{"id":54918,"date":"2026-04-03T11:48:47","date_gmt":"2026-04-03T11:48:47","guid":{"rendered":"https:\/\/certifeka-edu.com\/programs\/strategic-marketing-module-2\/lessons\/lesson-7-types-of-contingency-plans-3-2\/"},"modified":"2026-04-03T11:48:47","modified_gmt":"2026-04-03T11:48:47","slug":"lesson-7-types-of-contingency-plans-3-2","status":"publish","type":"lesson","link":"https:\/\/certifeka-edu.com\/ar\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/","title":{"rendered":"Lesson 7: Types of Contingency Plans"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"114\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png 96w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1-10x12.png 10w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1-42x50.png 42w\" sizes=\"auto, (max-width: 96px) 100vw, 96px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h2>Lesson 7: Contingency Planning<br \/>\n<\/h2>\n<h3>Types of Contingency Plans<br \/>\n<\/h3>\n<h5>When you run a business, risk comes with the territory and can occur in the form of accidents,<\/h5>\n<ul>\n<li>\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t\t\t\t\tNatural disasters,\n\t\t\t\t\t\t\t\t\t<\/li>\n<li>\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t\t\t\t\tFinancial risks,\n\t\t\t\t\t\t\t\t\t<\/li>\n<li>\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t\t\t\t\tIT attacks and more.\n\t\t\t\t\t\t\t\t\t<\/li>\n<\/ul>\n<h5>Be sure you are prepared by providing comprehensive contingency planning in your workplace.<\/h5>\n<h5>Contingency plans are utilized by corporations, governments, investors, and by central banks, such as the Fed.<\/h5>\n<h5>Contingencies can involve real estate transactions, commodities, investments, currency exchange rates, and geopolitical risks.<\/h5>\n<details id=\"e-n-accordion-item-4420\" open>\n<summary data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-4420\" >\n\t\t\t\t\t Protecting Assets<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">Contingencies might also include contingent assets, which are benefits (rather than losses) that accrue to a company or individual given the resolution of some uncertain event in the future.<\/h5>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">A favorable ruling in a lawsuit or an inheritance would be an example of contingent assets.<\/h5>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">Contingency plans might involve purchasing insurance policies that pay cash or a benefit if a particular contingency occurs.<\/h5>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">For example, property insurance might be purchased to protect against fire or wind damage.<\/h5>\n<\/details>\n<details id=\"e-n-accordion-item-4421\" >\n<summary data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-4421\" >\n\t\t\t\t\t Investment Positions<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<h5>Investors protect themselves from contingencies that could lead to financial losses related to investing.<\/h5>\n<h5>Investors might employ various hedging strategies such as stop-loss orders, which exit a position at a specific price level.<\/h5>\n<h5>Hedging can also involve using options strategies, which is akin to buying insurance whereby the strategies earn money as an investment position loses money from a negative event.<\/h5>\n<h5>The money earned from the options strategy completely or partially offsets the losses from the investment.<\/h5>\n<h5>However, these strategies come at a cost, usually in the form of a premium, which is an upfront cash payment.<\/h5>\n<h5>Investors also employ asset diversification, which is the process of investing in various different types of investments.<\/h5>\n<h5>Asset diversification helps to minimize risk if one asset class, such as stocks, declines in value.<\/h5>\n<\/details>\n<details id=\"e-n-accordion-item-4422\" >\n<summary data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-4422\" >\n\t\t\t\t\t Contingent Immunization<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<h5>Contingent immunization is a type of contingency plan used in fixed-income investing.<\/h5>\n<h5>It involves the fund manager switching to a defensive position if the portfolio drops below a predetermined value.<\/h5>\n<\/details>\n<details id=\"e-n-accordion-item-4423\" >\n<summary data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-4423\" >\n\t\t\t\t\t  Business Continuity and Recovery<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<h5>As part of a contingency plan for disasters, such as a pandemic, companies need to plan ahead to ensure that the business can operate during and after an event.<\/h5>\n<h5>This type of contingency plan is often called a business continuity plan (BCP) or a business recovery plan.<\/h5>\n<h5>A business continuity team is formed to plan for any possible contingencies and manage the continuity and recovery plan during a disruption.<\/h5>\n<h5>Businesses need to identify their critical business functions and perform an analysis of how an event might impact the company&#8217;s operations and processes.<\/h5>\n<h5>The contingency plan would include implementing the recovery of critical business functions such as systems, production, and employee access to technology such as computers.<\/h5>\n<h5>For example, a contingency plan for a pandemic would include developing a remote work strategy to help prevent the spread of disease and to provide employees with secure access to their work.<\/h5>\n<h5>As a result, companies would need to invest in technology, which could include providing laptops and video-conferencing access to employees, creating cloud-based data storage, and facilitating access to company-wide communications such as email and internal data.<\/h5>\n<p>\u00a0<br \/>\n\t\t\t\t\t<\/details>\n<details id=\"e-n-accordion-item-4424\" >\n<summary data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-4424\" >\n\t\t\t\t\t Cybersecurity<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<h5>With any type of disaster, cybercriminals often try to take advantage of a crisis to hack into a company&#8217;s systems and steal data or disrupt business operations.