Anticipated Downtime

The length of time it takes to begin processing from a remote backup site

Application Attack

A malicious virus attack of production software that migrates through all software versions

BEST (Black Eagle Security Team, Inc.)

A company created to bring the iSR to the market.  Created by partners who have services that are being utilized to define and create the iSR.  Best offers full security audits and continuity business continuity planning in support of the iSR.

Business Impact Analysis (BIA)

A process that identifies and evaluates the potential effects (financial, life/safety, regulatory, legal/contractual, reputation and so forth) of natural and man‐made events on business operations.

Business Logic

A series of steps, computations, and decisions that are required to fulfill a business task or objective.

Business To Business Communications (B2B)

The digital transmission of data (usually automated) to share key information between two business entities.


Software/Hardware responsible for parsing, formatting and sending transactions:

    • Standard EDI’s
    • Proprietary Datasets / Flat Files
    • SFTP
    • WebSphere MQ

Data vs Information Analogy

Data is read by computer software, where Information (output from applications) is read by people!

Data Validation or Data Quality Tool

Software/Hardware designed to validate the information extracted from another system, prior to its use or integration into a system.


The period of time which the systems are unavailable for use

Emergency Processing

The processing that user departments must do during a process recovery gap.  This includes manual and any automated support available  during the GAP.

Extract/Transform/Load (ETL) Tool

Software/Hardware designed to extract data from digital feeds, transform them into some standardized (normalized) format, and load it into other systems.

Intelligent Safe Room (iSR)

A safe room with an independent infrastructure having intelligent capabilities to support emergency processing during the GAP.

Processing Recovery Gap (The GAP)

The time between an unanticipated failure at the recovery site and a resumption of the backup process.

Recovery Point Objective (RPO)

It is the maximum period of time lost due to a disaster that is acceptable.

Recovery Time for an Application Attack (RTAA)

The time required to find, correct, test, and reinstall software that has failed.

Recovery Time Objective (RTO)

The duration of time and achived service level within which a business process must be restored after a disaster.

Safe Room

The location of an IT infrastructure independent from the production system which holds all of the computer outputs, log files and training records generated by production and the programs/processes to be used during a GAP or audit.  The log files are also used for process improvement.

Transaction Journal

A set of transactions output from production created at the time of processing used by the iSR to information held up‐to‐date as of the faliure.