Knowledge

Business continuity planning

Source ๐Ÿ“

156:(national or interorganizational). There are also two main types of resilience, which are proactive and post resilience. Proactive resilience is preparing for a crisis and creating a solid foundation for the company. Post resilience includes continuing to maintain communication and check in with employees. Proactive resilience is dealing with issues at hand before they cause a possible shift in the work environment and post resilience maintaining communication and accepting changes after an incident has happened. Resilience can be applied to any organization. In New Zealand, the Canterbury University Resilient Organisations programme developed an assessment tool for benchmarking the Resilience of Organisations. It covers 11 categories, each having 5 to 7 questions. A 137:. In her 2010 article, "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being" Buzzanell discussed the ability for organizations to thrive after having a crisis through building resistance. Buzzanell notes that there are five different processes that individuals use when trying to maintain resilience- crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work and downplaying negative feelings while foregrounding positive emotions. 3577: 687:โ€ข Tier 7 solutions include all the major components being used for a Tier 6 solution with the additional integration of automation. This allows a Tier 7 solution to ensure consistency of data above that of which is granted by Tier 6 solutions. Additionally, recovery of the applications is automated, allowing for restoration of systems and applications much faster and more reliably than would be possible through manual Disaster Recovery procedures. 903:: Businesses must have continuity planning measures to survive and continue to thrive whilst working towards keeping the incident as minimal as possible. The Act was separated into two parts: Part 1: civil protection, covering roles & responsibilities for local responders Part 2: emergency powers. In the United Kingdom, resilience is implemented locally by the 141:
crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work, and downplaying negative feelings while foregrounding negative emotions. Each of these processes can be applicable to businesses in crisis times, making resilience an important factor for companies to focus on while training.
617:โ€ข Tier 2 Disaster Recovery solutions make regular backups on tape. This is combined with an off-site facility and infrastructure (known as a hot site) in which to restore systems from those tapes in the event of a disaster. This tier solution will still result in the need to recreate several hours to days worth of data, but 168:
Plans and procedures are used in business continuity planning to ensure that the critical organizational operations required to keep an organization running continue to operate during events when key dependencies of operations are disrupted. Continuity does not need to apply to every activity which
140:
When looking at the resilience theory, the crisis communication theory is similar, but not the same. The crisis communication theory is based on the reputation of the company, but the resilience theory is based on the process of recovery of the company. There are five main components of resilience:
94:
outlines a range of disaster scenarios and the steps the business will take in any particular scenario to return to regular trade. BCP's are written ahead of time and can also include precautions to be put in place. Usually created with the input of key staff as well as stakeholders, a BCP is a set
895:
Within the UK, BS 25999-2:2007 and BS 25999-1:2006 were being used for business continuity management across all organizations, industries and sectors. These documents give a practical plan to deal with most eventualitiesโ€”from extreme weather conditions to terrorism, IT system failure, and staff
114:
Adapting to change in an apparently slower, more evolutionary manner - sometimes over many years or decades - has been described as being more resilient, and the term "strategic resilience" is now used to go beyond resisting a one-time crisis, but rather continuously anticipating and adjusting,
63:
Business continuity requires a top-down approach to identify an organisation's minimum requirements to ensure its viability as an entity. An organization's resistance to failure is "the ability ... to withstand changes in its environment and still function". Often called resilience, it is a
31: 645:โ€ข Tier 4 solutions are used by businesses that require both greater data currency and faster recovery than users of lower tiers. Rather than relying largely on shipping tape, as is common in the lower tiers, Tier 4 solutions begin to incorporate more disk-based solutions. 421: 277:
Recovery point objective (RPO) โ€“ the acceptable latency of data that will not be recovered. For example, is it acceptable for the company to lose 2 days of data? The recovery point objective must ensure that the maximum tolerable data loss for each activity is not
340:
objectives, to define a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms used in this context are "Recovery Consistency Characteristics" (RCC) and "Recovery Object Granularity" (ROG).
1112:
Software and work process changes must be documented and validated, including verification that documented work process recovery tasks and supporting disaster recovery infrastructure allow staff to recover within the predetermined recovery time objective.
941: 3036: 801::2021 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for business impact analysis - (Replaces ISO/TS 22315:2015 Societal security โ€“ Business continuity management systems โ€“ Guidelines for business impact analysis.) 807::2021 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for supply chain continuity (Replaces ISO/TS 22318:2015 Societal security โ€” Business continuity management systems โ€” Guidelines for supply chain continuity.) 125:
Resilience Theory can be related to the field of Public Relations. Resilience is a communicative process that is constructed by citizens, families, media system, organizations and governments through everyday talk and mediated conversation.
2115: 2037: 2045: 1426: 631:โ€ข Tier 3 solutions utilize components of Tier 2. Additionally, some mission-critical data is electronically vaulted. This electronically vaulted data is typically more current than that which is shipped via PTAM. As a result there is 344:
While RTO and RPO are absolute per-system values, RCO is expressed as a percentage that measures the deviation between actual and targeted state of business data across systems for process groups or individual business processes.
846:
ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection โ€” Information security controls. (Replaces ISO/IEC 27002:2013 Information technology โ€” Security techniques โ€” Code of practice for information security
843:, cybersecurity and privacy protection โ€” Information security management systems โ€” Requirements. (Replaces ISO/IEC 27001:2013 Information technology โ€” Security techniques โ€” Information security management systems โ€” Requirements.) 1003:- Several departments, teams or disciplines concentrate on multiple BCP aspects; the scope can range from a few teams from one building to multiple teams operating across dispersed locations. Pre-scripted "surprises" are added. 64:
capability that enables organizations to either endure environmental changes without having to permanently adapt, or the organization is forced to adapt a new way of working that better suits the new environmental conditions.
3184: 831::2014 Conformity assessment โ€“ Requirements for bodies providing audit and certification of management systems โ€“ Part 6: Competence requirements for auditing and certification of business continuity management systems. 2648: 1272: 677:. They are used by businesses with little or no tolerance for data loss and who need to restore data to applications rapidly. These solutions have no dependence on the applications to provide data consistency. 49:) is the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of 180:
A major cost in planning for this is the preparation of audit compliance management documents; automation tools are available to reduce the time and cost associated with manually producing this information.
1288:
Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of Applied Management Studies, Vol. 8, No, pp. 43โ€“60. Here: p.
589:โ€ข Businesses with a Tier 0 Disaster Recovery solution have no Disaster Recovery Plan. There is no saved information, no documentation, no backup hardware, and no contingency plan. Typical recovery time: 2975: 237:
Quantifying of loss ratios must also include "dollars to defend a lawsuit." It has been estimated that a dollar spent in loss prevention can prevent "seven dollars of disaster-related economic loss."
