Day-12 BRS To Be Send 24
Day-12 BRS To Be Send 24
Day-12 BRS To Be Send 24
Table of Contents
TABLE OF CONTENTS....................................................................................................2
1. INTRODUCTION.....................................................................................................4
1.1. DOCUMENT PURPOSE...........................................................................................4
1.2. INTENDED AUDIENCE...........................................................................................4
1.3. PROJECT BACKGROUND.......................................................................................5
1.4. PURPOSE OF THE BUSINESS REQUIREMENTS........................................................5
1.5. BUSINESS GOALS/OBJECTIVES TO BE ACHIEVED.................................................6
1.6. BENEFITS/RATIONALE..........................................................................................6
1.7. STAKEHOLDERS....................................................................................................6
1.8. DEPENDENCIES ON EXISTING SYSTEMS................................................................6
1.9. REFERENCES.........................................................................................................6
1.10. ASSUMPTIONS.......................................................................................................6
2. REQUIREMENTS SCOPE......................................................................................7
2.1. IN SCOPE..............................................................................................................8
2.2. OUT OF SCOPE......................................................................................................8
3. FUNCTIONAL REQUIREMENTS.........................................................................8
3.1. ACTOR PROFILES SPECIFICATION.........................................................................8
3.2. ESSENTIAL USE CASE DIAGRAM..........................................................................9
3.3. ESSENTIAL USE CASE SPECIFICATIONS................................................................9
3.4. FUNCTION HIERARCHY DIAGRAM......................................................................11
3.5. FUNCTION DEFINITION REPORT.........................................................................11
3.6. BUSINESS RULES................................................................................................12
4. DATA REQUIREMENTS......................................................................................13
4.1. DATA ARCHITECTURE........................................................................................13
4.1.1. Domain Class Diagram.................................................................................13
4.1.2. Entity Relationship Diagram.........................................................................14
4.2. DATA VOLUMES.................................................................................................14
4.3. DATA CONVERSION............................................................................................14
4.4. DATA RETENTION AND ARCHIVING...................................................................14
4.5. FOI/PRIVACY IMPLICATIONS.............................................................................14
4.6. DATA DEFINITION REPORTS...............................................................................15
4.6.1. Domain Class Definition Report...................................................................15
4.6.2. Entity Definition Report................................................................................16
5. NON-FUNCTIONAL REQUIREMENTS............................................................17
5.1. SECURITY REQUIREMENTS.................................................................................17
5.1.1. Authentication...............................................................................................17
5.1.2. Authorization and Access Controls...............................................................18
5.1.3. Information Security Classification and labelling........................................19
1. Introduction
The main intended audience for this document is the business owners of the
proposed system. This document should be readable by business owners of the
proposed system. They must be able to verify that their business requirements
have been documented here completely, accurately and unambiguously.
Developer, Maneger, Tester and Technical would also find the information in this
document useful when they need to design a solution that will address these
business requirements.
This document template contains hidden text. To enable hidden text, under
the “Tools | Options | View” tab, make sure that "Hidden Text" is checked. To
print the template with hidden text displayed, under the “Tools | Options |
Print” tab, make sure that "Hidden Text" is checked.
The text in black colour is meant to be part of the final filled in document.
Please do not delete them.
The text in red colour is instructions and examples on what to fill in the
various sections of this document. Please fill in the sections as per
instructions and then delete the red coloured text (instructions and
examples).
Please do not leave any section blank. If a section is not applicable, then type
in “Not Applicable” in that section.
UML Use case modeling using any tool that supports the UML notation
and standards as described in the ADE standards web site ;
This document template supports both Use case and Designer modeling
approaches. It is highly recommended that only one of the two modeling
approaches is adopted for describing the Business Requirements in this
document and not a hybrid approach. Data models may be presented either
in ERD notation or in UML class notation, regardless of which modeling
approach was used. All Modeling should conform to Ministry’s modeling
standards.
1.6. Benefits/Rationale
This section describes the major benefits to be achieved with the implementation
of the Business Requirements.
1.7. Stakeholders
Stakeholders are the individuals or groups who have a vested interest in this
project and whose interests need to be considered throughout the project. This
section lists the Stakeholders of the Application / Project for which these
Business requirements are documented.
This section describes the dependencies between the Application for which these
Business Requirements are written and the other existing applications/systems.
Last revised:26/04/2013 Page 6 of 26
1.9. References
1.10. Assumptions
This section describes major assumptions that were made prior to or during the
Business Requirements gathering and documentation.
2. Requirements Scope
This section shows what business functionality is in scope and out of scope for
Implementation. In Use case approach, the out of scope Use cases are indicated
in a separate boundary box. In Oracle Designer approach the out of scope
Functions are shown in grey coloured boxes.
