations
Optimize the performance of data uploaded and downloaded from any location
Set reminders to notify users of unused data sets on local machines
Actors
<NAME>
<NAME>
5. Page 5 of 6
BR2.0.0 - INFORMATION SECURITY
Prevent security breaches, data vulnerability and unauthorized access to the following:
Active drawings saved to hard drives
Hard copy drop-offs or cd's
Customer or <NAME>' FTP sites
Advanced Analysis data
Application (uploads and downloads)
3rd
Party Project Collaboration Portals
Emails
Actors
<name>
<NAME>