Knowledge

Business continuity planning

Source ๐Ÿ“

145:(national or interorganizational). There are also two main types of resilience, which are proactive and post resilience. Proactive resilience is preparing for a crisis and creating a solid foundation for the company. Post resilience includes continuing to maintain communication and check in with employees. Proactive resilience is dealing with issues at hand before they cause a possible shift in the work environment and post resilience maintaining communication and accepting changes after an incident has happened. Resilience can be applied to any organization. In New Zealand, the Canterbury University Resilient Organisations programme developed an assessment tool for benchmarking the Resilience of Organisations. It covers 11 categories, each having 5 to 7 questions. A 126:. In her 2010 article, "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being" Buzzanell discussed the ability for organizations to thrive after having a crisis through building resistance. Buzzanell notes that there are five different processes that individuals use when trying to maintain resilience- crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work and downplaying negative feelings while foregrounding positive emotions. 3566: 676:โ€ข Tier 7 solutions include all the major components being used for a Tier 6 solution with the additional integration of automation. This allows a Tier 7 solution to ensure consistency of data above that of which is granted by Tier 6 solutions. Additionally, recovery of the applications is automated, allowing for restoration of systems and applications much faster and more reliably than would be possible through manual Disaster Recovery procedures. 892:: Businesses must have continuity planning measures to survive and continue to thrive whilst working towards keeping the incident as minimal as possible. The Act was separated into two parts: Part 1: civil protection, covering roles & responsibilities for local responders Part 2: emergency powers. In the United Kingdom, resilience is implemented locally by the 130:
crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work, and downplaying negative feelings while foregrounding negative emotions. Each of these processes can be applicable to businesses in crisis times, making resilience an important factor for companies to focus on while training.
606:โ€ข Tier 2 Disaster Recovery solutions make regular backups on tape. This is combined with an off-site facility and infrastructure (known as a hot site) in which to restore systems from those tapes in the event of a disaster. This tier solution will still result in the need to recreate several hours to days worth of data, but 157:
Plans and procedures are used in business continuity planning to ensure that the critical organizational operations required to keep an organization running continue to operate during events when key dependencies of operations are disrupted. Continuity does not need to apply to every activity which
129:
When looking at the resilience theory, the crisis communication theory is similar, but not the same. The crisis communication theory is based on the reputation of the company, but the resilience theory is based on the process of recovery of the company. There are five main components of resilience:
83:
outlines a range of disaster scenarios and the steps the business will take in any particular scenario to return to regular trade. BCP's are written ahead of time and can also include precautions to be put in place. Usually created with the input of key staff as well as stakeholders, a BCP is a set
884:
Within the UK, BS 25999-2:2007 and BS 25999-1:2006 were being used for business continuity management across all organizations, industries and sectors. These documents give a practical plan to deal with most eventualitiesโ€”from extreme weather conditions to terrorism, IT system failure, and staff
103:
Adapting to change in an apparently slower, more evolutionary manner - sometimes over many years or decades - has been described as being more resilient, and the term "strategic resilience" is now used to go beyond resisting a one-time crisis, but rather continuously anticipating and adjusting,
52:
Business continuity requires a top-down approach to identify an organisation's minimum requirements to ensure its viability as an entity. An organization's resistance to failure is "the ability ... to withstand changes in its environment and still function". Often called resilience, it is a
20: 634:โ€ข Tier 4 solutions are used by businesses that require both greater data currency and faster recovery than users of lower tiers. Rather than relying largely on shipping tape, as is common in the lower tiers, Tier 4 solutions begin to incorporate more disk-based solutions. 410: 266:
Recovery point objective (RPO) โ€“ the acceptable latency of data that will not be recovered. For example, is it acceptable for the company to lose 2 days of data? The recovery point objective must ensure that the maximum tolerable data loss for each activity is not
329:
objectives, to define a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms used in this context are "Recovery Consistency Characteristics" (RCC) and "Recovery Object Granularity" (ROG).
1101:
Software and work process changes must be documented and validated, including verification that documented work process recovery tasks and supporting disaster recovery infrastructure allow staff to recover within the predetermined recovery time objective.
930: 3025: 790::2021 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for business impact analysis - (Replaces ISO/TS 22315:2015 Societal security โ€“ Business continuity management systems โ€“ Guidelines for business impact analysis.) 796::2021 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for supply chain continuity (Replaces ISO/TS 22318:2015 Societal security โ€” Business continuity management systems โ€” Guidelines for supply chain continuity.) 114:
Resilience Theory can be related to the field of Public Relations. Resilience is a communicative process that is constructed by citizens, families, media system, organizations and governments through everyday talk and mediated conversation.
2104: 2026: 2034: 1415: 620:โ€ข Tier 3 solutions utilize components of Tier 2. Additionally, some mission-critical data is electronically vaulted. This electronically vaulted data is typically more current than that which is shipped via PTAM. As a result there is 333:
While RTO and RPO are absolute per-system values, RCO is expressed as a percentage that measures the deviation between actual and targeted state of business data across systems for process groups or individual business processes.
835:
ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection โ€” Information security controls. (Replaces ISO/IEC 27002:2013 Information technology โ€” Security techniques โ€” Code of practice for information security
832:, cybersecurity and privacy protection โ€” Information security management systems โ€” Requirements. (Replaces ISO/IEC 27001:2013 Information technology โ€” Security techniques โ€” Information security management systems โ€” Requirements.) 992:- Several departments, teams or disciplines concentrate on multiple BCP aspects; the scope can range from a few teams from one building to multiple teams operating across dispersed locations. Pre-scripted "surprises" are added. 53:
capability that enables organizations to either endure environmental changes without having to permanently adapt, or the organization is forced to adapt a new way of working that better suits the new environmental conditions.
3173: 820::2014 Conformity assessment โ€“ Requirements for bodies providing audit and certification of management systems โ€“ Part 6: Competence requirements for auditing and certification of business continuity management systems. 2637: 1261: 666:. They are used by businesses with little or no tolerance for data loss and who need to restore data to applications rapidly. These solutions have no dependence on the applications to provide data consistency. 38:) is the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of 169:
A major cost in planning for this is the preparation of audit compliance management documents; automation tools are available to reduce the time and cost associated with manually producing this information.
1277:
Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of Applied Management Studies, Vol. 8, No, pp. 43โ€“60. Here: p.
578:โ€ข Businesses with a Tier 0 Disaster Recovery solution have no Disaster Recovery Plan. There is no saved information, no documentation, no backup hardware, and no contingency plan. Typical recovery time: 2964: 226:
Quantifying of loss ratios must also include "dollars to defend a lawsuit." It has been estimated that a dollar spent in loss prevention can prevent "seven dollars of disaster-related economic loss."
