Business Continuity Checklist
Business Continuity Checklist
Business Continuity Checklist
Planning Checklist
The following checklist identifies important, specific activities to help
lete
ss
businesses in their preparedness efforts.
d
gre
StaNot
Pro In
rte
mp
Co
1. PLANNING FOR THE IMPACT OF AN UNEXPECTED OR CATASTROPHIC EVENT ON YOUR
BUSINESS
Identify a coordinator and/or team with defined roles for preparedness and response
planning. Potential team members may include: Information Security, Operations, Systems,
Police/Security, Physical Plant, Insurance, Legal Affairs, Public Affairs, Personnel Department,
Comptroller, Audit Division, Safety Office and/or Emergency Response Team.
Conduct a business process and services inventory to understand which processes are
mission-critical to the survivability of the business.
Determine acceptable levels of service during the recovery period, and what processes need
to be maintained or restored first to keep the business running.
Identify essential employees and other critical inputs (sub-contractors, services, logistics, etc.)
required to maintain business operations by location and function during the event.
Once key components are identified, determine what measures should be taken to protect
and recover them.
Understand the rules or regulations governing your business operations. If you had a business
failure, would you be able to maintain compliance (Sarbanes Oxley, HIPPA, privacy, etc.)?
Identify a budget: Quantify the potential costs of downtime or total business failure. Develop
a business case to optimally invest in risk mitigation.
Set clear recovery time objectives for each of your business/technology areas.
1
Networking Views
Issue 2 2006
lete
ss
d
gre
StaNot
Pro In
rte
mp
Co
Develop a technology plan that includes hardware, software, facilities and service vendors.
Secure a backup vendor, if necessary, to perform that critical function if your primary vendor
is impacted by a business failure.
Perform security risk assessments around specific threats where possible. Examples of data
security include: virus protection, intrusion detection, hacker prevention, network events,
component failures and systems crashes.
Assess, if possible and per prior events, how quickly and accurately your business and
technology were restored by existing staff. What were the lessons learned so they can be
addressed in future planning?
Determine the effectiveness of your data backup and recovery policies and procedures. Are
the procedures fully documented and an appropriate staff member responsible for the
maintenance of that documentation?
Prepare an incident plan for mitigating a security breach. Audit annually, as security threats
can change.
Ensure employees know where to receive information and updates about whether they can
return to work, or if they are to report to a different location (Internet, conference bridges,
etc.).
Ensure mission-critical employees know their role in the plan and have access from remote
locations (i.e., home broadband, phone, VPN for security).
Make sure the plan can be executed by alternate employees who are not necessarily the
expert in cases where those employees cannot be reached.
Determine the need for a designated recovery site for your people to resume work. Plan for
communications, data connectivity, desktops and workspace at that site.
If you require support from vendor partners, ensure they also have a documented plan that
complements your needs. Review periodically to keep the plan current.
Share your plan with your building management so they have a clear understanding of their
role in safely securing the building and your employees.
Share best practices with other business leaders in your community, chambers of commerce
and business associations to improve community response efforts.
2
Networking Views
Issue 2 2006