The effectiveness of a Business Continuity Management (BCM) plan is determined mainly by how well an organisation prepares for potential disruptions before they occur.
For SHINE Children and Youth Services, maintaining the integrity, confidentiality, and accessibility of client information and records is essential for providing uninterrupted services to vulnerable populations.
As such, proactive readiness steps are critical to ensuring the organisation is well equipped to respond to unforeseen crises—whether caused by natural disasters, IT failures, data breaches, or other emergencies.
This chapter focuses on the Pre-Crisis phase of business continuity for the critical business function CBF-6 Client Information & Records Management, outlining the essential proactive measures SHINE must take to ensure readiness.
From establishing comprehensive records management policies to conducting regular risk assessments, these steps lay the foundation for a robust recovery strategy.
By building resilience into everyday operations, SHINE can reduce the impact of disruptions and maintain continuous service delivery to its clients.
The Sub-CBF Code and Sub-Critical Business Functions for CBF-06 Client Information & Records Management:
- CBF-6.1 Client Information Collection
- CBF-6.2 Client Records Maintenance
- CBF-6.3 Confidentiality & Privacy
- CBF-6.4 Document Management
- CBF-6.5 Record Retrieval & Access Control
- CBF-6.6 Record Disposal
- CBF-6.7 Compliance Monitoring
WHAT
CBF-06 Client Information & Records Management is a vital function that ensures SHINE Children and Youth Services can maintain accurate, confidential, and compliant records of clients' personal information and case history.
This function includes processes such as client data collection, record maintenance, secure document management, and disposal of outdated or unnecessary records.
Ensuring these records are available, secure, and compliant is crucial for effective service delivery and legal compliance.
This function supports the continuity of client service provision, facilitating critical operations such as case management, monitoring, and reporting.
In times of disruption, maintaining the integrity and accessibility of client information becomes even more important to avoid service interruptions and to comply with regulatory requirements.
The Pre-Crisis phase focuses on proactive measures to ensure SHINE Children and Youth Services is fully prepared for any potential disruption.
By planning, training staff, testing systems, and establishing clear policies, SHINE can minimise the impact of a crisis on its Client Information & Records Management functions.
HOW – Implementation Steps
These proactive steps are designed to build resilience and ensure the organisation can respond swiftly and effectively in the event of a disruption.
Establish a Comprehensive Records Management Policy
- Develop Clear Guidelines for Record Creation and Maintenance:
- WHAT to Establish:
- Create detailed guidelines for the creation, collection, maintenance, and updating of client records, ensuring accurate, consistent data capture across departments.
- HOW to Establish:
- Work with legal and compliance teams to align the policy with data protection laws (e.g., the PDPA) and internal standards. Include best practices for client data storage, confidentiality, and the management of electronic and physical records.
- Define clear roles and responsibilities for staff in maintaining and updating client records, with detailed procedures for reporting, filing, and retrieving records.
- Outcome:
- Ensure SHINE maintains a consistent, legally compliant approach to client records management to reduce the risk of data loss or mishandling.
- WHAT to Establish:
- Include Data Retention and Disposal Protocols:
- WHAT to Define:
- Develop and implement clear guidelines for data retention and disposal, ensuring records are kept only as long as necessary and securely disposed of when no longer needed.
- HOW to Define:
- Create schedules for how long different types of records should be retained, based on regulatory requirements and operational needs.
- Establish procedures for securely destroying sensitive records, such as shredding physical documents or wiping electronic files, in accordance with compliance standards.
- Outcome:
- Safeguard against unauthorised access to outdated or irrelevant client data and ensure that SHINE complies with data protection and privacy regulations.
- WHAT to Define:
Conduct Staff Training and Awareness
- Train Staff on Business Continuity and Data Security:
- WHAT to Train:
- Train all relevant staff on business continuity procedures, emphasising their roles during a disruption. This includes maintaining the confidentiality and integrity of client data.
