CBF-6 Client Information & Records Management
In a disaster scenario, the continued operation of SHINE Children and Youth Services (SHINE) relies heavily on the prompt restoration and maintenance of its critical business functions (CBFs).
For the business continuity of CBF-06 Client Information & Records Management, essential resources must be made available to preserve client records, maintain confidentiality, and ensure regulatory compliance.
The following table outlines the minimum resources required to recover key Sub-CBFs for this high-level function during a disaster.
Table S3: Minimum Resources Required During a Disaster for CBF-6
|
Sub-CBF Code |
Sub-CBF |
Recovery Location |
Minimum Resource Requirements per Function per Recovery Location |
No. of Staff (Min Qty) |
No. of Seats (Min Qty) |
No. of Tel (Min Qty) |
No of PC/Laptops (Min Qty) |
Others (Description & Min Qty) |
|
6.1 |
Client Information Collection |
Office, Remote |
Access to client intake systems, paper records, and forms |
2 |
2 |
2 |
2 |
Backup power supply (1), Access to client database (1) |
|
6.2 |
Client Records Maintenance |
Office, Remote |
Secure access to client records, database access, and the filing system |
2 |
2 |
2 |
2 |
Backup power supply (1), Access to cloud-based records (1) |
|
6.3 |
Confidentiality & Privacy |
Office, Remote |
Secure access to privacy protocols, confidentiality agreements |
1 |
1 |
1 |
1 |
Secure communication system (1) |
|
6.4 |
Document Management |
Office, Remote |
Access to a digital document management system, filing cabinets |
2 |
2 |
2 |
2 |
Backup power supply (1), Document scanners (1) |
|
6.5 |
Record Retrieval & Access Control |
Office, Remote |
Access to secure record retrieval systems |
2 |
2 |
2 |
2 |
Backup power supply (1), Access control system (1) |
|
6.6 |
Record Disposal |
Office, Remote |
Secure disposal mechanisms, access to shredders or digital erasure tools |
1 |
1 |
1 |
1 |
Secure disposal bins (1) |
|
6.7 |
Compliance Monitoring |
Office, Remote |
Access to compliance tracking systems and monitoring tools |
1 |
1 |
1 |
1 |
Compliance documentation (1) |
The effective restoration of CBF-06 Client Information & Records Management during a disaster requires a strategic allocation of resources to maintain critical operations, including client records management, confidentiality, document control, and compliance monitoring.
By ensuring these minimum resources are available at recovery locations, SHINE can continue to serve its clients while safeguarding sensitive information and complying with privacy regulations.
The outlined resources are essential to the continuity and efficiency of these functions, ensuring minimal disruption during crises.
More Information About Business Continuity Management Courses
To learn more about the course and schedule, click the buttons below for the BCM-300 Business Continuity Management Implementer [BCM-3] and the BCM-5000 Business Continuity Management Expert Implementer [BCM-5].



![Banner [BCM] [E3] [BCS] [T3] Minimum Resources Required during a Disaster](https://no-cache.hubspot.com/cta/default/3893111/8969ce47-38c2-4b89-88da-727979f12c39.png)


![Banner [Table] [BCM] [E3] [BCS] [T3] Minimum Resources Required during a Disaster](https://no-cache.hubspot.com/cta/default/3893111/7456e7dd-9e1f-4c07-a6f9-a39e58f74746.png)
![Banner [BCM] [E3] [BCS] [Summing Up] [T3] Minimum Resources Required during a Disaster](https://no-cache.hubspot.com/cta/default/3893111/6cebfa28-ed8a-49d6-8978-797c3a577f9e.png)
![[BCM] [SHINE] [E3] [BIA] MBCO Corporate MBCO](https://no-cache.hubspot.com/cta/default/3893111/8a4c1bad-b882-4431-9db9-564f8d734724.png)
![[BCM] [SHINE] [E3] [BIA] [PS] Key Product and Services](https://no-cache.hubspot.com/cta/default/3893111/5e23190b-1be3-4bd9-b9f4-ea90013c9628.png)
![[BCM] [SHINE] [E3] [RAR] [T1] List of Threats](https://no-cache.hubspot.com/cta/default/3893111/999fd75b-6269-41c1-b833-e44ec6e1be72.png)
![[BCM] [SHINE] [E3] [RAR] [T2] Treatment and Control](https://no-cache.hubspot.com/cta/default/3893111/08e6836a-0f79-4ea5-8059-07eaf1cf927c.png)
![[BCM] [SHINE] [E3] [RAR] [T3] Risk Impact and Likelihood Assessment](https://no-cache.hubspot.com/cta/default/3893111/dfeec650-fd4f-4916-b353-f6860d9e4393.png)
![[BCM] [SHINE] [E3] [BCS] [T1] Mitigation Strategies and Justification](https://no-cache.hubspot.com/cta/default/3893111/03fd32a8-7ffe-4c0b-9eef-a32cb67f2e61.png)
![[BCM] [SHINE] [E1] [C10] Identifying Critical Business Functions](https://no-cache.hubspot.com/cta/default/3893111/6fba5a23-5e02-4368-aa88-65a252d4edd7.png)
![[BCM] [SHINE] [E3] [BIA] [DP] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/f5b469c7-359b-48f9-983f-18f1b31c3cb1.png)
![[BCM] [SHINE] [E3] [BIA] [T1] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/441ad4cc-5ebd-49dd-88bb-d9f993b400f5.png)
![[BCM] [SHINE] [E3] [BIA] [T2] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/b2bf3ca3-2940-46b0-ac27-84bef79a8e79.png)
![[BCM] [SHINE] [E3] [BIA] [T3] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/16beb9b2-9321-4b46-86a7-dff19fd42eda.png)
![[BCM] [SHINE] [E3] [BCS] [T2] [CBF] [6] BCS Recovery Strategy](https://no-cache.hubspot.com/cta/default/3893111/16523ce7-0670-4dfe-b13a-e1138725d818.png)
![[BCM] [SHINE] [E3] [PD] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/11455df6-4620-446d-b4b7-8c9ee6a90210.png)


![Register [BL-B-3]*](https://no-cache.hubspot.com/cta/default/3893111/ac6cf073-4cdd-4541-91ed-889f731d5076.png)



![FAQ [BL-B-3]](https://no-cache.hubspot.com/cta/default/3893111/b3824ba1-7aa1-4eb6-bef8-94f57121c5ae.png)
![Email to Sales Team [BCM Institute]](https://no-cache.hubspot.com/cta/default/3893111/3c53daeb-2836-4843-b0e0-645baee2ab9e.png)





