Dev Id: Conversion Technical Specification
Dev Id: Conversion Technical Specification
_<Short_Description>
Author
[Pick the date]
Technical Specification Document
Table of Contents
1 EXECUTIVE SUMMARY...................................................................................................3
1.1 OBJECT INFORMATION AND ATTRIBUTES........................................................................3
1.2 BUSINESS DRIVER............................................................................................................4
1.3 DESIRED FUNCTIONALITY OVERVIEW.............................................................................4
1.4 ASSUMPTIONS...................................................................................................................4
1.5 PROJECT / DEVELOPMENT CONSTRAINTS........................................................................4
1.6 PERFORMANCE CRITERIA.................................................................................................4
1.7 APPLICATIONS AFFECTED................................................................................................4
1.8 DATA VOLUME.................................................................................................................5
1.9 DATA QUALITY METRICS................................................................................................5
1.10 OTHER OBJECTS AFFECTED.............................................................................................5
2 DETAILED REQUIREMENTS...........................................................................................6
2.1 PWRICEF TYPE SPECIFIC INFORMATION – CONVERSION...............................................6
3 ADDITIONAL INFORMATION.......................................................................................13
3.1 BACKUP / RECOVERY.....................................................................................................13
3.2 INFORMATION SECURITY................................................................................................13
3.3 AUDIT.............................................................................................................................15
1 EXECUTIVE SUMMARY
1.1 Object Information and Attributes
The following is current information about this object and document:
Object ID Assigned Object ID from Functional Specification
Title Object ID and Short Description from Functional Specification
Dev ID Dev ID from SAP Development Log
Gap Number Gap Number from SAP Development Log
Version Document version
Creation Date Date document created
Author(s) Name of the Technical specification author(s)
System Version SAP system version
Development Type Conversion
Disposition Draft, Approved, Rejected, or Deferred
Estimated S(imple), M(edium), C(omplex) or VC (very complex) – Initial Complexity from
Complexity SAP Development Log
Revision History:
1.4 Assumptions
Description:
Assumptions include those that will impact development, testing, roll-out, implementation and
on-going maintenance, as well as any potential impacts on other processes. Please refer to the
same section in Functional Specification for more details.
2 DETAILED REQUIREMENTS
2.1 PWRICEF Type Specific Information – Conversion
Description:
Identify the data requirements of this conversion including the business object, date range to be
considered for extracting information from Source System(s) for conversion, data cleansing and
detailed data mapping requirements.
Execution Method
Describe in detail, the method of program invocation (JCL specifics, online, etc.)
Program Type
Define type of program (Custom transaction, Batch, LSMW etc.)
Inputs / Outputs
A list of required inputs and outputs
Detailed Logic
Describe logic through the use of pseudo code, flow charts and supporting text. Include specific error handling.
Number all “If”s, “When’s and condition checks to drive test scenario. Describe the pre/post processing business
rules, data cleansing approach, data verification approach and additional requirements
Error Handling:
Description
Describe the error handling approach and error reporting in detail:
3 ADDITIONAL INFORMATION
Businesses Impacted:
Information Classified by whom: Date
Contact Information
Company Name Phone E-mail Address
List Potential
Information Owners:
Architecture
Environments: (impacted by this Fspec): Development Test Training Production
Public (Internet) Facing Internal Only
Architecture: (system exposure): 3rd Party Hosted Company * Hosted
Input any additional details related to business impact in the event of compromise:
*NDA – Non-Disclosure Agreement, MSA-Master Service Agreement
Information Classification
Action #1: Check the box below that represents the most restrictive classification.
Action #2: If Level 1 or 2 is selected, check the box below indicating data storage or data transmission.
Confidential – Secure Handling Required represents the most sensitive data classification related to individual personal
identifiable information and personal financial account information. This information considered critical to AG such that, if
disclosed, may disrupt or impede business operations, and due to legal, reputational, or operational concerns, requires
additional security controls. Information in this category includes, but is not limited to:
1. Social Security Number
2. Driver’s License Number or Government-issued Identification Number
3. Financial Account Number (card number or personal bank number)
4. Protected Health Information & Electronic Protected Health Information
SHR data stored? SHR data transmitted? SHR data stored and transmitted?
Level 2 – Confidential
Confidential represents the second most sensitive data classification related to operationally significant business information.
This information considered critical to AG such that, if disclosed, may disrupt or impede business operations. Examples of
Restricted Confidential include but are not limited to regulatory governed data, trade secrets, mergers and acquisition
discussions, product formulas and designs, corporate earnings data prior to public announcements, reorganization details prior
to announcements, current/closed company investigations and litigation, detailed network diagrams that could jeopardize
network security, strategic development/marketing plans and information integral to the success and operations of the
company.
Confidential data stored? Confidential data transmitted? Confidential data stored and transmitted?
Internal AG Use Only represents the third most data. It represents information that is less critical to privacy and business
operations but still must not be publicly disclosed. This information is not approved for general circulation outside AG.
Level 4 - Public
Public represents information that has been declared public knowledge by the information owner and can freely be given to
anyone without any possible impact to AG. As a result, no special data handling protections are required.
3.3 Audit
Define the audit solution (if applicable) for this design based on Functional Specification