<Li> The business requirements for recovery of the critical function, and / or </Li> <Li> The technical requirements for recovery of the critical function </Li> <P> After defining recovery requirements, each potential threat may require unique recovery steps . Common threats include: </P> <Ul> <Li> Epidemic </Li> <Li> Earthquake </Li> <Li> Fire </Li> <Li> Flood </Li> <Li> Cyber attack </Li> <Li> Sabotage (insider or external threat) </Li> <Li> Hurricane or other major storm </Li> <Li> Power outage </Li> <Li> Water outage (supply interruption, contamination) </Li> <Li> Telecomms outage </Li> <Li> IT outage </Li> <Li> Terrorism / Piracy </Li> <Li> War / civil disorder </Li> <Li> Theft (insider or external threat, vital information or material) </Li> <Li> Random failure of mission - critical systems </Li> <Li> Single point dependency </Li> </Ul>

Who is responsible for having bcp in place