0 оценок0% нашли этот документ полезным (0 голосов)
32 просмотров16 страниц
This document outlines a methodology for evaluating existing information systems as recordkeeping systems. It involves modeling business processes through techniques like structured analysis to identify functions, events, and elementary processes. This information is then used to analyze how well the current system satisfies functional requirements and metadata specifications. The methodology involves describing business processes, analyzing how the current system manages records, evaluating the system against requirements, and recommending improvements.
Исходное описание:
Management Information System of companies in general
This document outlines a methodology for evaluating existing information systems as recordkeeping systems. It involves modeling business processes through techniques like structured analysis to identify functions, events, and elementary processes. This information is then used to analyze how well the current system satisfies functional requirements and metadata specifications. The methodology involves describing business processes, analyzing how the current system manages records, evaluating the system against requirements, and recommending improvements.
This document outlines a methodology for evaluating existing information systems as recordkeeping systems. It involves modeling business processes through techniques like structured analysis to identify functions, events, and elementary processes. This information is then used to analyze how well the current system satisfies functional requirements and metadata specifications. The methodology involves describing business processes, analyzing how the current system manages records, evaluating the system against requirements, and recommending improvements.
A Methodology for Evaluating Existing Information Systems As Recordkeeping
Systems 2002 ersion
!he Indiana "niversity Electronic Records #ro$ect I%!R&'"(!I&% In using this methodology it is important to recognize the collaboration between archivists and the IT community, whose vocabularies at times do not quite match. This methodology is centered around archival and recordkeeping concepts, but facilitated by practices common to the IT community. Perhaps the language is most at odds with the term record. In the IT context a record might be thought of as a data structure representing an element of a file. owever, in the context of this methodology, a record is evidence of a business transaction. !n understanding of this usage of record is essential for success with the methodology, as is an understanding of other terms "which can be found in the glossary and throughout the text# and of the $unctional %equirements and &etadata 'pecifications "also in the appendix and discussed later in the text#. In general, the focus here is on information as it satisfies requirements of authenticity and evidence. 'everal phases and tasks for the methodology have been identified. Involvement in the information system(s design stage makes the process much easier to implement. In most cases, designing a new system involves incorporating your requirements or specifications and the results of your business process models into the design of the new system. ! methodology for analysis of new systems is outlined in a separate document. !nalysis of existing systems is normally a more time consuming, more difficult process. It involves not only specifying requirements and metadata specifications and a list of records to be captured. It also requires an analysis of how the present system is managing the data. In essence, the process involves analysis of )what is* as depicted by models and system documentation with )what should be* as defined by the requirements, specifications and models. &ore specifically, analysis of existing systems includes the following activities+ ,# a description and analysis of the business processes by means of a technique known as )modern structured analysis,* -# a description of how the information system is presently managing records of the identified processes, .# an evaluation of the information system against the $unctional %equirements and &etadata 'pecifications in the context of the identified business processes, and /# recommendations for intervention to satisfy the $unctional %equirements and &etadata 'pecifications. !lthough represented in the text as distinct phases, the reality is that thought processes don0t necessarily work in a step1by1step fashion. ! methodology may portray a progression through specific steps, but a person using the methodology should be able to consider multiple factors at any point through that progression. The entire methodology document and supporting materials should be reviewed and understood before proceeding with its use. 1 Step )* 'ES(RI+I%, A%' M&'E-I%, +"SI%ESS #R&(ESSES In this initial step of the methodology, the primary goal is to construct a representation of the logical processes of the business, i.e., to create a conceptual model of the work or activities that must be undertaken no matter how the information system is implemented or who does the work. To identify these processes, the methodology uses concepts derived from 2modern structured analysis2 techniques such as those advocated by 'tephen &c&enamin, 3ohn Palmer, and 4dward 5ourdan. This form of analysis has been defined as )a process1centered technique that is used to model business requirements for a system. The models are structured pictures that illustrate the processes, inputs, outputs, and files required to respond to business events.