BSI issues new standard to assist business continuity

The British Standards Institution (BSI) has released a new standard to help firms with business continuity.

This Article Covers


The British Standards Institution (BSI) has released a new standard to help firms with business continuity.

The Publicly Available Specification (PAS) 77:2006 standard explains the principles and some recommended techniques for IT Service Continuity Management (ITSCM).

PAS 77:2006 has been developed in partnership with Adam Continuity, Dell Corporation, Unisys and SunGard, and is designed for organisations of all sizes, whether in the private or public sector.

The new code of practice is intended for use by anyone responsible for implementing, delivering and managing IT Service Continuity within an organisation.

BSI said an effective IT service continuity management (ITSCM) system safeguards the performance of IT services both before and after an incident.

BSI said, “By investigating, developing and implementing preventative and recovery options beforehand, organisations with an ITSCM system in place are well prepared and equipped to minimise and manage the event of an IT Service failure that could threaten business continuity.”

PAS 77:2006 complements other existing and international continuity standards such as PAS 56, BS ISO/IEC 20000, BS ISO/IEC 17799 and ISO 9001 and does not replace or supersede them.

The new standard is available to buy in paperback for £49, or it can be downloaded from the BSI website at




Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT outsourcing

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...