Resource Ordering and Status System. User Business Resumption Plan
|
|
|
- Egbert Bruce
- 10 years ago
- Views:
Transcription
1 Resource Ordering and Status System User Business Resumption Plan
2 I. INTRODUCTION This document is the disaster preparedness and recovery plan for users of the Resource Ordering and Statusing System (ROSS). The purpose of the plan is to aid users in the event they are unable to connect to the ROSS server. The goal is to determine the cause of the disruption and to restore dispatch operations and communications with in ROSS as quickly as possible. The disaster recovery plan explains procedures and resources available to assist in preventing the loss of or rapidly reconstructing records or communications. The plan also includes a table of trouble shooting methods should you be unable to access ROSS. Additional information is provided in the appendices of this document and supporting documents containing additional hardware and software are located on the ROSS web site at What is a Disaster? A disaster is a sudden unexpected event that prevents a user from accessing the ROSS servers. Examples of events include power or phone line outages, disruption to the local area network (LAN), or evacuation of a dispatch office. II. User Responsibility The user s responsibilities in carrying out this plan include: Enhancing this plan to reflect local conditions Identify appropriate methods of recovery and the equipment/locations to execute the plan. Identify personnel to carry out the plan. Brief all dispatchers on the location and contents of the plan. Implement the plan. Test the plan. This document is in MS word format to facilitate users personalizing the document and storing as both hard and soft copy. Every dispatcher in the office should have been briefed on and know the location of the plan. III. Pro Active Mitigation ROSS is a mission critical software program used by the dispatch community. Many potential problems can be mitigated by communicating the needs for uninterrupted access to ROSS to the local IRM staff. There are a variety of agency specific issues such as firewalls and ports that IRM staffs manage. Users should pre arrange after hour support with the IRM staff so they are available if needed.
3 IV. TROUBLE SHOOTING The first step in disaster recovery is trouble shooting the issue of access to the ROSS system. The primary goal is to determine source of the problem and what steps are needed to resolve the issue. There are several reasons that could prevent access to ROSS. Your local area network may be down. Fire walls may be preventing you from accessing ROSS. Ports may need to be opened before you can access ROSS. ROSS itself may be down for maintenance or having issues. See appendix A for trouble shooting steps. V. BACKUP PLANS The key to a disaster recovery is a backup plan. To facilitate backup plans, users must communicate their plan to their computer support staff and other involved offices. In instances where the ROSS system may not available for technical reasons, there are several options to ensure data is recorded until system recovery is complete and data is synchronized to the point of the event. A. Interagency computers This plan assumes the problem is with a specific agencies network. Users would log on to another agencies computer to access ROSS with their normal user name and password. Major component; Users must have authority to log onto another agency computers. B. Off site computer facilities This plan enables a user to move to a pre-established location and continue in ROSS relatively uninterrupted. This works best if there is a standing agreement with n office or vender for use of computers on short notice. Examples of offsite computer facilities are the libraries, colleges and computer software training companies. Major component: The ability to procure facilities services quickly. When determining suitable sites, see the ROSS hard ware and software requirements. C. Agreement with neighboring units This requires a pre identified agreement with a dispatch unit to conduct your business in ROSS should you be unable to access the server. It ensures uninterrupted data flow in the system. When the issue is resolved, your office would resume the dispatch authority with little or no catch up time. Major component: Someone at the designated alternate dispatch should be set up with a user account and roles in your dispatch office s ROSS account. This enables them the pre-identified authority to take over the dispatch duties of your office should there be a need. D. Paper system The least desirable plan and should only be used if the ROSS server is not available by any method. This option requires users enter data on the card stock resource order form and then enter the data in to the system after the issue is resolved.