* 63effrey 7. 8hitten and 7onnie 9. :entley, 'ystems !nalysis and 9esign ðods, / th ed. ":oston+ &c;raw1ill, ,<<=#, p. ,--. 9escription of the business requirements is undertaken by means of a process known as decomposition . This process is a means of developing a top1down analysis of the business system, and of breaking down the business system into smaller and smaller processes and sub1processes. In accordance with )modern structured analysis* techniques, the I> methodology decomposes logical processes "business activities that must be undertaken no matter how one implements the system# into three components+ .unctions/ Event #rocesses or !ransactions/ and Elementary #rocesses0 In other words, business systems are comprised of functions, which are decomposed into business processes, which ultimately are reduced to business events, which normally represent a single process responding to external and temporal inputs and result in one or more outputs known as elementary processes. In the decomposition process, the activities at the highest end of the business system are known as 1usiness functions. ! function is a )set of related and on1going activities of the business. ! function has no start or end? it @ust continuously performs its work as needed.* "8hitten and :entley, 'ystems !nalysis and 9esign ðods, p. -,=#. $unctions normally are decomposed into sub1functions or into a more discrete and related set of on1going activities. $unctions are named with nouns that describe the entire set of activities. 4xamples of functions and sub1functions from the business area of Affice of the %egistrar include+ $unction+ 'tudent %ecordkeeping 1 'ubfunctions+ Afficial student record maintenance, student degree maintenance, current semester information maintenance. $unctions consist of business processes that respond to business events. ! 1usiness event is )something that Bhappens,( and that causes business data to change.* 8hitten and :entley, 'ystems !nalysis and 9esign ðods, . rd ed., p. C-/#. !n event )is a logical unit of work that must be completed as a whole. !n event is triggered by a discrete input and is completed when the process has responded with appropriate outputs. 4vents are sometimes called transactions.* "8hitten and :entley, 'ystems !nalysis and 9esign ðods, p. -,=#. There are three basic types of inputs that will trigger a business event or transaction+ an external event that is initiated by agents outside the system being reviewed, a temporal event that is triggered by the arrival of a predetermined point in time, and a state event that is triggered by a system(s change from one state or condition to another. &ost events or transactions are represented by a single process, although occasionally, the event may include two or three processes. !n event process or transaction is described in a single sentence that identifies the individual or agency initiating the action "sub@ect1phrase#? the official action "verb1phrase#? and the individuals 2 or ob@ects acted upon or interacted with "ob@ect1phrases#. 4xamples of event processes or transactions taken from the Affice of the %egistrar work area include+ $or 'ubfunction+ 'tudent grades and credit maintenance, the event processes or transactions include+ ,# Post grades for students upon completion of course work "Input+ grade roster from faculty member, and Autput+ Dreate a grade and credit record#? -# !ssign credit for student work done at other academic institutions "Input+ %ecord of work completed at another institution, and Autputs+ Dreate a credit articulation or evaluation report, and modify student record to reflect the decision#. !n event process is further decomposed into elementary processes, which are defined as )discrete, detailed activities or tasks required to complete the response to an event.* "8hitten and :entley, 'ystems !nalysis and 9esign ðods, / th ed., p. -,<.# In other words, elementary processes are the outputs generated by the business event. Types of elementary processes include+ creating a new occurrence of an entity "add#, updating an occurrence of an entity "change or modify#, and deleting an occurrence of an entity. The methodology omits any processes that do nothing more than move or route data, thus leaving the record unchanged. 4lementary processes are named with a strong action verb followed by an ob@ect clause that describes the work being performed. 4xamples of elementary processes from the $inancial !id work area include+ Dreate report listing federal aid recipients with unsatisfactory academic progress, record appeal information in student(s financial aid record, complete work1study verification form received from employer, and provide certification information to the lender. %ecord creation occurs at the event or transaction level, and the actual records to be analyzed are those documents received as inputs to the system and those records created as a result of the outputs or elementary processes generated in response to the external or temporal event. $or example+ The business event )processing an appeal* is initiated or triggered by a student or hisEher parents, and the input document is the appeal letter received from the student or the parents. The outputs or elementary processes of this event are ,# &aking and recording a decision on the appeal, -# &odifying the student(s financial aid data based on the appeal decision, and .