![]() |
![]() |
![]() |
|
![]() |
|||
| CM 1.2: Setting up the CM |
Contents
|
|
|
|---|
Product Flow
| From | Product | to | Methods | Tool Req. | Ext. Norms | |||
|---|---|---|---|---|---|---|---|---|
| Activity | State | Chapter | Title | Activity | State | |||
| PM1 | accepted | All | Project Manual | - | - | SSEC03 | ||
| CM1.1 | accepted | All | CM Plan | - | - | |||
+ "Chapter" are extra columns from the original printed version of GD 250
Further Results:
Product library
Installed tools
Handling
When storing the documents during the course of the project, the valid IT security-relevant regulations have to be adhered to.
Roles
| Role | Participation | ||
|---|---|---|---|
| CM Representative | advising
| CM Administrator |
responsible
| |
Tools Requirements
External Norms
![]() |
![]() |
GDPA Online
Last Updated 01.Jan.2002
Updated by Webmaster
Last Revised 01.Jan.2002
Revised by Webmaster
![]() |