2108: 1433: 351: 3018: 290:
Maximum time constraints for how long an enterprise's key products or services can be unavailable or undeliverable before stakeholders perceive unacceptable consequences have been named as:
1503: 2066: 2530: 1457: 3192: 1556:"An estimated 80 percent of companies without a well-conceived and tested business continuity plan, go out of business within two years of a major disaster" (Santangelo 2004) 173:, organizations are required to define their business continuity objectives, the minimum levels of product and service operations which will be considered acceptable and the 41:
may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and
603:โ€ข Businesses that use Tier 1 Disaster Recovery solutions back up their data at an off-site facility. Depending on how often backups are made, they are prepared to accept 1258: 2605: 1009:- All aspects of a medium exercise remain, but for maximum realism no-notice activation, actual evacuation and actual invocation of a disaster recovery site is added. 953: 836:
ISO/IEC 24762:2008 Information technology โ€” Security techniques โ€” Guidelines for information and communications technology disaster recovery services (withdrawn)
825::2021 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for developing business continuity plans and procedures (Current as of 2022.) 2638:
Cabinet Office. (2004). overview of the Act. In: Civil Contingencies Secretariat Civil Contingencies Act 2004: a short. London: Civil Contingencies Secretariat
348:
The following formula calculates RCO with "n" representing the number of business processes and "entities" representing an abstract value for business data:
1808: 1528: 3258: 1790: 1300: 828: 433:
After defining recovery requirements, each potential threat may require unique recovery steps (contingency plans or playbooks). Common threats include:
3297: 1935: 1238: 1158: 3007: 1761: 107:
over entities not prepared for various contingencies extended then-common business continuity planning practices. Business organizations such as the
1980: 2555: 813::2018 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for people aspects on business continuity (Current as of 2022.) 754:(ISO) has for example developed a whole series of standards on Business continuity management systems under responsibility of technical committee 850: 649:, but it is easier to make such point-in-time (PIT) copies with greater frequency than data that can be replicated through tape-based solutions. 1568: 1507: 997:- a small number of people concentrate on a specific aspect of a BCP. Another form involves a single representative from each of several teams. 853::2011 Information technology โ€“ Security techniques โ€“ Guidelines for information and communication technology readiness for business continuity. 822: 816: 810: 804: 798: 751: 1741: 962:
ASIS SPC.1-2009, Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use,
819::2018 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for business continuity strategy - (Current as of 2022.) 659:โ€ข Tier 5 solutions are used by businesses with a requirement for consistency of data between production and recovery data centers. There is 3238: 607:, but their backups are secure off-site. However, this Tier lacks the systems on which to restore data. Pickup Truck Access Method (PTAM). 332:
When more than one system crashes, recovery plans must balance the need for data consistency with other objectives, such as RTO and RPO.
2948:
ASIS SPC.1-2009 Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use
2059: 1318: 1461: 103:
A 2005 analysis of how disruptions can adversely affect the operations of corporations and how investments in resilience can give a
3496: 2580: 3173: 3290: 1914: 2359: 2327: 2309: 2263: 2245: 2227: 703:
Outside IT: preservation of hard copy (such as contracts). A process plan must consider skilled staff and embedded technology.
76:
interruption, loss of or damage to critical infrastructure (major machinery or computing/network resource). As such, BCP is a
53:. Business continuity is the intended outcome of proper execution of both business continuity planning and disaster recovery. 2959: 963: 856:
ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management (withdrawn)
1961: 1863: 1013:
While start and stop times are pre-agreed, the actual duration might be unknown if events are allowed to run their course.
946: 934: 1025:
Confirmation of information in the manual, roll out to staff for awareness and specific training for critical individuals.
416:{\displaystyle {\text{RCO}}=1-{\frac {({\text{number of inconsistent entities}})_{n}}{({\text{number of entities}})_{n}}}} 3506: 3371: 3351: 3205: 2745: 17: 3200: 3150: 3114: 3086: 3067: 1347:
Ian McCarthy; Mark Collard; Michael Johnson (2017). "Adaptive organizational resilience: an evolutionary perspective".
3250: 3461: 3341: 3283: 3233: 872:(BSI Group) released a series of standards which have since been withdrawn and replaced by the ISO standards above. 789::2020 Security and resilience โ€“ Business continuity management systems โ€“ Guidance on the use of ISO 22301 (Replaces 3583: 3562: 3486: 1225: 3659: 3593: 3471: 2704: 2676: 1812: 1779: 3255: 1021:
Biannual or annual maintenance cycle maintenance of a BCP manual is broken down into three periodic activities.
3639: 3598: 2815: 2531:"BS 7799-1:1995 Information security management - Code of practice for information security management systems" 1921: 1635:
Buzzanell, Patrice M. (March 2010). "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being".
663:
in such solutions; however, the presence of this functionality is entirely dependent on the application in use.
534:
of the disease. They also banned in-person contact during both business and non-business hours. This increased
891:
2008: BS 25777, Information and communications technology continuity management. Code of practice. (withdrawn)
3649: 3436: 2606:"BS 25777:2008 (Paperback) Information and communications technology continuity management. Code of practice" 987: 869: 86: 57: 1542:
Tiffany Braun; Benjamin Martz (2007). "Business Continuity Preparedness and the Mindfulness State of Mind".
3624: 3411: 3366: 2843: 1939: 1754: 1405: 900: 793::2012 Security and resilience - Business continuity management systems - Guidance on the use of ISO 22301.) 1973: 3654: 3521: 3501: 3466: 3441: 3386: 3321: 1600:
Buzzanell, Patrice M. (2010). "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being".
1221: 750:
There are many standards that are available to support business continuity planning and management. The
535: 2946: 526:
The above areas can cascade: Responders can stumble. Supplies may become depleted. During the 2002โ€“2003
256:
Each function/activity typically relies on a combination of constituent components in order to operate:
3644: 3491: 3416: 3396: 2732: 457: 250: 108: 1826: 3619: 3456: 3431: 3361: 2629:
British Standards Institution (2006). Business continuity management-Part 1: Code of practice :London
2209: 2023: 3588: 3552: 3526: 3476: 3391: 1670:
Buzzanell, Patrice M. (2018-01-02). "Organizing resilience as adaptive-transformational tensions".
956:(COOP) and National Continuity Policy Implementation Plan (NCPIP), United States Federal Government 700:
For IT: the minimum application and data requirements and the time in which they must be available.
60:
have been published by various standards bodies to assist in checklisting ongoing planning tasks.
3481: 3451: 3376: 3326: 1163: 990:
identified three types of exercises that can be employed when testing business continuity plans.
779::2019 Security and resilience โ€“ Business continuity management systems โ€“ Requirements (Replaces 3629: 3446: 3406: 3401: 3381: 3336: 2184:
CERTยฎ Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1
974:
The implementation phase involves policy changes, material acquisitions, staffing and testing.
904: 959:
Business Continuity Planning Suite, DHS National Protection and Programs Directorate and FEMA.
320:
mean the same thing and are defined using exactly the same words. Some standards use the term
3536: 3531: 3511: 3421: 2010: 104: 888:
BS 25999-2:2007 Business Continuity Management Part 2: Specification (superseded, withdrawn)
3557: 3516: 3426: 3356: 3346: 3243: 2921: 2868: 1356: 1322: 1170: 1128: 840: 281:
Recovery time objective (RTO)  โ€“ the acceptable amount of time to restore the function
2150: 2133: 72:
Any event that could negatively impact operations should be included in the plan, such as
8: 1195: 885:-1:2006 - Business continuity management Part 1: Code of practice (superseded, withdrawn) 3267: 1360: 1035:
Issues found during the testing phase often must be reintroduced to the analysis phase.
2163: 1695: 1547: 1143: 2816:"NATIONAL CONTINUITY POLICY IMPLEMENTATION PLAN Homeland Security Council August 2007" 1583:"Communication and resilience: concluding thoughts and key issues for future research" 1383: 3146: 3110: 3082: 3063: 2955: 2741: 2734:
NFPA 1600, Standard on Disaster/Emergency Management and Business Continuity Programs
2167: 2155: 1699: 1687: 1652: 1648: 1617: 1613: 1582: 1190: 1180: 1153: 1133: 1123: 1063: 718: 708: 575: 571: 531: 134: 130: 50: 3228: 3223: 1028:
Testing and verification of technical solutions established for recovery operations.
930:
NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs
95:
of contingencies to minimize potential harm to businesses during adverse scenarios.
2145: 1998: 1888: 1679: 1644: 1609: 1551: 1364: 1200: 1175: 1138: 727: 337: 1683: 1072:
Information about communication and transportation infrastructure (roads, bridges)
3634: 3262: 3209: 2790: 1852: 1368: 1185: 1043:
The BCP manual must evolve with the organization, and maintain information about
246: 81: 3215: 1727: 2182: 2002: 1960:"How to evaluate a recovery management solution." West World Productions, 2006 1085: 899:
In 2004, following crises in the preceding years, the UK government passed the
3331: 3220:
Mary Hall. The Storage Community (IBM). 18 July 2011. Retrieved 26 March 2013.
