GROUP INFORMATION TECHNOLOGY DEPARTMENT
SERVICE CONTINUITY MANAGEMENT POLICY & PROCEDURES
" Disclaimer: AlBabtain Group management considers the information contained in this document to be of confidential by nature and is a proprietary to AlBabtain Group. The distribution of this document should be controlled and be made available only to persons authorized by the CIO. No content of this document shall be copied, deconstructed or reproduced, except with a prior written approval from the Group IT management."
1. Policy Purpose and Scope
  1. IT Service Continuity Management (ITSM) aims to manage risks that could seriously impact IT services. ITSCM ensures that IT can always provide minimum agreed service levels, by reducing the risk from disaster events to an acceptable level and planning for the recovery of IT services. ITSM is designed to support AlBabtain Group’s Business Continuity Management.
  2. The goal of the Service Continuity Management is a systematic process to prevent, predict and manage Information Technology disruption and incidents which have the potential to disrupt IT services and should result in a more resilient IT service capability aligned to the business requirements.
  3. The scope of Service Continuity Management is planning and preparing for any anticipated major disasters. To identify and eliminate or contain risks. Restore from major failures of technology and using methods to return to normal operations.
  4. Implementing and operating controls and measures for managing AlBabtain Group’s overall continuity risks.
  5. Monitoring and reviewing the performance and effectiveness of the business continuity management system.
  6. Continual improvement based on objective measurements.
2. Policy Statement
3. Procedures
4. Process
  1. BCM identifies potential threats to the organization and impacts to business operations.
  2. BCM tests and plans and documents each identified threats and impact scenarios.
  3. After the analysis phase, BCM will reflect the requirements to recover the business from the damage by using all resources and capabilities within or outside the organization.
5. Authorization Matrix
5.1 RACI Legend
R The person(s) who is/are RESPONSIBLE for the process
A The person(s) who is/are ACCOUNTABLE about the process
C The person(s) who is/are CONSULTED in the process
I The person(s) who is/are INFORMED about the process
5.2 Roles Legend
Roles Job Title/ Role Name
Role “1” Application Analyst / Technical Analyst / IT Operators
Role ”2” BCM Manager/ Business/Process Owner
5.3 RACI Chart
Procedure Role “1” Role “2”
Service Continuity Management
Develop and implement a business continuity service R A/R
BCM – Exercise, test and review A/R I/C/A
Maintain a Continuity Strategy R A/R
P.S. The mentioned “RACI chart “procedures are built on standard practice and can be changed upon business and technology environment. And/or IT new frameworks, new roles & responsibilities across IT resources and business owners demand.

This document is intended for the internal use of AlBabtain Group and its subsidiaries only. Unauthorized usage or possession of this document in any form is strictly prohibited. The recipient should ensure that this document is not de-constructed, reproduced or circulated without prior approval from the document owner.