This page has been archived.
Information identified as archived on the Web is for reference, research or recordkeeping purposes. It has not been altered or updated after the date of archiving. Web pages that are archived on the Web are not subject to the Government of Canada Web Standards. As per the Communications Policy of the Government of Canada, you can request alternate formats on the "Contact Us" page.
Steering Government into the Next Millennium: A Guide to Effective Business Continuity in Support of the Year 2000 Challenge
October 14, 1998
Chief Information Officer Branch
Treasury Board of Canada Secretariat
The Canadian federal government, like most public and private sector organizations will be facing a problem when the year changes from 1999 to 2000 (1). Many systems that use a date in their processing, have traditionally utilized the date as a two-digit reference instead of a four-digit reference. The change to a new millennium may result in an error in date-related processing unless changes are made to these systems.
The potential negative consequences of the Year 2000 problem are far reaching and could bring entire organizations to a halt, or at least significantly impact their ability to deliver their services or products. Within the context of the federal government, the consequences could have highly undesirable impacts on Canadians, the country, and its economy. Specifically, these problems relate to inaccurate date processing or "denial of government service" issues when the systems crash.
The Treasury Board of Canada Secretariat (TBS) has initiated a project to address the Year 2000 problem across the government. A Project Office was established to initiate activity and to facilitate and monitor the progress on converting assets supporting government-wide mission-critical functions. A preliminary assessment of the significance of the Year 2000 problem across the government determined that 48 government-wide mission-critical functions might be sensitive to this problem.
The latest readiness assessment(2) of the government's progress in solving the Year 2000 problem shows that there is still a significant amount of work to be completed before the year 2000. The current project status suggests that government departments must consider the possibility that government services and programs will be affected by Year 2000 failures. Within that context, TBS is taking a leadership role in advising departments to:
Specifically, TBS is providing departments with this guide to business continuity, which will enhance the government's ability to address the potential negative consequences of the Year 2000 problem.
This guide was developed to:
The purpose of this document is to present a uniform and standardized set of business continuity activities for all departments to implement in order to facilitate the government's governance of the Year 2000 problem and thereby increase its likelihood of success.
TBS would like to acknowledge the contributions of the following participants:
Like all projects of this nature, size and complexity, the Year 2000 project brings with it a significant amount of uncertainty, unexpected events resulting from the dynamic environment in which we live in, and undesirable outcomes from the remediation work performed by departments. Most people would agree, in that context, that continuous risk management would be beneficial to departments. Who wouldn't want to identify potential problems early enough so that they can be addressed, thereby helping to ensure the ultimate success of their Year 2000 initiatives?
The Government remains optimistic about the its ability to successfully address the Year 2000 problem, but it is the ethical, social, business, and legal responsibility of all government managers to consider the possibility of not being able to complete their conversion activities. Continuity of operations should be the prime concern of managers impacted by the Year 2000 problem. Contingency planning will put these managers in a position to pro-actively and positively work through a potential crisis due to a Year 2000-related business disruption. A pre-established framework for control as well as effective communication, practiced through realistic scenarios, will also provide managers with invaluable tools to work through potential crises.
For these reasons, it is critical that business continuity be a priority for all departments.
In order to clearly position the business continuity process described in this guide vis-�-vis similar processes at the government and national level and conversion activities taking place within the departments, we are providing the readers with the underlying concepts of our process and some basic definitions. At the conceptual level, the TBS business continuity process can be depicted as shown below in Figure 1.
Figure 1 – Conceptual View of the Business Continuity Process
The Business Continuity process start with the establishment of a governance structure which will steer the process and ensure that decisions are made in a timely fashion. The governance structure extends from the planning and control level, where resources are mobilized and assigned to conversion activities, to the corporate (or department level) governance where high level decisions are made regarding business continuity. Both sides of the organization, that is functional and technical, are represented and bring their own set of objectives to the process. Technical personnel aim at achieving Year 2000 compliance before the year 2000 while functional personnel aim at ensuring business continuity. This guide is targeted at the functional side of the organization but recognizes that the achievement of the functional personnel's objectives is heavily dependent on the technical personnel's ability to meet theirs. The technical side of the organization plays an important role in the performance and success of the business continuity process.
The business continuity process spans over the three stages of business continuity identified, within the context of this guide, as:
The Business Continuity process is then broken down into process areas which include:
These four process areas are integrated into one common set of steps that take organizations from realizing that failures due to the year 2000 problem are possible through responding and recovering from crises. TBS integrated process has a particularity of building on the Software Engineering Institute's Continuous Risk Management process. Hence, although it may appear to differ from standard business continuity processes at the lowest level (step level), it satisfies the requirements of the government, builds upon a sound knowledge base and aligns itself nicely with similar processes implemented at the national level. These steps include:
The TBS is proposing a six-step approach to business continuity. It builds on the work of the Software Engineering Institute for Continuous Risk Management and integrates Contingency Planning, Crisis Response and Business Resumption. The underlying activities of this approach are depicted below.
Figure 2 – Integrated Business Continuity Approach
The business continuity activities are as follows:
Implicit but critical to this approach is the need to communicate information about the possibility of not completing conversion activities and the solutions to that problem. The success of the business continuity process hinges on frank and open communications on risks, contingency plans, crisis response plans and business resumption plans within departments as well as between departments, their partners and the TBS.
Getting started with this guide will probably be one of the biggest challenges for organizations that are new to business continuity. In addition to the inertia problem that many departments experience when faced with new processes, other barriers may arise. The following table summarizes some of these challenges and provides high-level solutions to address them.
Barriers | Solutions |
---|---|
Inadequate Senior Management Commitment |
|
Insufficient Funding |
|
Cultural Barriers |
|
Lack of Knowledge |
|
This guide has been structured and formatted to provide easy access to the TBS business continuity process requirements, and to maximize the efficiency of the individuals attempting to meet these requirements. The document focuses on the business continuity process and is divided into eight chapters (an introduction, six chapters describing each of the six steps, and a conclusion). The procedures required to effectively implement the elements are provided in appendices that are bound separately.
In order to keep this guide down to a reasonable size, and since the Software Engineering Institute Continuous Risk Management process has been fully endorsed by the TBS for CRM, specific references are made in this guide to the SEI Continuous Risk Management Guidebook. Departments that do not have a copy of the SEI CRM Guidebook can obtain one by contacting David Holmes at 957-2530. Activities or processes extracted directly from or based on the SEI CRM Guidebook are preceded by the logo below.
Departments must ensure that the business continuity process is supported by a sound governance structure that can steer and respond to decision requests that emerge from the process. An inadequate governance structure will impede the success and significantly impact the effectiveness of the business continuity efforts.
The first step towards implementing business continuity is to set up the required governance structure to support the process, identify and mobilize the department's resources, obtain governance structure members' commitment and involve these individuals in the business continuity process. While the business continuity governance structure should not be different but integrated within the existing Year 2000 Project governance structure found in the departments, the following generally accepted characteristics of a sound governance structure should be present during the set-up step:
The governance structure is depicted in Figure 3. The remaining sections provide additional information about the tasks that must be performed in support of this activity.
Figure 3 – Business Continuity Governance Structure
Process
The objective of this first activity is to identify the stakeholders that will be involved in the business continuity process. Similar to the governance structure depicted in Figure 3, departments should ensure that key representatives both from the functional and technical side of the organization are identified.
Output/Deliverable
The deliverable associated with this activity consists of a governance structure with key stakeholders identified at all levels of the organization.
Process
The objective of the Business Continuity Plan activity is to provide the department's specific details regarding the implementation of this guide. It should answer the basic questions: what, who, when, how.
Note: Currently, departments have only been asked to develop risk management plans. These plans will need to be enhanced to include the other aspects of this revised guide.
Output/Deliverable
The deliverable to be developed as part of this task consists of a Business Continuity Plan which provides the department's specific details regarding the implementation of this guide. A sample table of contents is provided in Appendix A.
Process
Business continuity issues will emerge well before the Year 2000 and members of the governance structure will need to be involved. The objective of the "Obtain Commitment" activity is to obtain the commitment of these stakeholders to support the process documented in the plan and to adapt to the needs of the department regarding timely decisions, strategic and policy directions, as well as oversight.
Output/Deliverable
The deliverable for this task is a revised or new project charter that clearly identifies the members of the governance structure and their roles and responsibilities regarding the business continuity process. One of the most important aspects of the new charter is the governance structure member's responsibility regarding their organization's response vis-�-vis certain risks. For example, members of the governance structure on the functional side of the organization should make the final decision regarding the development and activation of contingency plans.
The charter should include highlights of the business continuity plan including the resource commitments (human and financial) made to the business continuity process. A sample table of contents is provided in Appendix B.
Process
The objective of the "Involve the Governance Structure" activity is to develop vehicles to ensure the continuous involvement of the governance structure members.
Ouput/Deliverable
The deliverables for this task include:
Table 2 provides a summary of the techniques and tools used for this step. Details of the techniques and tools can be found in the appendices or the referenced documents.
activity | techniques and tools |
---|---|
Setup the Governance | No specific tool |
Develop Business Continuity Plan | Business Continuity Plan – Table of Contents (Appendix A) |
Obtain Commitment |
|
Involve the Governance Structure |
|
In order to initiate and feed the business continuity process with essential information, departments must identify those risks that may impact the achievements of the technical (compliance) and functional (business continuity) objectives. The absence of clear risk identification will lead to an unfocused business continuity process and the possible inability of departments to respond to crises.
Note: This risk identification activity is based on the
SEI
"Identify" process [CRM Guidebook,
Chapter 4, Page 27].
The objective of the risk identification step is to locate risks that may impact the ability of the department to convert their Year 2000 susceptible assets before they become problems and to ensure business continuity. The step includes the identification of risks through the use of a taxonomy questionnaire and the documentation of these risks in Risk Identification Sheets. That information will then be fed into the analysis phase where risk attributes will be defined and documented.
Figure 4 – Identify Data Flow
The following data inputs are required (shaded boxes is not included):
Input
Data Input | Description |
---|---|
Year 2000 Taxonomy | The Year 2000 taxonomy is the main tool used to support risk identification. It consists of a series of questions that highlight important aspects of a Year 2000 project. |
Prioritized Business Functions | A functional decomposition is primarily conducted to help identify risks by allowing participants to relate them to specific business functions (unless the risk is high level, affecting all aspects of the project). A prioritized list of business functions will assist in analyzing and ranking the risks or related business continuity activities. |
Asset Mapping | Asset mapping is essentially a list of assets (susceptible or not) that support a specific business function. The asset mapping will help the risk identification activity by allowing participants to relate risks to specific assets (unless the risk is high level, affecting all aspects of the project). |
Output/Deliverable
The deliverables for this task include:
Table 4 provides a summary of the techniques and tools used for this step. Details of the techniques and tools can be found in the appendices or in the referenced documents.