2581:"BS 25999-2:2007 (USA Edition) Business continuity management - Specification" 879:-1:1995 - peripherally addressed information security procedures. (withdrawn) 530:
outbreak, some organizations compartmentalized and rotated teams to match the
3613: 3098:
Business Continuity Plan Design, 8 Steps for Getting Started Designing a Plan
2761: 2159: 1691: 1656: 1621: 1489:
The Resilient Enterprise: Overcoming Vulnerability for Competitive Enterprise
621:. Examples include: PTAM with Hot Site available, IBM Tivoli Storage Manager. 1569:"Annex A.17: Information Security Aspects of Business Continuity Management" 249:(urgent) and non-critical (non-urgent) organization functions/activities. A 3307: 3275: 1483: 1266: 474: 119: 73: 2989: 2649:"July 2013 (V2) The role of Local Resilience Forums: A reference document" 2505: 2479: 2453: 2428: 2403: 2377: 2345: 2295: 2281: 206:
Documents and documentation, including which have off-site backup copies:
3186:
SteelStore Cloud Storage Gateway: Disaster Recovery Best Practices Guide.
2740:(2010 ed.). Quincy, MA: National Fire Protection Association. 2010. 733: 200: 3177:
Charlotte Brooks, Matthew Bedernjak, Igor Juran, and John Merryman. In,
1346: 755: 724:
Telecommunication architecture between primary and secondary work sites
444: 3229:
Maximum Tolerable Period of Disruption (MTPOD): BSI committee response
3159: 1974:"Six Myths About Business Continuity Management and Disaster Recovery" 1487: 916:
HB 292-2006, "A practitioners guide to business continuity management"
578:
released in 1992, were updated in 2012 by IBM as an eight tier model:
425:
100% RCO means that post recovery, no business data deviation occurs.
153: 145: 3181:
Chapter 2. Pages 21โ€“36. Red Books Series. IBM. Tivoli Software. 2002.
1529:"Newsday | Long Island's & NYC's News Source | Newsday" 1062:
Definitions of terminology to facilitate timely communication during
929: 790: 786: 780: 776: 770: 766: 762: 488: 468: 170: 1971: 1081:
Specialized technical resources must be maintained. Checks include:
149: 144:
There are three main groups that are affected by a crisis. They are
2556:"BS 25999-1:2006 Business continuity management - Code of practice" 2097:
developed by SHARE's Technical Steering Committee, working with IBM
1742:
ISO 22301 Business Continuity Management: Your implementation guide
1148: 942:
NFPA 1600, Standard on Continuity, Emergency, and Crisis Management
882: 462: 438: 3197:
Robert Kern and Victor Peltz. IBM Systems Magazine. November 2003.
3125: 2677:"HB HB 292โ€”2006 Executive Guide to Business Continuity Management" 1239:"How to Build an Effective and Organized Business Continuity Plan" 1107: 260:
Human resources (full-time staff, part-time staff, or contractors)
2896: 2134:"Disaster Governance: Social, Political, and Economic Dimensions" 876: 503:
Theft (insider or external threat, vital information or material)
3268:
Adapt and respond to risks with a business continuity plan (BCP)
2083:
Chloe Demrovsky (December 22, 2017). "Holding It All Together".
1458:"Business Continuity Planning (BCP) for Businesses of all Sizes" 1069:
Distribution lists (staff, important clients, vendors/suppliers)
919:
HB 293-2006, "Executive guide to business continuity management"
27:
Prevention and recovery from threats that might affect a company
2705:"HB 293โ€”2006 Executive Guide to Business Continuity Management" 1406:"Continuity Resources and Technical Assistance | FEMA.gov" 1321:. United States Department of Homeland Security. Archived from 1243: 492: 77: 30: 1889:"Plain English ISO 22301 2012 Business Continuity Definitions" 1853:"BIA Instructions, BUSINESS CONTINUITY MANAGEMENT - WORKSHOP" 1031:
Testing and verification of organization recovery procedures.
591:
The length of recovery time in this instance is unpredictable
452: 3217:
Continuous Operations: The Seven Tiers of Disaster Recovery.
3179:
Disaster Recovery Strategies with Tivoli Storage Management.
3107:
Disaster Survival Planning: A Practical Guide for Businesses
1713: 3140: 1541: 527: 133:, a professor at the Brian Lamb School of Communication at 84:. In the U.S., government entities refer to the process as 2844:"Continuity Resources and Technical Assistance | FEMA.gov" 1427:"A Guide to the preparation of a Business Continuity Plan" 696:
Two main requirements from the impact analysis stage are:
266:
Physical assets (mobile phones, laptops/workstations etc.)
115:"before the case for change becomes desperately obvious". 3251:
Department of Homeland Security Emergency Plan Guidelines
1997:"Medical supply location and distribution in disasters". 1936:"The Rise and Rise of the Recovery Consistency Objective" 1862:. Disaster Recovery Information Exchange (DRIE) Central. 1054:
Job descriptions, skillsets needed, training requirements
497: 977: 3202:
Business Continuity: The 5-tiers of Disaster Recovery.
2109:"A Business Continuity Solution Selection Methodology" 765::2021 Security and resilience โ€“ Vocabulary (Replaces 3037:"Validation of a Disaster Management Metamodel (DMM)" 354: 2762:"A Comprehensive Overview of the NFPA 1600 Standard" 1301:"Constructing a Successful Business Continuity Plan" 730:
methodology between primary and secondary work sites
633:
less data recreation or loss after a disaster occurs
593:. In fact, it may not be possible to recover at all. 1928: 1924:- National Cyber Security Center. 2022. p. 12. 1780:"Can your Organization survive a natural disaster?" 1091:
Application security and service patch distribution
