Professional Documents
Culture Documents
ACP2 - Task 1 Submission
ACP2 - Task 1 Submission
Company Information
Tech Comm Template BRD
Project Sponsor
Business Owner
Project Manager
System Architect
Development Lead
Quality Lead
Content Lead
3 Introduction
3.1 Project Summary
3.1.1 Objectives
The Healthy Body Wellness Center (HBWC) is primarily engaged in receipt, evaluation, and dissemination
of information among healthcare practitioners. Healthcare-related information (PHI), along with
other personally identifiable information (PII) must be secured in compliance with Federal
statutes and other regulations i.e., FISMA and HIPAA. The Office of Grants Giveaway (OGG)
seeks to streamline the processing and management of Grant Funds, which are currently
tracked through The Small Hospital Grant Tracking System (SHGTS), through implementation of
a Microsoft SQL Database and a web-based interface to be used by all individuals involved with
the Grants and associated research projects
3.1.2 Background
The Office of Grants Giveaway currently manages their grant and research data in single-user
applications. In today’s information-driven workplace, these single-user applications, like
Microsoft Access and Excel, can significantly decrease the availability of data and information to
workplace teams that may not be working in the same physical location. Upgrading the current
Local Area Network (LAN) to a Wide Area Network (WAN), coupled with additional backend
infrastructure will provide more robust information sharing opportunities, allowing for a larger
employee base, opening opportunities for additional grant programs.
The Small Hospital Grant Tracking System (SHGTS) is currently running in Microsoft Access 2010 on a
Windows Server 2008 R2 machine. Both applications have been without support or updates
from Microsoft since October 2020 and January 2020 respectively. With a goal of increasing
security of HBWC’s data, this system must be replaced.
Payroll is currently handled in-house with a physical check issued to the employee as part of the payroll
process. Direct Deposit is not an option. Research is underway to select a vendor to whom
Payroll and Benefit administration will be outsourced
3.3.2 Constraints
- Remote work limited by Internet bandwidth into main office
- Learning curve for employees with new software and data management processes
3.3.3 Risks
- Data corruption during migration from Access Database to new SQL Database
3.3.4 Issues
- None readily identified
Process Diagram for Grant Funding Process – no proposed changes to this process
5 Business Requirements
[The specific business requirements elicited from stakeholders should be listed and categorized by both priority and area of functionality to
smooth the process of reading and tracking them. Include links to use case documentation and other key reference material as needed to
make the requirements as complete and understandable as possible. You may wish to incorporate the functional and nonfunctional
requirements into a traceability matrix that can be followed throughout the project.]
The requirements in this document are prioritized as follows:
Value Rating Description
1 Critical This requirement is critical to the success of the project. The project will not be
possible without this requirement.
2 High This requirement is high priority, but the project can be implemented at a bare
minimum without this requirement.
3 Medium This requirement is somewhat important, as it provides some value, but the project
can proceed without it.
4 Low This is a low priority requirement, or a “nice to have” feature, if time and cost allow it.
5 Future This requirement is out of scope for this project and has been included here for a
possible future release.
Security Requirements
Information technology
infrastructure is currently
in an unsecured portion of
the office space. Moving
FR-S-05 2 Physical Security this to a more secure area
to reduce access, thereby
better securing data and
reducing incidence of
potential compromise
Reporting Requirements
Usability Requirements
Audit Requirements
Once IT infrastructure is
moved to a secured,
controlled access space,
logs should be routinely
FR-A-01 3 Physical Access Logs
reviewed to ensure that no
unauthorized personnel are
attempting to, or have
gained access to the space