2097: 1422: 340: 3007: 279:
Maximum time constraints for how long an enterprise's key products or services can be unavailable or undeliverable before stakeholders perceive unacceptable consequences have been named as:
1492: 2055: 2519: 1446: 3181: 1545:"An estimated 80 percent of companies without a well-conceived and tested business continuity plan, go out of business within two years of a major disaster" (Santangelo 2004) 162:, organizations are required to define their business continuity objectives, the minimum levels of product and service operations which will be considered acceptable and the 30:
may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and
592:โ€ข Businesses that use Tier 1 Disaster Recovery solutions back up their data at an off-site facility. Depending on how often backups are made, they are prepared to accept 1247: 2594: 998:- All aspects of a medium exercise remain, but for maximum realism no-notice activation, actual evacuation and actual invocation of a disaster recovery site is added. 942: 825:
ISO/IEC 24762:2008 Information technology โ€” Security techniques โ€” Guidelines for information and communications technology disaster recovery services (withdrawn)
814::2021 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for developing business continuity plans and procedures (Current as of 2022.) 2627:
Cabinet Office. (2004). overview of the Act. In: Civil Contingencies Secretariat Civil Contingencies Act 2004: a short. London: Civil Contingencies Secretariat
337:
The following formula calculates RCO with "n" representing the number of business processes and "entities" representing an abstract value for business data:
1797: 1517: 3247: 1779: 1289: 817: 422:
After defining recovery requirements, each potential threat may require unique recovery steps (contingency plans or playbooks). Common threats include:
3286: 1924: 1227: 1147: 2996: 1750: 96:
over entities not prepared for various contingencies extended then-common business continuity planning practices. Business organizations such as the
1969: 2544: 802::2018 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for people aspects on business continuity (Current as of 2022.) 743:(ISO) has for example developed a whole series of standards on Business continuity management systems under responsibility of technical committee 839: 638:, but it is easier to make such point-in-time (PIT) copies with greater frequency than data that can be replicated through tape-based solutions. 1557: 1496: 986:- a small number of people concentrate on a specific aspect of a BCP. Another form involves a single representative from each of several teams. 842::2011 Information technology โ€“ Security techniques โ€“ Guidelines for information and communication technology readiness for business continuity. 811: 805: 799: 793: 787: 740: 1730: 951:
ASIS SPC.1-2009, Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use,
808::2018 Security and resilience โ€“ Business continuity management systems โ€“ Guidelines for business continuity strategy - (Current as of 2022.) 648:โ€ข Tier 5 solutions are used by businesses with a requirement for consistency of data between production and recovery data centers. There is 3227: 596:, but their backups are secure off-site. However, this Tier lacks the systems on which to restore data. Pickup Truck Access Method (PTAM). 321:
When more than one system crashes, recovery plans must balance the need for data consistency with other objectives, such as RTO and RPO.
2937:
ASIS SPC.1-2009 Organizational Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use
2048: 1307: 1450: 92:
A 2005 analysis of how disruptions can adversely affect the operations of corporations and how investments in resilience can give a
3485: 2569: 3162: 3279: 1903: 2348: 2316: 2298: 2252: 2234: 2216: 692:
Outside IT: preservation of hard copy (such as contracts). A process plan must consider skilled staff and embedded technology.
65:
interruption, loss of or damage to critical infrastructure (major machinery or computing/network resource). As such, BCP is a
42:. Business continuity is the intended outcome of proper execution of both business continuity planning and disaster recovery. 2948: 952: 845:
ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management (withdrawn)
1950: 1852: 1002:
While start and stop times are pre-agreed, the actual duration might be unknown if events are allowed to run their course.
935: 923: 1014:
Confirmation of information in the manual, roll out to staff for awareness and specific training for critical individuals.
405:{\displaystyle {\text{RCO}}=1-{\frac {({\text{number of inconsistent entities}})_{n}}{({\text{number of entities}})_{n}}}} 3495: 3360: 3340: 3194: 2734: 3189: 3139: 3103: 3075: 3056: 1336:
Ian McCarthy; Mark Collard; Michael Johnson (2017). "Adaptive organizational resilience: an evolutionary perspective".
3239: 3450: 3330: 3272: 3222: 861:(BSI Group) released a series of standards which have since been withdrawn and replaced by the ISO standards above. 778::2020 Security and resilience โ€“ Business continuity management systems โ€“ Guidance on the use of ISO 22301 (Replaces 3572: 3551: 3475: 1214: 3648: 3582: 3460: 2693: 2665: 1801: 1768: 3244: 1010:
Biannual or annual maintenance cycle maintenance of a BCP manual is broken down into three periodic activities.
3628: 3587: 2804: 2520:"BS 7799-1:1995 Information security management - Code of practice for information security management systems" 1910: 1624:
Buzzanell, Patrice M. (March 2010). "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being".
652:
in such solutions; however, the presence of this functionality is entirely dependent on the application in use.
523:
of the disease. They also banned in-person contact during both business and non-business hours. This increased
880:
2008: BS 25777, Information and communications technology continuity management. Code of practice. (withdrawn)
3638: 3425: 2595:"BS 25777:2008 (Paperback) Information and communications technology continuity management. Code of practice" 976: 858: 75: 46: 1531:
Tiffany Braun; Benjamin Martz (2007). "Business Continuity Preparedness and the Mindfulness State of Mind".
3613: 3400: 3355: 2832: 1928: 1743: 1394: 889: 782::2012 Security and resilience - Business continuity management systems - Guidance on the use of ISO 22301.) 1962: 3643: 3510: 3490: 3455: 3430: 3375: 3310: 1589:
Buzzanell, Patrice M. (2010). "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being".
1210: 739:
There are many standards that are available to support business continuity planning and management. The
524: 2935: 515:
The above areas can cascade: Responders can stumble. Supplies may become depleted. During the 2002โ€“2003
245:
Each function/activity typically relies on a combination of constituent components in order to operate:
3633: 3480: 3405: 3385: 2721: 446: 239: 97: 1815: 3608: 3445: 3420: 3350: 2618:
British Standards Institution (2006). Business continuity management-Part 1: Code of practice :London
2198: 2012: 3577: 3541: 3515: 3465: 3380: 1659:
Buzzanell, Patrice M. (2018-01-02). "Organizing resilience as adaptive-transformational tensions".
945:(COOP) and National Continuity Policy Implementation Plan (NCPIP), United States Federal Government 689:
For IT: the minimum application and data requirements and the time in which they must be available.
49:
have been published by various standards bodies to assist in checklisting ongoing planning tasks.
3470: 3440: 3365: 3315: 1152: 979:
identified three types of exercises that can be employed when testing business continuity plans.
768::2019 Security and resilience โ€“ Business continuity management systems โ€“ Requirements (Replaces 3618: 3435: 3395: 3390: 3370: 3325: 2173:
CERTยฎ Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1
963:
The implementation phase involves policy changes, material acquisitions, staffing and testing.
893: 948:
Business Continuity Planning Suite, DHS National Protection and Programs Directorate and FEMA.
309:
mean the same thing and are defined using exactly the same words. Some standards use the term
3525: 3520: 3500: 3410: 1999: 93: 877:
BS 25999-2:2007 Business Continuity Management Part 2: Specification (superseded, withdrawn)
3546: 3505: 3415: 3345: 3335: 3232: 2910: 2857: 1345: 1311: 1159: 1117: 829: 270:
Recovery time objective (RTO)  โ€“ the acceptable amount of time to restore the function
2139: 2122: 61:
Any event that could negatively impact operations should be included in the plan, such as
8: 1184: 874:-1:2006 - Business continuity management Part 1: Code of practice (superseded, withdrawn) 3256: 1349: 1024:
Issues found during the testing phase often must be reintroduced to the analysis phase.
2152: 1684: 1536: 1132: 2805:"NATIONAL CONTINUITY POLICY IMPLEMENTATION PLAN Homeland Security Council August 2007" 1572:"Communication and resilience: concluding thoughts and key issues for future research" 1372: 3135: 3099: 3071: 3052: 2944: 2730: 2723:
NFPA 1600, Standard on Disaster/Emergency Management and Business Continuity Programs
2156: 2144: 1688: 1676: 1641: 1637: 1606: 1602: 1571: 1179: 1169: 1142: 1122: 1112: 1052: 707: 697: 564: 560: 520: 123: 119: 39: 3217: 3212: 1017:
Testing and verification of technical solutions established for recovery operations.
919:
NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs
84:
of contingencies to minimize potential harm to businesses during adverse scenarios.
2134: 1987: 1877: 1668: 1633: 1598: 1540: 1353: 1189: 1164: 1127: 716: 326: 1672: 1061:
Information about communication and transportation infrastructure (roads, bridges)
3623: 3251: 3198: 2779: 1841: 1357: 1174: 1032:
The BCP manual must evolve with the organization, and maintain information about
235: 70: 3204: 1716: 2171: 1991: 1949:"How to evaluate a recovery management solution." West World Productions, 2006 1074: 888:
In 2004, following crises in the preceding years, the UK government passed the
3320: 3209:
Mary Hall. The Storage Community (IBM). 18 July 2011. Retrieved 26 March 2013.