# Fotifying the student about the decision. The appeal letter, the decision document, the modified student record, and the notification are the records of the process. 4ventually all this business process information is described or depicted in models or representations that illustrate, usually through the use of pictures or symbols, the various components and relationships of the processes. &odels designed to )depict the system independent of any technical implementation* are known as logical models or essential models. "8hitten and :entley, 'ystems !nalysis and 9esign ðods, / th ed., p. -,G.# !nd of the logical models, it is the opinion of the !rchives staff that the most valuable models for archivists are those that focus on system processes, specifically business function decomposition diagrams, business event diagrams, and business process data flow models. In the I> methodology, staff normally create functional decomposition and business event diagrams. 8hat types of information are contained in these models, and what do the models look likeH To answer these questions, let us review the products !rchives personnel created for the business function )'tudent %ecordkeeping.* !s a first step, business processes for this function are defined in a short narrative statement. 4ventually this information is used 3 to generate a functional decomposition diagram for the function. ! partial diagram for the function )'tudent %ecordkeeping*contains the following information and is represented in the following manner. Function: Student Recordkeeping Sub-Function: Semester Data Maintenance Event Process: Dept. Modif ies Course Inventor. Event Process: Facu!t Modifies C!ass Sc"edu!e Event Process: Student Modif ies Course Se!ections Sub-Function: Student Record Maintenance Sub-Function: #rade and Credit Posting Event Process: $ssign #rade for %it"dra&a! Event Process: $ssign #rade f or Comp!etion Event Process: $ssign #rade for 'ransfer %ork Event Process: $ssign #rade C"anges Event Process: $ssign #rade for (t"er Credit Sub-Function: Degree Recording Sub-Function: $cademic Prof i!e Maintenance Sub-Function: Enro!!ment Certification Sub-Function: Degree Certification Event Process: Create $cademic Prof i!e Event Process: Modif $cademic Prof i!e Event Process: Post Dept. Certif ication Data Event Process: Post Certif ication From I)Care $pp!ication Event Process: Post Dept. *ist of Degree Recipients Event Process: Post Degrees From I)Care $pp!ication Ance the functional decomposition diagram is created, staff generate descriptions of the business event processes, including information on the inputs and the various elementary processes or outputs. Initially this data is captured in a simple form that includes the following categories of information for each event process+ Fame of process, input 4 activities, input record, output activities, and output record"s#. Ance this data is gathered, staff creates business event diagrams for each of the sub1functions. $or the event processes )department modifies course inventory,* and )processing an appeal received from a student,* the models contain the following information and are represented in the following manner. +usiness Event Diagrams - Sub-function: Semester Information Maintenance - Event Process: Department Modifies Course Inventor Inventory Updates Updates to Course Inventory Modification Confirmation Process: Modif Course Inventor Sstem Containing Course Inventories $cademic )nit 5 +usiness Event Diagram - Sub-Function - Financia! $id $&ards - Event Process: Processing an $ppea! Received from a Student Record Appeal Information into Student's Record Record Decision on Appeal into Student's Record Modify Student's Record Appeal Notification Notification of Decision Student Process $ppea! Sstem Containing Student Financia! $id Record Sstem Containing Student,s Financia! $id Record Sstem Containing Student,s Financia! $id Record 2&R3 S!E#S* ,. Pro@ect staff selects a business area for analysis. -. !nalyst reviews existing functional decomposition models, process models or data flow models, event diagrams or event lists, and other available documentation describing business processes. It is particularly important to review process models created when the system was designed. 