3079:Business Continuity Planning, A Step-by-Step Guide 1159:Disaster recovery and business continuity auditing 415: 1228:, published April 2018, accessed 19 February 2021 563:These should reflect the widest possible damage. 479:Water outage (supply interruption, contamination) 428: 240: 3611: 3076: 2922:"Business Continuity Planning Suite | Ready.gov" 769::2018 Security and resilience - Vocabulary and 546:Impact scenarios are identified and documented: 245:A business impact analysis (BIA) differentiates 169:the organization undertakes. For example, under 3057: 2954:. American National Standards Institute. 2009. 2082: 1349:Current Opinion in Environmental Sustainability 1108:Testing and verification of recovery procedures 253:may be considered critical if dictated by law. 3224:Maximum Tolerable Period of Disruption (MTPOD) 2214:International Organization for Standardization 2180: 2038:"transportation planning in disaster recovery" 1972:Josh Krischer; Donna Scott; Roberta J. Witty. 752:International Organization for Standardization 685:Highly automated, business-integrated solution 559:need for business and data processing supplies 3291: 1220:BCI Good Practice Guidelines 2013, quoted in 969: 859:IWA 5:2006 Emergency Preparedness (withdrawn) 3305: 3123: 3109:. Disaster Survival Planning, Incorporated. 3095: 2210:"ISO - ISO/TC 292 - Security and resilience" 2190:. Pittsburgh, PA: Carnegie Mellon University 2181:Partridge, Kevin G.; Young, Lisa R. (2011). 2106: 1482: 773::2012 Security and resilience - Vocabulary.) 675:maintain the highest levels of data currency 647:Several hours of data loss is still possible 273:For each function, two values are assigned: 2785: 2783: 1777: 1298: 336:(RCO) is the name of this goal. It applies 47:business continuity and resiliency planning 3298: 3284: 2138:Annual Review of Environment and Resources 1038: 506:Random failure of mission-critical systems 118:This approach is sometimes summarized as: 3104: 2174: 2149: 1672:Journal of Applied Communication Research 1669: 1634: 1599: 619:it is less unpredictable in recovery time 2780: 2100: 2060:"PLANNING SCENARIOS Executive Summaries" 1827:"Maximum Acceptable Outage (Definition)" 1421: 1419: 1381: 566: 29: 3189:Riverbed Technology, Inc. October 2011. 3174:The tiers of Disaster Recovery and TSM. 3060:A Guide to Business Continuity Planning 2869:"Continuity of operations: An overview" 2131: 2125: 1382:Intrieri, Charles (10 September 2013). 910: 199:Locations, including other offices and 34:Business continuity planning life cycle 14: 3612: 3141:Andrew Zolli; Ann Marie Healy (2013). 2791:"Business Continuity Plan | Ready.gov" 2132:Tierney, Kathleen (21 November 2012). 1744:, published, accessed 20 February 2021 1342: 1340: 736:with applications, data and work space 318:maximum tolerable period of disruption 296:Maximum tolerable period of disruption 189:Planners must have information about: 175:maximum tolerable period of disruption 3279: 3256:CIDRAP/SHRM Pandemic HR Guide Toolkit 3160:International Glossary for Resilience 2968: 2151:10.1146/annurev-environ-020911-095618 1416: 1057:Documentation and document management 978:Testing and organizational acceptance 964:American National Standards Institute 673:โ€ข Tier 6 Disaster Recovery solutions 122:, protection, response and recovery. 1226:Business Continuity Policy Statement 947:National Fire Protection Association 935:National Fire Protection Association 863: 556:civilian impact of nuclear disasters 2990:"Glossary | DRI International" 2976:"Business Continuity Plan Template" 1337: 541: 129:The theory is based on the work of 24: 3143:Resilience: Why Things Bounce Back 3124:Dimattia, S. (November 15, 2001). 3051: 3034: 3008:"Disaster Recovery Plan Checklist" 1915:"Baseline Cyber Security Controls" 1504:"Transform. The Resilient Economy" 691: 605:several days to weeks of data loss 269:Documents (electronic or physical) 25: 3671: 3166: 2085:Manufacturing Business Technology 312:According to ISO 22301 the terms 87:continuity of operations planning 3576: 3575: 3563:Outline of organizational theory 3024:from the original on 2022-10-09. 2121:from the original on 2022-10-09. 2072:from the original on 2022-10-09. 2048:from the original on 2022-10-09. 1986:from the original on 2022-10-09. 1796:from the original on 2022-10-09. 1767:from the original on 2022-10-09. 1649:10.1111/j.1460-2466.2009.01469.x 1614:10.1111/j.1460-2466.2009.01469.x 1278:from the original on 2022-10-09. 923: 745: 302:Maximum tolerable downtime (MTD) 223:The analysis phase consists of: 174: 3077:Kenneth L Fulmer (2004-10-04). 3028: 3000: 2982: 2939: 2914: 2889: 2861: 2836: 2808: 2754: 2725: 2697: 2669: 2641: 2632: 2623: 2598: 2573: 2548: 2523: 2498: 2472: 2446: 2421: 2396: 2370: 2352: 2338: 2320: 2302: 2288: 2274: 2256: 2238: 2220: 2202: 2107:Ellis Holman (March 13, 2012). 2091: 2076: 2052: 2030: 1990: 1965: 1954: 1907: 1881: 1869:from the original on 2022-10-09 1845: 1819: 1806: 1800: 1778:Helen Clark (August 15, 2012). 1771: 1747: 1734: 1720: 1706: 1663: 1628: 1593: 1575: 1561: 1535: 1521: 1496: 1476: 1460:. 19 April 2017. Archived from 1450: 1269:.org (American Bar Association) 901:Civil Contingencies Act of 2004 714:The solution phase determines: 553:need for transportation options 377:number of inconsistent entities 308:Maximum acceptable outage (MAO) 203:/work area recovery (WAR) sites 111:embraced this resilience goal. 3058:James C. Barnes (2001-06-08). 1398: 1384:"Business Continuity Planning" 1375: 1311: 1292: 1282: 1251: 1231: 1214: 1016: 429:Threat and risk analysis (TRA) 401: 392: 381: 372: 334:Recovery Consistency Objective 327: 305:Maximum tolerable outage (MTO) 285: 241:Business impact analysis (BIA) 13: 1: 1684:10.1080/00909882.2018.1426711 1571:. ISMS.online. November 2021. 1299:Alan Berman (March 9, 2015). 1207: 988:British Standards Institution 870:British Standards Institution 177:(MTPD) which can be allowed. 163: 98: 58:business continuity standards 1938:. 2016-03-22. Archived from 1895:. Praxiom Research Group LTD 1369:10.1016/j.cosust.2017.07.005 1076: 740: 601:Data backup with no Hot Site 465:(insider or external threat) 184: 160:summarizes this evaluation. 152:(group or organization) and 43:business continuity planning 7: 3212:Recovery Specialties. 