- HOW to Train:
- Develop training programs that include disaster recovery procedures, data protection practices, and the specific steps to follow during a crisis.
- Include simulations and role-playing exercises to ensure staff can effectively carry out their responsibilities during an actual crisis.
- Outcome:
- Build a workforce that is knowledgeable, responsive, and confident in managing client records during times of crisis, ensuring smoother and faster recovery.
- Increase Awareness of Legal and Compliance Requirements:
- WHAT to Increase Awareness of:
- Ensure all staff understand the regulatory and legal requirements governing client records, particularly confidentiality, privacy, and data retention and disposal.
- WHAT to Increase Awareness of:
- HOW to Increase Awareness:
- Conduct regular workshops or seminars on legal requirements (such as PDPA) and internal policies for managing client data. Incorporate real-world examples of data breaches and how to avoid them.
- Outcome:
- Empower staff to handle client records in compliance with legal standards, ensuring the organisation maintains its reputation and avoids costly legal ramifications.
- WHAT to Train:
3. Implement Redundant Systems and Backup Solutions
- Ensure Redundancy for Critical Systems:
- WHAT to Ensure:
- Implement redundant systems for storing, backing up, and accessing client records. This ensures that if one system fails, an alternative is available to keep operations running.
- HOW to Ensure:
- Use both cloud-based and physical storage solutions to back up client records. Ensure that the backup systems are regularly tested to verify data integrity and accessibility.
- Implement a robust backup schedule that includes full system backups, incremental backups, and daily snapshots to minimise data loss in the event of a disaster.
- Outcome:
- Guarantee that critical records are protected and can be accessed even if primary systems fail, reducing the risk of extended service interruptions.
- WHAT to Ensure:
- Test Redundancy Systems Regularly:
- WHAT to Test:
- Regularly test the backup and redundancy systems to ensure they function correctly and that data can be easily restored from backups if needed.
- HOW to Test:
- Conduct quarterly tests of backup systems, including full restoration drills, to simulate disaster recovery. Test both physical and cloud-based backups to ensure their reliability and ease of access.
- Outcome:
- Identify and remediate potential weaknesses in backup systems, ensuring recovery processes are seamless and effective during a crisis.
- WHAT to Test:
4. Develop a Crisis Communication Plan
- Create Internal Communication Protocols:
- WHAT to Create:
- Develop clear communication protocols for informing internal stakeholders, including staff and leadership, during and after a disruption.
- HOW to Create:
- Establish an internal communication chain with clearly defined roles and responsibilities. Create pre-drafted communication templates for use in different crisis scenarios (e.g., system outage, data breach).
- Implement secure communication platforms (such as encrypted email or messaging apps) to maintain confidentiality during a crisis.
- Outcome:
- Ensure that all employees receive timely, accurate, and consistent information during a disruption, reducing confusion and enhancing coordination.
- WHAT to Create:
- Create External Communication Protocols for Clients:
- WHAT to Create:
- Develop communication strategies for informing clients about disruptions affecting their data or services.
- HOW to Create:
- Prepare templates for client-facing communications that explain the nature of the disruption, outline the steps taken to secure their data, and provide a recovery timeline.
- Ensure that alternative communication channels (such as a temporary helpline or dedicated website) are available to clients during a crisis.
- Outcome:
- Maintain client trust and confidence by providing clear, transparent, and timely updates during a disruption.
- WHAT to Create:
5. Review Legal and Compliance Requirements
- Conduct Regular Compliance Audits:
- WHAT to Review:
- Regularly review internal processes and policies to ensure compliance with applicable data protection laws (e.g., PDPA) and other regulatory requirements.
- HOW to Review:
- Schedule annual or semiannual audits of client records management systems to verify compliance with privacy regulations. Engage legal and compliance professionals to identify any potential risks.
- Outcome:
- Identify compliance gaps and address them proactively to avoid penalties, data breaches, or reputational damage.
- WHAT to Review:
- Establish Legal Contingency Plans:
- WHAT to Establish:
- Create contingency plans to address legal ramifications during a crisis, such as a data breach or a regulatory investigation.