6 .. !nalyst conducts interview"s# with one or more staff from the business area to gather information about ma@or business functions and event processes. !gain it is extremely important to keep in mind that what we are asking staff to describe are business requirements and not a list of implementation procedures. Initially, staff to be interviewed should understand the responsibilities of the entire business unit for identification of higher1level functions and events. !s needed, other staff may be identified as appropriate resources for identification of elementary processes. Iuestions to be asked in every case+ JJ 8hat are the ma@or business functions and subfunctions of this business unitH JJ 8hat are the business processes undertaken to implement these functionsH In other words, what are the event processes or transactions involved in performing this functionH JJ 8hat are the business events that trigger an activity and cause records to be producedH JJ 8hat are the elementary processes that are initiated in response to these eventsH These processes will include+ creating a new occurrence of an entity "add#? updating an occurrence of an entity "change or modify#? and deleting an occurrence of an entity. /. !nalyst creates a narrative statements describing ,# the various business processes for the function"s# under review, and -# each event process transaction, including information on the name of the event process, input activities, and output activities. C.!nalyst creates a functional decomposition diagram that depicts the relationships between and among functions and business events or transactions for the function"s# under review. K. !nalyst creates models or depictions of the business event processes, including information on the inputs and the various elementary processes or outputs. L. !nalyst creates a list of the records that are created as products of the processes under review. =. !nalyst compares any logical models of business processes created when the system was designed with the business models generated during interviews with system managers and identifies and describes any differences in the two models. <. If there are differences in the definition of processes and records creation, the analyst will work with record creators and data managers to reconcile difference and come to a agreement on the products of the business processes. 2&R3 S!E#S* !I#S 4xamine functions proposed at a particular level to see if they fit within a higher level function. 4ven a ma@or business area typically has only six to twelve first1 level functions. 'econd1level functions typically have between three and eight third1level functions. "7ow numbers are very common.# :e as comprehensive and complete as possible. !ssure that the list adequately accounts for all ma@or activities of the area. !n outline form is appropriate for representing the relationships between functions and sub1functions. !s with an 7 outline, balance is expected but not symmetry. $unctions at the same level should have roughly the same significance, complexity, etc. owever, one second1level function may have two or three third1level functions while others may have eight or nine. 8ithout experience it is difficult to tell when the functional decomposition is complete. The function list should be reasonably complete, but will not be exhaustive. In general a third1level decomposition should be sufficient, but it may be necessary to go further to gain enough detail for the identification of transactions in the next task. RE4"IRE' MA!ERIA-S* ,. $unctional 9ecomposition models, Process models, or other descriptions of the business requirements. -. Ather documentation that depicts or models the business requirements, such as 4vent lists, 4vent1%esponse models, and 9ata $low models. 'E-IERA+-ES* ,. 9ecomposition descriptions and diagrams of business functions, event processes or transactions, and elementary processes currently being undertaken. -. 7ists of the records that are being produced by the elementary processes. .. If required, descriptions or depictions of how the current business processes differ from the set of business requirements created in the systems design stage. /. If required, a description of how differences in the analysis of business processes were resolved. R&-ES A%' RES#&%SI+I-I!IES* Donducted by+ pro@ect analyst %eviewed by+ pro@ect staff, business area staff !pproved by+ pro@ect staff Information resources+ business area staff 8 Step 2* A%A-56I%, !7E S5S!EM I% !ERMS &. !7E I" RE(&R'3EE#I%, RE4"IREME%!S The goals of this step in the methodology are twofold+ a# describe or model how the existing system is presently managing the records created by the business processes identified during the analysis conducted in 'tep ,? and b# analyze these results in terms of the I> $unctional %equirements. In defining how the system is presently managing records, the analyst will rely heavily on relevant documentation on system functionality and operations. 8here documentation is non1existent or lacks detail, the analyst will interview knowledgeable staff who understand how data is processed and managed in the system. The goal in this step is to determine how the system is how the system is managing the records under review. To determine this, the analyst will ask a series of questions derived from the I> $unctional %equirements document. The $unctional %equirements are system level requirements, and therefore are meant to be applied at a much higher level than the individual record. In other words, for all the $unctional %equirements the analyst will begin by reviewing and analyzing how the requirement is met at the highest1level sub1 function for the business function under review. $or example, in the decomposition model depicted above, this would mean analyzing as a body all records produced by the three sub1functions and the six business transactions for the high1level sub1function )9egree %ecording.