BCM BandTree

[BCM] [BT] [E3] [BIA] [T2] [CBF] [8] Procurement & Supply Chain Management

Written by Dr Goh Moh Heng | Jun 18, 2025 6:47:39 AM

BIA Questionnaires

Part 3: Impact Over Time of Business Functions

Notes for BCM Institute's Course Participants: This is the template for completing the "Part 3: Impact Over Time of Business Functions."

CBF-8: Procurement & Supply Chain Management

This chapter presents a detailed analysis of how disruptions to Bandtree’s critical business functions (CBFs) affect the organisation over time.

The assessment of “impact over time” is a crucial component of the Business Impact Analysis (BIA), as it reveals the rate at which disruption severity escalates across specific business functions and sub-processes.

By measuring the impact across defined time intervals—from as short as four hours to as long as sixty days—this analysis helps Bandtree identify which functions require urgent restoration (Recovery Time Objective – RTO) and the point beyond which disruption becomes intolerable (Maximum Tolerable Period of Disruption – MTPD).

It also highlights vulnerable periods when business functions are most at risk, such as during project milestones, audit cycles, or emergency operations.

Given Bandtree’s strategic position as a government-linked entity under Darussalam Assets, with responsibilities tied to national infrastructure and property management, ensuring the timely recovery of its critical functions is essential not only for operational continuity but also for national-level service assurance.

Based on your requirements and BCM Institute’s Impact Over Time methodology, here is a comprehensive impact analysis table for CBF-8: Procurement & Supply Chain Management of Bandtree.

This table outlines the sub-functions (Sub-CBFs), their highest-impact area, the severity of disruption over time (rated 1–5), along with the defined Recovery Time Objective (RTO), Maximum Tolerable Period of Disruption (MTPD), and the Vulnerable Period during which the business is at critical risk.

Table 3: [BIA] [P3] Impact Over Time of Business Functions (Sub-CBF) for CBF-8: Procurement & Supply Chain Management

 

Critical Business Function

Critical Business Function Code

Highest-Impact Area

4 Hr

8 Hr

1 Day

2 Day

3 Day

5 Day

7 Day

10 Day

14 Day

21 Day

30 Day

60 Day

RTO

MTPD

Vulnerable Period

Vendor Selection & Prequalification

8.1

Operational Disruption

2

2

3

4

4

5

5

5

5

5

5

5

2 Days

5 Days

Start of major sourcing cycle

Contract Management

8.2

Legal / Compliance

1

2

3

3

4

4

5

5

5

5

5

5

2 Days

7 Days

Renewal / expiration periods

Purchase Requisition & Approval

8.3

Operational Delay

2

3

4

4

5

5

5

5

5

5

5

5

1 Day

5 Days

End-of-month ordering cycle

Supplier Relationship Management

8.4

Operational Risk

2

2

3

3

4

4

5

5

5

5

5

5

3 Days

10 Days

During active service windows

Inventory & Logistics Coordination

8.5

Service Delivery

3

4

5

5

5

5

5

5

5

5

5

5

1 Day

3 Days

Maintenance / project periods

Compliance & Procurement Governance

8.6

Regulatory Compliance

1

1

2

2

3

4

4

5

5

5

5

5

5 Days

14 Days

Audit or regulatory review

Risk Management in Supply Chain

8.7

Strategic / Operational Risk

1

2

3

3

4

4

4

5

5

5

5

5

3 Days

10 Days

Vendor disruption events

Emergency Procurement

8.8

Operational Continuity

3

4

5

5

5

5

5

5

5

5

5

5

4 Hr

1 Day

Crisis or urgent requirement

Procurement System & Data Management

8.9

Digital Operations / Data Access

3

4

5

5

5

5

5

5

5

5

5

5

1 Day

3 Days

System failure/downtime

Legend
  • Impact Scale (1–5):
    1 = Negligible
    2 = Minor
    3 = Moderate
    4 = Significant
    5 = Severe
  • RTO (Recovery Time Objective): The maximum acceptable downtime before recovery must occur to avoid a significant impact.
  • MTPD (Maximum Tolerable Period of Disruption): The maximum time a process can be disrupted before causing unacceptable impact.
  • Vulnerable Period: Timeframes during which disruptions have heightened risk due to business cycles or operational dependencies.

Summing Up ... for Part 3

The findings in this chapter provide a time-based perspective on the vulnerabilities and criticality of Bandtree’s operations.

The structured evaluation of each business function’s impact over time enables informed prioritisation of recovery efforts and resource planning during disruptions.

Key insights from this chapter—such as which functions must be restored within hours versus days—will inform the development of targeted recovery strategies in the next phase of the Business Continuity Management (BCM) process.

These insights also help ensure alignment with Bandtree’s Minimum Business Continuity Objectives (MBCOs) and support compliance with internal policies and external regulatory requirements.

Ultimately, understanding how impacts evolve strengthens Bandtree’s resilience posture and enhances its capacity to maintain service delivery, uphold stakeholder confidence, and recover effectively from any disruptive event.