Activity | Techniques and Tools |
---|---|
Business Function Prioritization |
|
Asset Mapping |
|
Identify |
|
Identify Business Continuity Artifacts |
|
The following are guidelines and tips that can facilitate the performance of this step.
In order to make sound decisions regarding potential actions that will ensure business continuity, governance personnel must achieve a clear understanding of the department's exposure to risks and related business interruptions. Clearly defined risk attributes provide this required knowledge and can be acquired through analyzing the risks found in the previous step. A lack of understanding of the potential negative consequences of Year 2000 related risks may prevent departments from pro-actively dealing with potential crises and minimizing the impact on their programs and services.
Note: Risk analysis is based on the SEI "Analyze" process [CRM Guidebook, Chapter 5, Page 37].
Departments must convert the risk information, gathered in the "identify" step, into decision-making information. In addition to defining the risk attributes such as probability, impact, timeframe, source, response and priority, departments must relate the risk information to assets and functions.
This analysis will allow departments to clearly understand the potential impact of risk on business continuity and to take the appropriate management actions to address the risks.
This information will be obtained through the use of workshops with technical and functional personnel and various other techniques identified herein. The analysis phase will also complement the risk analysis with a the definition of the business continuity requirements and the assessment of the department's capability in the area of business continuity.
Figure 5 – Analyze Data Flow
The following data inputs are required:
Input
Data Input | Description |
---|---|
Risk Information Sheet(s) | Risk Information Sheets as defined in the "Identify" step including the risk statement and context. |
Function Prioritization and Asset Mapping Document | Contains the prioritized business functions using pre-defined criticality criteria and maps mission-critical business functions to assets. |
Business Continuity Artifacts | A list of business continuity artifacts such as existing business resumption plans and disaster recovery plans that should be used in support of the analysis function. |
Output/Deliverable
The deliverables for this task include:
Table 6 provides a summary of the techniques and tools used for this activity. Details of the techniques and tools can be found in the appendices or the referenced documents.
Activity | Techniques and Tools |
---|---|
Analyze |
|
Risk Assessment |
|
Business Continuity Statement of Requirements and Capability Assessment |
|
The following are guidelines and tips that can facilitate the performance of this activity:
In order to establish a yardstick against which a department's progress in implementing business continuity can be measured, plans must be developed and implemented. Failure to develop these plans may significantly affect the department's preparedness in dealing with possible crises.
Note: Risk planning is based on the SEI "Plan" process [CRM Guidebook, Chapter 6, Page 53].
With the first three activities completed, departments can then develop plans to address the risks and ensure their preparedness to ensure business continuity. The two plans that need to be developed are:
These plans should be developed by members of the governance structure assigned to the areas of the business continuity process (i.e. risk action plan, contingency planning, crisis management, and business resumption).
The process to be implemented consists of providing the information identified in the corresponding templates and, more importantly, mobilizing the resources to implement the plans.
More specifically, the objective of the Risk Action Plans is to determine what actions should be taken, if any, to mitigate the identified risks. Risk action planning answers the following questions:
Question | Explanation |
---|---|
|
Responsibility must be assigned for each risk item |
|
An approach or strategies to deal with the risk item must be developed |
|
The scope and actions to manage the risks must be determined |
The resulting risk action plans must then be implemented according to the assigned responsibilities.
The objective of the business continuity preparedness plan is to address all the components required to respond and recover from a crisis. In essence, it also answers fundamental questions such as:
Question | Explanation |
---|---|
|
Departments must develop both compliance and business continuity contingency plans for those areas where they are exposed. |
|
Departments must attempt to anticipate likely crisis scenarios in order to develop effective responses to these events. |
|
Departments must determine what needs to be done in order to revert back to normal operations after experiencing a crisis or implementing a contingency plan. |
Both of these plans are supported by templates.
Figure 6 – Plan Data Flow
The following data inputs are required:
Input
Data Input | Description |
---|---|
Risk Information Sheet(s) | From the "Analyze" activity containing the risk information |
Risk Assessment Report | Contains the risk information as well as other background information such as observations or problems. |
Business Continuity Statement of Requirements and Capability Assessment | From the "Analyze" activity, stating the requirements for contingency planning. |
Output/Deliverable
The deliverables to be developed as part of this task include:
Table 10 provides a summary of the techniques and tools used for this activity. Details of the techniques and tools can be found in the appendices.
Activity | Techniques and Tools |
---|---|
Plan(s) |
|
Develop Business Continuity Preparedness Plan |
|
The following are guidelines and tips that can facilitate the performance of this activity.
Departments must develop the capability to continuously assess risk and report on the progress of the business continuity plans and the conversion activities. Status reports emerging from this step will feed in the business continuity process and trigger the proper management actions such as activating contingency plans, declaring a crisis, or resuming a business function. Inadequate tracking may lead to ineffective actions or chaos that can disrupt operations.
Note: Risk tracking is based on the SEI "Track" process
[CRMGuidebook, Chapter
7,
Page 73].
The tracking step aims at collecting progress information from the conversion activities and risk action plans and feeding issues and risks into the business continuity process. Other indicators that could activate contingencies or emergency responses should also be tracked. This will provide a disciplined environment that allows departments to:
This step normally builds on existing reporting mechanisms such as project progress reporting, continuous risk management, verification and validation, as well as quality assurance. The objectives of the tracking step are two-fold:
Figure 7 – Track Data Flow
The following data inputs are required (shaded items not included):
Input
Data Input | Description |
---|---|
Risk Information Sheet(s) | From the "Plan" activity, including the risk action plan. |
Business Continuity Preparedness Plan | From the "Plan" activity, including the processes to be implemented. |
Output/Deliverable
The deliverables to be developed as part of this task include:
This table provides a summary of the techniques and tools used for this activity. Details of the techniques and tools are provided in the appendices or the referenced documents.
Activity | Techniques and Tools |
---|---|
Track |
|
The following are general guidelines and tips regarding this step:
In response to variances in the plans or risk events, departments must initiate actions that will ultimately correct the situation and return the operations to their normal status. The control step addresses all of the process areas required to achieve this goal namely: contingency plans, crisis response and business resumption. The control step assumes an orderly and structured approach to recovering from a crisis. Unprepared departments are likely to prolong the crisis state and potentially face total failure of certain functions.
Note: Business continuity control is based on the SEI "Control" process [CRM Guidebook, Chapter 8, Page 91].
The control step is closely related to the decision-making process found within the governance structure and primarily consists of activating pre-planned responses to predictable events and applying a structured decision-making framework to unforeseen events. The objective of the control step is to make informed, timely, and effective decisions regarding risks, failures and crises related to Year 2000 issues.
Figure 8 – Control Data Flow
The following data inputs are required:
Input
Data Input | Description |
---|---|
Status Reports | Contains status of business continuity plan implementation and status of risks. |
Risk Information Sheet(s) | Developed during the previous activities, the sheets contain the risk status. |
Updated Plans | Updated version of the plans defined in the "Plan" activity. |
Output/Deliverable
The deliverables to be developed as part of this task include:
This table provides a summary of the techniques and tools used for this activity. Details of the techniques and tools can be found in the appendices.
Activity | Techniques and Tools |
---|---|
Control |
|
The following are general guidelines and tips for effectively implementing this activity:
This guide is only one of the methods used in increasing the government's capability of addressing the Year 2000 challenge and ensuring the continuance of its business mission-critical functions. The purpose of the guide is to encourage departments to implement a business continuity process within their organization. This document provides a framework that identifies the minimum set of activities that should be performed. Each department should now tailor the steps found herein and implement a business continuity process within their Year 2000 initiatives.
At the government level, TBS will now be in a better position to ensure that the government is ready to face the potential crises related to the Year 2000 problem and to assist departments in resolving horizontal issues and risks.
Implementing industry best practices such as those described in this guide offers departments an opportunity to embrace proven solutions which will enhance their ability to manage and deliver their Year 2000 projects while solving one of the government's biggest problems.
Footnotes:
(1) There is also a related issue about leap year processing from the "extra" leap year for Feb. 29, 2000. [Return]
(2) Braiter/Westcott report on Year 2000 Readiness, February 1998. [Return]
The business continuity plan should include, as a minimum, but not be limited to the following elements:
EXECUTIVE SUMMARY
1. INTRODUCTION
Positions the Business Continuity guide in the departmental Year
2000 initiative.
1.1 Background
1.2 Objective
1.3 Scope
1.4 Business Continuity Process Overview (summary of this
guide)
1.5 References
2. BUSINESS CONTINUITY PROCESS AREAS
Summarizes department's approach in implementing the various
process areas of the guide.
2.1 Continuous Risk Management
2.2 Contingency Planning
2.3 Crisis Response
2.4 Business Resumption
3. ORGANIZATION AND RESPONSIBILITIES
Identifies key stakeholders involved in the implementation of the
Guide along with their roles and responsibilities. (Responsibility
Assignment Matrix).
3.1 Governance Structure
3.2 Key Year 2000 Business Continuity Stakeholders'
Responsibilities
3.3 Business Continuity Governance Framework
3.3.1 Meetings
3.3.2 Communications
4. METHODS, TECHNIQUES AND TOOLS
Identifies the methods, techniques and tools selected by the
department to support the process.
4.1 TBS
Business Continuity Tailoring Matrix
4.2 Plan Maintenance
The project charter should include, as a minimum, but not be limited to the following elements:
EXECUTIVE SUMMARY
1. INTRODUCTION
1.1 Background
1.2 Objective
1.3 Scope
1.4 References
2. APPROACH OVERVIEW
2.1 Business Continuity Activities
2.2 Implementation Overview
2.3 Key Milestones
3. ORGANIZATION AND RESPONSIBILITIES
3.1 Governance Structure
3.2 Key Year 2000 Business Continuity Stakeholders'
Responsibilities
3.3 Business Continuity Governance Framework
3.3.1 Meetings
3.3.2 Communications
4. RESOURCE REQUIREMENTS
4.1 Human Resource Requirements
4.2 Financial Resource Requirements
4.3 Other Resource requirements
5. SIGN-OFFS
To support the business continuity process, departments must develop a business model that accurately and uniquely identifies all the functions performed by the organization. These functions should be depicted in a tree-like fashion to reflect the hierarchical relationship between these functions (indented models can also be used).
The objective of this process is to conduct a functional decomposition of the department's main function into sub-functions to the point where single ownership can be assigned (see additional guidelines & tips for more direction).
The deliverable to be developed as part of this task is a business model or functional decomposition which accurately identifies all the functions performed by the organization and depicts them in a tree-like fashion to reflect the hierarchical relationship between these functions. A sample is provided below.
Figure C-1 – Sample Functional Decomposition
This table provides a summary of the techniques and tools used for this activity. Details of the techniques and tools can be found in the referenced documents.
Activity | Techniques and Tools |
---|---|
Perform Functional Decomposition |
No specific tool required. This technique can be found in many system development and business modeling methodologies. |
4. Guidelines and Tips
The following are guidelines and tips that can facilitate the performance of this activity.
