ABSTRACT
The initial version of this chapter was written for the 1999 edition of the Handbook of Information
Security Management. Since then, Y2K has come and gone, E-commerce has seized the spotlight, and
Web-based technologies are the emerging solution for almost everything. The constant throughout these
occurrences is that no matter what the climate, fundamental business processes have changed little. And,
as always, the focus of any business impact assessment is to assess the time-critical priority of these
business processes. With these more recent realities in mind, this chapter has been updated and is now
offered for your consideration.