4 Appendix A ROSS Trouble Shooting Determining who to call when you cannot access the ROSS application Problem Q / A Solution Unable to access ROSS. Receive a VLS or a long error message containing the word Corba. These two error message often mean you are unable to connect to the internet. ROSS maybe running, but if you cannot access the internet, you cannot access ROSS. Q - Can you access an internet site? Q - Can another computer in your office or connect to the internet? Q Can a different agencies computer connect to the internet and/or ROSS? A - Yes. Your agencies internet appears to be down Contact local IRM staff for status of your internet You will not have access to ROSS until your internet is restored Work Arounds If you have another agencies computer available, use that network until yours is restored Move dispatch operations to another location that does not use your agencies network. Contact one of your designated dispatch offices to continue dispatching for you until you have internet again
5 Problem Q / A Solution Unable to access ROSS. Receive a VLS or a long error message containing the word Corba. These two error message often mean you are unable to connect to the internet. ROSS maybe running, but if you cannot access the internet, you cannot access ROSS. Cont. Q - Can you access the internet? Q Can you access the ROSS web site? Q Can another computer in your office or access ROSS? A - Yes Can you access the internet? Q Can you access the ROSS web site? Q Can another computer in your office or access ROSS? A - No This may be a port or fire wall issue on your computer Contact local IRM and tell them only your computer (or only your agency in your office) cannot access ROSS. Other computers on the same agency network can. Work Arounds Use another computer in your office. Have a laptop you could set up? Move dispatch operations to another location that does not use your agencies network. Contact one of your designated dispatch offices to continue dispatching for you until you have internet again ROSS maybe down Contact the ROSS Helpdesk
Tk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
SAMPLE IT CONTINGENCY PLAN FORMAT
SAMPLE IT CONTINGENCY PLAN FORMAT This sample format provides a template for preparing an information technology (IT) contingency plan. The template is intended to be used as a guide, and the Contingency
I.T. Disaster Recovery Plan
I.T. Disaster Recovery Plan Ref 000xxxxQ January, 2015 5, 443 Albany Hwy Victoria Park, WA, 6100 p. 1300 664 136 [email protected] www.focusnetworks.com.au I.T. Disaster Recovery Plan - January
How To Build A Disaster Recovery Testing Program
Building a Disaster Recovery Testing Program Presented by Steve Carroll Email: [email protected] Phone: 717-256-1865 About Our Speaker Steve Carroll is a Senior Consultant with Abound Resources.
Birkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
Hong Kong Baptist University
Hong Kong Baptist University Disaster Recovery Standard FOR INTERNAL USE ONLY Date of Issue: JULY 2012 Revision History Version Author Date Revision 1.0 Information Security Subcommittee (ISSC) July 2012
Disaster Recovery Policy
Disaster Recovery Policy Organizational Functional Area: Policy for: Executive Division Bank Disaster Recovery Program Board Reviewed: September 14, 2011 Department/Individual Responsible for Maintaining/Updating
Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support
Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue
Business Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
Identify and Protect Your Vital Records
Identify and Protect Your Vital Records INTRODUCTION The Federal Emergency Management Agency s Federal Preparedness Circular 65 states The protection and ready availability of electronic and hardcopy documents,
Managed Security Services SLA Document. Response and Resolution Times
Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
NETGEAR ReadyNAS & Acronis Replicating an Acronis Vault between ReadyNAS Appliances
NETGEAR ReadyNAS & Acronis Replicating an Acronis Vault between ReadyNAS Appliances Table of Contents Contents...2 Concepts...3 Acronis efficient data backup...3 ReadyNAS Replicate efficient & simple replication...4
Fire Department Guide. Creating and Maintaining Business Continuity Plans (BCP)
Fire Department Guide Creating and Maintaining Business Continuity Plans (BCP) Business Continuity Planning Components Index: Introduction Getting Started Section 1 1. Assign departmental business continuity
Disaster Recovery Plan Documentation for Agencies Instructions
California Office of Information Security Disaster Recovery Plan Documentation for Agencies Instructions () November 2009 SCOPE AND PURPOSE The requirements included in this document are applicable to
Massachusetts Institute of Technology. Functional Area Recovery Management Team Plan Development Template
Massachusetts Institute of Technology Functional Area Recovery Management Team Plan Development Template Public Distribution Version For further information, contact: Jerry Isaacson MIT Information Security
Technology Recovery Plan Instructions
State of California California Information Security Office Technology Recovery Plan Instructions SIMM 5325-A (Formerly SIMM 65A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF
Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper
Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
1. Backup and Recovery Policy
POLICY TITLE: POLICY #: IT - 2 DATE DRAFTED: 09/23/05 APPROVED DATE: 09/23/05 REVISION DATE: BRIEF DESCRIPTION: Backup and Recovery Policy Minimum requirements for the creation and retention of computer
Unit Guide to Business Continuity/Resumption Planning
Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions
The Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS)
Information Technology Disaster Recovery Policy Policy Statement This policy defines acceptable methods for disaster recovery planning, preparedness, management and mitigation of IT systems and services
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
Business Unit CONTINGENCY PLAN
Contingency Plan Template Business Unit CONTINGENCY PLAN Version 1.0 (Date submitted) Submitted By: Business Unit Date Version 1.0 Page 1 1 Plan Review and Updates... 3 2 Introduction... 3 2.1 Purpose...