2570:"BS 25999-2:2007 (USA Edition) Business continuity management - Specification" 868:-1:1995 - peripherally addressed information security procedures. (withdrawn) 519:
outbreak, some organizations compartmentalized and rotated teams to match the
3602: 3087:
Business Continuity Plan Design, 8 Steps for Getting Started Designing a Plan
2750: 2148: 1680: 1645: 1610: 1478:
The Resilient Enterprise: Overcoming Vulnerability for Competitive Enterprise
610:. Examples include: PTAM with Hot Site available, IBM Tivoli Storage Manager. 1558:"Annex A.17: Information Security Aspects of Business Continuity Management" 238:(urgent) and non-critical (non-urgent) organization functions/activities. A 3296: 3264: 1472: 1255: 463: 108: 62: 2978: 2638:"July 2013 (V2) The role of Local Resilience Forums: A reference document" 2494: 2468: 2442: 2417: 2392: 2366: 2334: 2284: 2270: 195:
Documents and documentation, including which have off-site backup copies:
3175:
SteelStore Cloud Storage Gateway: Disaster Recovery Best Practices Guide.
2729:(2010 ed.). Quincy, MA: National Fire Protection Association. 2010. 722: 189: 3166:
Charlotte Brooks, Matthew Bedernjak, Igor Juran, and John Merryman. In,
1335: 744: 713:
Telecommunication architecture between primary and secondary work sites
433: 3218:
Maximum Tolerable Period of Disruption (MTPOD): BSI committee response
3148: 1963:"Six Myths About Business Continuity Management and Disaster Recovery" 1476: 905:
HB 292-2006, "A practitioners guide to business continuity management"
567:
released in 1992, were updated in 2012 by IBM as an eight tier model:
414:
100% RCO means that post recovery, no business data deviation occurs.
142: 134: 3170:
Chapter 2. Pages 21โ€“36. Red Books Series. IBM. Tivoli Software. 2002.
1518:"Newsday | Long Island's & NYC's News Source | Newsday" 1051:
Definitions of terminology to facilitate timely communication during
918: 779: 775: 769: 765: 759: 755: 751: 477: 457: 159: 1960: 1070:
Specialized technical resources must be maintained. Checks include:
138: 133:
There are three main groups that are affected by a crisis. They are
2545:"BS 25999-1:2006 Business continuity management - Code of practice" 2086:
developed by SHARE's Technical Steering Committee, working with IBM
1731:
ISO 22301 Business Continuity Management: Your implementation guide
1137: 931:
NFPA 1600, Standard on Continuity, Emergency, and Crisis Management
871: 451: 427: 3186:
Robert Kern and Victor Peltz. IBM Systems Magazine. November 2003.
3114: 2666:"HB HB 292โ€”2006 Executive Guide to Business Continuity Management" 1228:"How to Build an Effective and Organized Business Continuity Plan" 1096: 249:
Human resources (full-time staff, part-time staff, or contractors)
2885: 2123:"Disaster Governance: Social, Political, and Economic Dimensions" 865: 492:
Theft (insider or external threat, vital information or material)
3257:
Adapt and respond to risks with a business continuity plan (BCP)
2072:
Chloe Demrovsky (December 22, 2017). "Holding It All Together".
1447:"Business Continuity Planning (BCP) for Businesses of all Sizes" 1058:
Distribution lists (staff, important clients, vendors/suppliers)
908:
HB 293-2006, "Executive guide to business continuity management"
16:
Prevention and recovery from threats that might affect a company
2694:"HB 293โ€”2006 Executive Guide to Business Continuity Management" 1395:"Continuity Resources and Technical Assistance | FEMA.gov" 1310:. United States Department of Homeland Security. Archived from 1232: 481: 66: 19: 1878:"Plain English ISO 22301 2012 Business Continuity Definitions" 1842:"BIA Instructions, BUSINESS CONTINUITY MANAGEMENT - WORKSHOP" 1020:
Testing and verification of organization recovery procedures.
580:
The length of recovery time in this instance is unpredictable
441: 3206:
Continuous Operations: The Seven Tiers of Disaster Recovery.
3168:
Disaster Recovery Strategies with Tivoli Storage Management.
3096:
Disaster Survival Planning: A Practical Guide for Businesses
1702: 3129: 1530: 516: 122:, a professor at the Brian Lamb School of Communication at 73:. In the U.S., government entities refer to the process as 2833:"Continuity Resources and Technical Assistance | FEMA.gov" 1416:"A Guide to the preparation of a Business Continuity Plan" 685:
Two main requirements from the impact analysis stage are:
255:
Physical assets (mobile phones, laptops/workstations etc.)
104:"before the case for change becomes desperately obvious". 3240:
Department of Homeland Security Emergency Plan Guidelines
1986:"Medical supply location and distribution in disasters". 1925:"The Rise and Rise of the Recovery Consistency Objective" 1851:. Disaster Recovery Information Exchange (DRIE) Central. 1043:
Job descriptions, skillsets needed, training requirements
486: 966: 3191:
Business Continuity: The 5-tiers of Disaster Recovery.
2098:"A Business Continuity Solution Selection Methodology" 754::2021 Security and resilience โ€“ Vocabulary (Replaces 3026:"Validation of a Disaster Management Metamodel (DMM)" 343: 2751:"A Comprehensive Overview of the NFPA 1600 Standard" 1290:"Constructing a Successful Business Continuity Plan" 719:
methodology between primary and secondary work sites
622:
less data recreation or loss after a disaster occurs
582:. In fact, it may not be possible to recover at all. 1917: 1913:- National Cyber Security Center. 2022. p. 12. 1769:"Can your Organization survive a natural disaster?" 1080:
Application security and service patch distribution