<\/h5>\n<h5>Contingency plans are used to outline the procedures for cybersecurity teams to protect an organization from threats and malicious attacks.<\/h5>\n<p>\u00a0<br \/>\n\t\t\t\t\t<\/details>\n<details id=\"e-n-accordion-item-4425\" >\n<summary data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-4425\" >\n\t\t\t\t\t Special Considerations<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<h5>A contingency plan should also prepare for the loss of intellectual property through theft or destruction.<\/h5>\n<h5>As a result, backups of critical files and computer programs, as well as key company patents, should be maintained in a secure off-site location.<\/h5>\n<h5>99Contingency plans 99 need to prepare for the possibility of operational mishaps, theft, and fraud.<\/h5>\n<h5>A company should have an emergency public relations response relating to possible events that have the ability to severely damage the company&#8217;s reputation and its ability to conduct business.<\/h5>\n<p>\u00a0<br \/>\n\t\t\t\t\t<\/details>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">Contingencies might also include contingent assets, which are benefits (rather than losses) that accrue to a company or individual given the resolution of some uncertain event in the future.<\/h5>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">A favorable ruling in a lawsuit or an inheritance would be an example of contingent assets.<\/h5>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">Contingency plans might involve purchasing insurance policies that pay cash or a benefit if a particular contingency occurs.<\/h5>\n<h5 tabindex=\"0\" data-element-id=\"ebookHeading4\" data-node-type=\"text\" data-magic=\"col-description\">For example, property insurance might be purchased to protect against fire or wind damage.<\/h5>\n<h5>Investors protect themselves from contingencies that could lead to financial losses related to investing.<\/h5>\n<h5>Investors might employ various hedging strategies such as stop-loss orders, which exit a position at a specific price level.<\/h5>\n<h5>Hedging can also involve using options strategies, which is akin to buying insurance whereby the strategies earn money as an investment position loses money from a negative event.<\/h5>\n<h5>The money earned from the options strategy completely or partially offsets the losses from the investment.<\/h5>\n<h5>However, these strategies come at a cost, usually in the form of a premium, which is an upfront cash payment.<\/h5>\n<h5>Investors also employ asset diversification, which is the process of investing in various different types of investments.<\/h5>\n<h5>Asset diversification helps to minimize risk if one asset class, such as stocks, declines in value.<\/h5>\n<h5>Contingent immunization is a type of contingency plan used in fixed-income investing.<\/h5>\n<h5>It involves the fund manager switching to a defensive position if the portfolio drops below a predetermined value.<\/h5>\n<h5>As part of a contingency plan for disasters, such as a pandemic, companies need to plan ahead to ensure that the business can operate during and after an event.<\/h5>\n<h5>This type of contingency plan is often called a business continuity plan (BCP) or a business recovery plan.<\/h5>\n<h5>A business continuity team is formed to plan for any possible contingencies and manage the continuity and recovery plan during a disruption.<\/h5>\n<h5>Businesses need to identify their critical business functions and perform an analysis of how an event might impact the company&#8217;s operations and processes.<\/h5>\n<h5>The contingency plan would include implementing the recovery of critical business functions such as systems, production, and employee access to technology such as computers.<\/h5>\n<h5>For example, a contingency plan for a pandemic would include developing a remote work strategy to help prevent the spread of disease and to provide employees with secure access to their work.<\/h5>\n<h5>As a result, companies would need to invest in technology, which could include providing laptops and video-conferencing access to employees, creating cloud-based data storage, and facilitating access to company-wide communications such as email and internal data.<\/h5>\n<p>\u00a0<\/p>\n<h5>With any type of disaster, cybercriminals often try to take advantage of a crisis to hack into a company&#8217;s systems and steal data or disrupt business operations.<\/h5>\n<h5>Contingency plans are used to outline the procedures for cybersecurity teams to protect an organization from threats and malicious attacks.<\/h5>\n<p>\u00a0<\/p>\n<h5>A contingency plan should also prepare for the loss of intellectual property through theft or destruction.<\/h5>\n<h5>As a result, backups of critical files and computer programs, as well as key company patents, should be maintained in a secure off-site location.<\/h5>\n<h5>99Contingency plans 99 need to prepare for the possibility of operational mishaps, theft, and fraud.<\/h5>\n<h5>A company should have an emergency public relations response relating to possible events that have the ability to severely damage the company&#8217;s reputation and its ability to conduct business.<\/h5>\n<p>\u00a0<\/p>\n<h5>How a company is reorganized after a negative event should be included in a contingency plan.<\/h5>\n<h5>It should have procedures outlining what needs to be done to return the company to normal operations and limit any further damage from the event.<\/h5>\n<h5>For example, financial services firm Cantor Fitzgerald was able to resume operation in just two days after being crippled by the 9\/11 terrorist attacks due to having a comprehensive contingency plan in place.