- HOW to Establish:
- Consult with legal experts to define the steps to take if legal issues arise during a disruption. This may include notifying authorities, informing affected clients, or implementing corrective actions.
- Outcome:
- Mitigate legal risks by having a structured approach to handling compliance issues during a crisis, ensuring that SHINE remains in good legal standing.
- WHAT to Establish:
6. Conduct Regular Risk Assessments
- Assess Vulnerabilities in Client Information Systems:
- WHAT to Assess:
- Regularly assess the risks associated with client information systems, including IT infrastructure, physical records storage, and the potential for security breaches.
- HOW to Assess:
- Perform regular risk assessments and vulnerability scans to identify potential weaknesses in systems. Engage with cybersecurity experts to conduct penetration testing and threat simulations.
- Outcome:
- Identify and remediate potential threats before they affect operations, ensuring the integrity and security of client records.
- WHAT to Assess:
- Evaluate Disaster Scenarios and Recovery Readiness:
- WHAT to Evaluate:
- Assess various disaster scenarios (e.g., IT system failures, data breaches, natural disasters) and how prepared SHINE is to respond.
- HOW to Evaluate:
- Conduct annual business continuity tests, including simulations of different disaster scenarios. Review past crisis responses to identify opportunities for improvement.
- Outcome:
- Continuously improve the organisation's preparedness and response capabilities to ensure a rapid, effective recovery in the event of a crisis.
- WHAT to Evaluate:
The Pre-Crisis – Proactive Readiness Steps ensure that SHINE Children and Youth Services is well-prepared to respond to any disruption that may affect client information and records management.
By establishing comprehensive policies, training staff, testing systems, and reviewing compliance requirements, SHINE can build resilience into its operations.
These proactive steps help mitigate risks, reduce recovery times, and safeguard both client data and organisational integrity during crises.
The Within T+24 Hours (RESUMPTION) phase is critical for ensuring that SHINE Children and Youth Services can resume essential operations as quickly as possible after a disruption.
The key objective during this phase is to minimise downtime and restore critical Client Information & Records Management services, including data accessibility, confidentiality, and continuity of care.
These steps focus on immediate actions to stabilise the situation and resume essential functions within the first 24 hours following a disruption.
1. Assess the Situation
- Initial Impact Assessment:
- WHAT to Assess:
- Immediately assess the scope of the disruption, including which systems or processes were affected (e.g., IT systems, client record access, physical records storage).
- Identify the severity of the incident (e.g., data breach, IT failure, or physical damage to records).
- HOW to Assess:
- Conduct an initial team meeting with key stakeholders, including the IT team, records management staff, and leadership, to gather information about the disruption's impact.
- Prioritise impacted areas, such as high-risk client data, systems critical to ongoing case management, and potential legal or compliance risks.
- Outcome:
- Understand the extent of the disruption, potential risks to data security or confidentiality, and the immediate needs to resume critical operations.
- WHAT to Assess:
2. Activate Contingency Plans
- Implementation of Recovery Procedures:
- WHAT to Activate:
- Activate the Business Continuity and Disaster Recovery Plan (BCDRP) for CBF-06 Client Information & Records Management.
- This includes the specific steps outlined for resuming client data collection, record management, and privacy safeguards.
- HOW to Activate:
- Follow the established incident response protocols and begin implementing recovery strategies for each sub-CBF (CBF-6.1 to CBF-6.7).
- This includes accessing backup systems or shifting to manual processes as necessary.
- If IT systems are down, switch to offline or manual procedures for client data entry and processing.
- Utilise physical record systems if digital records cannot be accessed.
- Outcome:
- Establish immediate measures to keep essential client services functioning, even if full recovery isn’t yet possible. Temporary solutions (e.g., paper-based documentation) may be employed until systems are restored.