2007. 1305:Business Insurance Magazine 1222:Mid Sussex District Council 1116: 218: 67: 10: 3676: 3105:Judy Bell (October 1991). 2003:10.1016/j.ijpe.2009.10.004 1319:"Business Continuity Plan" 970:Implementation and testing 944:(2019, current standard), 709:disaster recovery planning 109:Council on Competitiveness 3571: 3545: 3314: 3194:Disaster Recovery Levels. 3126:"Planning for Continuity" 2360:"ISO/IEC TS 17021-6:2014" 1714:"Resilient Organisations" 984:Exercising for Excellence 707:This phase overlaps with 615:Data backup with Hot Site 550:need for medical supplies 314:maximum acceptable outage 230:Threat and risks analysis 3553:History of organizations 3244:Business Continuity Plan 3145:. Simon & Schuster. 1637:Journal of Communication 1602:Journal of Communication 954:Continuity of Operations 671:Zero or little data loss 92:business continuity plan 3584:Aspects of corporations 1728:"Resilience Diagnostic" 1164:Disaster risk reduction 1097:Application operability 1088:definition distribution 1051:A series of checklists 1039:Information and targets 509:Single point dependency 212:Procedure documentation 3660:Management cybernetics 3594:Aspects of occupations 2897:"Business | Ready.gov" 2018:Cite journal requires 1544:AMCIS 2007 Proceedings 1259:"Surviving a Disaster" 905:Local Resilience Forum 661:little to no data loss 417: 322:maximum downtime limit 196:Supplies and suppliers 35: 3640:Disaster preparedness 3599:Aspects of workplaces 1833:. Albion Research Ltd 1809:"Finding RPO and RTO" 657:Transaction integrity 567:Tiers of preparedness 418: 105:competitive advantage 33: 3650:Emergency management 3558:Organization studies 3507:Retaliatory behavior 3352:Citizenship behavior 3162:, DRI International. 2480:"ISO/PAS 22399:2007" 2454:"ISO/IEC 27031:2011" 2429:"ISO/IEC 27002:2022" 2404:"ISO/IEC 27001:2022" 2378:"ISO/IEC 24762:2008" 1979:. Gartner Research. 1922:Ministry of Interior 1755:"Emergency Planning" 1730:. November 28, 2017. 1587:www.researchgate.net 1171:Emergency management 1129:Catastrophe modeling 1094:Hardware operability 1045:who has to know what 911:Australian standards 841:Information security 643:Point-in-time copies 538:against the threat. 471:or other major storm 352: 131:Patrice M. Buzzanell 3625:Business continuity 2712:Standards Australia 2684:Standards Australia 2346:"Iso/Ts 22332:2021" 2328:"ISO/TS 22331:2018" 2310:"ISO/TS 22330:2018" 2296:"Iso/Ts 22318:2021" 2282:"Iso/Ts 22317:2021" 1361:2017COES...28...33M 1196:Systems engineering 986:, published by The 839:ISO/IEC 27001:2022 629:Electronic vaulting 39:Business continuity 18:Business continuity 3655:IT risk management 3580:See also templates 3261:2013-05-18 at the 3208:2018-09-26 at the 3096:Richard Kepenach. 3041:SCHOLAR.google.com 2460:. 5 September 2016 2042:SCHOLAR.google.com 1325:on 7 December 2018 1144:Digital continuity 995:Tabletop exercises 829:ISO/IEC/TS 17021-6 574:'s seven tiers of 413: 397:number of entities 209:Business documents 36: 3645:Disaster recovery 3607: 3606: 3487:Perceived support 2961:978-1-887056-92-2 2768:. 29 January 2019 1831:riskythinking.com 1716:. March 22, 2011. 1191:Scenario planning 1154:Disaster recovery 1134:Crisis management 1124:Capacity planning 1100:Data verification 1064:disaster recovery 1007:Complex exercises 864:British standards 721:command structure 719:Crisis management 576:disaster recovery 532:incubation period 411: 398: 378: 358: 135:Purdue University 51:disaster recovery 16:(Redirected from 3667: 3620:Systems thinking 3579: 3578: 3472:Network analysis 3462:Machiavellianism 3300: 3293: 3286: 3277: 3276: 3239:Janco Associates 3156: 3137: 3120: 3101: 3092: 3073: 3045: 3044: 3032: 3026: 3025: 3023: 3012: 3004: 2998: 2997: 2986: 2980: 2979: 2972: 2966: 2965: 2953: 2943: 2937: 2936: 2934: 2932: 2918: 2912: 2911: 2909: 2907: 2893: 2887: 2886: 2884: 2882: 2873: 2865: 2859: 2858: 2856: 2854: 2840: 2834: 2833: 2831: 2829: 2820: 2812: 2806: 2805: 2803: 2801: 2787: 2778: 2777: 2775: 2773: 2758: 2752: 2751: 2739: 2729: 2723: 2722: 2720: 2718: 2709: 2701: 2695: 2694: 2692: 2690: 2681: 2673: 2667: 2666: 2664: 2662: 2653: 2645: 2639: 2636: 2630: 2627: 2621: 2620: 2618: 2616: 2602: 2596: 2595: 2593: 2591: 2577: 2571: 2570: 2568: 2566: 2552: 2546: 2545: 2543: 2541: 2527: 2521: 2520: 2518: 2516: 2502: 2496: 2495: 2493: 2491: 2476: 2470: 2469: 2467: 2465: 2450: 2444: 2443: 2441: 2439: 2425: 2419: 2418: 2416: 2414: 2400: 2394: 2393: 2391: 2389: 2374: 2368: 2367: 2356: 2350: 2349: 2342: 2336: 2335: 2324: 2318: 2317: 2306: 2300: 2299: 2292: 2286: 2285: 2278: 2272: 2271: 2264:"ISO 22313:2020" 2260: 2254: 2253: 2246:"ISO 22301:2019" 2242: 2236: 2235: 2228:"ISO 22300:2018" 2224: 2218: 2217: 2206: 2200: 2199: 2197: 2195: 2189: 2178: 2172: 2171: 2153: 2129: 2123: 2122: 2120: 2113: 2104: 2098: 2095: 2089: 2088: 2080: 2074: 2073: 2071: 2064: 2056: 2050: 2049: 2034: 2028: 2027: 2021: 2016: 2014: 2006: 1994: 1988: 1987: 1985: 1978: 1969: 1963: 1958: 1952: 1951: 1949: 1947: 1932: 1926: 1925: 1919: 1911: 1905: 1904: 1902: 1900: 1885: 1879: 1878: 1876: 1874: 1868: 1857: 1849: 1843: 1842: 1840: 1838: 1823: 1817: 1816: 1811:. Archived from 1804: 1798: 1797: 1795: 1784: 1775: 1769: 1768: 1766: 1759: 1751: 1745: 1738: 1732: 1731: 1724: 1718: 1717: 1710: 1704: 1703: 1667: 1661: 1660: 1632: 1626: 1625: 1597: 1591: 1590: 1579: 1573: 1572: 1565: 1559: 1558: 1539: 1533: 1532: 1525: 1519: 1518: 1516: 1515: 1506:. Archived from 1500: 1494: 1493: 1486:(October 2005). 1480: 1474: 1473: 1471: 1469: 1464:on 24 April 2017 1454: 1448: 1447: 1445: 1444: 1438: 1432:. Archived from 1431: 1423: 1414: 1413: 1402: 1396: 1395: 1393: 1391: 1379: 1373: 1372: 1344: 1335: 1334: 1332: 1330: 1315: 1309: 1308: 1296: 1290: 1286: 1280: 1279: 1277: 1263: 1255: 1249: 1248: 1247:. June 26, 2015. 