<\/h5>","protected":false},"comment_status":"open","ping_status":"closed","template":"","class_list":["post-54918","lesson","type-lesson","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lesson 7: Types of Contingency Plans - Certifeka-edu<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/certifeka-edu.com\/ar\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lesson 7: Types of Contingency Plans - Certifeka-edu\" \/>\n<meta property=\"og:description\" content=\"Lesson 7: Contingency Planning Types of Contingency Plans When you run a business, risk comes with the territory and can occur in the form of accidents, Natural disasters, Financial risks, IT attacks and more. Be sure you are prepared by providing comprehensive contingency planning in your workplace. Contingency plans are utilized by corporations, governments, investors, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/certifeka-edu.com\/ar\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Certifeka-edu\" \/>\n<meta property=\"og:image\" content=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"webpage\"],\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/\",\"name\":\"Lesson 7: Types of Contingency Plans - Certifeka-edu\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/logos-png-01-296x57-1.png\",\"datePublished\":\"2026-04-03T11:48:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/logos-png-01-296x57-1.png\",\"contentUrl\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/logos-png-01-296x57-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/integrated-marketing-strategies-module-ucam-university\\\/lessons\\\/lesson-7-types-of-contingency-plans-3-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"home\",\"item\":\"https:\\\/\\\/certifeka-edu.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lessons\",\"item\":\"https:\\\/\\\/certifeka-edu.com\\\/lesson\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lesson 7: Types of Contingency Plans\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#website\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/\",\"name\":\"certifeka\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/certifeka-edu.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#organization\",\"name\":\"certifeka\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-certifeka-removebg-preview.png\",\"contentUrl\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-certifeka-removebg-preview.png\",\"width\":366,\"height\":104,\"caption\":\"certifeka\"},\"image\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lesson 7: Types of Contingency Plans - Certifeka-edu","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/certifeka-edu.com\/ar\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/","og_locale":"ar_AR","og_type":"article","og_title":"Lesson 7: Types of Contingency Plans - Certifeka-edu","og_description":"Lesson 7: Contingency Planning Types of Contingency Plans When you run a business, risk comes with the territory and can occur in the form of accidents, Natural disasters, Financial risks, IT attacks and more. Be sure you are prepared by providing comprehensive contingency planning in your workplace. Contingency plans are utilized by corporations, governments, investors, [&hellip;]","og_url":"https:\/\/certifeka-edu.com\/ar\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/","og_site_name":"Certifeka-edu","og_image":[{"url":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"6 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","webpage"],"@id":"https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/","url":"https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/","name":"Lesson 7: Types of Contingency Plans - Certifeka-edu","isPartOf":{"@id":"https:\/\/certifeka-edu.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/#primaryimage"},"image":{"@id":"https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/#primaryimage"},"thumbnailUrl":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png","datePublished":"2026-04-03T11:48:47+00:00","breadcrumb":{"@id":"https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/#primaryimage","url":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png","contentUrl":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/certifeka-edu.com\/programs\/integrated-marketing-strategies-module-ucam-university\/lessons\/lesson-7-types-of-contingency-plans-3-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"home","item":"https:\/\/certifeka-edu.com\/"},{"@type":"ListItem","position":2,"name":"Lessons","item":"https:\/\/certifeka-edu.com\/lesson\/"},{"@type":"ListItem","position":3,"name":"Lesson 7: Types of Contingency Plans"}]},{"@type":"WebSite","@id":"https:\/\/certifeka-edu.com\/#website","url":"https:\/\/certifeka-edu.com\/","name":"certifeka","description":"","publisher":{"@id":"https:\/\/certifeka-edu.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/certifeka-edu.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/certifeka-edu.com\/#organization","name":"certifeka","url":"https:\/\/certifeka-edu.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/certifeka-edu.com\/#\/schema\/logo\/image\/","url":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/03\/cropped-certifeka-removebg-preview.png","contentUrl":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/03\/cropped-certifeka-removebg-preview.png","width":366,"height":104,"caption":"certifeka"},"image":{"@id":"https:\/\/certifeka-edu.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/lesson\/54918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/lesson"}],"about":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/types\/lesson"}],"replies":[{"embeddable":true,"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/comments?post=54918"}],"version-history":[{"count":0,"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/lesson\/54918\/revisions"}],"wp:attachment":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/media?parent=54918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}