- WHAT to Activate:
3. Secure and Isolate Affected Systems
- Prevent Further Data Loss or Breach:
- WHAT to Secure:
- Identify and secure any compromised systems to prevent further data loss or breach of client records. This includes isolating affected systems or networks to limit the spread of disruption.
- HOW to Secure:
- If a data breach has occurred, immediately disconnect affected systems from the network to contain the breach. This includes servers, databases, or client portals that may have been impacted.
- Ensure that all access points to sensitive records are restricted until the system is fully recovered (e.g., temporarily disabling user access or limiting access to key personnel only).
- Implement emergency data protection measures such as additional encryption, password changes, or multi-factor authentication to mitigate risks during recovery.
- Outcome:
- Limit the scope of damage or loss to the affected systems to ensure client data security is not further compromised.
- WHAT to Secure:
4. Begin Record Retrieval
- Accessing Backups and Archives:
- WHAT to Retrieve:
- Immediately access backup data to restore client records and key documentation. If digital systems are offline, begin retrieving physical records stored in secure locations.
- HOW to Retrieve:
- Begin restoring critical client records from backup systems, including cloud storage, external drives, and secondary servers. Ensure that the restoration process is consistent with data integrity and security protocols.
- For manual operations, retrieve physical files from designated secure storage locations and prepare them for review or manual case management.
- If records were partially or fully compromised, consult with IT or external experts to restore clean copies of data from unaffected backups.
- Outcome:
- Ensure that all necessary client records are accessible to staff for ongoing case management. This may include creating temporary access logs for manual systems until full digital access is restored.
- WHAT to Retrieve:
5. Communicate with Stakeholders
- Internal Communication:
- WHAT to Communicate:
- Provide clear instructions to internal teams, including case managers, administrative staff, and IT personnel, on the current status of recovery efforts and next steps.
- HOW to Communicate:
- Use internal communication channels (e.g., email, messaging platforms, or intranet) to keep staff informed about recovery progress. Share real-time updates about which systems are online, what steps are being taken to restore access, and what actions staff should take.
- If physical records are being used temporarily, communicate this to all relevant personnel to avoid confusion and ensure consistent documentation practices.
- Outcome:
- Maintain transparency and clarity within the organisation to avoid miscommunication. Ensure all staff understand the recovery status and their roles during the resumption period.
- WHAT to Communicate:
- Client Communication:
- WHAT to Communicate:
- Notify clients that there has been a disruption to services, explain the nature of the issue (in simple, non-technical language), and provide a timeline for when services will return to normal.
- HOW to Communicate:
- Prepare communication templates (e.g., email, SMS, or phone call scripts) that can be quickly customised and sent to clients. Provide them with alternative means to reach support services, such as a temporary hotline or access to urgent services via a different platform.
- If client data was compromised or affected, assure them that recovery efforts are underway and share the steps being taken to secure their information.
- Outcome:
- Manage client expectations by keeping them informed of the situation and reassuring them that their records are being managed with the utmost care and security during the disruption.
- WHAT to Communicate:
6. Begin the Restoration of Non-Critical Operations
- Short-Term Service Delivery:
- WHAT to Restore:
- Begin restoring non-critical operations that depend on client records, such as non-urgent case management tasks, administrative processes, and internal reporting.
- HOW to Restore:
- Prioritise less time-sensitive functions to ensure smooth resumption of work. This may include organising and categorising restored client records or performing routine administrative tasks that do not require full system access.
- Ensure that any non-critical client interactions are resumed, including follow-up calls, assessments, and documentation processing that were delayed by the disruption.
- Outcome:
- Enable the organisation to continue as many of its day-to-day operations as possible, even as more critical services are still being restored.
- WHAT to Restore:
The Within T+24 Hours – RESUMPTION phase is designed to stabilise operations quickly after a disruption.
By assessing the impact, activating recovery plans, securing affected systems, retrieving client records, and communicating effectively with internal stakeholders and clients, SHINE Children and Youth Services can minimise operational downtime and resume essential services.