3068:Business Continuity Planning, A Step-by-Step Guide 1148:Disaster recovery and business continuity auditing 404: 1217:, published April 2018, accessed 19 February 2021 552:These should reflect the widest possible damage. 468:Water outage (supply interruption, contamination) 417: 229: 3600: 3065: 2911:"Business Continuity Planning Suite | Ready.gov" 758::2018 Security and resilience - Vocabulary and 535:Impact scenarios are identified and documented: 234:A business impact analysis (BIA) differentiates 158:the organization undertakes. For example, under 3046: 2943:. American National Standards Institute. 2009. 2071: 1338:Current Opinion in Environmental Sustainability 1097:Testing and verification of recovery procedures 242:may be considered critical if dictated by law. 3213:Maximum Tolerable Period of Disruption (MTPOD) 2203:International Organization for Standardization 2169: 2027:"transportation planning in disaster recovery" 1961:Josh Krischer; Donna Scott; Roberta J. Witty. 741:International Organization for Standardization 674:Highly automated, business-integrated solution 548:need for business and data processing supplies 3280: 1209:BCI Good Practice Guidelines 2013, quoted in 958: 848:IWA 5:2006 Emergency Preparedness (withdrawn) 3294: 3112: 3098:. Disaster Survival Planning, Incorporated. 3084: 2199:"ISO - ISO/TC 292 - Security and resilience" 2179:. Pittsburgh, PA: Carnegie Mellon University 2170:Partridge, Kevin G.; Young, Lisa R. (2011). 2095: 1471: 762::2012 Security and resilience - Vocabulary.) 664:maintain the highest levels of data currency 636:Several hours of data loss is still possible 262:For each function, two values are assigned: 2774: 2772: 1766: 1287: 325:(RCO) is the name of this goal. It applies 36:business continuity and resiliency planning 3287: 3273: 2127:Annual Review of Environment and Resources 1027: 495:Random failure of mission-critical systems 107:This approach is sometimes summarized as: 3093: 2163: 2138: 1661:Journal of Applied Communication Research 1658: 1623: 1588: 608:it is less unpredictable in recovery time 2769: 2089: 2049:"PLANNING SCENARIOS Executive Summaries" 1816:"Maximum Acceptable Outage (Definition)" 1410: 1408: 1370: 555: 18: 3178:Riverbed Technology, Inc. October 2011. 3163:The tiers of Disaster Recovery and TSM. 3049:A Guide to Business Continuity Planning 2858:"Continuity of operations: An overview" 2120: 2114: 1371:Intrieri, Charles (10 September 2013). 899: 188:Locations, including other offices and 23:Business continuity planning life cycle 3601: 3130:Andrew Zolli; Ann Marie Healy (2013). 2780:"Business Continuity Plan | Ready.gov" 2121:Tierney, Kathleen (21 November 2012). 1733:, published, accessed 20 February 2021 1331: 1329: 725:with applications, data and work space 307:maximum tolerable period of disruption 285:Maximum tolerable period of disruption 178:Planners must have information about: 164:maximum tolerable period of disruption 3268: 3245:CIDRAP/SHRM Pandemic HR Guide Toolkit 3149:International Glossary for Resilience 2957: 2140:10.1146/annurev-environ-020911-095618 1405: 1046:Documentation and document management 967:Testing and organizational acceptance 953:American National Standards Institute 662:โ€ข Tier 6 Disaster Recovery solutions 111:, protection, response and recovery. 1215:Business Continuity Policy Statement 936:National Fire Protection Association 924:National Fire Protection Association 852: 545:civilian impact of nuclear disasters 2979:"Glossary | DRI International" 2965:"Business Continuity Plan Template" 1326: 530: 118:The theory is based on the work of 13: 3132:Resilience: Why Things Bounce Back 3113:Dimattia, S. (November 15, 2001). 3040: 3023: 2997:"Disaster Recovery Plan Checklist" 1904:"Baseline Cyber Security Controls" 1493:"Transform. The Resilient Economy" 680: 594:several days to weeks of data loss 258:Documents (electronic or physical) 14: 3660: 3155: 2074:Manufacturing Business Technology 301:According to ISO 22301 the terms 76:continuity of operations planning 3565: 3564: 3552:Outline of organizational theory 3013:from the original on 2022-10-09. 2110:from the original on 2022-10-09. 2061:from the original on 2022-10-09. 2037:from the original on 2022-10-09. 1975:from the original on 2022-10-09. 1785:from the original on 2022-10-09. 1756:from the original on 2022-10-09. 1638:10.1111/j.1460-2466.2009.01469.x 1603:10.1111/j.1460-2466.2009.01469.x 1267:from the original on 2022-10-09. 912: 734: 291:Maximum tolerable downtime (MTD) 212:The analysis phase consists of: 163: 3066:Kenneth L Fulmer (2004-10-04). 3017: 2989: 2971: 2928: 2903: 2878: 2850: 2825: 2797: 2743: 2714: 2686: 2658: 2630: 2621: 2612: 2587: 2562: 2537: 2512: 2487: 2461: 2435: 2410: 2385: 2359: 2341: 2327: 2309: 2291: 2277: 2263: 2245: 2227: 2209: 2191: 2096:Ellis Holman (March 13, 2012). 2080: 2065: 2041: 2019: 1979: 1954: 1943: 1896: 1870: 1858:from the original on 2022-10-09 1834: 1808: 1795: 1789: 1767:Helen Clark (August 15, 2012). 1760: 1736: 1723: 1709: 1695: 1652: 1617: 1582: 1564: 1550: 1524: 1510: 1485: 1465: 1449:. 19 April 2017. Archived from 1439: 1258:.org (American Bar Association) 890:Civil Contingencies Act of 2004 703:The solution phase determines: 542:need for transportation options 366:number of inconsistent entities 297:Maximum acceptable outage (MAO) 192:/work area recovery (WAR) sites 100:embraced this resilience goal. 3047:James C. Barnes (2001-06-08). 1387: 1373:"Business Continuity Planning" 1364: 1300: 1281: 1271: 1240: 1220: 1203: 1005: 418:Threat and risk analysis (TRA) 390: 381: 370: 361: 323:Recovery Consistency Objective 316: 294:Maximum tolerable outage (MTO) 274: 230:Business impact analysis (BIA) 1: 1673:10.1080/00909882.2018.1426711 1560:. ISMS.online. November 2021. 1288:Alan Berman (March 9, 2015). 1196: 977:British Standards Institution 859:British Standards Institution 166:(MTPD) which can be allowed. 152: 87: 47:business continuity standards 1927:. 2016-03-22. Archived from 1884:. Praxiom Research Group LTD 1358:10.1016/j.cosust.2017.07.005 1065: 729: 590:Data backup with no Hot Site 454:(insider or external threat) 173: 149:summarizes this evaluation. 141:(group or organization) and 32:business continuity planning 7: 3201:Recovery Specialties. 