To prioritize business functions, departments must utilize a business model that accurately identifies all the functions performed by the organization (Appendix C - Functional decomposition approach). Once assigned a unique function identifier, business functions can then be prioritized using pre-determined criteria. Within the context of the Year 2000 Project, these criteria should be those provided by TBS to determine the "mission-criticality" of specific government functions (i.e. when using the TBS criteria, the higher the function scores the more "mission-critical" it is).
The prioritization process consists of scoring functions, found at the lowest level of the business model, based on the TBS criticality criteria and developing a prioritized list of functions that will provide the required framework to structure and sequence business continuity activities.
The total score of a given function is achieved as follows:
2 and 4 are used as intermediate values. 0 is used when the function does not have an impact in this area (Impact on safety, environment, etc.).
The deliverable for this activity is a prioritized list of business functions.
This table provides a summary of the techniques and tools used for this activity. Details of the techniques and tools can be found in the appropriate sections.
Table D-1: Business Function Prioritization Techniques and Tools
Activity |
Techniques and Tools |
Score Business Functions |
|
The following are guidelines and tips that can facilitate the performance of this activity.
The following table summarizes the criteria used to assess business functions as defined by the Treasury Board of Canada Secretariat. Weighting factors from 5 (High) to 1 (Low).
Table D-2: Mission-critical Criteria
Criteria |
Weight |
Definition |
Impact on Canadians |
5 |
These criteria lead to the establishment of a government-wide mission-critical function. A government-wide mission-critical function has been defined as a service or function performed by a federal government department or agency: |
|
||
|
Impact on the health/environment of Canadians. Sample business functions associated with this criteria include food inspection, drug management and testing, and other related functions from the "Health Canada" portfolio. | |
|
Impact on the safety of Canadians. Sample business functions associated with that criteria include search and rescue functions. | |
|
Impact on the security of Canadians. Sample business functions associated with that criteria include law enforcement, correctional services, and other related functions from the Solicitor General's portfolio. Defence related functions are also associated with this criteria. | |
|
Impact on the economic circumstance of Canadians. Sample business functions associated with that criteria include Receiver General functions, Pension, Welfare, and other functions that provide economical benefits to Canadians. | |
|
Impact on the environment of Canadians and Canada. Sample business functions associated with that criteria reside within Environment Canada, environmental response groups in Fisheries and Oceans. | |
Impact on Obligations |
3 |
These criteria lead to the establishment of a department-wide mission-critical function. Within the context of this guide, a department-wide mission-critical function has been defined as a service or function performed by a federal government department or agency: |
|
||
|
Self-explanatory | |
|
Self-explanatory | |
|
Self-explanatory | |
|
Within the Federal government. | |
|
Provincial, Regional, Municipal governments. | |
|
Self-explanatory | |
Impact on Employees |
1 |
|
|
Self-explanatory | |
|
Self-explanatory | |
|
Self-explanatory | |
Financial Impact |
1 |
|
|
Impact on Federal government where revenue or operating expenditure is affected, or cost is increased. | |
|
Self-explanatory |
Section D-2: Sample Prioritized Function List
ID | Code | Function Name | Relative Score | Raw Score | Category |
---|---|---|---|---|---|
5.1.2 | SAR | Detection of distress alters | 1 | 169 | GWMC |
5.1.5 | SAR | SAR coordination | 0,99 | 168 | GWMC |
5.1.4 | SAR | Search and rescue planning | 0,98 | 166 | GWMC |
3.1.1 | MCTS | Detect and respond safety/distress calls | 0,94 | 159 | GWMC |
3.1.2 | MCTS | Respond to calls | 0,94 | 159 | GWMC |
3.1.3 | MCTS | Analyze situation | 0,94 | 159 | GWMC |
3.1.4 | MCTS | Alert proper agencies | 0,94 | 159 | GWMC |
3.1.5 | MCTS | Coordinate information process | 0,94 | 159 | GWMC |
3.1.8 | MCTS | Receive safety information from outside sources | 0,94 | 159 | GWMC |
3.1.9 | MCTS | Broadcast safety information | 0,94 | 159 | GWMC |
5.1.1 | SAR | Ensure SAR coverage by ressources | 0,82 | 139 | GWMC |
2.2.2 | MNS | Provide electronic aids to navigation | 0,80 | 135 | GWMC |
5.2.2 | SAR | Environmental response operations | 0,79 | 133 | GWMC |
5.3.2 | ER | ER contingency planning exercising | 0,79 | 133 | GWMC |
2.1.3 | MNS | Overflow outpout/forecast/control | 0,77 | 130 | GWMC |
2.1.4 | MNS | Water level forecasting | 0,77 | 130 | GWMC |
4.2.2 | ICE | Ice routing and dice charts info | 0,77 | 130 | GWMC |
4.4.1 | ICE | Monitoring of ice conditions | 0,77 | 130 | GWMC |
4.4.2 | ICE | Icebreaking for flood control | 0,77 | 130 | GWMC |
The Business Prioritization and Asset Mapping Document should include, as a minimum, but not be limited to the following elements:
EXECUTIVE SUMMARY
1. INTRODUCTION
1.1 Background
1.2 Purpose
1.3 Scope
1.4 Definitions
1.5 References
2. METHODOLOGY
3. BUSINESS FUNCTION PRIORITIZATION RESULTS
3.1 Observations
3.2 Overview Results
4. ASSET MAPPING RESULTS
4.1 Observations
4.2 Overview Results
APPENDICES:
Appendix 1 – Criticality Criteria
Appendix 2 – Functional Decomposition Results
Appendix 3 – Prioritized Business Function List
Appendix 4 – Asset Mapping Results
In order to clearly link the asset conversion work to the business continuity activities, departments must map their Year 2000 assets to each function. This mapping provides a more detailed understanding of the relationship between risks related to the asset conversion work and the business risks and related impacts.
The objective of this process is to map assets to the specific function they are supporting. Categories of assets should be developed in order to facilitate the mapping process. Recommended categories include:
The deliverable to be produced as part of this process is a "cause-and-effect" diagram as shown below. Using the cause-and-effect relationship between assets and business functions, departments can link their conversion activities to the business function they support. A sample "cause-and-effect" diagram, using the above categories, is provided below.
Figure F-1 – "Cause-and-effect" diagram
The objective of this process is to document, in a clear and concise, fashion the results of the asset mapping exercise done using the "cause-and-effect" diagrams described in Section 2 above.
The deliverable to be developed as part of this activity is a table that identifies:
This table provides a summary of the techniques and tools used for this process. Details of the techniques and tools can be found in the appendices or the referenced documents.
Table F-1: Asset Mapping Techniques and Tools
Activity |
Techniques and Tools |
---|---|
Map Assets to Business Functions | Cause-and-effect Analysis [CRM Guidebook, Chapter A-8, Page 301]. |
Document Asset Mappings | A sample asset mapping table is provided in Section F-1 of this Appendix. |
The following are guidelines and tips that can facilitate the performance of this activity:
Section F-1: Sample Asset Mapping Table
The following asset mapping table is provided as an example only. It depicts the asset categories from Figure F-1 as column headings, and contains detailed assets for a specific business function.
Table F-2: Sample Asset Mapping Table
ID: 5.1.2 | |||
---|---|---|---|
Function Name: Detection of distress alerts ("function owner") | |||
Software | Hardware | Networks | Utilities |
|
|
|
|
Building Systems | Fleets | Other Branches/Dpts | Other Causes |
|
|
|
ID: 5.1.5 | |||
---|---|---|---|
Function Name: SAR coordination ("function owner") | |||
Software | Hardware | Networks | Utilities |
|
|
|
|
Building Systems | Fleets | Other Branches/Dpts | Other Causes |
|
|
ID: 5.1.4 | |||
---|---|---|---|
Function Name: Search and rescue planning ("function owner") | |||
Software | Hardware | Networks | Utilities |
|
|
|
|
Building Systems | Fleets | Other Branches/Dpts | Other Causes |
|
|
Risk identification can occur periodically at specified milestones/phases in a project and/or on a continuous basis throughout the project. The following table provides steps to identify risks under both scenarios.
Table G-1: Risk Identification at specified milestones/phases
Risk Identification Steps |
Description |
Responsibility |
||
---|---|---|---|---|
|
The Year 2000 Project Manager should
determine the number of "peer-level" workshops with various
stakeholder groups involved in the Year 2000 Project that is
required to identify risks. Typical groups include:
The Year 2000 Project Manager should also establish the number of interviews with various executives involved in the Year 2000 Project required to complement the workshops. Typical interviews include:
|
Year 2000 Project Manager | ||
|
Generally, a risk identification
workshop requires 3 hours to conduct and an interview anywhere from
½ hour to 2 hours.
Workshops and interviews should all be scheduled before starting the process. |
Year 2000 Project Manager | ||
|
The TBS Risk Taxonomy questionnaire (refer to Appendix H) should be tailored to reflect the subject areas of the workshop/interview participants as well as to meet the workshop/interview duration. | Year 2000 Project Manager | ||
|
Conducting the risk identification
workshops/interviews involves:
|
Year 2000 Project Manager | ||
|
Using the notes from the workshops/ interviews, look for common risk areas or consensus across various groups/ interviewees and develop a risk list. | Year 2000 Project Manager | ||
Each risk identified requires:
|
Note: The responsibility currently assigned to the Year 2000 Project Manager can be delegated to other members of the organization including audit.
Table G-2: Continuous Risk Identification Steps
Risk Identification Steps |
Description |
Responsibility |
||
---|---|---|---|---|
|
Any individual can identify a new risk
by using the Risk Information Sheets (Appendix I). Each risk identified requires:
|
Year 2000 Project stakeholder (programmer, tester, application manager, functional resources, etc.) | ||
|
The risk information sheets should then be forwarded to the Year 2000 Project Office for initial review. | Year 2000 Project stakeholder (programmer, tester, application manager, functional resources, etc.) | ||
|
Upon review and validation, the Project Office should then forward the risk to its owner for action planning as well as the function owners affected by the risk (if not the same person) in order to potentially trigger contingency plans. | Year 2000 project Office |
Note: The responsibility currently assigned to the Year 2000 Project Manager can be delegated to other members of the organization including audit.
The Treasury Board of Canada Secretariat (TBS) Year 2000 Project Office requires that Federal Departments and Agencies with Government-Wide Mission-Critical (GWMC) business functions identify, report and manage Year 2000 project risks.
In order to provide guidance for identifying Year 2000 project risks, this Year 2000 Taxonomy provides for a comprehensive and structured classification scheme. Standard use of the TBS Year 2000 Taxonomy will provide for a common basis across departments for risk identification.
The purpose of this appendix is to describe and document the TBS Year 2000 Taxonomy that can be used by Federal Departments in identifying the Year 2000 project risks associated with the Government-Wide Mission-Critical (GWMC) and Department-Wide Mission-Critical DWMC business functions. Departments may use their own taxonomy, but must ensure that all risk areas identified in the TBS Year 2000 taxonomy are addressed.
