Download Software Guide (Measuring Instruments Directive 2004
Transcript
WELMEC WG7 Software Guide WELMEC 7.2, Issue 5 Are means employed to ensure the authenticity of the legally relevant software and are the authenticity of the results that are presented guaranteed? Is the legally relevant software designed in such a way that other U9 software does not inadmissibly influence it? * Explanations are needed if there are deviations from software requirements. U8 3) Checklist for specific requirements extension L Do the stored measurement data contain all relevant information necessary to reconstruct an earlier measurement? Are stored data protected against accidental and unintentional L2 changes? Are the stored measurement data protected against intentional changes carried out by simple common software tools (for risk L3 classes B&C) or by special sophisticated software tools (for risk classes D&E)? Are the stored measurement data capable of being authentically L4 traced back to the measurement that generated them? B&C) Are keys treated as legally relevant data and kept secret and protected against compromise by simple software tools? D&E) Are keys and accompanying data treated as legally L5 relevant data and kept secret and protected against compromise by sophisticated software tools? Are Appropriate methods equivalent to electronic payment used? Is user able to verify the authenticity of the public key? Does the software used for verifying stored measurement data sets display or print the data, check the data for changes, and L6 warn if a change has occurred? Are there means to prevent data detected as having been corrupted to be used? Are the measurement data stored automatically when the L7 measurement is concluded? Does the long-term storage have a capacity which is sufficient L8 for the intended purpose? * Explanations are needed if there are deviations from software requirements. L1 109 Failed Not Applicable Passed Testing procedures Requirement Checklist for Requirements of Extension L Remarks *