2007. 1294:Business Insurance Magazine 1211:Mid Sussex District Council 1105: 207: 56: 10: 3667: 3094:Judy Bell (October 1991). 1992:10.1016/j.ijpe.2009.10.004 1308:"Business Continuity Plan" 959:Implementation and testing 933:(2019, current standard), 698:disaster recovery planning 98:Council on Competitiveness 3560: 3534: 3303: 3183:Disaster Recovery Levels. 3115:"Planning for Continuity" 2349:"ISO/IEC TS 17021-6:2014" 1703:"Resilient Organisations" 973:Exercising for Excellence 696:This phase overlaps with 604:Data backup with Hot Site 539:need for medical supplies 303:maximum acceptable outage 219:Threat and risks analysis 3542:History of organizations 3233:Business Continuity Plan 3134:. Simon & Schuster. 1626:Journal of Communication 1591:Journal of Communication 943:Continuity of Operations 660:Zero or little data loss 81:business continuity plan 3573:Aspects of corporations 1717:"Resilience Diagnostic" 1153:Disaster risk reduction 1086:Application operability 1077:definition distribution 1040:A series of checklists 1028:Information and targets 498:Single point dependency 201:Procedure documentation 3649:Management cybernetics 3583:Aspects of occupations 2886:"Business | Ready.gov" 2007:Cite journal requires 1533:AMCIS 2007 Proceedings 1248:"Surviving a Disaster" 894:Local Resilience Forum 650:little to no data loss 406: 311:maximum downtime limit 185:Supplies and suppliers 24: 3629:Disaster preparedness 3588:Aspects of workplaces 1822:. Albion Research Ltd 1798:"Finding RPO and RTO" 646:Transaction integrity 556:Tiers of preparedness 407: 94:competitive advantage 22: 3639:Emergency management 3547:Organization studies 3496:Retaliatory behavior 3341:Citizenship behavior 3151:, DRI International. 2469:"ISO/PAS 22399:2007" 2443:"ISO/IEC 27031:2011" 2418:"ISO/IEC 27002:2022" 2393:"ISO/IEC 27001:2022" 2367:"ISO/IEC 24762:2008" 1968:. Gartner Research. 1911:Ministry of Interior 1744:"Emergency Planning" 1719:. November 28, 2017. 1576:www.researchgate.net 1160:Emergency management 1118:Catastrophe modeling 1083:Hardware operability 1034:who has to know what 900:Australian standards 830:Information security 632:Point-in-time copies 527:against the threat. 460:or other major storm 341: 120:Patrice M. Buzzanell 3614:Business continuity 2701:Standards Australia 2673:Standards Australia 2335:"Iso/Ts 22332:2021" 2317:"ISO/TS 22331:2018" 2299:"ISO/TS 22330:2018" 2285:"Iso/Ts 22318:2021" 2271:"Iso/Ts 22317:2021" 1350:2017COES...28...33M 1185:Systems engineering 975:, published by The 828:ISO/IEC 27001:2022 618:Electronic vaulting 28:Business continuity 3644:IT risk management 3569:See also templates 3250:2013-05-18 at the 3197:2018-09-26 at the 3085:Richard Kepenach. 3030:SCHOLAR.google.com 2449:. 5 September 2016 2031:SCHOLAR.google.com 1314:on 7 December 2018 1133:Digital continuity 984:Tabletop exercises 818:ISO/IEC/TS 17021-6 563:'s seven tiers of 402: 386:number of entities 198:Business documents 25: 3634:Disaster recovery 3596: 3595: 3476:Perceived support 2950:978-1-887056-92-2 2757:. 29 January 2019 1820:riskythinking.com 1705:. March 22, 2011. 1180:Scenario planning 1143:Disaster recovery 1123:Crisis management 1113:Capacity planning 1089:Data verification 1053:disaster recovery 996:Complex exercises 853:British standards 710:command structure 708:Crisis management 565:disaster recovery 521:incubation period 400: 387: 367: 347: 124:Purdue University 40:disaster recovery 3656: 3609:Systems thinking 3568: 3567: 3461:Network analysis 3451:Machiavellianism 3289: 3282: 3275: 3266: 3265: 3228:Janco Associates 3145: 3126: 3109: 3090: 3081: 3062: 3034: 3033: 3021: 3015: 3014: 3012: 3001: 2993: 2987: 2986: 2975: 2969: 2968: 2961: 2955: 2954: 2942: 2932: 2926: 2925: 2923: 2921: 2907: 2901: 2900: 2898: 2896: 2882: 2876: 2875: 2873: 2871: 2862: 2854: 2848: 2847: 2845: 2843: 2829: 2823: 2822: 2820: 2818: 2809: 2801: 2795: 2794: 2792: 2790: 2776: 2767: 2766: 2764: 2762: 2747: 2741: 2740: 2728: 2718: 2712: 2711: 2709: 2707: 2698: 2690: 2684: 2683: 2681: 2679: 2670: 2662: 2656: 2655: 2653: 2651: 2642: 2634: 2628: 2625: 2619: 2616: 2610: 2609: 2607: 2605: 2591: 2585: 2584: 2582: 2580: 2566: 2560: 2559: 2557: 2555: 2541: 2535: 2534: 2532: 2530: 2516: 2510: 2509: 2507: 2505: 2491: 2485: 2484: 2482: 2480: 2465: 2459: 2458: 2456: 2454: 2439: 2433: 2432: 2430: 2428: 2414: 2408: 2407: 2405: 2403: 2389: 2383: 2382: 2380: 2378: 2363: 2357: 2356: 2345: 2339: 2338: 2331: 2325: 2324: 2313: 2307: 2306: 2295: 2289: 2288: 2281: 2275: 2274: 2267: 2261: 2260: 2253:"ISO 22313:2020" 2249: 2243: 2242: 2235:"ISO 22301:2019" 2231: 2225: 2224: 2217:"ISO 22300:2018" 2213: 2207: 2206: 2195: 2189: 2188: 2186: 2184: 2178: 2167: 2161: 2160: 2142: 2118: 2112: 2111: 2109: 2102: 2093: 2087: 2084: 2078: 2077: 2069: 2063: 2062: 2060: 2053: 2045: 2039: 2038: 2023: 2017: 2016: 2010: 2005: 2003: 1995: 1983: 1977: 1976: 1974: 1967: 1958: 1952: 1947: 1941: 1940: 1938: 1936: 1921: 1915: 1914: 1908: 1900: 1894: 1893: 1891: 1889: 1874: 1868: 1867: 1865: 1863: 1857: 1846: 1838: 1832: 1831: 1829: 1827: 1812: 1806: 1805: 1800:. Archived from 1793: 1787: 1786: 1784: 1773: 1764: 1758: 1757: 1755: 1748: 1740: 1734: 1727: 1721: 1720: 1713: 1707: 1706: 1699: 1693: 1692: 1656: 1650: 1649: 1621: 1615: 1614: 1586: 1580: 1579: 1568: 1562: 1561: 1554: 1548: 1547: 1528: 1522: 1521: 1514: 1508: 1507: 1505: 1504: 1495:. Archived from 1489: 1483: 1482: 1475:(October 2005). 1469: 1463: 1462: 1460: 1458: 1453:on 24 April 2017 1443: 1437: 1436: 1434: 1433: 1427: 1421:. Archived from 1420: 1412: 1403: 1402: 1391: 1385: 1384: 1382: 1380: 1368: 1362: 1361: 1333: 1324: 1323: 1321: 1319: 1304: 1298: 1297: 1285: 1279: 1275: 1269: 1268: 1266: 1252: 1244: 1238: 1237: 1236:. June 26, 2015. 