These immediate recovery actions lay the foundation for the more comprehensive recovery processes in subsequent stages, ensuring that client information and records management operations return to full functionality as soon as possible.
The recovery process after the first 24 hours of disruption focuses on restoring full functionality to the Client Information & Records Management function, ensuring the integrity of client data, and returning to normal operations.
The following steps outline the key actions to be taken:
1. Full System Restoration
- Restoration of IT Systems:
- Ensure that all affected IT systems, including databases, document management platforms, and record storage systems, are fully restored. This may involve restoring from backups or rebuilding systems if necessary.
- Confirm that all restoration processes are successful, and no data corruption or integrity issues have occurred during the process.
- If necessary, consult with IT vendors or external experts to support the recovery of specialised systems or platforms used for client records management.
- Test Data Integrity:
- After restoring the systems, conduct a thorough check of all client records to verify that no data loss or corruption has occurred during the recovery process. This includes reviewing the accuracy, completeness, and format of the restored data.
- Test the functionality of client record systems to ensure they are fully operational. This includes testing search features, record retrieval systems, and access controls.
- Reintegration of Systems:
- Reinstate any integrations with external systems, such as case management software, regulatory compliance tools, or other internal systems that rely on client records.
- Ensure these integrations function as expected.
2. Document Management and Verification
- Verification of Restored Records:
- Review and verify that all client records are restored accurately. This includes verifying the completeness and accuracy of physical and digital documents.
- Perform random audits of restored records to verify they match the original versions, with close attention to key fields such as personal details, case histories, and service delivery notes.
- Ensure that no records are missing or misplaced during the recovery process.
- Reconciliation of Physical and Digital Records:
- If physical records were used during the downtime (e.g., temporary manual handling), reconcile them with the digital records upon system restoration.
- Convert any manually maintained records back into the digital systems as needed and ensure that they are categorised and stored correctly in line with the client records management policy.
- Confidentiality and Privacy Checks:
- Review client records to confirm that no confidentiality or privacy breaches occurred during the downtime or recovery process.
- Implement additional security controls, such as encryption or access controls, as needed to reinforce data protection.
3. Return to Normal Operations
- Resumption of Full Service:
- Once the system has been restored and verified, resume regular service delivery, including all client-facing functions such as case management, assessment, and support services.
- Reactivate internal workflows that rely on client records, such as intake processes, client tracking, reporting, and follow-up.
- Client Communication and Support:
- Communicate with clients to confirm that normal operations have resumed and that their records are secure. This can be done via email, phone, or an online portal.
- If the disruption caused delays or affected service delivery, provide clients with updated timelines and offer compensation or alternative solutions where applicable.
- Staff Communication and Training:
- Notify all relevant staff that the recovery process is complete and that normal procedures can resume.
- Conduct any necessary retraining or refresher training on the updated processes and any changes made during the recovery period.
- Support staff by providing clear guidance and updates on changes during the recovery, such as new data-handling practices or updated IT systems.
4. Continuous Monitoring and Post-Recovery Support
- Ongoing Monitoring of IT Systems:
- Implement enhanced monitoring of all IT systems for at least 30 days after recovery to identify any issues arising from the restoration process.
- Use automated tools and manual audits to detect system vulnerabilities, missing data, or discrepancies in client records.
- Monitor backup system performance and ensure it functions as expected to avoid future disruptions.
- Client Records Access Control:
- Review and update access controls to ensure that only authorised personnel can access client records. This includes confirming the proper functioning of multi-factor authentication, role-based access, and password policies.
- If access restrictions were altered during the downtime, verify that these changes align with organisational security protocols.
- Reinforce Data Security Measures:
- Reevaluate and strengthen data security protocols, such as encryption, access logs, and intrusion detection systems. If vulnerabilities were identified during the recovery process, take immediate action to address them.
- Ensure that physical records are securely stored and that only authorised personnel have access to sensitive data. This may involve revising physical security measures, such as lock systems or access monitoring for file storage areas.