This appendix includes a description of "How to use the Year 2000 Taxonomy", the Year 2000 Taxonomy questionnaire, a description of the Year 2000 Taxonomy questionnaire template data elements, and tips for using the Year 2000 Taxonomy.
This document relates to the following documents as identified
The following glossary is intended to clarify certain terminology contained in the Year 2000 taxonomy.
Asset: |
This refers to all items which may be impacted by the Year 2000 problem such as:
|
---|---|
Mission-critical business functions: | Mission-critical business functions consist of specific business functions that have a high impact on Canadians, the operations of the government, and/or its employees. The level of criticality can be determined based on a series of criticality criteria provided in Appendix D. Within the context of this guide, functions will be classified as government-wide mission-critical or department-wide mission-critical. |
Time event horizon: | A date or point in time when a specific asset will experience the impact of its Year 2000 problem, which may be a date in advance of 2000. |
Year 2000 compliance: | Year 2000 compliant means that the asset accurately processes date/time data (including, but not limited to, calculating, comparing, and sequencing) from, into, and between the twentieth and twenty-first centuries, and the years 1999 and 2000 and leap year calculations. |
The TBS Business Continuity Guide [Reference 1] provides detailed sections devoted to conducting risk identification and analysis in support of Year 2000 projects.
The main tool utilized in identifying Year 2000 project risks is the Year 2000 Taxonomy as depicted in the diagram below. The Year 2000 Taxonomy is a questionnaire used in a workshop or interview setting that highlights important aspects of a Year 2000 project life-cycle which must be addressed otherwise issues/problems may arise. The information captured as a result of the risk identification and analysis activities is to be documented and formatted as per the TBS Year 2000 Risk Information Sheet [Reference c].
Communicate = communiquer
Identify = identifier
Analyze = analyser
Plan = planifier
Track = suivre
Control = contrôler
Figure H-1 : "Conduct Risk Assessment" Activity
2.1.1 Participants to the Workshop or Interview
The TBS Year 2000 Taxonomy can be used during a 3 hour
workshop or ½ - 2 hour interview with project stakeholders.
These Year 2000 project stakeholders may include resources such as
the Year 2000 project office personnel including the Project
Manager, practitioners, Year 2000 Steering Committee members, the
Year 2000 Project Director, the Year 2000 Project Sponsor, other
senior executives (ADMs, DMs), business line managers (including
personnel), and technical managers (including personnel responsible
for applications, infrastructure, facilities, etc.).
2.1.2 Tailoring
The TBS Year 2000 Taxonomy is a comprehensive
questionnaire used to support the identification of Year 2000 risks
during a risk assessment (risk identification and analysis).
Ideally all questions should be asked, however, the taxonomy may
contain questions that are not relevant to some participants of the
risk assessment, or relevant at a particular point in the Year 2000
project life-cycle.
As a guideline to help with the tailoring of the questionnaire, an indicator has been associated with each question to identify a mandatory (answer required) or tailorable question. The questionnaire can also be tailored for the type of personnel being interviewed. As a general rule, the questionnaire can be tailored as follows:
An additional suggested approach for tailoring the questions is to determine your organization's Year 2000 project stakeholders (as in section 2.1.1 above). You then create additional columns alongside the questionnaire corresponding to the stakeholders, and check-off the questions that are to be asked to a particular stakeholder (refer to the example figure below). Overlapping questions asked to various stakeholders is considered to be acceptable and will provide different viewpoints to a particular subject area.
# |
Question |
Y |
N |
DK |
NA |
Stake- holder A |
Stake- holder |
Stake- holder C |
Stake- holder D |
---|---|---|---|---|---|---|---|---|---|
1.1.1 | 4 | 4 | |||||||
1.1.2 | 4 | 4 | 4 | ||||||
1.1.3 | 4 | 4 | |||||||
1.1.4 | 4 | 4 | 4 | ||||||
1.1.5 | 4 | 4 | 4 | ||||||
. | 4 | 4 | |||||||
N | 4 | 4 | 4 |
Figure H-2: Example of Tailoring Questions and Targeting Stakeholders
2.1.3 During the Workshop or Interview
During the Year 2000 risk assessment workshops or
interviews, questions from the TBS Year 2000 Taxonomy should be
asked to the participants in order to elicit discussion and
determine if a risk exists in the subject area. The facilitator for
the risk identification workshop/interview should also attempt to
link risks to the business functions of the department.
The general steps include:
i) Yes – This is considered to be a positive response to the question indicating that there is no risk with regards to the subject area of the question;
ii) No – This is considered to be a negative response to the question indicating that there may be a certain level of risk with regards to the subject area of the question. The risk including the potential negative consequence must be recorded including any contextual information;
iii) Do Not Know – This is considered to be an uncertain response to the question indicating that there may be a risk with regards to the subject area of the question. Further investigation is required outside of the workshop or interview in order to determine if there is a risk; and
iv) Not Applicable – This response means that there is no risk with regards to the subject area of the question. Ensure that the question and context is well understood (refer to c. below).
2.1.4 Recording Risks
The risks identified as a result of the risk
identification process should be documented using the TBS Year 2000
Risk Information Sheet [Reference c] serving as the primary means
for documenting and retaining information about a risk.
The TBS Year 2000 Taxonomy Questionnaire is located in Addendum 1 to this appendix.
This table describes the data elements (column headings) in the TBS Year 2000 Taxonomy.
Table H-1: Year 2000 Taxonomy Questionnaire Data Element Definition
Field Name |
Description |
---|---|
Tailor | This is a guideline for tailoring the TBS Year 2000 Taxonomy. The guideline will
|
Question |
The first question in the column is the main question, versus sub-questions (if applicable). The main question is the means for identifying risk in a particular Year 2000 life cycle phase or management area. Sub-questions are not considered to be part of the main question, but rather help provide context for the main question. |
Yes | A positive response to the question indicates that there is no risk with regards to the subject area of the question. |
No | A negative response to the question indicates that there may be a certain level of risk with regards to the subject area of the question. |
Do Not Know | An uncertain response to the question indicates that there may be a risk with regards to the subject area of the question. |
Not Applicable | The question does not apply signifies that there is no risk with regards to the subject area of the question. |
Observation | An observation is considered to be contextual information for an identified risk. Observations may also arise from discussions with regards to the sub-questions. |
The following guidelines and tips are aimed at improving the use of the Year 2000 Taxonomy during risk assessments:
Tailor |
Question |
Yes |
No |
Do Not Know |
NA |
Obser- |
---|---|---|---|---|---|---|
1 Year 2000 Project Life-Cycle Processes | ||||||
1.1 Awareness/Inventory | ||||||
M |
1.1.1 Is the Year 2000 problem among the top priorities of your organization?
|
|||||
M |
1.1.2 Is the awareness level across your organization reflective of the priority level required by Year 2000 activities? | |||||
M |
1.1.3 Is there a Year 2000 communication plan/strategy in place?
|
|||||
M |
1.1.4 Has your organization identified all its mission- critical business functions?
|
|||||
M |
1.1.5 Has your organization assessed the potential business impact of the Year 2000 problem on its mission-critical functions?
|
|||||
M |
1.1.6 Has your organization identified the assets supporting the business functions? Examples of possible assets are:
|
|||||
M |
1.1.7 Has your organization's asset inventory been prioritized?
|
|||||
M |
1.1.8 Is there a controlled repository of the asset inventory information?
|
|||||
M |
1.1.9 Has the number of assets in the inventory remained unchanged since the completion of the inventory phase? | |||||
M |
1.1.10 Have owners for business functions and assets been clearly identified?
|
|||||
1.2 Assessment (Analysis/Design) | ||||||
M |
1.2.1 Have Year 2000 compliance requirements been defined for all types of assets?
|
|||||
M |
1.2.2 Has a standard for dates been established and approved?
|
|||||
M |
1.2.3 Are resources, assigned to the assessment phase, appropriately trained in assessment techniques and tools, and knowledgeable of the assets being assessed? | |||||
M |
1.2.4 Has your organization determined the number of assets which are susceptible to the Year 2000 problem? | |||||
M |
1.2.5 Has your organization determined the time event horizon (a date which could be before 2000) for Year 2000 failure for all assets that are susceptible to the Year 2000 problem? | |||||
M |
1.2.6 Has the magnitude/impact of the year 2000 problem been established for each asset or asset type?
|
|||||
M |
1.2.7 Are the assets accurately documented? Do they include:
|
|||||
M |
1.2.8 Has a triage (repair, re-engineer, replace, or retire) been conducted on the assets? | |||||
M |
1.2.9 Has the triage on assets been approved by senior management? | |||||
M |
1.2.10 Have the conversion techniques and tools been identified for asset types?
|
|||||
T |
1.2.11 For assets requiring replacement, have vendors been solicited for Year 2000 compliance? | |||||
T |
1.2.12 Have issues with electronic partners (e.g. electronic output and input requirements) been identified and resolved?
|
|||||
T |
1.2.13 For assets utilizing external source data (such as application software), has a data conversion strategy been identified?
|
|||||
T |
1.2.14 For IT assets, will the existing IT infrastructure support the added load of Year 2000 conversion activities? | |||||
T |
1.2.15 For IT assets, have the changesto the IT production environment (HW, SW, network) been identified and costed? | |||||
M |
1.2.16 Have issues with vendor responses for Year 2000 compliance been identified and resolved?
|
|||||
M |
1.2.17 Have the results from the assessment phase been used to re-evaluate/confirm the effort estimates and budget? | |||||
T |
1.2.18 Have vendors been solicited for their Year 2000 strategy with respect to their suppliers (supply chain issues)? | |||||
M |
1.2.19 Have business continuity artifacts been collected (e.g. business resumption plans, disaster recovery plans, etc.)? If yes, are they up-to-date? | |||||
M |
1.2.20 Has the ability of the organization to ensure business continuity been assessed? If yes, were deficiencies identified and resolved? | |||||
M |
1.2.21 Have relevant crisis scenarios been identified and documented? | |||||
1.3 Renovation (Build) | ||||||
M |
1.3.1 Are resources, assigned to renovation activities, appropriately trained in renovation techniques and tools, and knowledgeable of the assets being renovated? | |||||
M |
1.3.2 Can your organization state the exact number of assets that have been converted (repaired or replaced) to date? | |||||
M |
1.3.3 For assets requiring replacement, have Year 2000 compliant versions of the assets been ordered?
|
|||||
M |
1.3.4 Have issues with renovation activities been identified and resolved?
|
|||||
T |
1.3.5 Has your organization planned for the development of bridges and filters to handle non-conforming data?
|
|||||
M |
1.3.6 Is the following documentation being updated as part of renovation activities:
|
|||||
M |
1.3.7 Has unit/component testing been conducted (where applicable)? | |||||
M |
1.3.8 Have issues with regards to Year 2000 compliance for suppliers and business partners been identified and resolved?
|
|||||
M |
1.3.9 Are standards being adhered to? | |||||
T |
1.3.10 Have the phase out plans for assets, scheduled for retirement, been prepared?
|
|||||
M |
1.3.11 Are contingency plans, at the business function level, in place?
|
|||||
1.4 Validation (Testing) | ||||||
M |
1.4.1 Have the types of resources required for validation activities been identified (such as users, business/functional resources, and technical resources)? | |||||
M |
1.4.2 Are there sufficient resources for conducting testing activities? | |||||
M |
1.4.3 Does test coverage include full functional testing as opposed to only Year 2000 specific testing? | |||||
M |
1.4.4 Has test data (where applicable for assets such as application software) been developed, collected and/or converted to support the validation activities? | |||||
M |
1.4.5 Are automated test tools/equipment in use?
|
|||||
M |
1.4.6 Do you have sufficient time allocated for the testing activities that have been planned to be conducted? | |||||
M |
1.4.7 Is problem tracking and reporting being utilized for the Year 2000 project?
|
|||||
M |
1.4.8 Has the corrective action process (the protocol for the fixing of problems encountered) during the validation phase been properly identified and documented?