1224: 1218: 1207: 1190:System lifecycle 1165:Man-made hazards 1128:Cyber resilience 1092:Data application 990:Medium exercises 717:Data replication 576:No off-site data 531:Impact scenarios 507:Misconfiguration 501:Supplier failure 471:Telecomms outage 411: 409: 408: 403: 401: 399: 398: 397: 388: 385: 379: 378: 377: 368: 365: 359: 348: 345: 327:data consistency 287: 286: 222:Impact scenarios 147:Resilience Ratio 3666: 3665: 3659: 3658: 3657: 3655: 3654: 3653: 3599: 3598: 3597: 3592: 3578:Aspects of jobs 3556: 3530: 3299: 3293: 3262: 3252:Wayback Machine 3223:Wayback Machine 3199:Wayback Machine 3158: 3142: 3119:Library Journal 3106: 3078: 3059: 3043: 3041:Further reading 3038: 3037: 3022: 3018: 3010: 2999: 2995: 2994: 2990: 2977: 2976: 2972: 2963: 2962: 2958: 2951: 2940: 2934: 2933: 2929: 2919: 2917: 2909: 2908: 2904: 2894: 2892: 2884: 2883: 2879: 2869: 2867: 2860: 2856: 2855: 2851: 2841: 2839: 2831: 2830: 2826: 2816: 2814: 2807: 2803: 2802: 2798: 2788: 2786: 2778: 2777: 2770: 2760: 2758: 2749: 2748: 2744: 2737: 2736:978-161665005-6 2726: 2720: 2719: 2715: 2705: 2703: 2696: 2692: 2691: 2687: 2677: 2675: 2668: 2664: 2663: 2659: 2649: 2647: 2640: 2636: 2635: 2631: 2626: 2622: 2617: 2613: 2603: 2601: 2593: 2592: 2588: 2578: 2576: 2568: 2567: 2563: 2553: 2551: 2543: 2542: 2538: 2528: 2526: 2518: 2517: 2513: 2503: 2501: 2493: 2492: 2488: 2478: 2476: 2467: 2466: 2462: 2452: 2450: 2441: 2440: 2436: 2426: 2424: 2416: 2415: 2411: 2401: 2399: 2391: 2390: 2386: 2376: 2374: 2365: 2364: 2360: 2347: 2346: 2342: 2333: 2332: 2328: 2315: 2314: 2310: 2305:. 12 July 2019. 2297: 2296: 2292: 2283: 2282: 2278: 2269: 2268: 2264: 2251: 2250: 2246: 2233: 2232: 2228: 2223:. 12 July 2019. 2215: 2214: 2210: 2197: 2196: 2192: 2182: 2180: 2176: 2168: 2164: 2119: 2115: 2107: 2100: 2094: 2090: 2085: 2081: 2070: 2066: 2058: 2051: 2047: 2046: 2042: 2025: 2024: 2020: 2008: 2006: 1997: 1996: 1985: 1984: 1980: 1972: 1965: 1959: 1955: 1948: 1944: 1934: 1932: 1923: 1922: 1918: 1906: 1902: 1901: 1897: 1887: 1885: 1876: 1875: 1871: 1861: 1859: 1855: 1849:driecentral.org 1844: 1840: 1839: 1835: 1825: 1823: 1814: 1813: 1809: 1794: 1790: 1782: 1771: 1765: 1761: 1753: 1746: 1742: 1741: 1737: 1728: 1724: 1715: 1714: 1710: 1701: 1700: 1696: 1657: 1653: 1622: 1618: 1587: 1583: 1570: 1569: 1565: 1556: 1555: 1551: 1529: 1525: 1516: 1515: 1511: 1502: 1500: 1491: 1490: 1486: 1470: 1466: 1456: 1454: 1445: 1444: 1440: 1431: 1429: 1425: 1418: 1414: 1413: 1406: 1393: 1392: 1388: 1378: 1376: 1369: 1365: 1334: 1327: 1317: 1315: 1306: 1305: 1301: 1286: 1282: 1276: 1272: 1264: 1250: 1246: 1245: 1241: 1226: 1225: 1221: 1208: 1204: 1199: 1194: 1175:Risk management 1170:Natural hazards 1108: 1099: 1068: 1030: 1008: 969: 961: 927:. (superseded). 915: 902: 855: 737: 732: 683: 681:Solution design 558: 533: 513: 504:Data corruption 489:/civil disorder 420: 393: 389: 384: 380: 373: 369: 364: 360: 358: 344: 342: 339: 338: 319: 284: 283: 277: 232: 216:Impact analysis 210: 176: 155: 90: 71:risk management 59: 17: 12: 11: 5: 3664: 3663: 3652: 3651: 3646: 3641: 3636: 3631: 3626: 3621: 3616: 3611: 3594: 3593: 3591: 3590: 3585: 3580: 3575: 3570: 3561: 3558: 3557: 3555: 3554: 3549: 3544: 3538: 3536: 3532: 3531: 3529: 3528: 3523: 3518: 3513: 3508: 3503: 3498: 3493: 3488: 3483: 3478: 3473: 3468: 3463: 3458: 3453: 3448: 3443: 3438: 3433: 3428: 3426:Identification 3423: 3418: 3413: 3408: 3403: 3398: 3393: 3388: 3383: 3378: 3373: 3368: 3363: 3358: 3353: 3348: 3343: 3338: 3333: 3328: 3323: 3318: 3313: 3307: 3305: 3301: 3300: 3292: 3291: 3284: 3277: 3269: 3260: 3259: 3254: 3242: 3236: 3235: 3230: 3225: 3220: 3215: 3210: 3202: 3187: 3179: 3171: 3157: 3156:External links 3154: 3153: 3152: 3146: 3141:978-1451683813 3140: 3127: 3110: 3105:978-0963058003 3104: 3091: 3082: 3077:978-1931332217 3076: 3063: 3058:978-0471530152 3057: 3042: 3039: 3036: 3035: 3016: 2988: 2970: 2956: 2949: 2927: 2902: 2877: 2849: 2824: 2796: 2768: 2742: 2735: 2713: 2685: 2657: 2645:Cabinet Office 2629: 2620: 2611: 2586: 2561: 2536: 2511: 2486: 2475:. 18 June 2012 2460: 2434: 2409: 2384: 2373:. 6 March 2008 2358: 2340: 2326: 2308: 2290: 2276: 2262: 2244: 2241:. 5 June 2023. 2226: 2208: 2190: 2162: 2133:(1): 341โ€“363. 2113: 2088: 2079: 2064: 2040: 2018: 2009:|journal= 1978: 1953: 1942: 1916: 1895: 1869: 1833: 1807: 1804:on 2016-03-03. 1796:May, Richard. 1788: 1759: 1735: 1722: 1708: 1694: 1651: 1616: 1581: 1563: 1549: 1523: 1509: 1484: 1464: 1438: 1404: 1386: 1363: 1325: 1299: 1280: 1270: 1239: 1219: 1201: 1200: 1198: 1195: 1193: 1192: 1187: 1182: 1177: 1172: 1167: 1162: 1157: 1156: 1155: 1150: 1145: 1135: 1130: 1125: 1120: 1115: 1109: 1107: 1104: 1098: 1095: 1094: 1093: 1090: 1087: 1084: 1081: 1078: 1067: 1064: 1063: 1062: 1059: 1056: 1049: 1048: 1047: 1044: 1029: 1026: 1022: 1021: 1018: 1015: 1007: 1004: 1000: 999: 993: 987: 971:The 2008 book 968: 965: 960: 957: 956: 955: 949: 946: 940: 928: 914: 911: 910: 909: 906: 901: 898: 882: 881: 878: 875: 869: 854: 851: 850: 849: 846: 843: 837: 833: 826: 822: 821: 815: 809: 803: 797: 791: 784: 783: 773: 763: 736: 733: 731: 728: 727: 726: 720: 714: 711: 694: 693: 690: 682: 679: 678: 677: 667: 653: 639: 625: 611: 597: 583: 557: 554: 550: 549: 546: 543: 540: 532: 529: 512: 511: 510:Network outage 508: 505: 502: 499: 496: 493: 490: 484: 475: 472: 469: 466: 461: 455: 449: 444: 439: 436: 431: 424: 419: 416: 396: 392: 383: 376: 372: 363: 357: 354: 351: 318: 315: 299: 298: 295: 292: 289: 276: 273: 272: 271: 268: 260: 259: 256: 253: 250: 231: 228: 224: 223: 220: 217: 209: 206: 205: 204: 203: 202: 199: 193: 186: 183: 175: 172: 160:ISO 22301:2019 154: 151: 137:(individual), 89: 86: 58: 55: 15: 9: 6: 4: 3: 2: 3662: 3661: 3650: 3647: 3645: 3642: 3640: 3637: 3635: 3632: 3630: 3627: 3625: 3622: 3620: 3619:Collaboration 3617: 3615: 3612: 3610: 3607: 3606: 3604: 3589: 3586: 3584: 3581: 3579: 3576: 3574: 3571: 3563: 3562: 3559: 3553: 3550: 3548: 3545: 3543: 3540: 3539: 3537: 3533: 3527: 3524: 3522: 3519: 3517: 3514: 3512: 3509: 3507: 3504: 3502: 3499: 