.

BIA Questionnaires

Part 4: Supporting IT Systems and Applications

Notes for BCM Institute's Course Participants: This is the template for completing the "Part 4: Supporting IT Systems and Applications."

CBF-8: Procurement & Supply Chain Management

The effective functioning of CBF-8: Procurement & Supply Chain Management at Bandtree Brunei relies heavily on a suite of digital tools and applications that support procurement planning, vendor engagement, inventory tracking, contract governance, and risk mitigation.

Purpose of Chapter

This chapter identifies the critical IT systems and applications that underpin each sub-process of the procurement function, outlining their Recovery Point Objectives (RPO), System Recovery Time Objectives (System RTO), and dependencies on specialised equipment or resources.

Given the time-sensitive and high-value nature of procurement activities—particularly during emergencies or project deadlines—it is imperative to ensure high availability, swift recovery, and data integrity of supporting systems.

These applications enable seamless coordination between departments, vendors, and external regulatory stakeholders, ensuring operational continuity and compliance with organisational and national procurement standards.

Below is the requested table for CBF-8: Procurement & Supply Chain Management of Bandtree Brunei, detailing the IT systems and applications, Recovery Point Objective (RPO), System Recovery Time Objective (RTO), supporting special equipment and resources, and additional remarks for each sub-process.

Table 4: [BIA] [P4] Supporting IT Systems and Applications for CBF-8: Procurement & Supply Chain Management

 

Sub-Critical Business Function

Sub-CBF Code

IT Systems and Applications

RPO

System RTO

Supporting Special Equipment or Resources

Remarks

Vendor Selection & Prequalification

8.1

Vendor Evaluation Portal, Email

24 hrs

48 hrs

Secure internet access, evaluation templates

Requires updated vendor databases and scoring tools

Contract Management

8.2

Contract Lifecycle Management (CLM)

12 hrs

24 hrs

Secure document repository, e-signature devices

Legal templates and a renewal tracking system are critical

Purchase Requisition & Approval

8.3

ERP System (e.g. SAP/Oracle)

4 hrs

8 hrs

User access terminals, approval tokens

Delay affects the procurement cycle and inventory ordering

Supplier Relationship Management

8.4

Supplier Portal, CRM

24 hrs

48 hrs

Communication devices, contact database

Long-term service quality and response tracking depend on system access

Inventory & Logistics Coordination

8.5

Inventory Management System (IMS)

4 hrs

12 hrs

Barcode scanners, warehouse terminals

Physical asset visibility and dispatch coordination depend on real-time data

Compliance & Procurement Governance

8.6

Compliance Monitoring Tools

12 hrs

24 hrs

Audit support tools, policy reference systems

Necessary to meet audit and regulatory deadlines

Risk Management in Supply Chain

8.7

Risk Monitoring Dashboard, BI Tools

24 hrs

48 hrs

Risk tracking sheets, analytics infrastructure

Enables proactive vendor disruption mitigation

Emergency Procurement

8.8

ERP Emergency Module, Mobile Access

2 hrs

4 hrs

Mobile procurement devices, rapid approval access

Requires rapid activation for urgent needs (e.g. facility outages)

Procurement System & Data Management

8.9

Central Procurement System (e.g., SAP SRM)

1 hr

4 hrs

Cloud backup, DR-enabled servers

The core system for all procurement activities must be regularly backed up

Legend
  • RPO (Recovery Point Objective): Maximum acceptable data loss measured in time.
  • System RTO (Recovery Time Objective): Maximum acceptable downtime before system functionality must be restored.
  • Special Equipment/Resources: Tools, devices, or infrastructure necessary to support the system's operational continuity.

Summing Up ... for Part 4

The analysis of supporting IT systems and applications confirms that uninterrupted access to digital tools is critical to maintaining the integrity and efficiency of Bandtree’s procurement and supply chain operations.

Downtime or data loss in these systems could cause severe disruptions in inventory management, vendor coordination, compliance reporting, and emergency procurement response.

To mitigate these risks, Bandtree must maintain robust IT disaster recovery capabilities, including system redundancy, cloud backups, and clearly defined Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) for each core system.

This chapter serves as a key input for IT continuity planning, ensuring that procurement sub-CBFs are prioritised appropriately in the event of a disruption and can be recovered within tolerable timeframes to meet business and stakeholder expectations.

 

 

Implementing Business Continuity Management for Bandtree: A Practical Guide
eBook 3: Starting Your BCM Implementation
MBCO P&S RAR T1 RAR T2 RAR T3 BCS T1  CBF
CBF-8 Procurement & Supply Chain Management
DP BIAQ T1 BIAQ T2 BIAQ T3 BCS T2 BCS T3 PD


More Information About Business Continuity Management Courses

To learn more about the course and schedule, click the buttons below for the  BCM-300 Business Continuity Management Implementer [BCM-3] and the BCM-5000 Business Continuity Management Expert Implementer [BCM-5].

 

 


Please feel free to send us a note if you have any questions.