5. Debrief and Review
- Conduct Post-Recovery Analysis:
- Conduct a detailed debriefing session with the business continuity team, IT staff, and key stakeholders to assess the recovery process. Document lessons learned and identify any gaps or weaknesses in the recovery procedures.
- Update the business continuity plan based on insights gained from the recovery effort to improve future responses to disruptions.
- Review and Update the Recovery Plan:
- Based on the debrief, review the existing business continuity and disaster recovery plans.
- Identify areas for improvement and revise plans to incorporate best practices and new technologies.
- Ensure that any changes made during the recovery process (e.g., updated software, new backup solutions, improved security measures) are reflected in the revised business continuity strategy.
- Report to Senior Management:
- Provide a final recovery report to senior management, outlining the steps taken during recovery, the effectiveness of the response, and any ongoing issues that need attention.
- Include recommendations for future disaster preparedness, such as additional training, resource allocation, or technology investments.
6. Continuous Improvement and Testing
- Regular Testing of Systems:
- Implement regular testing of the recovery systems to ensure they remain effective. This may include simulation exercises, such as disaster recovery drills, to test staff and IT system preparedness.
- Conduct mock recovery tests at least once a year or after any significant change to the IT infrastructure, policies, or staffing.
- Engage in Ongoing Training and Awareness Programs:
- Periodically refresh staff training on recovery procedures, mainly focusing on data security and record management protocols.
- Ensure that all staff are aware of the latest changes in recovery procedures and understand their roles in the event of future disruptions.
The recovery process for CBF-06 Client Information & Records Management aims to fully restore all critical client data and maintain operational continuity after a disruption.
By executing these detailed recovery steps, SHINE Children and Youth Services ensures that client records are secure, accessible, and compliant, enabling the organisation to resume essential services to clients as quickly as possible.
Continuous monitoring, staff engagement, and improvements to the recovery plan help to minimise the impact of future disruptions and strengthen overall business resilience.
In a rapidly changing, often unpredictable environment, SHINE Children and Youth Services' ability to maintain the continuity of critical functions, such as Client Information & Records Management, hinges on proactive preparedness.
The Pre-Crisis steps outlined in this chapter ensure that the organisation is not only ready to respond quickly but also capable of minimising the impact of a crisis on client data and services.
By establishing clear policies, training staff, implementing redundant systems, and regularly reviewing legal and compliance requirements, SHINE can maintain client trust and safety, even during disruptions.
The foundation of a successful business continuity plan lies in anticipation and preparation.
By continually refining these proactive readiness steps, SHINE will adapt to evolving challenges and ensure the continued success of its mission to serve at-risk youth and their families.
More Information About Business Continuity Management Courses
To learn more about the course and schedule, click the buttons below for the BCM-300 Business Continuity Management Implementer [BCM-3] and the BCM-5000 Business Continuity Management Expert Implementer [BCM-5].