3497: 3494: 3492: 3489: 3487: 3484: 3482: 3479: 3477: 3474: 3472: 3469: 3467: 3464: 3462: 3459: 3457: 3454: 3452: 3449: 3447: 3444: 3442: 3439: 3437: 3434: 3432: 3429: 3427: 3424: 3422: 3419: 3417: 3414: 3412: 3409: 3407: 3404: 3402: 3401:Effectiveness 3399: 3397: 3394: 3392: 3389: 3387: 3384: 3382: 3379: 3377: 3374: 3372: 3369: 3367: 3364: 3362: 3359: 3357: 3356:Communication 3354: 3352: 3349: 3347: 3344: 3342: 3339: 3337: 3334: 3332: 3329: 3327: 3324: 3322: 3319: 3317: 3314: 3312: 3309: 3308: 3306: 3302: 3298: 3297:organizations 3290: 3285: 3283: 3278: 3276: 3271: 3270: 3267: 3263: 3258: 3255: 3253: 3249: 3246: 3243: 3241: 3238: 3237: 3234: 3231: 3229: 3226: 3224: 3221: 3219: 3216: 3214: 3211: 3208: 3207: 3203: 3200: 3196: 3193: 3192: 3188: 3185: 3184: 3180: 3177: 3176: 3172: 3169: 3165: 3164: 3160: 3159: 3150: 3147: 3143: 3137: 3133: 3128: 3124: 3120: 3116: 3111: 3107: 3101: 3097: 3092: 3088: 3083: 3079: 3073: 3070:. Rothstein. 3069: 3064: 3060: 3054: 3050: 3045: 3044: 3031: 3027: 3020: 3009: 3005: 2998: 2992: 2984: 2980: 2974: 2966: 2960: 2952: 2946: 2939: 2938: 2931: 2916: 2915:www.ready.gov 2912: 2906: 2891: 2890:www.ready.gov 2887: 2881: 2866: 2859: 2853: 2838: 2834: 2828: 2813: 2806: 2800: 2785: 2784:www.ready.gov 2781: 2775: 2773: 2756: 2752: 2746: 2738: 2732: 2725: 2724: 2717: 2702: 2695: 2689: 2674: 2667: 2661: 2646: 2639: 2633: 2624: 2615: 2600: 2596: 2590: 2575: 2571: 2565: 2550: 2546: 2540: 2525: 2521: 2515: 2500: 2496: 2490: 2474: 2470: 2464: 2448: 2444: 2438: 2423: 2419: 2413: 2398: 2394: 2388: 2372: 2368: 2362: 2354: 2350: 2344: 2336: 2330: 2322: 2318: 2312: 2304: 2300: 2294: 2286: 2280: 2272: 2266: 2258: 2254: 2248: 2240: 2236: 2230: 2222: 2218: 2212: 2204: 2200: 2194: 2175: 2174: 2166: 2158: 2154: 2150: 2146: 2141: 2136: 2132: 2128: 2124: 2117: 2106: 2099: 2092: 2083: 2075: 2068: 2057: 2050: 2044: 2036: 2032: 2028: 2022: 2014: 2001: 1993: 1989: 1982: 1971: 1964: 1957: 1951: 1946: 1931:on 2020-09-26 1930: 1926: 1920: 1912: 1905: 1899: 1883: 1879: 1873: 1854: 1850: 1843: 1837: 1821: 1817: 1811: 1803: 1799: 1792: 1781: 1777: 1770: 1763: 1752: 1745: 1739: 1732: 1726: 1718: 1712: 1704: 1698: 1690: 1686: 1682: 1678: 1674: 1670: 1666: 1662: 1655: 1647: 1643: 1639: 1635: 1631: 1627: 1620: 1612: 1608: 1604: 1600: 1596: 1592: 1585: 1577: 1573: 1567: 1559: 1553: 1546: 1542: 1538: 1534: 1527: 1519: 1513: 1499:on 2013-10-22 1498: 1494: 1488: 1480: 1479: 1474: 1468: 1452: 1448: 1442: 1428:on 2019-02-09 1424: 1417: 1411: 1409: 1400: 1396: 1390: 1374: 1367: 1359: 1355: 1351: 1347: 1343: 1339: 1332: 1330: 1313: 1309: 1303: 1295: 1291: 1284: 1274: 1263: 1259: 1257: 1249: 1243: 1235: 1234: 1229: 1223: 1216: 1212: 1206: 1202: 1191: 1188: 1186: 1183: 1181: 1178: 1176: 1173: 1171: 1168: 1166: 1163: 1161: 1158: 1154: 1151: 1149: 1146: 1144: 1141: 1140: 1139: 1136: 1134: 1131: 1129: 1126: 1124: 1121: 1119: 1116: 1114: 1111: 1110: 1103: 1091: 1088: 1085: 1082: 1079: 1076: 1073: 1072: 1071: 1060: 1057: 1054: 1050: 1045: 1042: 1041: 1039: 1038: 1037: 1035: 1025: 1019: 1016: 1013: 1012: 1011: 1003: 997: 994: 991: 988: 985: 982: 981: 980: 978: 974: 964: 954: 950: 947: 944: 941: 938: 937: 932: 929: 926: 925: 920: 917: 916: 913:United States 907: 904: 903: 897: 895: 891: 886: 879: 876: 873: 870: 867: 864: 863: 862: 860: 847: 844: 841: 840:ISO/IEC 27031 838: 834: 831: 827: 824: 823: 819: 816: 813: 810: 807: 804: 801: 798: 795: 792: 789: 786: 785: 781: 777: 774: 771: 767: 764: 761: 757: 753: 750: 749: 748: 746: 742: 735:ISO Standards 724: 721: 718: 715: 712: 709: 706: 705: 704: 701: 699: 691: 688: 687: 686: 675: 671: 668: 665: 661: 657: 654: 651: 647: 643: 640: 637: 633: 629: 626: 623: 619: 615: 612: 609: 605: 601: 598: 595: 591: 587: 584: 581: 577: 573: 570: 569: 568: 566: 562: 553: 547: 544: 541: 538: 537: 536: 528: 526: 522: 518: 509: 506: 503: 500: 497: 494: 491: 488: 485: 483: 479: 476: 473: 470: 467: 465: 462: 459: 456: 453: 450: 448: 445: 443: 440: 437: 435: 432: 429: 426: 425: 423: 415: 412: 394: 374: 355: 352: 349: 335: 331: 328: 324: 314: 312: 308: 304: 296: 293: 290: 282: 281: 280: 269: 265: 264: 263: 257: 254: 251: 248: 247: 246: 243: 241: 237: 227: 221: 218: 215: 214: 213: 200: 197: 196: 194: 191: 187: 184: 181: 180: 179: 171: 167: 165: 161: 150: 148: 144: 140: 136: 131: 127: 125: 121: 116: 112: 110: 105: 101: 99: 95: 85: 82: 78: 77: 72: 68: 64: 54: 50: 48: 43: 41: 37: 33: 29: 21: 3511:Storytelling 3431:Intelligence 3311:Architecture 3261: 3205: 3190: 3182: 3174: 3167: 3161: 3131: 3125:(19): 32โ€“34. 3122: 3118: 3095: 3086: 3067: 3048: 3029: 3019: 3003: 2991: 2982: 2973: 2959: 2936: 2930: 2918:. Retrieved 2914: 2905: 2893:. Retrieved 2889: 2880: 2868:. Retrieved 2864: 2852: 2840:. Retrieved 2836: 2827: 2815:. Retrieved 2811: 2799: 2787:. Retrieved 2783: 2759:. Retrieved 2754: 2745: 2722: 2716: 2704:. Retrieved 2700: 2688: 2676:. Retrieved 2672: 2660: 2648:. Retrieved 2644: 2632: 2623: 2614: 2602:. Retrieved 2598: 2589: 2577:. Retrieved 2573: 2564: 2552:. Retrieved 2548: 2539: 2527:. Retrieved 2523: 2514: 2502:. Retrieved 2498: 2495:"IWA 5:2006" 2489: 2477:. Retrieved 2472: 2463: 2451:. Retrieved 2446: 2437: 2425:. Retrieved 2421: 2412: 2400:. Retrieved 2396: 2387: 2375:. Retrieved 2370: 2361: 2352: 2343: 2329: 2320: 2311: 2302: 2293: 2279: 2265: 2256: 2247: 2238: 2229: 2220: 2211: 2202: 2193: 2181:. Retrieved 2172: 2165: 2130: 2126: 2116: 2103:. IBM Corp. 2091: 2082: 2073: 2067: 2043: 2030: 2021: 2000:cite journal 1981: 1956: 1945: 1935:September 9, 1933:. Retrieved 1929:the original 1919: 1898: 1886:. Retrieved 1881: 1872: 1860:. Retrieved 1848: 1836: 1824:. Retrieved 1819: 1810: 1802:the original 1791: 1775: 1762: 1738: 1725: 1711: 1697: 1667:(1): 14โ€“18. 1664: 1660: 1654: 1629: 1625: 1619: 1594: 1590: 1584: 1575: 1566: 1552: 1544: 1532: 1526: 1512: 1501:. Retrieved 1497:the original 1487: 1481:. MIT Press. 