|
|||||
M |
1.4.9 Is the Year 2000 certification of assets a formal approval process? | |||||
1.5 Implementation | ||||||
M |
1.5.1 Is Year 2000 related client training planned for the implementation of new or modified systems? | |||||
M |
1.5.2 Are all the contingency procedures for the restoration of assets in place and ready to be activated?
|
|||||
M |
1.5.3 Have conflicts with current operations and maintenance activities been identified? |
Tailor |
Question |
Yes |
No |
Do Not Know |
NA |
Observ- |
---|---|---|---|---|---|---|
2 Management | ||||||
2.1 Technical / Project Management Processes | ||||||
M |
2.1.1 Is there a Project Charter for the Year 2000 Project?
|
|||||
M |
2.1.2 Is there a Project Management Plan?
|
|||||
M |
2.1.3 Is the Project Management plan based on an industry approved Year 2000 life cycle or approach complete with structured activities? | |||||
M |
2.1.4 Are there plans (or work packages) for Year 2000 activities at the asset level? | |||||
M |
2.1.5 Has the Year 2000 budget been fully approved until implementation?
|
|||||
M |
2.1.6 Is there a Year 2000 Project Management Office PMO?
|
|||||
M |
2.1.7 Has a manager been assigned the responsibility of defining and fulfilling the Year 2000 project objectives (converting Year 2000 susceptible assets in order to maintain business continuity beyond 2000, within the estimated budget and timeframe)?
|
|||||
M |
2.1.8 Is there a Year 2000 steering committee?
|
|||||
M |
2.1.9 Is cooperation among the stakeholders effective? | |||||
M |
2.1.10 Is the master schedule realistic for mission critical business functions/assets?
|
|||||
M |
2.1.11 Does the project have scheduled checkpoints or "gates" when it will be reviewed and where management will decide on its future, and if necessary, take appropriate corrective action? | |||||
M |
2.1.12 Is there an audit plan for the Year 2000 project? | |||||
M |
2.1.13 Is the project plan updated to reflect the results uncovered during the previous Year 2000 life-cycle phase?
|
|||||
M |
2.1.14 Are internal project reviews conducted periodically with asset category owners/conversion teams to track progress and issues? | |||||
M |
2.1.15 Does your organization track actual progress against the year 2000 planned activities (as identified on the master schedule)?
|
|||||
M |
2.1.16 Are frequent progress reports available?
|
|||||
M |
2.1.17 Are the budget and schedule stable (unchanging)? | |||||
M |
2.1.18 Are your organization's budget and schedule intermediate objectives being met? | |||||
M |
2.1.19 Are there critical success factors established for the Year 2000 project?
|
|||||
M |
2.1.20 Has a human resource strategy been developed and approved? | |||||
M |
2.1.21 Have the human resource requirements for each phase been allocated?
|
|||||
M |
2.1.20 Has your organization re-assigned resources to the Year 2000 project when requested? | |||||
M |
2.1.23 Do you have access to the right people when you need them?
|
|||||
M |
2.1.24 Have all the systems, tools, and facilities required for each phase been identified, committed or acquired?
|
|||||
O |
2.1.25 Are all the contracts for the resources to be procured in place (human, computing, facilities, etc.)? | |||||
T |
2.1.26 Are the contracts secured beyond Year 2000? | |||||
M |
2.1.27 Are Year 2000 warranty clauses being inserted in contracts for goods and services (where applicable)? | |||||
M |
2.1.28 Is there a documented risk management process (including tools, techniques, practices) being utilized? | |||||
M |
2.1.29 Are risk action plans being developed and implemented to manage identified risks on the Year 2000 project? | |||||
M |
2.1.30 Is project tracking and oversight being conducted?
|
|||||
T |
2.1.31 Is subcontractor management being conducted?
|
|||||
M |
2.1.32 Is quality assurance being conducted?
|
|||||
M |
2.1.33 Is configuration management performed?
|
|||||
M |
2.1.34 Is there a Crisis Management organization? If yes, is the organization trained and tested with scenarios? |
|||||
M |
2.1.35 Has a Crisis Operations Centre been established? Does the organization have a pre-designated spokesperson for crisis events to inform your end users (client?)? |
|||||
M |
2.1.36 Is there a business continuity plan for the organization? Does it address risk management, contingency planning, crisis response and business resumption activities? |
|||||
M |
2.1.37 Has a top-level executive been identified to lead the crisis management team? Is this person aware of their responsibilities? |
|||||
2.2 Business/Program Management | ||||||
M |
2.2.1 Are there any system development/upgrade projects currently in progress?
|
|||||
O |
2.2.2 Are there any plans to minimize non-Year 2000 initiatives until the Year 2000 problem is resolved or under control? | |||||
M |
2.2.3 Is disruption to operations and production service levels being monitored? | |||||
M |
2.2.4 Has the current business environment been evaluated for constraints that may impact the Year 2000 project implementation?
|
|||||
M |
2.2.5 Has your organization assessed its legal liabilities associated with the Year 2000 problem and potential business function failures?
|
|||||
M |
2.2.6 Have you discussed your Year 2000 Plan with your organization's Legal representative? | |||||
M |
2.2.7 Is your organization's Legal representative conducting a Legal Risk Assessment? | |||||
M |
2.2.8 Is there a legal action plan? |
The Treasury Board of Canada Secretariat (TBS) Year 2000 Project Office requires that Federal Departments and Agencies with Government-Wide Mission-Critical (GWMC) business functions identify, report and manage Year 2000 project risks.
In order to standardize the risk reporting requirements for content and format, a Year 2000 risk information sheet (RIS) is provided to document relevant information about a risk.
The purpose of this appendix is to define and describe the TBS Year 2000 RIS to be used by Federal Departments and Agencies in reporting information regarding the Year 2000 project risks associated with the Government-Wide Mission-Critical (GWMC) and Department-Wide Mission-Critical (DWMC) business functions.
This appendix includes a description of "How to use the Year 2000 RIS , a Year 2000 RIS template, a description of the Year 2000 RIS template data elements, and a sample Year 2000 RIS.
This document relates to the following documents as identified:
The Treasury Board of Canada Secretariat Business Continuity Guide [Reference 1] provides a detailed section devoted to conducting risk assessments on Year 2000 projects. Risk assessments include the "Identify" and "Analyze" processes of the SEI CRM methodology.
The information captured as a result of the risk assessment activity is to be documented and formatted as per the Year 2000 RIS. The Year 2000 RIS serves as the primary means for documenting and managing information about a risk, and is the main deliverable for the risk assessment activity as depicted in the diagram below.
Communicate = communiquer
Identify = identifier
Analyze = analyser
Plan = planifier
Track = suivre
Control = contrôler
Figure I-1: "Conduct Risk Assessment" Activity
The Year 2000 RIS is comprised of five sections:
The first four sections are mandatory risk reporting requirements by the TBS. Details of the template data elements are provided in this appendix. Section 5 of the RIS is an optional section that is provided as a guideline for the department/agency to use in developing and implementing risk management activities.
The following template constitutes the TBS Year 2000 RIS.
Department/Agency: | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
1. Risk Assessment Information | ||||||||||||
Rank: | Risk Id: | Identified on: | ||||||||||
Risk Statement: | ||||||||||||
Context/background: | ||||||||||||
Probability: | ||||||||||||
Project Impact: | ||||||||||||
Time frame: | ||||||||||||
Source: | ||||||||||||
Response: | Escalate: |
Other _______________ ¨
TBS ¨ DM ¨ ADM ¨ Steer.Com ¨ |
||||||||||
2. Risk Management Information | ||||||||||||
Assigned to: | Action Plan Due Date: | |||||||||||
Risk Management Strategy Overview: | ||||||||||||
Indicators/metrics for risk materialization: | Means collected: | |||||||||||
3. Business Information | ||||||||||||
Business Function(s): | Criticality |
Government-Wide ¨
Department-Wide ¨ |
||||||||||
Business Impact: | ||||||||||||
Contingency Plan: | ||||||||||||
Trigger: | ||||||||||||
4. Status Information | ||||||||||||
Status: | Status date: | |||||||||||
Approval: | Closing date: | |||||||||||
Closing rationale: | ||||||||||||
Department/Agency: | |||||||||
---|---|---|---|---|---|---|---|---|---|
Rank: | Risk Id: | Identified on: | |||||||
5. Risk Action Plan Information | |||||||||
Action Item | Responsibility | Date Due | Date Completed | ||||||
Notes: | |||||||||
|
This table describes the data elements in the TBS Year 2000 RIS.
