Download Software Guide (Measuring Instruments Directive 2004

Transcript
WELMEC WG7
Software Guide
WELMEC 7.2, Issue 5
Are means employed to ensure the authenticity of the legally
relevant software and are the authenticity of the results that are
presented guaranteed?
Is the legally relevant software designed in such a way that other
U9
software does not inadmissibly influence it?
* Explanations are needed if there are deviations from software requirements.
U8
3) Checklist for specific requirements extension L
Do the stored measurement data contain all relevant information
necessary to reconstruct an earlier measurement?
Are stored data protected against accidental and unintentional
L2
changes?
Are the stored measurement data protected against intentional
changes carried out by simple common software tools (for risk
L3
classes B&C) or by special sophisticated software tools (for risk
classes D&E)?
Are the stored measurement data capable of being authentically
L4
traced back to the measurement that generated them?
B&C) Are keys treated as legally relevant data and kept secret
and protected against compromise by simple software tools?
D&E) Are keys and accompanying data treated as legally
L5
relevant data and kept secret and protected against compromise
by sophisticated software tools? Are Appropriate methods
equivalent to electronic payment used? Is user able to verify the
authenticity of the public key?
Does the software used for verifying stored measurement data
sets display or print the data, check the data for changes, and
L6
warn if a change has occurred? Are there means to prevent data
detected as having been corrupted to be used?
Are the measurement data stored automatically when the
L7
measurement is concluded?
Does the long-term storage have a capacity which is sufficient
L8
for the intended purpose?
* Explanations are needed if there are deviations from software requirements.
L1
109
Failed
Not Applicable
Passed
Testing
procedures
Requirement
Checklist for Requirements of Extension L
Remarks
*