1235: 1229: 1218: 1201:System lifecycle 1176:Man-made hazards 1139:Cyber resilience 1103:Data application 1001:Medium exercises 728:Data replication 587:No off-site data 542:Impact scenarios 518:Misconfiguration 512:Supplier failure 482:Telecomms outage 422: 420: 419: 414: 412: 410: 409: 408: 399: 396: 390: 389: 388: 379: 376: 370: 359: 356: 338:data consistency 298: 297: 233:Impact scenarios 158:Resilience Ratio 21: 3675: 3674: 3670: 3669: 3668: 3666: 3665: 3664: 3610: 3609: 3608: 3603: 3589:Aspects of jobs 3567: 3541: 3310: 3304: 3273: 3263:Wayback Machine 3234:Wayback Machine 3210:Wayback Machine 3169: 3153: 3130:Library Journal 3117: 3089: 3070: 3054: 3052:Further reading 3049: 3048: 3033: 3029: 3021: 3010: 3006: 3005: 3001: 2988: 2987: 2983: 2974: 2973: 2969: 2962: 2951: 2945: 2944: 2940: 2930: 2928: 2920: 2919: 2915: 2905: 2903: 2895: 2894: 2890: 2880: 2878: 2871: 2867: 2866: 2862: 2852: 2850: 2842: 2841: 2837: 2827: 2825: 2818: 2814: 2813: 2809: 2799: 2797: 2789: 2788: 2781: 2771: 2769: 2760: 2759: 2755: 2748: 2747:978-161665005-6 2737: 2731: 2730: 2726: 2716: 2714: 2707: 2703: 2702: 2698: 2688: 2686: 2679: 2675: 2674: 2670: 2660: 2658: 2651: 2647: 2646: 2642: 2637: 2633: 2628: 2624: 2614: 2612: 2604: 2603: 2599: 2589: 2587: 2579: 2578: 2574: 2564: 2562: 2554: 2553: 2549: 2539: 2537: 2529: 2528: 2524: 2514: 2512: 2504: 2503: 2499: 2489: 2487: 2478: 2477: 2473: 2463: 2461: 2452: 2451: 2447: 2437: 2435: 2427: 2426: 2422: 2412: 2410: 2402: 2401: 2397: 2387: 2385: 2376: 2375: 2371: 2358: 2357: 2353: 2344: 2343: 2339: 2326: 2325: 2321: 2316:. 12 July 2019. 2308: 2307: 2303: 2294: 2293: 2289: 2280: 2279: 2275: 2262: 2261: 2257: 2244: 2243: 2239: 2234:. 12 July 2019. 2226: 2225: 2221: 2208: 2207: 2203: 2193: 2191: 2187: 2179: 2175: 2130: 2126: 2118: 2111: 2105: 2101: 2096: 2092: 2081: 2077: 2069: 2062: 2058: 2057: 2053: 2036: 2035: 2031: 2019: 2017: 2008: 2007: 1996: 1995: 1991: 1983: 1976: 1970: 1966: 1959: 1955: 1945: 1943: 1934: 1933: 1929: 1917: 1913: 1912: 1908: 1898: 1896: 1887: 1886: 1882: 1872: 1870: 1866: 1860:driecentral.org 1855: 1851: 1850: 1846: 1836: 1834: 1825: 1824: 1820: 1805: 1801: 1793: 1782: 1776: 1772: 1764: 1757: 1753: 1752: 1748: 1739: 1735: 1726: 1725: 1721: 1712: 1711: 1707: 1668: 1664: 1633: 1629: 1598: 1594: 1581: 1580: 1576: 1567: 1566: 1562: 1540: 1536: 1527: 1526: 1522: 1513: 1511: 1502: 1501: 1497: 1481: 1477: 1467: 1465: 1456: 1455: 1451: 1442: 1440: 1436: 1429: 1425: 1424: 1417: 1404: 1403: 1399: 1389: 1387: 1380: 1376: 1345: 1338: 1328: 1326: 1317: 1316: 1312: 1297: 1293: 1287: 1283: 1275: 1261: 1257: 1256: 1252: 1237: 1236: 1232: 1219: 1215: 1210: 1205: 1186:Risk management 1181:Natural hazards 1119: 1110: 1079: 1041: 1019: 980: 972: 938:. (superseded). 926: 913: 866: 748: 743: 694: 692:Solution design 569: 544: 524: 515:Data corruption 500:/civil disorder 431: 404: 400: 395: 391: 384: 380: 375: 371: 369: 355: 353: 350: 349: 330: 295: 294: 288: 243: 227:Impact analysis 221: 187: 166: 101: 82:risk management 70: 28: 23: 22: 15: 12: 11: 5: 3673: 3663: 3662: 3657: 3652: 3647: 3642: 3637: 3632: 3627: 3622: 3605: 3604: 3602: 3601: 3596: 3591: 3586: 3581: 3572: 3569: 3568: 3566: 3565: 3560: 3555: 3549: 3547: 3543: 3542: 3540: 3539: 3534: 3529: 3524: 3519: 3514: 3509: 3504: 3499: 3494: 3489: 3484: 3479: 3474: 3469: 3464: 3459: 3454: 3449: 3444: 3439: 3437:Identification 3434: 3429: 3424: 3419: 3414: 3409: 3404: 3399: 3394: 3389: 3384: 3379: 3374: 3369: 3364: 3359: 3354: 3349: 3344: 3339: 3334: 3329: 3324: 3318: 3316: 3312: 3311: 3303: 3302: 3295: 3288: 3280: 3271: 3270: 3265: 3253: 3247: 3246: 3241: 3236: 3231: 3226: 3221: 3213: 3198: 3190: 3182: 3168: 3167:External links 3165: 3164: 3163: 3157: 3152:978-1451683813 3151: 3138: 3121: 3116:978-0963058003 3115: 3102: 3093: 3088:978-1931332217 3087: 3074: 3069:978-0471530152 3068: 3053: 3050: 3047: 3046: 3027: 2999: 2981: 2967: 2960: 2938: 2913: 2888: 2860: 2835: 2807: 2779: 2753: 2746: 2724: 2696: 2668: 2656:Cabinet Office 2640: 2631: 2622: 2597: 2572: 2547: 2522: 2497: 2486:. 18 June 2012 2471: 2445: 2420: 2395: 2384:. 6 March 2008 2369: 2351: 2337: 2319: 2301: 2287: 2273: 2255: 2252:. 5 June 2023. 2237: 2219: 2201: 2173: 2144:(1): 341โ€“363. 2124: 2099: 2090: 2075: 2051: 2029: 2020:|journal= 1989: 1964: 1953: 1927: 1906: 1880: 1844: 1818: 1815:on 2016-03-03. 1807:May, Richard. 1799: 1770: 1746: 1733: 1719: 1705: 1662: 1627: 1592: 1574: 1560: 1534: 1520: 1495: 1475: 1449: 1415: 1397: 1374: 1336: 1310: 1291: 1281: 1250: 1230: 1212: 1211: 1209: 1206: 1204: 1203: 1198: 1193: 1188: 1183: 1178: 1173: 1168: 1167: 1166: 1161: 1156: 1146: 1141: 1136: 1131: 1126: 1120: 1118: 1115: 1109: 1106: 1105: 1104: 1101: 1098: 1095: 1092: 1089: 1078: 1075: 1074: 1073: 1070: 1067: 1060: 1059: 1058: 1055: 1040: 1037: 1033: 1032: 1029: 1026: 1018: 1015: 1011: 1010: 1004: 998: 982:The 2008 book 979: 976: 971: 968: 967: 966: 960: 957: 951: 939: 925: 922: 921: 920: 917: 912: 909: 893: 892: 889: 886: 880: 865: 862: 861: 860: 857: 854: 848: 844: 837: 833: 832: 826: 820: 814: 808: 802: 795: 794: 784: 774: 747: 744: 742: 739: 738: 737: 731: 725: 722: 705: 704: 701: 693: 690: 689: 688: 678: 664: 650: 636: 622: 608: 594: 568: 565: 561: 560: 557: 554: 551: 543: 540: 523: 522: 521:Network outage 519: 516: 513: 510: 507: 504: 501: 495: 486: 483: 480: 477: 472: 466: 460: 455: 450: 447: 442: 435: 430: 427: 407: 403: 394: 387: 383: 374: 368: 365: 362: 329: 326: 310: 309: 306: 303: 300: 287: 284: 283: 282: 279: 271: 270: 267: 264: 261: 242: 239: 235: 234: 231: 228: 220: 217: 216: 215: 214: 213: 210: 204: 197: 194: 186: 183: 171:ISO 22301:2019 165: 162: 148:(individual), 100: 97: 69: 66: 26: 9: 6: 4: 3: 2: 3672: 3661: 3658: 3656: 3653: 3651: 3648: 3646: 3643: 3641: 3638: 3636: 3633: 3631: 3630:Collaboration 3628: 3626: 3623: 3621: 3618: 3617: 3615: 3600: 3597: 3595: 3592: 3590: 3587: 3585: 3582: 3574: 3573: 3570: 3564: 3561: 3559: 3556: 3554: 3551: 3550: 3548: 3544: 3538: 3535: 3533: 3530: 3528: 3525: 3523: 3520: 3518: 3515: 3513: 3510: 