Requirements Template 0
Requirements Template 0
Steps
Step 1. Complete solution requirements.
Stakeholders
Role
Subject Matter Expert
Steering Committee Member
End User
Downstream System Owner
Note: For a detailed description of each field, refer to the Field Reference Tab.
This tab contains interaction of system with other systems. Describes necessary
intetegrations, interfaces, data formats and frequency between various systems
Definition of Role
Deep knowledge, insights, and expertise in the system.
Provides governance, oversight and ensure alignment with strategic direction
Interacts directly with the system
Consumes outputs, data or results from the system (e.g. Accounts Payable pays invoices originated fr
procurement system)
Provides master data / resources to the system (e.g. Student Information System provides key studen
required for system to operate)
Configurations, Maintainence and Support of the sytem
Role
Subject Matter Expert - Undergraduate Groups
Subject Matter Expert & Steering Committee Member - Finance and Treasury
Req # Requirement Category
Compliance & Regulatory
…
…
…
Reporting, Dashboards and Analytics
Reporting, Dashboards and Analytics
Data Migration
Data Migration
Data Migration
Data Migration
Data Migration
Data Migration
Standards and Compliance
User Experience
User Experience
User Experience
User Experience
User Experience
User Experience
Non functional requirements
Non functional requirements
System should offer a set of Pre-configured reports for specific user roles
The system must allow users to create and customize reports based on
specific criteria and filters to meet diverse informational needs.
The system must support scheduling and automated distribution of reports
at predefined intervals to designated recipients.
The system must provide functionality for exporting report data in various
formats such as CSV, PDF, and Excel for external analysis and archiving.
The system must ensure that reports display real-time data, reflecting the
most current information available at the time of report generation.
The system must include tools for visualizing data through charts, graphs,
and other graphical elements to enhance data interpretation and
presentation.
The system must offer data aggregation and drill-down functionalities,
allowing users to summarize data at higher levels and explore detailed data
at granular levels as needed.
(Add, update or delete Reporting, Dashboards and Analytics requirements
as needed)
Implemennter should confirm that an incremental or phased approach is
feasible, allowing validation checks to be performed on smaller datasets.
Implementer should define a clear procedure for rolling back the data
migration in case unexpected errors or issues arise during the migration
process.
All data transferred from source to target system must be accurate,
complete and consistent.
Implementer must provide a comprehensive document detailing the
migration process, including data volumes, issues encountered, resolutions,
and stakeholder approvals.
Implementer must document detailed mappings of data fields and
transformations between source and target systems, ensuring clarity, and
stakeholder validation.
(Add, update or delete Data Migration requirements as needed)
Ensure that the system complies with latest Web Content Accessibility
Guidelines (WCAG) , providing equal access to all users, including those
with disabilities, by meeting the necessary accessibility requirements for
web content, user interfaces, and functionality.
Health-related Data (HIPAA): System should protect and manage all health-
related data in compliance with HIPAA regulations to ensure privacy and
security of patient information.
Payment Data Security Standard (PCI DSS): System should implement and
maintain security measures to protect payment card data in compliance
with PCI DSS standards.
Protection and Privacy of Student's Educational Record (FERPA): System
should safeguard the privacy and integrity of student educational records in
accordance with FERPA regulations.
Web Application Security (OWASP): System should follow OWASP guidelines
to secure web applications against common vulnerabilities and threats.
Protection of Data (SOC 2): System should implement and maintain controls
to protect data and ensure compliance with SOC 2 standards for security,
availability, processing integrity, confidentiality, and privacy.
(Add, update or delete standards and compliance requirements as needed)
csv file
Dotty Mainty
Field Name Tab
Req# Solution Requirements
Used to classify business requirements into distinct groups, ensuring that all critical aspects
of a project are covered.
Individual(s) who owns the data being exchanged between system to support business
process supported by the system
Individual(s) responsible for the technical implementation, maintenance, and support of the
data exchange mechanisms between systems
Processes supported by the data integration
Usage
Provide a sequential number for the requirement so that they can be referenced easily.
Should Have:
These are important requirements that should be included if possible, causing
inconvenience if absent but still allowing project success with workarounds.
Could Have:
These are desirable, lower-priority requirements that can be included if time and resources
permit, without significantly impacting the project's functionality or success if omitted.
Identify where the requirement came from, such as a specific stakeholder, previous
requirement document, regulatory standard, etc.
Provide any relevant information or context that might help in understanding or
implementing the requirement
Fully met: The current solution completely fulfills the requirement.
Partially met: The current solution meets the requirement to some extent but has gaps.
Not met: The current solution does not fulfill the requirement at all.
Provide official name of the system
Specify whether the data is incoming, outgoing or bidirectional in reference to the current
system
Describe type, purpose, and nature of data being exchanged between systems
State the interval of data transfer such as real-time, hourly, daily, etc.
Provide any relevant information or context that might help in understanding or managing
the integration.
Specify whether it is a file transfer, API, Database connection etc., and the data format
(e.g., CSV, XML).
Must Have:
These are critical, non-negotiable requirements essential for the project's success, without
which the project would fail or be incomplete.
Should Have:
These are important requirements that should be included if possible, causing
inconvenience if absent but still allowing project success with workarounds.
Could Have:
These are desirable, lower-priority requirements that can be included if time and resources
permit, without significantly impacting the project's functionality or success if omitted.