Beruflich Dokumente
Kultur Dokumente
NO CHECKLIST
Usability
Browser Support, screen locking & screen back/forward support
Reliability
Complete or partial loss of the module ability to perform a business
operation.
Recoverability
Plans to have a Continuity of Operations.
Data Backup/Restore
If the hardware, data, and onsite backup are destroyed, Where backup
copies of the system and data held within it, will be stored?
Availability
System availability is the time when the application must be available for
use. Required system availability is used in determining when maintenance
may be performed.
Performance
What is the response time for reports, queries, and updates?
what is the total number of user sessions open for the entire application?
What is the total amount of idle time before the user session is forced to
terminate?
Acceptable Transaction Response Times – peak
Data Retention
Data Retention details the length of time that various data will be retained
in the system.
Capacity
Anticipated Number of Users
Security
Protection for sensitive information
Internationalization
Multi-lingual implementation of application module
EXAMPLE COMPLY
Storage location of system data in order to deal with any failure. E.g.
backup servers.
Defining peak and non-peak hours, this will help in organizing system
maintenance activity whenever required and least impacting any business
process.
e.g. The time frame of audit logs to be available for view in the system,
after stipulated time frame such data will be migrated and stored in
separate location.
How many users will use the application or a particular module? E.g. 2000
users will use the application.
How many concurrent users will be using the application module at same
time? E.g 1000 users will be using the application simulatenously.
How many Locations or terminals will be using the application? E.g. 200
terminals will be using the application 10 at Bogota, 10 in cali.
How many daily transactions can happen from a terminal using the
particualr module of an application? E.g 2000 packets reception, 1000
packets legalization etc.
Dictate protection for sensitive information. Some types of privacy
requirements include: data encryption for database tables, policies
regarding the transmission of data to 3rd parties, Data Security,Encryption
Requirements
Any privacy policy that need to be mentioned, for e.g. all the details
mentioned at the back side of Guias as privacy & guidelines.
The use of authentication of application from LDAP or any other security
framework.