As a system user for Accreditation Management, I should be able to digitally manage Collaboration. |
As a system user for Accreditation Management, I should be able to digitally manage Compliance Management. |
As a system user for Accreditation Management, I should be able to digitally manage Document Management. |
As a system user for Accreditation Management, I should be able to digitally manage Higher Education. |
As a system user for Accreditation Management, I should be able to digitally manage Requirements Management. |
As a system user for Accreditation Management, I should be able to digitally manage Reviewer Portal. |
As a system user for Accreditation Management, I should be able to digitally manage Self Assessment. |
As a system user for Accreditation Management, I should be able to digitally manage User Access Permissions. |
As a system user for Accreditation Management, I should be able to digitally manage Workflow Management. |
As a system user for Audit, I should be able to digitally manage Alerts/Notifications. |
As a system user for Audit, I should be able to digitally manage Asset Tracking. |
As a system user for Audit, I should be able to digitally manage Audit Planning. |
As a system user for Audit, I should be able to digitally manage Compliance Management. |
As a system user for Audit, I should be able to digitally manage Dashboard. |
As a system user for Audit, I should be able to digitally manage Forms Management. |
As a system user for Audit, I should be able to digitally manage Issue Management. |
As a system user for Audit, I should be able to digitally manage Mobile Access. |
As a system user for Audit, I should be able to digitally manage Risk Assessment. |
As a system user for Audit, I should be able to digitally manage Task Management. |
As a system user for Audit, I should be able to digitally manage Workflow Management. |
As a system user for Cloud Storage, I should be able to digitally manage Access Control. |
As a system user for Cloud Storage, I should be able to digitally manage Archiving & Retention. |
As a system user for Cloud Storage, I should be able to digitally manage Backup. |
As a system user for Cloud Storage, I should be able to digitally manage Data Migration. |
As a system user for Cloud Storage, I should be able to digitally manage Data Synchronization. |
As a system user for Cloud Storage, I should be able to digitally manage Encryption. |
As a system user for Cloud Storage, I should be able to digitally manage File Sharing. |
As a system user for Cloud Storage, I should be able to digitally manage Version Control. |
As a system user for Compliance, I should be able to digitally manage Archiving & Retention. |
As a system user for Compliance, I should be able to digitally manage Audit Management. |
As a system user for Compliance, I should be able to digitally manage Compliance Tracking. |
As a system user for Compliance, I should be able to digitally manage Controls Testing. |
As a system user for Compliance, I should be able to digitally manage Environmental Compliance. |
As a system user for Compliance, I should be able to digitally manage FDA Compliance. |
As a system user for Compliance, I should be able to digitally manage HIPAA Compliant. |
As a system user for Compliance, I should be able to digitally manage Incident Management. |
As a system user for Compliance, I should be able to digitally manage ISO Compliance. |
As a system user for Compliance, I should be able to digitally manage OSHA Compliance. |
As a system user for Compliance, I should be able to digitally manage Process/Workflow Automation. |
As a system user for Compliance, I should be able to digitally manage Risk Management. |
As a system user for Compliance, I should be able to digitally manage Sarbanes-Oxley Compliance. |
As a system user for Compliance, I should be able to digitally manage Surveys & Feedback. |
As a system user for Compliance, I should be able to digitally manage Version Control. |
As a system user for Computer Security, I should be able to digitally manage Anti Spam. |
As a system user for Computer Security, I should be able to digitally manage Anti Virus. |
As a system user for Computer Security, I should be able to digitally manage Audit Trail. |
As a system user for Computer Security, I should be able to digitally manage Compliance Management. |
As a system user for Computer Security, I should be able to digitally manage Database Security Audit. |
As a system user for Computer Security, I should be able to digitally manage File Access Control. |
As a system user for Computer Security, I should be able to digitally manage Financial Data Protection. |
As a system user for Computer Security, I should be able to digitally manage Maintenance Scheduling. |
As a system user for Computer Security, I should be able to digitally manage Real Time Monitoring. |
As a system user for Computer Security, I should be able to digitally manage Security Event Log. |
As a system user for Computer Security, I should be able to digitally manage Virus Definition Update. |
As a system user for Computer Security, I should be able to digitally manage Vulnerability Protection. |
As a system user for Cybersecurity, I should be able to digitally manage AI / Machine Learning. |
As a system user for Cybersecurity, I should be able to digitally manage Behavioral Analytics. |
As a system user for Cybersecurity, I should be able to digitally manage Endpoint Management. |
As a system user for Cybersecurity, I should be able to digitally manage Incident Management. |
As a system user for Cybersecurity, I should be able to digitally manage IOC Verification. |
As a system user for Cybersecurity, I should be able to digitally manage Tokenization. |
As a system user for Cybersecurity, I should be able to digitally manage Vulnerability Scanning. |
As a system user for Cybersecurity, I should be able to digitally manage Whitelisting/Blacklisting. |
As a system user for Digital Signature, I should be able to digitally manage Audit Trail. |