Field Name | Description |
---|---|
Section 1. Risk Assessment Information | |
Department/Agency | The Federal Government department or agency that is reporting risks on their Year 2000 project. |
Rank | Rank or priority, in numeric format (1 through "N"), assigned to the risk. The rank should reflect the risk ranking within the department/agency at the time that the risk is reported |
Risk Id | Unique identifier for the risk, which is generally a combination of a category name for the risk and a sequential numbering scheme (e.g. Management –001). |
Identified on | Date when the risk was identified. |
Risk Statement | Statement of the risk which is comprised of a description of the condition or circumstance causing concern or uncertainty for a potential loss or negative outcome with respect to the compliance and business continuity objectives. [details for developing a risk statement can be found in the Reference 2 - part2, chapter 4, section 2, p.31] |
Context/background | Associated information that clarifies the risk. Context is usually gathered at the time of identification. |
Probability |
Likelihood of occurrence of the risk – exact value depends on the type of analysis. A suggested approach is to utilize a qualitative description as follows:
|
Project Impact |
The loss or negative outcome on the project if the risk materializes. One of the following values is required:
|
Timeframe |
Timeframe in which the risk will occur or action is needed. One of the following values is required:
Departments can use a timeframe that is more relevant to their environment. |
Source |
The source of the risk (reason why there is a risk). One of the following values is required:
|
Response |
The department's/agency's response to the risk. One of the following values is required:
|
Escalate |
A flag which indicates that the risk is being escalated to another organization/management level such as:
|
Section 2. Risk Management Information | |
Assigned to | The person within the department/agency who is responsible for managing the risk. |
Action Plan Due Date | The completion date for the activities as identified in the action plan to manage the risk. |
Risk Management Strategy Overview | The selected strategy for managing the risk. This strategy is a high-level description that provides a general direction and takes into account the source and the response to the risk. Generally only risks with an "avoid" or "control" response have action plans associated with them. An "assume" response does not require risk management since the department/agency has decided to live with the consequences of the risk materializing. A transfer/escalate will require a response from the receiving party. |
Indicators/metrics for risk materialization | An indicator/metric or sign that will clearly let the Year 2000 project stakeholders know that the risk is materializing and becoming an issue or problem. The indicator should be part of progress information that is collected during the "Track" step. |
Means collected | The means or manner for collecting the indicators/metrics identified in the risk materialization field. |
Section 3. Business Information | |
Business Function(s) | The business function(s) as identified on the TBS Government-Wide Mission-Critical function list or as identified by the department/agency's Department-Wide Mission-Critical function list. Risks may apply to more than one business function. |
Criticality | The mission criticality of the business function associated with the risk in question. The mission criticality is as defined by the TBS mission criticality criteria. Only one of 2 choices is available: Government-wide or Department-wide Mission-critical. |
Business Impact | The impact of the risk on the continuity of the business function as opposed to the "Project Impact" defined in section 1 of the Year 2000 RIS. |
Contingency Plan | This is a reference to a contingency plan. The contingency plan should contain procedures that will restore the mission- critical business function or an asset within a business function in the event that a Year 2000 problem materializes. |
Trigger | The trigger for implementing a contingency plan/procedure. The trigger will generally be the "fact" or "threshold" that indicates that the risk has materialized and/or has become a problem/issue. |
Section 4. Status Information | |
Status |
Status of the risk. The following value is required:
|
Status date | The date the last status was provided or determined. |
Approval | This is a signature for approval for mitigation strategies or closure by the "Assigned To" person from section 2 of the Year 2000 RIS. |
Closing date | Date when the risk was closed |
Closing rationale | Rationale for closure of the risk |
Section 5. Risk Action Plan Information | |
Action Item | This is a series of action or steps that must be executed in order to mitigate the risk. The action items must support the risk mitigation strategy. |
Responsibility | The person assigned to conduct an action item. The same person may conduct all action items on the list. This person may be the same as the "Assigned To" person from section 2 of the Year 2000 RIS or this person may be someone who has been assigned to work on the actions but still must report to the "Assigned To" person. |
Date Due | The date the action item is due. |
Date Completed | The date the action item was completed. |
Notes |
An optional field for general notes.
This section could identify resources required in order to implement the risk action plan actions. |
2.4.1 Example A – Organizational/project risk
The following Year 2000 RIS is to be used as an EXAMPLE ONLY. This risk is based on an imaginary scenario where a department X has identified a risk regarding a lack of funding for the Year 2000 project.
Department/Agency: | Department X | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
1. Risk Assessment Information | ||||||||||||
Rank: | 2 | Risk Id: | Lack of Funding | Identified on: | 5-Jan-1998 | |||||||
Risk Statement: | ||||||||||||
There is a risk that the funding for Year 2000 activities beyond March 1998 will not be approved in time to allow the timely progression of Year 2000 related activities.
The impact of this risk is that the remaining Year 2000 activities will not be conducted, thus affecting the Year 2000 project schedule. |
||||||||||||
Context/background: | ||||||||||||
The Treasury Board submission for funding is currently being prepared and is planned to be delivered on March 10, 1998.
No Year 2000 susceptible assets have been completely converted as of 5-Jan-1998. |
||||||||||||
Probability: | High | |||||||||||
Project Impact: | High | |||||||||||
Time frame: | Near | |||||||||||
Source: | Lack of control | |||||||||||
Response: | Avoid | Escalate: |
Other _______________¨
TBS ¨ DM ¨ ADM ¨ Steer.Com n |
|||||||||
2. Risk Management Information | ||||||||||||
Assigned to: | Action Plan Due Date: | |||||||||||
Mr. Y | 20-Mar-1998 | |||||||||||
Risk Management Strategy Overview: | ||||||||||||
The risk management strategy is aimed at obtaining control over funding. | ||||||||||||
Indicators/metrics for risk materialization: | Means collected: | |||||||||||
1. Schedule slippage
2. An inability to hire subcontractors |
1. Master schedule/progress reports
2. Non-approval for procurement requests for hiring subcontractors |
|||||||||||
3. Business Information | ||||||||||||
Business Function(s): | All functions that have dependencies on Year 2000 susceptible assets | Criticality |
Government-Wide n
Department-Wide n |
|||||||||
Business Impact: |
Year 2000 failures in the Year 2000 susceptible assets will halt operations in the following government-wide and department-wide mission-critical functions:
1. Provide service X (GWMC) 2. Pay employees (DWMC) |
|||||||||||
Contingency Plan: |
Department X contingency plan:
1. Restore "Provide service X" function - Contingency procedure 2.3.1-003 2. Restore "Pay employees" function - Contingency procedure 4.3.1-001 |
|||||||||||
Trigger: |
1. If Year 2000 susceptible assets for the "Provide service X" function are not certified Year 2000 compliant by January 1, 1999, then the contingency will be implemented.
2. If Year 2000 conversion for Year 2000 susceptible assets for the "Pay employees" function is not certified Year 2000 compliant by December 15, 1999, then the contingency will be implemented. |
|||||||||||
4. Status Information | ||||||||||||
Status: | Status date: | |||||||||||
Open | 21-Jan-1998 | |||||||||||
Approval: | Closing date: | |||||||||||
Signature of "Mr. Y" | ||||||||||||
Closing rationale: | ||||||||||||
Department/Agency: | Department X | ||||||||
---|---|---|---|---|---|---|---|---|---|
Rank: | 2 | Risk Id: | Lack of Funding | Identified on: | 5-Jan-1998 | ||||
5. RISK ACTION PLAN INFORMATION | |||||||||
Action Item | Responsibility | Date Due | Date Completed | ||||||
1. Complete the Treasury Board submission for extra funding | Mr. Y | 5-Feb-1998 | |||||||
2. Have the Treasury Board submission signed by the senior executives and delivered to Treasury Board | Mr. Y | 20-Feb-1998 | |||||||
3. Obtain Treasury Board approval | Mr. Y | 20-Mar-1998 | |||||||
Notes: | |||||||||
It was decided to dedicate Mr. A and Mr. B in order to deliver the Treasury Board submission by 20-Feb-1998 instead of the planned 10-Mar-1998. |
2.4.2 Example B – Technical risk
The following Year 2000 RIS is to be used as an example only. This risk is based on an imaginary scenario where a department X has identified a risk regarding an inability to obtain a Year 2000 compliant version of "Equipment A".
Department/Agency: | Department X | |||||
---|---|---|---|---|---|---|
1. Risk Assessment Information | ||||||
Rank: | 3 | Risk Id: | Non-Year 2000 compliant Equipment A | Identified on: | 12-Apr-1998 | |
Risk Statement: | ||||||
There is a risk that the "Equipment A" as provided by vendor A will be discontinued since the vendor cannot provide details nor plans for Year 2000 compliance. The impact of this risk is that the existing "Equipment A" will not be certified as Year 2000 compliant. |
||||||
Context/background: | ||||||
"Equipment A" was discovered to be Year 2000 susceptible during the assessment phase of the Year 2000 project. The vendor A has not responded to our letter requesting a statement of Year 2000 compliance for a future version of "Equipment A". |
Department/Agency | Department X | |||||
---|---|---|---|---|---|---|
Probability: |
High | |||||
Project Impact: | High | |||||
Time frame: | Mid | |||||
Source: | Lack of information | |||||
Response: | Avoid | Escalate: |
Other _______________¨
TBS ¨ DM ¨ ADM ¨ Steer.Com ¨ |
|||
2. Risk Management Information | ||||||
Assigned to: | Action Plan Due Date: | |||||
Mr. Z | ||||||
Risk Management Strategy Overview: | ||||||
The risk management strategy is aimed at obtaining better information regarding the ability of vendor A to provide a Year 2000 compliant version of "Equipment A". | ||||||
Indicators/metrics for risk materialization: | Means collected: | |||||
1. Schedule slippage for the Year 2000 conversion of "Equipment A". | 1. Master schedule/progress reports | |||||
3. Business Information | ||||||
Business Function(s): | "Provide service C" | Criticality |
Government-Wide ¨
Department-Wide n |
|||
Business Impact: | A Year 2000 failure for "Equipment A" will degrade the "Provide service C" function to 25% capacity. | |||||
Contingency Plan: |
Department X contingency plan:
1. Restore "Provide service C" function - Contingency procedure 10.2.5-002 |
|||||
Trigger: | 1. A Year 2000 compliant version of "Equipment A" is not obtained by | |||||
4. Status Information | ||||||
Status: | Status date: | |||||
Open | 12-Apr-1998 | |||||
Approval: | Closing date: | |||||
Signature of "Mr. Z" | ||||||
Closing rationale: | ||||||
Part 2 – Risk Management Details |
|||||||||
---|---|---|---|---|---|---|---|---|---|
Department/Agency: | Department X | ||||||||
Rank: | 3 | Risk Id: | Non-Year 2000 compliant Equipment A | Identified on: | 12-Apr-1998 | ||||
5. Risk Action Plan Information | |||||||||
Action Item | Responsibility | Date Due | Date Completed | ||||||
1. Attempt a second contact with vendor A | Mr. Z | 10-May-1998 | |||||||
2. Conduct an options analysis for a replacement equipment or substitute for "Equipment A" | Mr. Z | 1-Jun-1998 | |||||||
3. Select replacement equipment or substitute for "Equipment A" | Mr. Z | 1-Jul-1998 | |||||||
4. Integrate the replacement equipment or substitute for "Equipment A" | Mr. Z | 2-Oct-1998 | |||||||
5. Test the replacement equipment or substitute for "Equipment A" for the Year 2000 problem | Mr. Z | 10-Jan-1999 | |||||||
6. Certify/validate the replacement equipment or substitute for "Equipment A" as being Year 2000 compliant | Mr. Z | 3-Feb-1999 | |||||||
Notes: | |||||||||
None |
Department/Agency: | Department X | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
1. Risk Assessment Information | ||||||||||||
Rank: | 4 | Risk Id: | Inability to pay benefits | Identified on: | 8-Oct-1998 | |||||||
Risk Statement: | ||||||||||||
There is a risk that benefits will not be paid to eligible beneficiaries beyond January 2000.