2.1. In Scope
3. Functional Requirements
This section describes all the Actors and their profiles within the context of the
Business Requirements being documented. An Actor is a person, organization or
Last revised:26/04/2013 Page 8 of 26
This section is applicable only to Use case approach. This section depicts the
Business Requirements in the form of Essential Use case diagram. In the Use
case approach, the Functional Requirements are decomposed into a number of
Essential Use cases. Essential use cases are of primary importance early in a
project’s requirements/analysis phase. Their purpose is to document the
business process that the Application must support without bias to technology
and implementation.
This section is applicable only to Use case approach. This section describes
each Essential Use case in narrative text form. A use case typically has one
basic course of action and one or more alternate courses of actions. The basic
course of action is the main start-to-finish path that the use case will follow,
where as the alternate courses represent the infrequently used paths and
exceptions, error conditions etc. The complete business logic of a use case such
as basic course of action, alternate course of action, pre-condition, post-condition
etc is not depicted in the Use case diagram. Rather they are documented in
narrative style in use case specifications.
If the number of use cases is less than 15, the Essential Use case specifications
in narrative form are included in this BRD in tabular format. Each use case is
described in a separate table. If the number of use cases is greater than 15, the
Essential Use case specifications in narrative form are attached as a separate
document with this BRD.
Use Case Id : ##
Actors
Non-Functional Requirements
Pre-Conditions
Post-Conditions
This section is applicable only to Designer approach. This section depicts the
Business Requirements in the form of Function Hierarchy Diagram (FHD). In the
This section is applicable only to Designer approach. This section describes each
Business Function in narrative text form.
This section lists and describes the business rules applicable to the proposed
system.
4. Data Requirements
This section describes the Data requirements part of the Business Requirements.
This section describes the Data Architectural requirements part of the Business
Requirements.
This section is applicable only to Use case approach. This section depicts the
Data Architecture in the form of Domain Class Diagram. In the Use case
Last revised:26/04/2013 Page 14 of 26
approach, the conceptual data architecture (structural aspects) for the Business
Requirements is modeled using Domain Class Diagram. The Domain Class
Diagram is used to model the conceptual classes, its attributes (fields) and
operations (methods) and also the interrelationships (association, composition,
aggregation and generalization) between the classes. Domain model is a
representation of real world conceptual classes, not of software components.
This section is applicable only to Oracle Designer approach. This section depicts
the Data Architecture in the form of Entity Relationship Diagram (ERD). In the
Oracle Designer approach, the conceptual data architecture (structural aspects)
for the Business Requirements is modeled using Entity Relationship Diagram
(ERD).
This section describes the expected approximate Data volumes (initial volume
and annual growth %) for each conceptual Class or Entity.
This section describes the Data retention (time frames for online Data retention
before archiving) and also the archiving requirements.
This section describes the sensitivity levels of each class of data. The following
criteria are used in determining the sensitivity level of each conceptual
class/entity in line with the Government Core Policy Manual).
This section is applicable only to Use case approach. This section describes
Data Architecture / definition (Domain Class model) in narrative text form.
Class Name
Class Description
Description :
Name :
Description :
Name :
Description :
Name :
Description :
Name :
Description :
Name :
Description :
Entity Name
Entity Description
Description :
Name :
Description :
Name :
Description :
Name :
Description :
Name :
Description :
Name :
Description :
5. Non-Functional requirements
5.1.1. Authentication
This section describes the Authorization and Access Control requirements part of
the Business Requirements at a high-level. Authorization is the process of
determining if the person/group, once identified through the “Authentication
process”, is permitted to have access to certain services. The Authorization and
Access Control requirements are best described through a matrix.
C Create
R Read
U Update
D Delete
This section is provided for information purposes only. Please do not delete this
section while creating the Business requirements Document from this template.
However, please be aware that the finished application/initiative/project and all its
output deliverables (such as documents, models, diagrams etc) need to be
classified and labelled in accordance with the OCIO guidelines. This will help in
determining how much protection the finished application and its data will need
commensurate with its sensitivity levels determined during information security
classification process. It will also help in evaluation of risks associated with
authorized and unauthorized disclosures of the application’s data.
This section describes what kind of System Help features are needed to be built
into the system.
This section describes how the system is expected to scale to new higher or
lower levels. Both user and application scalability requirements are described
here. Data scalability is not described here as it is already described in the “data
volumes” section earlier.
6. Interface Requirements
This section describes User and System Interface requirements for the proposed
system.
7. Business Glossary
APMS Update
Comments:
Revision Log
Appendices
Approval
This document has been approved as the official Business Requirements
Document for the Project Name project.
Following approval of this document, changes will be governed by the
project’s change management process, including impact analysis,
appropriate reviews and approvals, under the general control of the
Master Project Plan and according to Project Support Office policy.
Prepared by Signature Date
Author's Name
[Title]
[Organization]
Approved by Signature Date
[Client Acceptor’s
Name]
[Title]
[Organization]