* If during the analysis it becomes clear that the records produced in the course of completing lower1level sub1functions are managed differently than the records of related sub1functions, the analyst will then proceed to analyze the records at the next lower level. $or example, in reviewing the system for the requirement )!uthenticity,* the analyst discovers that rules for modification of records for the sub1function )4nrollment Dertification* are different than for the sub1function )9egree Dertification.* Ance this difference is discovered, the analyst would immediately adopt a strategy of reviewing separately the products of business processes for each of the lower1level sub1functions. 'imilarly, if different procedures are undertaken at the level of the business transaction, then the analyst will begin the analysis of the system for that requirement at the level of the business event or record level. owever, this will be a rare occurrence. In the vast ma@ority of cases, the analysis of the system in terms of the I> $unctional %equirements will be at the highest sub1function level. 2&R3 S!E#S* ,. !nalyst gathers available documentation on systems, standards, procedures, retention schedules, etc. Prominent categories of documentation include+ Processing descriptions with models, if available? procedure manuals and workflow models relating to routing, inputting, updating, saving and deleting records? procedure manuals relating to backing1 up, migrating, purging, exporting and restoring data? documentation on data and data models to determine what types of informational value may be present in records? procedures that define access and use of records, and training procedures? existing disposition schedules and laws, policies and best practices related to recordkeeping? 9 policies and procedures dealing with security and authorization mechanisms? documentation describing predefined reports and inquiries? and documentation describing specific applications that are part of the system, including on1line processing transactions and batch @obs. -. 8here documentation is unavailable or lacks details, the analyst interviews staff and administrators who are familiar with the how the system processes and manages data and records.
.. >sing the functional decomposition analyses and system documentation, the analyst reviews how the system is managing records in accordance with the )%equirements for 4lectronic %ecords &anagement 'ystems.*
RE4"IRE' MA!ERIA-S* ,. $unctional decomposition analyses from step ,. -. 'ystem documentation. .. Ather documentation "e.g., procedure manuals, policies, retention schedules#. /. Fotes from interview with staff and administrators C. I> $unctional %equirements statement.
'E-IERA+-E* ,. This document will be organized at the highest level sub1function, and only will include analysis at lower levels as needed. 8ithin each sub1function, the responses will be arranged according to the list of $unctional %equirements and will address the issues defined for each requirement. $or each requirement, prepare a brief narrative statement describing how the system does or does not meet the requirement. R&-ES A%' RES#&%SI+I-I!IES* Donducted by+ pro@ect analyst %eviewed by+ pro@ect staff, business area staff, computing services staff !pproved by+ pro@ect staff Information %esources+ business area staff, computing services staff S!E# 8* A%A-56I%, 7&2 !7E S5S!EM IS '&("ME%!I%, RE(&R'S I% !ERMS &. !7E I" ME!A'A!A S#E(I.I(A!I&%S 10 The goals of this step in the methodology are twofold+ a# describe or model how the existing system is presently documenting the records created by the business processes identified during the analysis conducted in 'tep ,? and b# analyze these results in terms of the I> &etadata 'pecifications. In essence the goal is to determine if the )evidence* required to document the business transactions exists and in what form. In other words, the primary ob@ective is to determine whether the metadata category or element exists for that record or class of records. The goal is not to determine whether the value provided for that metadata element is correct or incorrect. !s in the previous step, the analyst will rely heavily on relevant documentation to determine how the system is presently documenting records. 8here documentation is non1existent or lacks detail, the analyst will interview knowledgeable staff who understand how data is processed and managed in the system. In reviewing the documentation and determining how the system is documenting records, the analyst will be guided by the specifications for recordkeeping listed in the &etadata 'pecifications statement. %ecords within business events and even business sub1functions often will include the same types of metadata. This is particularly true for so1called )management* metadata that document why and how records will be accessed and used, disposed of, and preserved. In most cases, the type of metadata collected to document these activities will be the same for many, many records within a business process. 