3508: 3505: 3503: 3500: 3498: 3495: 3493: 3490: 3488: 3485: 3483: 3480: 3478: 3475: 3473: 3470: 3468: 3465: 3463: 3460: 3458: 3455: 3453: 3450: 3448: 3445: 3443: 3440: 3438: 3435: 3433: 3430: 3428: 3425: 3423: 3420: 3418: 3415: 3413: 3412:Effectiveness 3410: 3408: 3405: 3403: 3400: 3398: 3395: 3393: 3390: 3388: 3385: 3383: 3380: 3378: 3375: 3373: 3370: 3368: 3367:Communication 3365: 3363: 3360: 3358: 3355: 3353: 3350: 3348: 3345: 3343: 3340: 3338: 3335: 3333: 3330: 3328: 3325: 3323: 3320: 3319: 3317: 3313: 3309: 3308:organizations 3301: 3296: 3294: 3289: 3287: 3282: 3281: 3278: 3274: 3269: 3266: 3264: 3260: 3257: 3254: 3252: 3249: 3248: 3245: 3242: 3240: 3237: 3235: 3232: 3230: 3227: 3225: 3222: 3219: 3218: 3214: 3211: 3207: 3204: 3203: 3199: 3196: 3195: 3191: 3188: 3187: 3183: 3180: 3176: 3175: 3171: 3170: 3161: 3158: 3154: 3148: 3144: 3139: 3135: 3131: 3127: 3122: 3118: 3112: 3108: 3103: 3099: 3094: 3090: 3084: 3081:. Rothstein. 3080: 3075: 3071: 3065: 3061: 3056: 3055: 3042: 3038: 3031: 3020: 3016: 3009: 3003: 2995: 2991: 2985: 2977: 2971: 2963: 2957: 2950: 2949: 2942: 2927: 2926:www.ready.gov 2923: 2917: 2902: 2901:www.ready.gov 2898: 2892: 2877: 2870: 2864: 2849: 2845: 2839: 2824: 2817: 2811: 2796: 2795:www.ready.gov 2792: 2786: 2784: 2767: 2763: 2757: 2749: 2743: 2736: 2735: 2728: 2713: 2706: 2700: 2685: 2678: 2672: 2657: 2650: 2644: 2635: 2626: 2611: 2607: 2601: 2586: 2582: 2576: 2561: 2557: 2551: 2536: 2532: 2526: 2511: 2507: 2501: 2485: 2481: 2475: 2459: 2455: 2449: 2434: 2430: 2424: 2409: 2405: 2399: 2383: 2379: 2373: 2365: 2361: 2355: 2347: 2341: 2333: 2329: 2323: 2315: 2311: 2305: 2297: 2291: 2283: 2277: 2269: 2265: 2259: 2251: 2247: 2241: 2233: 2229: 2223: 2215: 2211: 2205: 2186: 2185: 2177: 2169: 2165: 2161: 2157: 2152: 2147: 2143: 2139: 2135: 2128: 2117: 2110: 2103: 2094: 2086: 2079: 2068: 2061: 2055: 2047: 2043: 2039: 2033: 2025: 2012: 2004: 2000: 1993: 1982: 1975: 1968: 1962: 1957: 1942:on 2020-09-26 1941: 1937: 1931: 1923: 1916: 1910: 1894: 1890: 1884: 1865: 1861: 1854: 1848: 1832: 1828: 1822: 1814: 1810: 1803: 1792: 1788: 1781: 1774: 1763: 1756: 1750: 1743: 1737: 1729: 1723: 1715: 1709: 1701: 1697: 1693: 1689: 1685: 1681: 1677: 1673: 1666: 1658: 1654: 1650: 1646: 1642: 1638: 1631: 1623: 1619: 1615: 1611: 1607: 1603: 1596: 1588: 1584: 1578: 1570: 1564: 1557: 1553: 1549: 1545: 1538: 1530: 1524: 1510:on 2013-10-22 1509: 1505: 1499: 1491: 1490: 1485: 1479: 1463: 1459: 1453: 1439:on 2019-02-09 1435: 1428: 1422: 1420: 1411: 1407: 1401: 1385: 1378: 1370: 1366: 1362: 1358: 1354: 1350: 1343: 1341: 1324: 1320: 1314: 1306: 1302: 1295: 1285: 1274: 1270: 1268: 1260: 1254: 1246: 1245: 1240: 1234: 1227: 1223: 1217: 1213: 1202: 1199: 1197: 1194: 1192: 1189: 1187: 1184: 1182: 1179: 1177: 1174: 1172: 1169: 1165: 1162: 1160: 1157: 1155: 1152: 1151: 1150: 1147: 1145: 1142: 1140: 1137: 1135: 1132: 1130: 1127: 1125: 1122: 1121: 1114: 1102: 1099: 1096: 1093: 1090: 1087: 1084: 1083: 1082: 1071: 1068: 1065: 1061: 1056: 1053: 1052: 1050: 1049: 1048: 1046: 1036: 1030: 1027: 1024: 1023: 1022: 1014: 1008: 1005: 1002: 999: 996: 993: 992: 991: 989: 985: 975: 965: 961: 958: 955: 952: 949: 948: 943: 940: 937: 936: 931: 928: 927: 924:United States 918: 915: 914: 908: 906: 902: 897: 890: 887: 884: 881: 878: 875: 874: 873: 871: 858: 855: 852: 851:ISO/IEC 27031 849: 845: 842: 838: 835: 834: 830: 827: 824: 821: 818: 815: 812: 809: 806: 803: 800: 797: 796: 792: 788: 785: 782: 778: 775: 772: 768: 764: 761: 760: 759: 757: 753: 746:ISO Standards 735: 732: 729: 726: 723: 720: 717: 716: 715: 712: 710: 702: 699: 698: 697: 686: 682: 679: 676: 672: 668: 665: 662: 658: 654: 651: 648: 644: 640: 637: 634: 630: 626: 623: 620: 616: 612: 609: 606: 602: 598: 595: 592: 588: 584: 581: 580: 579: 577: 573: 564: 558: 555: 552: 549: 548: 547: 539: 537: 533: 529: 520: 517: 514: 511: 508: 505: 502: 499: 496: 494: 490: 487: 484: 481: 478: 476: 473: 470: 467: 464: 461: 459: 456: 454: 451: 448: 446: 443: 440: 437: 436: 434: 426: 423: 405: 385: 366: 363: 360: 346: 342: 339: 335: 325: 323: 319: 315: 307: 304: 301: 293: 292: 291: 280: 276: 275: 274: 268: 265: 262: 259: 258: 257: 254: 252: 248: 238: 232: 229: 226: 225: 224: 211: 208: 207: 205: 202: 198: 195: 192: 191: 190: 182: 178: 176: 172: 161: 159: 155: 151: 147: 142: 138: 136: 132: 127: 123: 121: 116: 112: 110: 106: 96: 93: 89: 88: 83: 79: 75: 65: 61: 59: 54: 52: 48: 44: 40: 32: 19: 3522:Storytelling 3442:Intelligence 3322:Architecture 3272: 3216: 3201: 3193: 3185: 3178: 3172: 3142: 3136:(19): 32โ€“34. 3133: 3129: 3106: 3097: 3078: 3059: 3040: 3030: 3014: 3002: 2993: 2984: 2970: 2947: 2941: 2929:. Retrieved 2925: 2916: 2904:. Retrieved 2900: 2891: 2879:. Retrieved 2875: 2863: 2851:. Retrieved 2847: 2838: 2826:. Retrieved 2822: 2810: 2798:. Retrieved 2794: 2770:. Retrieved 2765: 2756: 2733: 2727: 2715:. Retrieved 2711: 2699: 2687:. Retrieved 2683: 2671: 2659:. Retrieved 2655: 2643: 2634: 2625: 2613:. Retrieved 2609: 2600: 2588:. Retrieved 2584: 2575: 2563:. Retrieved 2559: 2550: 2538:. Retrieved 2534: 2525: 2513:. Retrieved 2509: 2506:"IWA 5:2006" 2500: 2488:. Retrieved 2483: 2474: 2462:. Retrieved 2457: 2448: 2436:. Retrieved 2432: 2423: 2411:. Retrieved 2407: 2398: 2386:. Retrieved 2381: 2372: 2363: 2354: 2340: 2331: 2322: 2313: 2304: 2290: 2276: 2267: 2258: 2249: 2240: 2231: 2222: 2213: 2204: 2192:. Retrieved 2183: 2176: 2141: 2137: 2127: 2114:. IBM Corp. 2102: 2093: 2084: 2078: 2054: 2041: 2032: 2011:cite journal 1992: 1967: 1956: 1946:September 9, 1944:. Retrieved 1940:the original 1930: 1909: 1897:. Retrieved 1892: 1883: 1871:. Retrieved 1859: 1847: 1835:. Retrieved 1830: 1821: 1813:the original 1802: 1786: 1773: 1749: 1736: 1722: 1708: 1678:(1): 14โ€“18. 1675: 1671: 1665: 1640: 1636: 1630: 1605: 1601: 1595: 1586: 1577: 1563: 1555: 1543: 1537: 1523: 1512:. Retrieved 1508:the original 1498: 1492:. MIT Press. 