As a system user for Digital Signature, I should be able to digitally manage Authentication. |
As a system user for Digital Signature, I should be able to digitally manage Auto Reminders. |
As a system user for Digital Signature, I should be able to digitally manage Customizable Templates. |
As a system user for Digital Signature, I should be able to digitally manage Document Analytics. |
As a system user for Digital Signature, I should be able to digitally manage Mobile Signature. |
As a system user for Digital Signature, I should be able to digitally manage Multi-Party Signing. |
As a system user for Digital Signature, I should be able to digitally manage Task Progress Tracking. |
As a system user for GDPR Compliance, I should be able to digitally manage Access Control. |
As a system user for GDPR Compliance, I should be able to digitally manage Consent Management. |
As a system user for GDPR Compliance, I should be able to digitally manage Data Mapping. |
As a system user for GDPR Compliance, I should be able to digitally manage Incident Management. |
As a system user for GDPR Compliance, I should be able to digitally manage PIA / DPIA. |
As a system user for GDPR Compliance, I should be able to digitally manage Policy Management. |
As a system user for GDPR Compliance, I should be able to digitally manage Risk Management. |
As a system user for GDPR Compliance, I should be able to digitally manage Sensitive Data Identification. |
As a system user for Log Management, I should be able to digitally manage Archiving. |
As a system user for Log Management, I should be able to digitally manage Audit Trails. |
As a system user for Log Management, I should be able to digitally manage Compliance Reporting. |
As a system user for Log Management, I should be able to digitally manage Consolidation. |
As a system user for Log Management, I should be able to digitally manage Data Visualization. |
As a system user for Log Management, I should be able to digitally manage Event Logs. |
As a system user for Log Management, I should be able to digitally manage Network Logs. |
As a system user for Log Management, I should be able to digitally manage Remediation. |
As a system user for Log Management, I should be able to digitally manage Syslogs. |
As a system user for Log Management, I should be able to digitally manage Thresholds. |
As a system user for Log Management, I should be able to digitally manage Web Logs. |
As a system user for Network Monitoring, I should be able to digitally manage Bandwidth Monitoring. |
As a system user for Network Monitoring, I should be able to digitally manage Baseline Manager. |
As a system user for Network Monitoring, I should be able to digitally manage Dashboard. |
As a system user for Network Monitoring, I should be able to digitally manage Internet Usage Monitoring. |
As a system user for Network Monitoring, I should be able to digitally manage IP Address Monitoring. |
As a system user for Network Monitoring, I should be able to digitally manage Network Diagnosis. |
As a system user for Network Monitoring, I should be able to digitally manage Network Resource Management. |
As a system user for Network Monitoring, I should be able to digitally manage Server Monitoring. |
As a system user for Network Monitoring, I should be able to digitally manage SLA Monitoring. |
As a system user for Network Monitoring, I should be able to digitally manage Uptime Monitoring. |
As a system user for Network Monitoring, I should be able to digitally manage Web Traffic Reporting. |
As a system user for Network Security, I should be able to digitally manage Access Control. |
As a system user for Network Security, I should be able to digitally manage Activity Monitoring. |
As a system user for Network Security, I should be able to digitally manage Firewalls. |
As a system user for Network Security, I should be able to digitally manage Intrusion Detection System. |
As a system user for Network Security, I should be able to digitally manage Reporting/Analytics. |
As a system user for Network Security, I should be able to digitally manage Threat Response. |
As a system user for Network Security, I should be able to digitally manage VPN. |
As a system user for Network Security, I should be able to digitally manage Vulnerability Scanning. |
As a system user for PCI Compliance, I should be able to digitally manage Access Control. |
As a system user for PCI Compliance, I should be able to digitally manage Compliance Reporting. |
As a system user for PCI Compliance, I should be able to digitally manage Exceptions Management. |
As a system user for PCI Compliance, I should be able to digitally manage File Integrity Monitoring. |
As a system user for PCI Compliance, I should be able to digitally manage Intrusion Detection System. |
As a system user for PCI Compliance, I should be able to digitally manage Log Management. |
As a system user for PCI Compliance, I should be able to digitally manage Patch Management. |
As a system user for PCI Compliance, I should be able to digitally manage PCI Assessment. |
As a system user for PCI Compliance, I should be able to digitally manage Policy Management. |
As a system user for Vulnerability Management, I should be able to digitally manage Asset Discovery. |
As a system user for Vulnerability Management, I should be able to digitally manage Asset Tagging. |
As a system user for Vulnerability Management, I should be able to digitally manage Network Scanning. |
As a system user for Vulnerability Management, I should be able to digitally manage Patch Management. |
As a system user for Vulnerability Management, I should be able to digitally manage Policy Management. |
As a system user for Vulnerability Management, I should be able to digitally manage Prioritization. |
As a system user for Vulnerability Management, I should be able to digitally manage Risk Management. |
As a system user for Vulnerability Management, I should be able to digitally manage Vulnerability Assessment. |
As a system user for Vulnerability Management, I should be able to digitally manage Web Scanning. |