4ven audit trail metadata documenting activities performed on individual records is predictable because so much of this type documentation is collected automatically by the system and applied to many records within a business process. $inally even types of metadata that are unique to a specific record, such as the unique identifier, can be analyzed at the aggregate level by asking the question+ for records of this class or function, does the system assign a unique identifier. !gain, it is important to remember that what we are analyzing is whether the system collects or creates this category of metadata and not whether the metadata value is correct or not. !ccordingly, as with the functional requirements, the analyst will begin by reviewing and analyzing how the metadata specification is met at the highest1 level sub1function for the business function under review. If during the analysis it becomes clear that the records produced in the course of completing lower1level sub1functions are documented differently than the records of related sub1functions, the analyst will then proceed to analyze the records at the next lower level. $or example, in reviewing the system for )9isposition* &etadata,* the analyst discovers that within the sub1function )4nrollment Dertification* retention periods are specified, while for the related sub1 function )9egree Dertification* retention metadata is not present. Ance this difference is discovered, the analyst would immediately adopt a strategy of reviewing separately the products of business processes for each of the lower1level sub1functions. 'imilarly, if types of metadata collected at the level of the business transaction are different, then the analyst will begin the analysis of the system for that specification at the level of the business event or record level. 11 It is also important to determine the nature of the logical relationship between the record content and the metadata. Is the metadata part of the recordH Is it electronically linked to the recordH Is the metadata a paper record whose location is electronically linked to the recordH Ar is there no logical relationship between the metadata and recordH
2&R3 S!E#S* ,. !nalyst gathers available documentation on how the system documents data and records. Prominent types of documentation include business process models, data models, and data dictionaries. -. 8here documentation is unavailable or lacks details, the analyst interviews staff and administrators who are familiar with the how the system documents data and records.
.. !nalyst reviews how the system is documenting records in accordance with the I> %ecordkeeping &etadata 'pecifications.
RE4"IRE' MA!ERIA-S* ,. $unctional decomposition analyses from step ,. -. 9ocumentation on how the system is documenting records. .. Fotes from interview with staff and administrators /. I> &etadata 'pecifications document. 'E-IERA+-E* %esponses will be organized at the highest level sub1function, and only will include analysis at lower levels as needed. 8ithin each sub1function, the responses will be arranged according to the list of &etadata 'pecifications and will address the following questions+ a# 9oes the metadata existH :# 8hat is the logical relationship between the metadata or a citation to the metadata and the record contentH R&-ES A%' RES#&%SI+I-I!IES* Donducted by+ pro@ect analyst %eviewed by+ pro@ect staff, business area staff, computing services staff !pproved by+ pro@ect staff Information %esources+ business area staff, computing services staff 12 Step 9* EA-"A!E !7E S5S!EMS I% !ERMS &. !7E :."%(!I&%A- RE4"IREME%!S .&R EI'E%(E I% RE(&R'3EE#I%,: ow effectively does the existing system satisfy the requirements of a recordkeeping systemH In this step, the results of the analyses conducted in steps , and - are evaluated in terms of various categories of compliance.
2&R3 S!E#S* ,. Pro@ect staff review documentation produced by analyst in previous steps. -. Pro@ect staff interview analyst, if necessary. .. It may be necessary to conduct additional interviews with record creators or to review the documentation so as to gather more specific or detailed information. 4ven with the best efforts of the analyst in preparing documentation for the evaluation, the evaluator"s# may require additional information or interpretation in order to evaluate correctly the evidence collected during the previous analyses. /. $or each sub1function the pro@ect staff evaluates the systems according to the following criteria+ ow effectively does the system satisfy the requirements of a recordkeeping systemH $or each of the Indiana >niversity $unctional %equirements, what evidence is there that the system satisfies that %equirementH 9o not respond with a simple yes or no? generate a brief narrative statement with specific examples of evidence that the requirement is fulfilled or not fulfilled. In addition, classify the level of compliance in terms of one of the following three categories+ ,# satisfied, -# partially satisfied, and .# not satisfied. RE4"IRE' MA!ERIA-S* ,. 9ocumentation from steps , and -. -. Ather supporting documentation accumulated in previous phases. .. Indiana >niversity versions of $unctional %equirements. 'E-IERA+-E* ,. ! document that for each high1level sub1function that describes the nature and level of compliance with each of the I> $unctional %equirements. R&-ES A%' RES#&%SI+I-I!IES* Donducted by+ pro@ect staff %eviewed by+ archivist !pproved by+ archivist Information resources+ pro@ect analyst 13 Step ;* EA-"A!E !7E S5S!EMS I% !ERMS &. 7&2 2E-- !7E5 MEE! !7E I" ME!A'A!A S#E(I.I(A!I&%S ow effectively does the existing system satisfy the I> &etadata 'pecifications. In this step, the results of the analyses conducted in steps , and - are evaluated in terms of various categories of compliance.