The impact of this risk is that the economic well being of thousands of Canadians may be impacted. |
||||||||||||
Context/background: | ||||||||||||
Department X is paying benefits to over 1Million Canadians in support of Program "Y". These benefits represent the main source of income to many of these beneficiaries and are essential to these individuals.
Department X depends on several business partners to pay these benefits and has currently no control over their progress in addressing the Year 2000 problem. |
||||||||||||
Probability: | Medium | |||||||||||
Project Impact: | High | |||||||||||
Time frame: | Near | |||||||||||
Source: | Lack of control | |||||||||||
Response: | Avoid | Escalate: |
Other _______________¨
TBS ¨ DM n ADM ¨ Steer.Com ¨ |
|||||||||
2. Risk Management Information | ||||||||||||
Assigned to: | Action Plan Due Date: | |||||||||||
Mr. Y | 15-Nov-1998 | |||||||||||
Risk Management Strategy Overview: | ||||||||||||
The risk management strategy is aimed at obtaining control over some key business partners by formalizing their engagement to pay benefits through special legal agreements. | ||||||||||||
Indicators/metrics for risk materialization: | Means collected: | |||||||||||
1. Variances in partner's plans
2. Missed payments complaints from beneficiaries |
1. progress reports
2. complaint department |
|||||||||||
3. Business Information | ||||||||||||
Business Function(s): | Pay benefits | Criticality |
Government-Wide n
Department-Wide ¨ |
|||||||||
Business Impact: | Inability to pay benefits | |||||||||||
Contingency Plan: | Manually produce cheques for beneficiaries and have them delivered through special courier service. | |||||||||||
Trigger: | 1. Clear indication that some partners will not be ready. 2. Complaints from beneficiaries |
|||||||||||
4. Status Information | ||||||||||||
Status: | Status date: | |||||||||||
Open | 14-Oct-1998 | |||||||||||
Approval: | Closing date: | |||||||||||
Signature of "Mr. Y" | ||||||||||||
Closing rationale: | ||||||||||||
The following sample risk list contains the following information:
The definitions for these attributes are located in Appendix I – Risk Information Sheet.
Table J-1: Sample Risk List
Risk Id |
Risk Statement |
Context |
---|---|---|
Contingency Planning | There is a risk that contingency plans may not be created/updated for certain Branches since this was an activity that seemed to have less priority over other operational and Year 2000 activities. | A Year 2000 contingency plan in the context of this risk is "a plan which will identify how a particular business function will be performed should a system fail due to the Year 2000 problem". |
Lack of contingency planning may result in an inability to resume certain business functions which may have social, legal and political implications; | There were discussions of disaster recovery plans and business resumption plans during the interview sessions and during the risk assessment, but very little information was provided regarding Year 2000 contingency plans. | |
Human Resource Planning | There is a risk that "Dept. X" may not be able to assemble all the resources needed to support its Year 2000 conversion as evidenced by resource losses to the private industry and the current significant reliance on industry to fulfill its current role. | As of July 1997, the following actions had been performed:
|
The impact related to this risk is schedule delays, and the possibility of not completing all of the planned Year 2000 conversions; |
|
|
Operational Activities | Operational activities may focus
priorities away from the Year 2000 problem and place additional
demands for similar resources. The potential for the outsourcing
option also adds more uncertainty and complexity in an environment
that is already complex.
The impact related to this risk is an increase in resource requirements and the potential for some Year 2000 conversions to not be ready on time. |
Many development projects are being conducted in parallel such as project "X", "Y", and "Z". |
Sample business continuity artifacts include:
Risk analysis follows the identification step and is aimed at obtaining risk information that can be used for decision-making on the Year 2000 Project. The following table provides the details to the analyze step. Detailed procedures for analyzing and determining the contingency planning requirements are provided in Appendix N.
Risk Analysis Steps |
Description |
Responsibility |
---|---|---|
1. Conduct a Risk Analysis Workshop | Identify a subset of stakeholders from the various risk identification workshops in order to conduct a risk analysis workshop intended to analyze each risk. | Year 2000 Project Manager |
2. Conduct Tri-level Attribute Evaluations for each Risk. |
During the risk analysis workshop, determine the following qualitative attributes for each risk: Probability: High, Medium, or Low; (Refer to risk information sheet for details – |
Year 2000 Project Manager |
3. Determine the Source of the Risk. | During the risk analysis workshop, determine the source for each risk as follows:
|
Year 2000 Project Manager |
4. Determine the Response to the Risk. | During the risk analysis workshop, determine the response to each risk as follows:
|
Year 2000 Project Manager |
5. Determine the Risk Rank. | During the risk analysis workshop, conduct a risk ranking activity using one of the following three techniques:
As a guideline, risks with "low" probability and "low" impact should be discarded from the prioritization exercise. In order to conduct efficient risk management, it is important to deal with the risks that have medium to high probability and impact. |
Year 2000 Project Stakeholder (Year 2000 PO resources plus others from within the department) |
6. Approve the new Risks | The Year 2000 Project Manager approves the risks identified on the final risk list. | Year 2000 Project Manager |
7. Develop the Risk Information Sheets. | Once the risks are approved, document the risks using a Risk Information Sheet (refer to Appendix I). Each Risk Information Sheet will form the basis for managing each risk identified. | Year 2000 Project Manager |
Note: The responsibility currently assigned to the Year 2000 Project Manager can be delegated to other members of the organization including audit.
A risk assessment report should provide the following sections following the content requirements of the guide sections 3 (Identify) and 4 (Analyze).
TABLE OF CONTENTS
EXECUTIVE SUMMARY
1. INTRODUCTION
1.1 Background
1.2 Purpose
1.3 Scope
1.4 Objectives
1.5 References
2. METHODOLOGY
3. RISK ASSESSMENT RESULTS
3.1 Risk Assessment Summary
3.2 Observations
3.3 Problems
3.4 Detailed Risk Assessment
3.5 Sources Types
3.5.1 Sources of Risks
3.5.2 Source Analysis Results
3.6 Responses Types
3.6.1 Responses to Risks
3.6.2 Response Analysis Results
4. RISK MANAGEMENT STRATEGIES
4.1 Risks to be Assumed
4.2 Avoidance Strategies
4.3 Control Strategies
4.4 Transfer Strategies
5. CONCLUDING REMARKS
5.1 Next Step
5.2 Conclusion
APPENDICES
Appendix A – Risk Assessment Participants
Appendix B – Comparative Risk Ranking Results
Appendix C – Total Risk Estimation (TRE) Matrix
An essential element of business continuity is the determination of when and where contingency plans should be developed and implemented. The following table provides steps to assist departments in making this determination. This procedure should be applied during the "analyze" step.
Steps | Description | Responsibility |
---|---|---|
1. Conduct a business impact analysis |
Using the prioritized mission-critical business function list and associated asset mappings from the "Identify" step, as well as the Risk Information Sheets from the "Analyze" step, conduct a business impact analysis. Input may also be required from the Year 2000 Project/Program Office with respect to progress on assets being made Year 2000 compliant. For each mission-critical business function: |
Function Owner |
a. Has a risk been associated with the mission critical
function or any of its mapped assets?
|
||
b. In addition to any risk assessment information, are any
assets that are mapped to the business function vulnerable to a Year 2000
failure?
|
||
c. Is the asset(s) that is considered to be vulnerable to a
Year 2000 failure required (or considered a significant contributor) in
delivering the business function's services/products (or delivering a minimal
acceptable level of service)?
|
||
2. Develop a draft/high level contingency for the entire business function? | For each business function associated with a known risk (Step 1-a) or has vulnerable assets from Step 1-c), develop a contingency plan to address a potential failure (can be total or limited to one or a combination of assets). | Function Owner |
Factors to consider at this stage
are:
|
||
3. Monitor Progress Report | For each mission-critical business function and mapped asset: | Function Owner |
a. Is there is a concern with the Year 2000
readiness based on variance in schedule, successive slippages, etc.?
|
||
b. Is the concern with the progress at a threshold
where the contingency should be triggered?
|
||
4. Monitor Continuous Risk Management Activities |
For each
mission-critical business function and mapped asset:
a. Are any of the identified risks materializing based on the indicators on the risk information sheets?
|
Function Owner |
b. Have new risks been identified?
|
||
5. Review the Verification and Validation reports (including audit reports) |
For each
mission-critical business function and mapped asset:
a. Is there is a concern with the Year 2000 readiness for an asset or function based on the verification and validation (or audit) report.?
|
Function Owner |
b. Is the concern with the progress at a threshold
where the contingency should be triggered?
|
The "plan" step is divided into separate but related types of planning documents: Risk Action Plans, Contingency Plans, and Business Continuity Preparedness Documents. The following table provides steps to develop risk action plans for the identified risks. Sample Tables of Contents are provided for the other plans.
Risk Planning Steps | Description | Responsibility |
---|---|---|
1. Conduct a Risk Planning Workshop. | Identify key stakeholders from the Year 2000 Project in order to conduct a workshop intended to develop risk action plans for mitigating the identified risks. | Year 2000 Project Manager |
2. Select Risks | Answer "Who's risk is it?"
Review the risks identified in Risk Information Sheets (RIS) to determine their validity and to determine whether the Year 2000 PO is responsible for managing each risk. Using the Responsibility Decision flowchart (CRM Guidebook, Chapter 6, Part 2), for each risk, determine: |
Year 2000 Project Manager |
a. Does the Year 2000 PO have the responsibility to deal with
this risk?
|
||
b. Does the functional organization
have the responsibility to deal with this risk?
|
||
3. Analyze the Risks and Decide an Approach for Managing the Risks. | Answer "What can be done about it?"
For each risk that the Year 2000 PO is responsible for (or other organization as in step #1 - b) determine whether the risk is well understood, then determine the appropriate approach for managing the risk. Using the Approach Decision flowchart (CRM Guidebook, Chapter 6, Part 2), for each risk, determine: |
Year 2000 Project Manager |
a. Does the Year 2000 PO understand
the risk and is the risk clearly documented in the Risk Information
Sheet?
|
||
b. Can the Year 2000 PO accept this
risk without doing anything to manage or control its probability
and impact (this is validating the "response" on the Risk
Information Sheet)?:
|
||
c. Can the Year 2000 PO do anything
with regards to this risk? Does the Year 2000 PO need to act on
this risk?
|
||
4. Generate Action Plans | Answer "How much and what should be
done?"
