SlideShare a Scribd company logo
1 of 6
Business Requirement Checklist
(BRC)
Project Name
Date
INSERT COMPANY LOGO
Page 2 of 6
DOCUMENT CONTROL
Document Version History
Date Author Version Change Reference
Document Owner
Name Department Email Contact #
Document Purpose
Purpose User Community
The purpose of this document is to confirm the business
requirements for the <Name> project within the <Name>
deparment. This document provides a checklist of identified
requirements that will be used as inputs to a detailed Business
Requirement Document.
<NAME>, Analysts
Page 3 of 6
Table of Contents
DOCUMENT CONTROL........................................................................................................................2
BUSINESS REQUIREMENT CHECKLIST ..................................................................................................4
BR1.0.0 - DATA MANAGEMENT ......................................................................................................................4
BR2.0.0 - INFORMATION SECURITY ..................................................................................................................5
NOTES ...............................................................................................................................................6
Page 4 of 6
BUSINESS REQUIREMENT CHECKLIST
BR1.0.0 - DATA MANAGEMENT
Provide a common platform to manage data. The platform can:
Priority 1
 Create backup and recovery structures to mitigate data loss disasters from hardware failures,
fire, flood, etc.
 Allow for the sharing and collaboration of data between different users (Clarify whether check in
check out policies needed)
 Enforce security access and protect confidential information based on security permissions by
security group
 Accept multiple software file types (i.e. FEMAP, NASTRAN, AQWA, NASTRAN, AQWA)
 Enable access to analysis software requiring different license schemes
 Allow an unlimited number of file downloads/uploads
 Two factor authentication to access storage area
 Centralize, store and archive all files (including terabytes of data)
 Perform Drag and Drop functionality
Priority 2
 Provide an audit trail of all user activity
 Accommodate file downloads to preapproved locations
 Optimize the performance of data uploaded and downloaded from any location
 Set reminders to notify users of unused data sets on local machines
Actors
<NAME>
<NAME>
Page 5 of 6
BR2.0.0 - INFORMATION SECURITY
Prevent security breaches, data vulnerability and unauthorized access to the following:
 Active drawings saved to hard drives
 Hard copy drop-offs or cd's
 Customer or <NAME>' FTP sites
 Advanced Analysis data
 Application (uploads and downloads)
 3rd
Party Project Collaboration Portals
 Emails
Actors
<name>
<NAME>
Page 6 of 6
NOTES
NOTE ID DESCRIPTION
1
2
3

More Related Content

What's hot

Software Requirement Specification Master Template
Software Requirement Specification Master TemplateSoftware Requirement Specification Master Template
Software Requirement Specification Master Template
Wayne Chen
 
Sample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library BlogSample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library Blog
ALATechSource
 
Online Shopping Cart Business Requirement Dcoument
Online Shopping Cart Business Requirement DcoumentOnline Shopping Cart Business Requirement Dcoument
Online Shopping Cart Business Requirement Dcoument
H2Kinfosys
 

What's hot (20)

Organizational Operations Document
Organizational Operations DocumentOrganizational Operations Document
Organizational Operations Document
 
Project Business Requirements Document
Project Business Requirements DocumentProject Business Requirements Document
Project Business Requirements Document
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai India
 
Brd template uml-noble_inc
Brd template uml-noble_incBrd template uml-noble_inc
Brd template uml-noble_inc
 
Analysis & Business Requirements
Analysis & Business RequirementsAnalysis & Business Requirements
Analysis & Business Requirements
 
Business analyst ppt
Business analyst pptBusiness analyst ppt
Business analyst ppt
 
Software Requirement Specification Master Template
Software Requirement Specification Master TemplateSoftware Requirement Specification Master Template
Software Requirement Specification Master Template
 
Business Requirements: How to Create a Business Requirements Document (Free T...
Business Requirements: How to Create a Business Requirements Document (Free T...Business Requirements: How to Create a Business Requirements Document (Free T...
Business Requirements: How to Create a Business Requirements Document (Free T...
 
What is in your Business Analysis Toolkit?
What is in your Business Analysis Toolkit?What is in your Business Analysis Toolkit?
What is in your Business Analysis Toolkit?
 
UN CEFACT Business Requirements Specification Cross Industry Invoicing Process
UN CEFACT Business Requirements Specification Cross Industry Invoicing ProcessUN CEFACT Business Requirements Specification Cross Industry Invoicing Process
UN CEFACT Business Requirements Specification Cross Industry Invoicing Process
 
Sample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library BlogSample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library Blog
 
Brd template
Brd template Brd template
Brd template
 
Business Requirement Document
Business Requirement DocumentBusiness Requirement Document
Business Requirement Document
 
Requirement Cheat Sheet
Requirement Cheat SheetRequirement Cheat Sheet
Requirement Cheat Sheet
 
1Minute Account Opening_BRD_Updated
1Minute Account Opening_BRD_Updated1Minute Account Opening_BRD_Updated
1Minute Account Opening_BRD_Updated
 
requirement gathering
requirement gatheringrequirement gathering
requirement gathering
 
What does a business analyst do?
What does a business analyst do?What does a business analyst do?
What does a business analyst do?
 