2&R3 S!E#S* ,. Pro@ect staff review documentation produced by analyst in previous steps. -. Pro@ect staff interview analyst, if necessary. .. It may be necessary to conduct additional interviews with record creators or to review the documentation so as to gather more specific or detailed information. 4ven with the best efforts of the analyst in preparing documentation for the evaluation, the evaluator"s# may require additional information or interpretation in order to evaluate correctly the evidence collected during the previous analyses. /. $or each business event the pro@ect staff evaluates the systems according to the following criteria+ Is the appropriate metadata "context, structure, and content# being captured and preserved inviolate by the existing systemH $or each of the Indiana >niversity &etadata 'pecifications, what evidence is there that the system satisfies the 'pecificationH !gain, do not respond with a simple yes or no. Dreate a brief narrative statement with specific examples of compliance or non1compliance. In addition, classify the level of compliance in terms of one of the following categories+ a# &etadata is available electronically with use of record? b# &etadata is available in electronic or paper format, and there is a logical relationship between the metadata or a citation to this metadata and the record itself? c# &etadata is available in electronic or paper format, but there is no logical relationship between the metadata or a citation to the metadata and the record itself? d# &etadata is not available anywhere.
RE4"IRE' MA!ERIA-S* ,. 9ocumentation from steps , and -. -. Ather supporting documentation accumulated in previous phases. .. Indiana >niversity versions of the &etadata 'pecifications 'E-IERA+-E* ,. ! document that for each event process or transaction describes the nature and level of compliance with the I> &etadata 'pecifications. R&-ES A%' RES#&%SI+I-I!IES* Donducted by+ pro@ect staff 14 %eviewed by+ archivist !pproved by+ archivist Information resources+ pro@ect analyst Step <* RE(&MME%'A!I&%S Ance the analysis of how the information system is managing records of the various business processes is completed, staff meet to determine what recommendations will be made for improving the performance of the system. 8e recognize that not all the problems identified in the evaluation process will be of equal rank or of the same level or degree of seriousness. Therefore there are three categories or levels of recommendations+ ighest Priority %ecommendations, Doncerns, and $or 5our Information. 8hen making recommendations for changes to recordkeeping systems keep in mind the costsErisks and benefits associated with implementing that particular recommendation. 8e also recognize that institutions will not likely implement every recommendation we make. The decision to implement will be based on a variety of factors, including an appraisal of the value of the records, costs and benefits, risk of retaining or disposing of documentation, and organizational needs and priorities. 2&R3 S!E#S* ,. Pro@ect staff reviews the evaluation document for evidence of functional requirements and metadata specifications that have not been met. -. Pro@ect staff prepares a set of recommendations for improving the system based on the three categories listed above. .. Pro@ect staff prepares a report and presents the recommendations to appropriate parties. RE4"IRE' MA!ERIA-S* ,. The evaluation document from 'tep .. -. 9ocuments from other phases if necessary 'E-IERA+-ES* %eport of recommendations in the following format+ Introductory statement describing the scope and ob@ectives of the evaluation process 'pecific recommendations organized into the categories of+ ighest Priority %ecommendations, Doncerns, and $or 5our Information. 4ach recommendation will include an explanation of the problem and recommendations on how the unit might 15 address it. This document along with a short cover letter outlining the process is then forwarded to the appropriate data stewards and managers for their review. 'oon after transmittal of the report, a meeting will be scheduled to discuss the various recommendations and implementation strategies. R&-ES A%' RES#&%SI+I-I!IES* Donducted by+ pro@ect staff, pro@ect analyst %eviewed by+ archivist, business area staff !pproved by+ archivist !ccepted or %e@ected by+ business area staff Information resources+ pro@ect analyst 16