- Published: Tuesday, 21 July 2015 08:44
The updating of NFPA 1600, the Standard on Disaster/Emergency Management and Business Continuity Programs, has reached a new stage. The Second Draft Report has now been posted and NITMAMs are now being accepted.
Under NFPA rules, anyone wishing to make an allowable amending motion at an NFPA Technical Meeting must declare their intentions by filing, within the published deadline, a NITMAM (Notice of Intent to Make a Motion).
The Motions Committee of the NFPA Standards Council, in accordance with NFPA rules, then reviews each NITMAM to determine whether the intended motion is a proper motion.
The deadline for NFPA 1600 new edition NITMAMs is August 21st 2015.
Source: NFPA 1600 update process moves to next stage
Published: Thursday, 16 July 2015 08:34
ISO/PRF TS 22317, the new technical specification for business impact analysis, has reached stage 60.00 in the ISO standards development process.
This means that the technical specification, officially titled ‘Societal security — Business continuity management systems — Guidelines for business impact analysis (BIA)’, has had its final draft (FDIS) approved by a formal vote.
The 27 page document will now be prepared for publication
ISO/PRF TS 22317 is being developed by the ISO Technical Committee 292 (Security and Resilience).
Source: ISO business impact analysis technical specification approved
Published: Monday, 03 August 2015 07:09
Most midsize US businesses have business continuity plans but few have tested them, according to The Hartford’s survey of midsize business owners and C-level executives.
The survey also found that more than one-third (36 percent) of midsize businesses had been unable to meet a client need due to an interruption in their operation, putting their relationship with that client at risk.
Source: Survey looks into business continuity practices of midsize US businesses
Windows users are encouraged to update their computers as soon as possible, after Microsoft pushed out a patch for an issue in Internet Explorer that lets attackers remotely run malicious code with whatever privileges the current user has.
Source: Microsoft pushes emergency update for Internet Explorer vulnerability | PCWorld