Data Export & Security
UC-ANA-002: Export Custom Data
Purpose: Enable deep-dive analysis by exporting raw data.
| Property | Value |
|---|---|
| Actor | Manager |
| Trigger | User requests export |
| Priority | P2 |
Main Success Scenario:
- User filters "Bookings" table by date range "Last Quarter".
- User clicks "Export to CSV".
- System runs background job to generate file.
- User receives download link via notification.
Acceptance Criteria:
- [ ] Sensitive PII masked in export (unless authorized).
- [ ] File generation handles large datasets (>10k rows) gracefully.
UC-ANA-003: View Security Audit Logs
Purpose: Track sensitive actions for security and compliance.
| Property | Value |
|---|---|
| Actor | Tenant Admin |
| Trigger | Suspicious activity or routine check |
| Priority | P0 |
Capabilities Breakdown:
1. Granular Audit Logs (UC 60.1)
-
Scope: Tracks "Who created", "Who edited", "Who deleted" for ALL entities.
-
Detail: Records "Before Value" vs "After Value" (e.g., Price changed $50 -> $60).
-
Search: "Show me all changes by User X between Date A and Date B".
2. Compliance Exports (UC 60.3)
-
GDPR / CCPA: One-click "Download My Data" pack for end-users (JSON/PDF).
-
Tax Audits: "Export all invoices" for a fiscal year in standard Accounting Format (XERO/QuickBooks CSV).
3. Masking & PII Protection (UC 60.5)
-
Role-Based masking: Reception sees
+1 555-****, Manager sees+1 555-1234. -
Export Sanitization: Option to anonymize names in analytics dumps.
Main Success Scenario:
- Admin suspects an unauthorized price change.
- Admin opens "Audit Logs".
- Filters by "Entity: Service Menu".
- Sees Log: "User 'Bob' changed 'Haircut' price from $50 to $10".
- Admin reverts change and locks Bob's account.
Acceptance Criteria:
- [ ] Audit logs are immutable (write-once).
- [ ] "Delete User" (Right to be Forgotten) hard-deletes PII but keeps anonymized transational data.
- [ ] Exports larger than 10MB are emailed as async download links.
Related Use Cases
-
User Roles: Who can see logs.
-
Billing: Source of invoice data.
Main Success Scenario:
- Admin navigates to "Security Logs".
- System displays chronological list of events (Login, Delete Booking, Export Data).
- Admin searches for specific user "Staff A".
- System filters logs to show actions by "Staff A".
Acceptance Criteria:
- [ ] Immutable logs.
- [ ] Logs retained for minimum 6 months.