ASX SETTLEMENT OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
APPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval
Disaster Preparedness & Response
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B C E INTRODUCTION AND PURPOSE REVIEW ELEMENTS ABBREVIATIONS NCUA REFERENCES EXTERNAL REFERENCES Planning - Ensuring
Disaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
TECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
Emergency Operations California State University Los Angeles
Business Continuity Plan Emergency Operations California State University Los Angeles 1. Objective & Scope 2. Definition of Disaster 3. Risk and Business Impact Analysis Summary 4. Business Continuity
Standard: Data Center Security
Information Security Standards Data Center Security Standard IS-DCS Effective Date TBD Email [email protected] # Version 3.0 Contact Mike Cook Phone 408-924-1705 Standard: Data Center Security Page 1 Executive
Disaster Recovery Planning Procedures and Guidelines
Disaster Recovery Planning Procedures and Guidelines A Mandatory Reference for ADS Chapter 545 New Reference: 06/01/2006 Responsible Office: M/DCIO File Name: 545mal_060106_cd44 Information System Security
Comprehensive Emergency Management Plan (CEMP) Annex V CONTINUITY OF OPERATIONS PLAN (COOP)
Annex V CONTINUITY OF OPERATIONS PLAN (COOP) Milwaukee County Office of the Sheriff (MCSO) Division of Emergency Management Milwaukee County, ANNEX V CONTINUITY OF OPERATIONS PLAN (COOP) TABLE OF CONTENTS
How to Prepare for an Emergency: A Disaster and Business Recovery Plan
How to Prepare for an Emergency: A Disaster and Business Recovery Plan Chapter 1: Overview of the Disaster and Business Recovery Plan Purpose: To develop and establish a comprehensive Disaster and Business
Unitrends, Inc. Software and Hardware Support Handbook
1 Unitrends, Inc. Software and Hardware Support Handbook Overview This Customer Support Handbook details support services, contact information and best practices for contacting Unitrends Support to ensure
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
Business Continuity Planning in IT
Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
[INSERT NAME OF SCHOOL] BUSINESS CONTINUITY PLAN
Plan Ref No: [INSERT NAME OF SCHOOL] BUSINESS CONTINUITY PLAN PLAN DETAILS Date Written Plan Owner Plan Writer Version Number Review Schedule 6 monthly Annually Date of Plan Review Date of Plan Exercise
San Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
Disaster Recovery Plan
Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
iseries Server Cloud Migration Frequently Asked Questions
iseries Server Cloud Migration Frequently Asked Questions 1. What are the advantages of the iseries cloud-hosted environment? Elimination of LEA s costs associated with power, cooling and floor space Elimination
VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY
ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and
24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase
24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk Onsite Support itg CloudBase Pro-Active managed it support services for one single cost per month covers all aspects of
Disaster Recovery Plan
Disaster Recovery Plan Date: February 2, 2009 Revision: 9.0 EXTERNAL BUSINESS CONTINUITY PLAN PAGE 1 of 13 Federal regulation states, and internal corporate policies require, that Penson Financial Services,
Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: [email protected] Fax: (718) 380-7322
Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery
Service Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support
Service Support 1.1. First Level Support First Level Support (Tier I) provides immediate response to emergencies and customer questions TSD - First Level Support Office: Sub-Division: Extension: E-mail:
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
Emergency Response and Business Continuity Management Policy
Emergency Response and Business Continuity Management Policy Owner: John Duffy, Registrar & Secretary Last updated: September 2012 Version: 04 Document control Date Version Author Changes To be populated
