Specific identified methods are applied in specific ways to
implement protection in the hope that, by uniformly applying these methods,
they will be effective. Examples include the use of checklists to verify
proper status during preflight, regularly performing backups to assure that
information is not inadvertently lost, and a standard method for dealing
with bomb threats made over the telephone.
Complexity: Developing and
implementing standard procedures is not difficult and can be greatly aided by
the use of standard procedure notebooks, checklists, and other similar
aides.
fc@red.a.net