System use case specification maintain protocols - ESG-Project/documentation GitHub Wiki

← Home / Requirements / System Use Cases / System Use Cases Specification

Identification UC08
Use case Maintain protocols
Actors Administrator, Technician
Stakeholders and interests Consulting company: Ability to maintain the protocols of each project.
Pre-conditions User is logged into the system as an administrator or technician; Has at least one registered client; Has at least one registered project.
Minimum guarantees System prevents duplicate records.
Success guarantees User performs any CRUD manipulation of protocols.

Main Success Scenario

User Action System Response
1. This use case begins when the user selects the option to list protocols of a project 2. The system displays the list of registered protocols linked to the project
3. The user accesses the option to register a new protocol 4. The system displays the protocol registration form
5. The user fills in the protocol's information 6. The system validates the input
7. The user selects the save option 8. The system validates all information and saves the protocol data
9. The system confirms the successful registration of the protocol

Alternative Flows

2a Invalid protocol information

User Action System Response
1. The system detects invalid or missing information
2. The system displays an error message to the user
3. The user corrects the information and resubmits 4. The system validates the corrected information and returns to step 6 of the Main Success Scenario

3a Edit protocol

User Action System Response
1. The user accesses the option to edit a protocol 2. The system displays the protocol information in an editable form
3. The user modifies the protocol's information 4. The system validates the changes
5. The user selects the save option 6. The system validates all information and updates the protocol data
7. The system confirms the successful update of the protocol

3b Delete protocol

User Action System Response
1. The user accesses the option to delete a protocol 2. The system displays a confirmation dialog
3. The user confirms the deletion 4. The system verifies if the protocol can be deleted
5. The system removes the protocol data
6. The system confirms the successful deletion of the protocol

3b.4a Protocol cannot be deleted

User Action System Response
1. The system detects that the protocol has associated records (e.g., documents, tasks)
2. The system displays an error message explaining why the protocol cannot be deleted
3. The system returns to the protocols list

3c User cancels the action

User Action System Response
1. The user cancels the action 2. The system returns to the protocols list without making any changes

Special Requirements

  • Protocol Information: Must include name, description, status, dates, and project association.
  • Duplicate Prevention: The system must check for existing protocols with similar information before saving.
  • Data Validation: All protocol information must be validated according to business rules.
  • Access Control: Only authorized users can modify protocol information based on their role.
  • Audit Trail: The system must maintain a history of all changes made to protocol records.
  • Soft Delete: When a protocol is deleted, its information should be archived rather than permanently removed.
  • Search Functionality: The system must provide search and filter capabilities for the protocol list.
  • Status Management: The system must support different protocol statuses (e.g., Draft, Active, Archived).
  • Project Association: Each protocol must be associated with a valid project.
  • Document Management: The system must support attaching and managing related documents.
  • Notification System: The system must notify relevant users about protocol changes and updates.