The Business Analyst And The Sdlc
The Business Analyst And The SdlcThe Business Analyst And The Sdlc
The Business Analyst And The Sdlc
 
Business Requirement Document
Business Requirement DocumentBusiness Requirement Document
Business Requirement Document
 
Online Shopping Cart Business Requirement Dcoument
Online Shopping Cart Business Requirement DcoumentOnline Shopping Cart Business Requirement Dcoument
Online Shopping Cart Business Requirement Dcoument
 

Viewers also liked

Sample Technical Requirement Document (TRD)
Sample Technical Requirement Document (TRD)Sample Technical Requirement Document (TRD)
Sample Technical Requirement Document (TRD)
Sunil Kumar Gunasekaran
 
Business process analysis and optimization: A pragmatic approach to business ...
Business process analysis and optimization: A pragmatic approach to business ...Business process analysis and optimization: A pragmatic approach to business ...
Business process analysis and optimization: A pragmatic approach to business ...
Mozammel Hoque
 
A Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP ProjectsA Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
Varuna Harshana
 

Viewers also liked (19)

Software Requirement Spesification
Software Requirement SpesificationSoftware Requirement Spesification
Software Requirement Spesification
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 
The Mysterious Process of Business Analysis Solved
The Mysterious Process of Business Analysis SolvedThe Mysterious Process of Business Analysis Solved
The Mysterious Process of Business Analysis Solved
 
Sample Technical Requirement Document (TRD)
Sample Technical Requirement Document (TRD)Sample Technical Requirement Document (TRD)
Sample Technical Requirement Document (TRD)
 
Business analysis thinking methodology
Business analysis thinking methodologyBusiness analysis thinking methodology
Business analysis thinking methodology
 
Predictive Analytics: Business Process Analysis And Optimization a CRM Case S...
Predictive Analytics: Business Process Analysis And Optimization a CRM Case S...Predictive Analytics: Business Process Analysis And Optimization a CRM Case S...
Predictive Analytics: Business Process Analysis And Optimization a CRM Case S...
 
Getting to the core, requirements gathering in the wild
Getting to the core, requirements gathering in the wildGetting to the core, requirements gathering in the wild
Getting to the core, requirements gathering in the wild
 
Writing software requirement document
Writing software requirement documentWriting software requirement document
Writing software requirement document
 
Object Oriented Business Process Analysis
Object Oriented Business Process AnalysisObject Oriented Business Process Analysis
Object Oriented Business Process Analysis
 
FIVE FORCE ANALYSIS AND BUSINESS PROCESS REENGINEERING.
FIVE FORCE ANALYSIS AND BUSINESS PROCESS REENGINEERING.FIVE FORCE ANALYSIS AND BUSINESS PROCESS REENGINEERING.
FIVE FORCE ANALYSIS AND BUSINESS PROCESS REENGINEERING.
 
8 essential business analysis steps
8 essential business analysis steps8 essential business analysis steps
8 essential business analysis steps
 
Business process analysis and optimization: A pragmatic approach to business ...
Business process analysis and optimization: A pragmatic approach to business ...Business process analysis and optimization: A pragmatic approach to business ...
Business process analysis and optimization: A pragmatic approach to business ...
 
A Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP ProjectsA Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
 
Building a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprintBuilding a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprint
 
Leave Management System: Software Requirements Specification Document(SRS)
Leave Management System: Software Requirements Specification Document(SRS) Leave Management System: Software Requirements Specification Document(SRS)
Leave Management System: Software Requirements Specification Document(SRS)
 
SRS for Hospital Management System
SRS for Hospital Management SystemSRS for Hospital Management System
SRS for Hospital Management System
 
Pharmacy management system Requirement Analysis and Elicitation Document
Pharmacy management system Requirement Analysis and Elicitation Document Pharmacy management system Requirement Analysis and Elicitation Document
Pharmacy management system Requirement Analysis and Elicitation Document
 
Business Analyst Interview Questions with Answers
Business Analyst Interview Questions with AnswersBusiness Analyst Interview Questions with Answers
Business Analyst Interview Questions with Answers
 
Requirement Gathering & Rapid Prototyping
Requirement Gathering & Rapid PrototypingRequirement Gathering & Rapid Prototyping
Requirement Gathering & Rapid Prototyping
 

