** Reply to note from "Heath, Mark" <[log in to unmask]> Wed, 13 Aug 2003 14:51:01 +0100
> Probably an obvious query, but has anyone tested the view that "live "data -
How do you test the view though? Is it euphimism for "has anyone been
prosecuted?
> that will in due course be put on a new system & "used" shouldn't be test
> run on that system? One view is that it will go on anyway so why worry,
> another is that its a different purpose - testing the system cf providing a
> service.
When you have the new system delivered you could migrate ALL the data and
keep the old system running whilst you satisfy yourself that the new system is
working properly. However much you test with dummy data you will HAVE TO
put the real data on and still check it
>
> The latter tends to attract the narrow pedant response, but is I suspect
Pedant on a mailing list? Never!!!
> right - especially if the testing is being done by AN Other - the supplier
> of the system or whoever......
AN Other is not the problem as AN Other could come and see your data any
time you have a problem and you invite him. Your notifiocation should cover
for such AN Others.
>
> If right, I wonder if others specify that suppliers of new IT systems must
> test any new system with dummy data that they bring, not assume access to
> our live data.......
At some point you have to use real data purely for testing:
(a) the new system
(b) your data migration routines.
Regards
Charles
==============================================
Charles Christacopoulos, Management Information Officer,
Planning & Information, University of Dundee, Dundee, DD1 4HN,
Scotland, United Kingdom. Tel: 44(0)1382-344891. Fax: 44(0)1382-201604.
http://www.somis.dundee.ac.uk/
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|