1477: 1473:Yossi Sheffi 1467: 1455:. Retrieved 1451:the original 1441: 1430:. Retrieved 1423:the original 1399:www.fema.gov 1398: 1389: 1379:29 September 1377:. Retrieved 1366: 1341: 1337: 1316:. Retrieved 1312:the original 1302: 1293: 1283: 1273: 1256:American Bar 1254: 1242: 1231: 1222: 1205: 1100: 1069: 1033: 1031: 1023: 1009: 1001: 995: 989: 983: 972: 970: 962: 934: 922: 887: 883: 856: 812:ISO/TS 22332 806:ISO/TS 22331 800:ISO/TS 22330 794:ISO/TS 22318 788:ISO/TS 22317 738: 702: 695: 684: 673: 669: 663: 659: 655: 649: 645: 641: 635: 631: 627: 621: 617: 613: 607: 603: 599: 593: 589: 585: 579: 575: 571: 559: 551: 534: 514: 464:Power outage 447:Cyber attack 421: 413: 336: 332: 322: 320: 310: 306: 302: 300: 278: 261: 244: 233: 225: 211: 177: 168: 156: 146: 132: 128: 117: 113: 109:preparedness 106: 102: 91: 80: 74: 63:supply chain 60: 51: 44: 35: 31: 27: 26: 3481:Performance 3406:Engineering 3386:Diagnostics 3381:Development 3295:Aspects of 1882:praxiom.com 1632:(1): 1โ€“14. 1597:(1): 1โ€“14. 1006:Maintenance 723:Backup site 317:Consistency 275:Maximum RTO 3603:Categories 3491:Resilience 3486:Psychology 3456:Narcissism 3446:Life cycle 3361:Complexity 3351:Commitment 2755:AlertMedia 1503:2019-02-04 1432:2019-02-08 1197:References 885:sickness. 836:controls.) 745:ISO/TC 292 525:resiliency 434:Earthquake 252:IT systems 153:Continuity 88:Resilience 79:(COOP). A 3516:Structure 3466:Ombudsman 3421:Hierarchy 3051:. Wiley. 2920:5 January 2895:5 January 2870:5 January 2842:5 January 2817:5 January 2789:5 January 2761:4 January 2706:5 January 2678:5 January 2650:5 January 2604:5 January 2599:BSI Group 2579:5 January 2574:BSI Group 2554:5 January 2549:BSI Group 2529:5 January 2524:BSI Group 2504:5 January 2479:5 January 2453:5 January 2427:5 January 2402:5 January 2377:5 January 2183:5 January 2157:154422711 2149:1543-5938 1888:4 October 1862:4 October 1826:4 October 1689:149004681 1681:0090-9882 1646:0021-9916 1611:1460-2466 1344:: 33โ€“40. 1318:4 October 1066:Technical 780:ISO 22313 776:ISO 22313 770:ISO 22301 766:ISO 22301 760:ISO 22300 756:ISO 22300 752:ISO 22300 730:Standards 478:Terrorism 474:IT outage 458:Hurricane 430:/pandemic 356:− 267:exceeded. 182:Equipment 174:Inventory 3535:See also 3526:Workshop 3471:Patterns 3441:Learning 3366:Conflict 3316:Behavior 3248:Archived 3195:Archived 3024:Othman. 3008:Archived 2983:drii.org 2105:Archived 2056:Archived 2035:Archived 1970:Archived 1853:Archived 1780:Archived 1751:Archived 1457:28 April 1262:Archived 1260:. 2011. 1138:Disaster 1106:See also 921:(2010). 872:BS 25999 452:Sabotage 428:Epidemic 240:function 236:critical 208:Analysis 57:Overview 45:Several 3436:Justice 3396:Ecology 3391:Dissent 3371:Culture 3346:Climate 3326:Capital 3004:CMS.gov 1541:7698286 1375:. Flevy 1346:Bibcode 866:BS 7799 772::2012.) 288:(MTPoD) 3624:Backup 3521:Theory 3501:Safety 3411:Ethics 3376:Design 3304:Topics 3138:  3102:  3074:  3055:  2947:  2733:  2155:  2147:  1776:RI.gov 1687:  1679:  1644:  1609:  1539:  1233:Forbes 670:Tier 7 656:Tier 6 642:Tier 5 628:Tier 4 614:Tier 3 600:Tier 2 586:Tier 1 572:Tier 0 482:Piracy 190:backup 67:subset 3506:Space 3416:Field 3336:Chart 3331:Cells 3321:Blame 3011:(PDF) 3000:(PDF) 2941:(PDF) 2861:(PDF) 2808:(PDF) 2727:(PDF) 2697:(PDF) 2669:(PDF) 2641:(PDF) 2177:(PDF) 2153:S2CID 2108:(PDF) 2101:(PDF) 2059:(PDF) 2052:(PDF) 1973:(PDF) 1966:(PDF) 1907:(PDF) 1856:(PDF) 1845:(PDF) 1783:(PDF) 1772:(PDF) 1754:(PDF) 1747:(PDF) 1729:ISO, 1685:S2CID 1537:S2CID 1426:(PDF) 1419:(PDF) 1265:(PDF) 1251:(PDF) 1075:Virus 561:SHARE 442:Flood 143:macro 135:micro 3136:ISBN 3100:ISBN 3072:ISBN 3053:ISBN 2945:ISBN 2922:2023 2897:2023 2872:2023 2865:FEMA 2844:2023 2837:FEMA 2819:2023 2812:FEMA 2791:2023 2763:2023 2731:ISBN 2708:2023 2680:2023 2652:2023 2606:2023 2581:2023 2556:2023 2531:2023 2506:2023 2481:2023 2455:2023 2429:2023 2404:2023 2379:2023 2185:2023 2145:ISSN 2013:help 1937:2019 1890:2018 1864:2018 1828:2018 1677:ISSN 1642:ISSN 1607:ISSN 1459:2017 1381:2013 1320:2018 857:The 517:SARS 438:Fire 305:and 139:meso 34:(or 3123:126 2499:ISO 2473:ISO 2447:ISO 2422:ISO 2397:ISO 2371:ISO 2353:ISO 2321:ISO 2303:ISO 2257:ISO 2239:ISO 2221:ISO 2135:doi 1988:doi 1669:doi 1634:doi 1599:doi 1354:doi 1278:48. 747:: 487:War 346:RCO 69:of 3605:: 3121:. 3117:. 3028:. 3006:. 3002:. 2981:. 2913:. 2888:. 2863:. 2835:. 2810:. 2782:. 2771:^ 2753:. 2699:. 2671:. 2643:. 2597:. 2572:. 2547:. 2522:. 2497:. 2471:. 2445:. 2420:. 2395:. 2369:. 2351:. 2319:. 2301:. 2255:. 2237:. 2219:. 2201:. 2151:. 2143:. 2131:37 2129:. 2125:. 2054:. 2033:. 2029:. 2004:: 2002:}} 1998:{{ 1909:. 1880:. 1847:. 1818:. 1778:. 1774:. 1749:. 1683:. 1675:. 1665:46 1663:. 1640:. 1630:60 1628:. 1605:. 1595:60 1593:. 1574:. 1543:. 1535:. 1407:^ 1397:. 1352:. 1342:28 1340:. 1328:^ 1292:. 1253:. 1230:. 1213:, 1036:: 896:. 700:. 672:โ€“ 658:โ€“ 644:โ€“ 630:โ€“ 616:โ€“ 602:โ€“ 588:โ€“ 574:โ€“ 313:. 3288:e 3281:t 3274:v 3144:. 3108:. 3089:. 3080:. 3061:. 3032:. 2985:. 2967:. 2953:. 2924:. 2899:. 2874:. 2846:. 2821:. 2793:. 2765:. 2739:. 2710:. 2682:. 2654:. 2608:. 2583:. 2558:. 2533:. 2508:. 2483:. 2457:. 2431:. 2406:. 2381:. 2355:. 2337:. 2323:. 2287:. 2273:. 2259:. 2205:. 2187:. 2159:. 2137:: 2076:. 2015:) 2011:( 1994:. 1990:: 1939:. 1892:. 1866:. 1830:. 1691:. 1671:: 1648:. 1636:: 1613:. 1601:: 1578:. 1520:. 1506:. 1461:. 1435:. 1401:. 1383:. 1360:. 1356:: 1348:: 1322:. 1296:. 1055:, 939:. 624:. 480:/ 395:n 391:) 382:( 375:n 371:) 362:( 353:1 350:=

Index


disaster recovery
business continuity standards
supply chain
subset
risk management
continuity of operations planning
competitive advantage
Council on Competitiveness
preparedness
Patrice M. Buzzanell
Purdue University
micro
meso
macro
ISO 22301:2019
maximum tolerable period of disruption
backup
critical
function
data consistency
Epidemic
Earthquake
Flood
Cyber attack
Sabotage
Hurricane
Power outage
Terrorism
Piracy

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