In addition to compiling the list of user access requirement…

In addition to compiling the list of user access requirements, applications, and systems, the business impact analysis (BIA) also includes processes that are __________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.