DRJ's Spring 2019

Conference & Exhibit

Attend The #1 BC/DR Event!

Spring Journal

Volume 32, Issue 1

Full Contents Now Available!

Glossary of terms used on this site


Download Entire Glossary:

wordpdf

UPDATED: September 2018
Search for glossary terms (regular expression allowed)
Begin with Contains Exact term

Glossaries

TermDefinition
Validation
The Technical Practice within the BCM Lifecycle that confirms that the Business Continuity Management (BCM) programme meets the objectives set in the Business Continuity (BC) Policy and that the organization?s Business Continuity Plan (BCP) is fit for purpose.
Validation Script
A set of procedures within the Business Continuity Plan to validate the proper function of a system or process before returning it to production operation.
Verification
Confirmation, through the provision of evidence, that specified requirements have been fulfilled.
Virtual Battle Box
An electronic form of a storage location held on the internet, intranet or cloud so that data and information are immediately available post incident and accessible by the Incident/Crisis Management Team.
Virtual Command Centre
A means of operating when it is physically impossible for members of the Incident Management Team to move to a Command Centre. A virtual command centre working using telephony and internet solutions including a Virtual Battle Box can be established.
Virus
An unauthorised programme that inserts itself into a computer system and then propagates itself to other computers via networks or disks. When activated, it interferes with the operation of the computer systems.
Vital Materials
Any materials that are essential for recovery from a disaster or major incident.
Vital Records
Records essential to the continued functioning or reconstitution of an organization during and after an emergency and also those records essential to protecting the legal and financial rights of that organization and of the individuals directly affected by its activities.
Vulnerability
The degree to which a person, asset, process, information, infrastructure or other resources are exposed to the actions or effects of a risk, event or other occurrence.