![Banner [BCM] [E3] [PD] Guidance Notes for Drafting BCM Procedures](https://no-cache.hubspot.com/cta/default/3893111/a46c7034-99d4-4c99-b9b9-61c35d4b8fc7.png)


![Banner [Table] [BCM] [E3] [PD] [S] [1] Description of CBF](https://no-cache.hubspot.com/cta/default/3893111/e7553068-2cd7-4914-aa3b-1c315fd97d50.png)
![Banner [Table] [BCM] [E3] [PD] [S] [2] Pre-Crisis](https://no-cache.hubspot.com/cta/default/3893111/2f20f3bc-f4df-4134-99f3-54d856c34c74.png)
![Banner [BCM] [E3] [PD] [S] [2] [Summary] Pre-Crisis](https://no-cache.hubspot.com/cta/default/3893111/e3ab44a7-a75c-433b-8379-a9e15906addc.png)
![Banner [Table] [BCM] [E3] [PD] [S] [3] Within T-24 Hours](https://no-cache.hubspot.com/cta/default/3893111/b3652ad3-c061-4ae6-8a2d-d0c37fe56bfd.png)
![Banner [BCM] [E3] [PD] [S] [3] [Summary] Within T-24 Hours](https://no-cache.hubspot.com/cta/default/3893111/78fdc219-2d41-440a-b923-fe57df85766d.png)
![Banner [Table] [BCM] [E3] [PD] [S] [4] After T-24 Hours](https://no-cache.hubspot.com/cta/default/3893111/3cedc822-1826-430d-a715-f6336a4c1f08.png)

![Banner [BCM] [E3] [PD] [S] [1] [Summary] Critical Business Function](https://no-cache.hubspot.com/cta/default/3893111/d47660f7-04d1-475c-b195-f350bb9230c9.png)
![[BCM] [SHINE] [E3] [BIA] MBCO Corporate MBCO](https://no-cache.hubspot.com/cta/default/3893111/8a4c1bad-b882-4431-9db9-564f8d734724.png)
![[BCM] [SHINE] [E3] [BIA] [PS] Key Product and Services](https://no-cache.hubspot.com/cta/default/3893111/5e23190b-1be3-4bd9-b9f4-ea90013c9628.png)
![[BCM] [SHINE] [E3] [RAR] [T1] List of Threats](https://no-cache.hubspot.com/cta/default/3893111/999fd75b-6269-41c1-b833-e44ec6e1be72.png)
![[BCM] [SHINE] [E3] [RAR] [T2] Treatment and Control](https://no-cache.hubspot.com/cta/default/3893111/08e6836a-0f79-4ea5-8059-07eaf1cf927c.png)
![[BCM] [SHINE] [E3] [RAR] [T3] Risk Impact and Likelihood Assessment](https://no-cache.hubspot.com/cta/default/3893111/dfeec650-fd4f-4916-b353-f6860d9e4393.png)
![[BCM] [SHINE] [E3] [BCS] [T1] Mitigation Strategies and Justification](https://no-cache.hubspot.com/cta/default/3893111/03fd32a8-7ffe-4c0b-9eef-a32cb67f2e61.png)
![[BCM] [SHINE] [E1] [C10] Identifying Critical Business Functions](https://no-cache.hubspot.com/cta/default/3893111/6fba5a23-5e02-4368-aa88-65a252d4edd7.png)
![[BCM] [SHINE] [E3] [BIA] [DP] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/f5b469c7-359b-48f9-983f-18f1b31c3cb1.png)
![[BCM] [SHINE] [E3] [BIA] [T1] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/441ad4cc-5ebd-49dd-88bb-d9f993b400f5.png)
![[BCM] [SHINE] [E3] [BIA] [T2] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/b2bf3ca3-2940-46b0-ac27-84bef79a8e79.png)
![[BCM] [SHINE] [E3] [BIA] [T3] [CBF] [6] Client Information & Records Management](https://no-cache.hubspot.com/cta/default/3893111/16beb9b2-9321-4b46-86a7-dff19fd42eda.png)
![[BCM] [SHINE] [E3] [BCS] [T2] [CBF] [6] BCS Recovery Strategy](https://no-cache.hubspot.com/cta/default/3893111/16523ce7-0670-4dfe-b13a-e1138725d818.png)
![[BCM] [SHINE] [E3] [BCS] [T3] [CBF] [6] Minimum Resources Required during a Disaster](https://no-cache.hubspot.com/cta/default/3893111/dd4907bc-bb88-474a-bccd-befe9a4a1e41.png)


![Register [BL-B-3]*](https://no-cache.hubspot.com/cta/default/3893111/ac6cf073-4cdd-4541-91ed-889f731d5076.png)



![FAQ [BL-B-3]](https://no-cache.hubspot.com/cta/default/3893111/b3824ba1-7aa1-4eb6-bef8-94f57121c5ae.png)
![Email to Sales Team [BCM Institute]](https://no-cache.hubspot.com/cta/default/3893111/3c53daeb-2836-4843-b0e0-645baee2ab9e.png)





