Byte correcting perfect codes are developed to correct burst errors within bytes. If a code is byte correcting code and we say that the code is [Formula: see text]-burst correcting, meaning that it corrects a single burst of length [Formula: see text] or less within a byte. A byte correcting code is such that if [Formula: see text]; [Formula: see text] denote the set of syndromes obtained from the [Formula: see text]th-byte of the parity check matrix [Formula: see text] and [Formula: see text]; [Formula: see text] denote the set of syndromes obtained from the [Formula: see text]th-byte of the parity check matrix [Formula: see text] then [Formula: see text]. In an [Formula: see text] code, if there are [Formula: see text] bytes of size [Formula: see text], then [Formula: see text]. Byte correcting codes are preferred where information stored in all bytes are equally important. But there are cases where some parts of the message are more important than other parts of the message, for example, if we have to transmit a message on a border location “ Shift Battalion (Bn) from Location A to Location B” then, we will focus more on the information shift, location [Formula: see text] and location [Formula: see text] i.e., bytes containing these information will be more important than others. In this situation, it is needed that during transmission these bytes should have no possibility of error. In other words, these bytes should be protected absolutely against any error. Keeping this in mind, we study burst error correcting capabilities of byte oriented codes in terms of byte protection level of each byte. If there is a byte error pattern of length [Formula: see text] in the transmission then all those bytes of the received pattern will be decoded correctly whose burst protection level is [Formula: see text] or more even though the code word may be decoded wrongly. Taking the code length [Formula: see text] to be divided into [Formula: see text] bytes with burst protection level of the [Formula: see text]th-byte as [Formula: see text]; [Formula: see text]; [Formula: see text], we construct linear codes that we call byte protecting burst (BPB) codes and investigate their byte protecting capabilities in this paper.