1488: 1484:Yossi Sheffi 1478: 1466:. Retrieved 1462:the original 1452: 1441:. Retrieved 1434:the original 1410:www.fema.gov 1409: 1400: 1390:29 September 1388:. Retrieved 1377: 1352: 1348: 1327:. Retrieved 1323:the original 1313: 1304: 1294: 1284: 1267:American Bar 1265: 1253: 1242: 1233: 1216: 1111: 1080: 1044: 1042: 1034: 1020: 1012: 1006: 1000: 994: 983: 981: 973: 945: 933: 898: 894: 867: 823:ISO/TS 22332 817:ISO/TS 22331 811:ISO/TS 22330 805:ISO/TS 22318 799:ISO/TS 22317 749: 713: 706: 695: 684: 680: 674: 670: 666: 660: 656: 652: 646: 642: 638: 632: 628: 624: 618: 614: 610: 604: 600: 596: 590: 586: 582: 570: 562: 545: 525: 475:Power outage 458:Cyber attack 432: 424: 347: 343: 333: 331: 321: 317: 313: 311: 289: 272: 255: 244: 236: 222: 188: 179: 167: 157: 143: 139: 128: 124: 120:preparedness 117: 113: 102: 91: 85: 74:supply chain 71: 62: 55: 46: 42: 38: 37: 3492:Performance 3417:Engineering 3397:Diagnostics 3392:Development 3306:Aspects of 1893:praxiom.com 1643:(1): 1โ€“14. 1608:(1): 1โ€“14. 1017:Maintenance 734:Backup site 328:Consistency 286:Maximum RTO 3614:Categories 3502:Resilience 3497:Psychology 3467:Narcissism 3457:Life cycle 3372:Complexity 3362:Commitment 2766:AlertMedia 1514:2019-02-04 1443:2019-02-08 1208:References 896:sickness. 847:controls.) 756:ISO/TC 292 536:resiliency 445:Earthquake 263:IT systems 164:Continuity 99:Resilience 90:(COOP). A 3527:Structure 3477:Ombudsman 3432:Hierarchy 3062:. Wiley. 2931:5 January 2906:5 January 2881:5 January 2853:5 January 2828:5 January 2800:5 January 2772:4 January 2717:5 January 2689:5 January 2661:5 January 2615:5 January 2610:BSI Group 2590:5 January 2585:BSI Group 2565:5 January 2560:BSI Group 2540:5 January 2535:BSI Group 2515:5 January 2490:5 January 2464:5 January 2438:5 January 2413:5 January 2388:5 January 2194:5 January 2168:154422711 2160:1543-5938 1899:4 October 1873:4 October 1837:4 October 1700:149004681 1692:0090-9882 1657:0021-9916 1622:1460-2466 1355:: 33โ€“40. 1329:4 October 1077:Technical 791:ISO 22313 787:ISO 22313 781:ISO 22301 777:ISO 22301 771:ISO 22300 767:ISO 22300 763:ISO 22300 741:Standards 489:Terrorism 485:IT outage 469:Hurricane 441:/pandemic 367:− 278:exceeded. 193:Equipment 185:Inventory 3546:See also 3537:Workshop 3482:Patterns 3452:Learning 3377:Conflict 3327:Behavior 3259:Archived 3206:Archived 3035:Othman. 3019:Archived 2994:drii.org 2116:Archived 2067:Archived 2046:Archived 1981:Archived 1864:Archived 1791:Archived 1762:Archived 1468:28 April 1273:Archived 1271:. 2011. 1149:Disaster 1117:See also 932:(2010). 883:BS 25999 463:Sabotage 439:Epidemic 251:function 247:critical 219:Analysis 68:Overview 56:Several 3447:Justice 3407:Ecology 3402:Dissent 3382:Culture 3357:Climate 3337:Capital 3015:CMS.gov 1552:7698286 1386:. Flevy 1357:Bibcode 877:BS 7799 783::2012.) 299:(MTPoD) 3635:Backup 3532:Theory 3512:Safety 3422:Ethics 3387:Design 3315:Topics 3149:  3113:  3085:  3066:  2958:  2744:  2166:  2158:  1787:RI.gov 1698:  1690:  1655:  1620:  1550:  1244:Forbes 681:Tier 7 667:Tier 6 653:Tier 5 639:Tier 4 625:Tier 3 611:Tier 2 597:Tier 1 583:Tier 0 493:Piracy 201:backup 78:subset 3517:Space 3427:Field 3347:Chart 3342:Cells 3332:Blame 3022:(PDF) 3011:(PDF) 2952:(PDF) 2872:(PDF) 2819:(PDF) 2738:(PDF) 2708:(PDF) 2680:(PDF) 2652:(PDF) 2188:(PDF) 2164:S2CID 2119:(PDF) 2112:(PDF) 2070:(PDF) 2063:(PDF) 1984:(PDF) 1977:(PDF) 1918:(PDF) 1867:(PDF) 1856:(PDF) 1794:(PDF) 1783:(PDF) 1765:(PDF) 1758:(PDF) 1740:ISO, 1696:S2CID 1548:S2CID 1437:(PDF) 1430:(PDF) 1276:(PDF) 1262:(PDF) 1086:Virus 572:SHARE 453:Flood 154:macro 146:micro 3147:ISBN 3111:ISBN 3083:ISBN 3064:ISBN 2956:ISBN 2933:2023 2908:2023 2883:2023 2876:FEMA 2855:2023 2848:FEMA 2830:2023 2823:FEMA 2802:2023 2774:2023 2742:ISBN 2719:2023 2691:2023 2663:2023 2617:2023 2592:2023 2567:2023 2542:2023 2517:2023 2492:2023 2466:2023 2440:2023 2415:2023 2390:2023 2196:2023 2156:ISSN 2024:help 1948:2019 1901:2018 1875:2018 1839:2018 1688:ISSN 1653:ISSN 1618:ISSN 1470:2017 1392:2013 1331:2018 868:The 528:SARS 449:Fire 316:and 150:meso 45:(or 3134:126 2510:ISO 2484:ISO 2458:ISO 2433:ISO 2408:ISO 2382:ISO 2364:ISO 2332:ISO 2314:ISO 2268:ISO 2250:ISO 2232:ISO 2146:doi 1999:doi 1680:doi 1645:doi 1610:doi 1365:doi 1289:48. 758:: 498:War 357:RCO 80:of 3616:: 3132:. 3128:. 3039:. 3017:. 3013:. 2992:. 2924:. 2899:. 2874:. 2846:. 2821:. 2793:. 2782:^ 2764:. 2710:. 2682:. 2654:. 2608:. 2583:. 2558:. 2533:. 2508:. 2482:. 2456:. 2431:. 2406:. 2380:. 2362:. 2330:. 2312:. 2266:. 2248:. 2230:. 2212:. 2162:. 2154:. 2142:37 2140:. 2136:. 2065:. 2044:. 2040:. 2015:: 2013:}} 2009:{{ 1920:. 1891:. 1858:. 1829:. 1789:. 1785:. 1760:. 1694:. 1686:. 1676:46 1674:. 1651:. 1641:60 1639:. 1616:. 1606:60 1604:. 1585:. 1554:. 1546:. 1418:^ 1408:. 1363:. 1353:28 1351:. 1339:^ 1303:. 1264:. 1241:. 1224:, 1047:: 907:. 711:. 683:โ€“ 669:โ€“ 655:โ€“ 641:โ€“ 627:โ€“ 613:โ€“ 599:โ€“ 585:โ€“ 324:. 3299:e 3292:t 3285:v 3155:. 3119:. 3100:. 3091:. 3072:. 3043:. 2996:. 2978:. 2964:. 2935:. 2910:. 2885:. 2857:. 2832:. 2804:. 2776:. 2750:. 2721:. 2693:. 2665:. 2619:. 2594:. 2569:. 2544:. 2519:. 2494:. 2468:. 2442:. 2417:. 2392:. 2366:. 2348:. 2334:. 2298:. 2284:. 2270:. 2216:. 2198:. 2170:. 2148:: 2087:. 2026:) 2022:( 2005:. 2001:: 1950:. 1903:. 1877:. 1841:. 1702:. 1682:: 1659:. 1647:: 1624:. 1612:: 1589:. 1531:. 1517:. 1472:. 1446:. 1412:. 1394:. 1371:. 1367:: 1359:: 1333:. 1307:. 1066:, 950:. 635:. 491:/ 406:n 402:) 393:( 386:n 382:) 373:( 364:1 361:= 20:)

Index

Business continuity

disaster recovery
business continuity standards
supply chain
subset
risk management
continuity of operations planning
competitive advantage
Council on Competitiveness
preparedness
Patrice M. Buzzanell
Purdue University
micro
meso
macro
ISO 22301:2019
maximum tolerable period of disruption
backup
critical
function
data consistency
Epidemic
Earthquake
Flood
Cyber attack
Sabotage
Hurricane
Power outage
Terrorism

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