For each risk that the Year 2000 PO is responsible for, and for which a "Mitigation (avoid)" or "Watch (control)" approach for managing the risk is required (resulting from step 3-c), develop various strategies to deal with the risks. This can be accomplished using a brainstorming technique. Once various alternative strategies have been clearly identified, choose the best strategy (or combination thereof) which minimizes the probability of occurrence as well as minimizes the negative impact of the risk. The selected strategy must then be elaborated by developing a risk action plan for each risk. The risk action plan is a series of action items that will direct a Year 2000 PO or departmental resource in implementing the mitigation strategy. The risk action plan is to be attached to the Risk Information Sheet. |
Year 2000 Project Manager |
5. Assign Year 2000 PO Risk Owner | For each risk that requires a risk action plan (those for the Year 2000 PO as well as those delegated to the department or transferred to another organization such as TBS), assign a risk owner. This person will be responsible for tracking and reporting status on each risk and associated activities (such as the development of risk action plans). | Year 2000 Project Manager |
6. Ensure Risk Action Plans are Developed | For each risk that was delegated to
the department or transferred to another organization, the Year
2000 PO must ensure that risk action plans are being developed for
risks requiring avoidance or control.
The Year 2000 PO must still track activities for this risk since it is still a risk which can have negative impacts on the Year 2000 Project. |
Risk Owners |
7. Implement Action Plans | For each risk action plan that was
developed and for which there was a risk mitigation (or avoidance)
strategy required, each risk owner responsible for a risk must
implement the risk action items on the Risk Information Sheet by
the target implementation date.
The implementation activities will be tracked and monitored for problems with the implementation. |
Risk Owners |
Note: The responsibility currently assigned to the Year 2000 Project Manager can be delegated to other members of the organization including audit.
A contingency plan should provide the following sections following the content requirements of the guide sections 5 (Develop Risk Action and Contingency Plans).
EXECUTIVE SUMMARY
1. INTRODUCTION
1.1 Background
1.2 Purpose
1.3 Scope
1.4 Audience
1.5 Relationship to Other Plans/Reports
2. ORGANIZATION
2.1 Governance Structure
2.2 Key Year 2000 Contingency Planning Stakeholders
3. EXPOSURE ANALYSIS RESULTS
3.1 Contingency Capability Assessment
3.2 Business Function Priority
3.3 Risk Assessment
3.4 Contingency Requirements
4. CONTINGENCY PLANNINGACTIVITY OVERVIEW
4.1 Perform Continuous Risk Management
4.2 Define Crisis Scenarios
4.3 Develop Contingency Plan
4.4 Respond to crises
4.5 Resume operations
5. CONTINGENCY PLAN TRAINING
5.1 Objectives
5.2 Requirements
5.3 Activities
6. CONTINGENCY PLAN TESTING
6.1 Objectives
6.2 Requirements
6.3 Activities
7. CONTINGENCY PLAN MAINTENANCE
7.1 Objectives
7.2 Requirements
7.3 Activities
APPENDICES
Appendix A – Contingency Procedures For Mission Critical Functions
Department/Agency: | |||||
1. CONTINGENCY PLAN IDENTIFICATION | |||||
Procedure Name:
Procedure Id: |
Business Function Impacted (Consequence):
Business Function Id: |
||||
System / Asset Failure Description (Range from individual to complete asset failure):
|
Trigger 1: | ||||
Trigger 2: | |||||
Maximum Acceptable Degradation Level: | |||||
Maximum Acceptable Delay Before Resumption: | |||||
Mission Criticality:
Government-wide r Department-wide r Other r |
Reviews:
Legal: r Deputy Minister's Office: r |
||||
Functional Authority (name):
Telephone Number: |
Asset Responsibility (name):
Telephone Number: |
||||
2. CONTINGENCY PLANS | |||||
Contingency Procedures: (Contingency procedure owners can attach a more detailed description of the procedure)
|
|||||
Key Logistical Issues: (Location of key contingency procedure tools, guides, supplies and/or resources)
|
|||||
Crisis Response Procedures: (Extraordinary measures only taken under crisis)
|
|||||
Business Resumption Procedures: (Actions required to restore normal state of operations)
|
|||||
3. CONTINGENCY PLAN LIFE CYCLE: | |||||
Training Frequency:
Date Last Training: Sign-off: |
Test Frequency:
Date Last Tested: Sign-off: |
Maintenance Frequency:
Date Last Maintained: Sign-off: |
|||
Status (Draft or Final) and Version: | |||||
Approval: | |||||
Dated: | File Location: |
This procedure supports the performance of the activity defined in Section 4.2 of the contingency plan.
Table Q-1: Detailed Crisis Scenario Definition Steps
Step |
Description |
Components |
Step 1 | Identify Vulnerabilities (Hazard Identification / Risk Assessment) | |
Step 2 | Prepare Risk List Based on Priorities and High consequence Events | |
Step 3 | Assess Capabilities | |
Step 4 | Identify Objectives of Prevention Preparedness Response (PPR) Program |
|
Step 5 | Prepare Crisis Response Plan (as part of PPR Program) |
|
Step 6 | Design / Develop Scenarios |
Prior to undertaking the Scenario:
|
Tabletop Scenarios (estimated time 4-6 weeks)
|
||
Scenario Exercises (estimated time 6 - 22 weeks)
|
||
Determine Objectives and Issues
|
This document elaborates further section 4.4 of the Contingency Plan.
EXECUTIVE SUMMARY
1. CRISIS RESPONSE PLAN – MANDATE
1.1 Establish objectives for Responding to a Crisis
1.2 Ensure management support
1.3 Establish Mandate
1.4 Introduction to Plan
1.5 Acknowledgment / Sign-off sheet
2. CRISIS RESPONSE PLAN – RISK ASSESSMENT / CREDIBLE SCENARIO LIST
2.1 Risk Identification
2.2 Target Levels of Safety
2.3 Risk Assessment
2.4 Risk Mitigation / Risk Controls
3. CRISIS RESPONSE PLAN – CRISIS RESPONSE ORGANIZATION
3.1 Executive Level Organization
3.2 Emergency Response Team Organization
3.3 Integration of different areas (business resumption, response
teams, public information ...)
3.4 Crisis Team contact sheet
3.5 Crisis Team Organization – Crisis Team Leader,
3.6 Team Contact Sheet
3.7 Crisis Centre: Location, Map of Resources, and Supplies
4. CRISIS RESPONSE PLAN – CRISIS RESPONSE PLAN ACTION STEPS
4.1 Crisis Thresholds and Alert Responsibilities
4.2 Assessment / Planning Activities
4.3 Action
5. CRISIS RESPONSE PLAN – POST-CRISIS EVALUATION
5.1 Follow-up
5.2 Post-Mortem
5.3 Reporting Requirements
6. CRISIS RESPONSE PLAN COMMUNICATIONS PLAN
6.1 Primary Contact Lists
6.2 Secondary Contact Lists
6.3 Media Relations
7. CRISIS RESPONSE PLAN – LEGAL / FINANCIAL CONSIDERATIONS
8. CRISIS RESPONSE PLAN – TRAINING PLAN
8.1 Evaluation
8.2 Methodology
8.3 Quality Assurance Program
8.4 Scenario Exercises
8.5 Scenario Drills
This document elaborates further section 4.5 of the Contingency Plan.
TABLE OF CONTENTS
1. BUSINESS RESUMPTION INTRODUCTION
1.1 Acknowledgement / Updates
1.2 Departmental Information
1.3 Scenario List
2. BUSINESS RESUMPTION PLANNING
2.1 BRP
Policy
2.2 BRP
Mandate
2.3 BRP Planning Considerations
2.4 BRP Assumptions
2.5 BRP Organizational Structure
Organizational Roles and
Responsibilities
Crisis Management Team
Departmental Production Recovery Teams
Administration Team
Technology Team
Other Functional Teams
2.6 BRP Scenario Testing and Maintenance Program
3. BRP STANDARD OPERATING PROCEDURES
3.1 Activation
3.2 Communication / Notification Guidelines
3.3 Command Centre
4. RECOVERY RESPONSES
4.1 BRP Flowchart (Notification, Assessment, Planning,
Implementation, Termination)
4.2 Crisis Management Team Tasks
4.3 Administration Team Tasks
4.4 Technology Management Team Tasks
4.5 Production Recovery Team Tasks
5. BRP REFERENCE MATERIALS
Appendix A | - Departmental Information |
Appendix B | - Facility Location Plans |
Appendix C | - Emergency Service Agreements |
Appendix D | - Key Client / Customer List |
Appendix E | - BRP Equipment Supplies List |
Appendix F | - Information Technology Application List |
Appendix G | - Information Technology Equipment List |
Appendix H | - Office Equipment List |
Appendix I | - Other Equipment List |
Appendix J | - Departmental Personnel List |
Appendix K | - Key Vendor/Supplier List |
Appendix L | - Primary / Secondary Team Contact Sheets |
Appendix M | - Offsite Storage / Vital Records Log |
Appendix N | - Incident Log |
Appendix O | - Critical Inventory List (based on Scenarios) |
Tracking should take place upon initiating the plans. The following table provides steps to track risks, and progress information.
Table T-1: Detailed Tracking Steps
Tracking Steps |
Description |
Responsibility |
||
|
Each risk owner responsible for a
risk, must collect risk information according to the indicators
identified on the Risk Information Sheet.
This is to be accomplished for all risks that require avoidance or control as indicated on the Risk information Sheet. Progress information should also be collected through progress reports from the Project Office. |
Risk Owners | ||
|
The risk and progress information obtained from step #1 is to be analyzed with respect to any thresholds established for contingency plans. New information could be compared to previous information and then a determination made as to whether the risk is materializing or progress is lacking compared to the plans. | Risk Owners | ||
|
The Year 2000 project manager must query the plan and risk owners to determine if their respective plans are being implemented and are adhering to the action plan due dates. | Year 2000 Project Manager | ||
|
Using the information from step #2 (on the Risk Information Sheets) and step #3, prepare or update the risk status report (i.e. exposure to business interruptions). The report should provide simple, concise and accurate status on the risks and the plans for use at the Year 2000 PO project management and Year 2000 Steering Committee meetings. | Year 2000 Project Manager | ||
|
The status and dispositions of risks and issues are to be discussed at the Year 2000 project management meeting and/or the Year 2000 Steering Committee meeting. | Year 2000 Project Manager and Risk Owners |
Note: The responsibility currently assigned to the Year 2000 Project Manager can be delegated to other members of the organization including audit.
Risk control takes place upon identifying variances to the risk level and plans established as part of the "Plan" step. The following table provides procedures to perform the "Control" step.
Table U-1: Detailed Control Procedure
Control Steps |
Description |
Responsibility |
||
|
The Year 2000 Project Manager, risk
owner, and plan owners are to analyze the status reports provided
through the "Track" activity in order to determine trends,
deviations, or anomalies – this can be conducted using
"cause-and-effect" analysis.
The goal of this step is to clearly understand the status of each risk and plan in order to determine if further actions are required. |
Year 2000 Project Manager | ||
|
Using the knowledge gained from the analysis step, the Project Manager must decide one of the following next steps: | Year 2000 Project Manager | ||
|
||||
|
Implement the "control" decision from step #2 above. | Year 2000 Project Manger or other Risk Owner |
Note: The responsibility currently assigned to the Year 2000 Project Manager can be delegated to other members of the organization including audit.