Similar to Business requirement checklist

Software requirements specification_for_Projects
Software requirements specification_for_ProjectsSoftware requirements specification_for_Projects
Software requirements specification_for_Projects
nazzf
 
srs_template-ieee (4).doc
srs_template-ieee (4).docsrs_template-ieee (4).doc
srs_template-ieee (4).doc
nopeco9205
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
Sahithi Naraparaju
 
Addmi 02-addm overview
Addmi 02-addm overviewAddmi 02-addm overview
Addmi 02-addm overview
odanyboy
 

Similar to Business requirement checklist (20)

Srs template ieee
Srs template ieeeSrs template ieee
Srs template ieee
 
Software requirements specification_for_Projects
Software requirements specification_for_ProjectsSoftware requirements specification_for_Projects
Software requirements specification_for_Projects
 
srs_template-ieee.doc
srs_template-ieee.docsrs_template-ieee.doc
srs_template-ieee.doc
 
srs_template-ieee (4).doc
srs_template-ieee (4).docsrs_template-ieee (4).doc
srs_template-ieee (4).doc
 
srs_template.doc
srs_template.docsrs_template.doc
srs_template.doc
 
Lab Manual 01.pdf
Lab Manual 01.pdfLab Manual 01.pdf
Lab Manual 01.pdf
 
Srs tem
Srs temSrs tem
Srs tem
 
software requirements specification template
software requirements specification templatesoftware requirements specification template
software requirements specification template
 
Template-FDW
Template-FDWTemplate-FDW
Template-FDW
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)
 
Sap template 050312
Sap template 050312Sap template 050312
Sap template 050312
 
Srs template 1
Srs template 1Srs template 1
Srs template 1
 
Srs template 1
Srs template 1Srs template 1
Srs template 1
 
Srs template ieee
Srs template ieeeSrs template ieee
Srs template ieee
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
Addmi 02-addm overview
Addmi 02-addm overviewAddmi 02-addm overview
Addmi 02-addm overview
 
Srs template
Srs templateSrs template
Srs template
 
Configuration management plan
Configuration management planConfiguration management plan
Configuration management plan
 
Template-FDW-CMFG
Template-FDW-CMFGTemplate-FDW-CMFG
Template-FDW-CMFG
 
Template FDW
Template FDWTemplate FDW
Template FDW
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Business requirement checklist

  • 1. Business Requirement Checklist (BRC) Project Name Date INSERT COMPANY LOGO
  • 2. Page 2 of 6 DOCUMENT CONTROL Document Version History Date Author Version Change Reference Document Owner Name Department Email Contact # Document Purpose Purpose User Community The purpose of this document is to confirm the business requirements for the <Name> project within the <Name> deparment. This document provides a checklist of identified requirements that will be used as inputs to a detailed Business Requirement Document. <NAME>, Analysts
  • 3. Page 3 of 6 Table of Contents DOCUMENT CONTROL........................................................................................................................2 BUSINESS REQUIREMENT CHECKLIST ..................................................................................................4 BR1.0.0 - DATA MANAGEMENT ......................................................................................................................4 BR2.0.0 - INFORMATION SECURITY ..................................................................................................................5 NOTES ...............................................................................................................................................6
  • 4. Page 4 of 6 BUSINESS REQUIREMENT CHECKLIST BR1.0.0 - DATA MANAGEMENT Provide a common platform to manage data. The platform can: Priority 1  Create backup and recovery structures to mitigate data loss disasters from hardware failures, fire, flood, etc.  Allow for the sharing and collaboration of data between different users (Clarify whether check in check out policies needed)  Enforce security access and protect confidential information based on security permissions by security group  Accept multiple software file types (i.e. FEMAP, NASTRAN, AQWA, NASTRAN, AQWA)  Enable access to analysis software requiring different license schemes  Allow an unlimited number of file downloads/uploads  Two factor authentication to access storage area  Centralize, store and archive all files (including terabytes of data)  Perform Drag and Drop functionality Priority 2  Provide an audit trail of all user activity  Accommodate file downloads to preapproved locations  Optimize the performance of data uploaded and downloaded from any location  Set reminders to notify users of unused data sets on local machines Actors <NAME> <NAME>
  • 5. Page 5 of 6 BR2.0.0 - INFORMATION SECURITY Prevent security breaches, data vulnerability and unauthorized access to the following:  Active drawings saved to hard drives  Hard copy drop-offs or cd's  Customer or <NAME>' FTP sites  Advanced Analysis data  Application (uploads and downloads)  3rd Party Project Collaboration Portals  Emails Actors <name> <NAME>
  • 6. Page 6 of 6 NOTES NOTE ID DESCRIPTION 1 2 3