The 5 Most Commonly Used Disaster Recovery Process
DR Risk Assessment White Paper This document provides an overview of Equilibrium s disaster recovery risk analysis and remediation methodology. This methodology was developed over a period of 10+ years
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
CDK Cloud Hosting HSP (Hardware Service Provision) For your Dealer Management System (DMS)
CDK Cloud Hosting HSP (Hardware Service Provision) For your Dealer Management System (DMS) First things first. Ask yourself these questions: Question 1: If your DMS was suddenly unavailable, could you
DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
DRAFT Disaster Recovery Policy Template
DRAFT Disaster Recovery Policy Template NOTE: This is a boiler plate template much information is needed from to finalizeconsider this document pre-draft FOREWARD... 3 Policy Overview...
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
AUSTRACLEAR REGULATIONS Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Frequently Asked Questions About WebDrv Online (Remote) Backup
Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks
Our Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015
Our Server Support Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Telephone Sales and Accounts 0161 232 0001 Technical Support 0161 232 0125 Email
DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
ICT Damage Assessment and Recovery Plan after Cyclone Heta in Niue Islands
ICT Damage Assessment and Recovery Plan after Cyclone Heta in Niue Islands Background Tropical Cyclone Heta (5 January 2004) left behind severe physical damage in Niue, especially in the coastal areas
Remote Backup Solution: Frequently Asked Questions
Remote Backup Solution: Frequently Updated December 2014 Contents What is ECi Remote Backup?...3 What Levels of Protection are Available?...3 Why is ECi Remote Backup Important for Disaster Recovery?...3
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
JANSSEN PARTNERS, INC. Business Continuity Plan (BCP)
JANSSEN PARTNERS, INC. Business Continuity Plan (BCP) Emergency Contact Persons Our firm s two emergency contact persons are: Peter Janssen, President, Tel. 641-209-5940, Cell 516-456-7059, Fax 641-843-7036,
2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM).
BACKUP POLICY POLICY ADOPTED BY COUNCIL ON 25 APRIL 2012 AT ITEM C.14.3 POLICY AMENDED BY COUNCIL ON 24 APRIL 2014 AT ITEM C.14.1 Cape Winelands District Municipality Backup Policy 1. 1. INTRODUCTION Computer
Navajo Nation Department of Information Technology (NNDIT) Helpdesk Policy P100
Navajo Nation Department of Information Technology (NNDIT) Helpdesk Policy P100 HelpDesk Problem & Request Management Process The following discussion of Problem Management procedures is intended to provide
Incident and Disaster Tolerance/Response Policy
Incident and Disaster Tolerance/Response Policy Policy Number: PSU-NK-ITS-013 Date: December 4, 2012 Page Count: 5 Purpose: To provide campus faculty and staff with an overview of campus policies and guidance
Infrastructure Engineer
Infrastructure Engineer It s About You Do you have a passion for all types of computer hardware, software, communication and network technology? Do you like to be hands-on and directly involved in improving
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Creating a Business Continuity Plan for your Health Center
Creating a Business Continuity Plan for your Health Center 1 Page Left Intentionally Blank 2 About This Manual This tool is the result of collaboration between the Primary Care Development Corporation
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS
1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,
University Information Technology Services. Information System Contingency Plan Instructions
University Information Technology Services Information System Contingency Plan Instructions Prepared by Victor Font UITS Business Continuity / Disaster Recovery Coordinator January 2013 Table of Contents
USING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
Running Successful Disaster Recovery Tests
Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,
NAME: Adibo Stephen CONTACT ADDRESS:
CONTACT ADDRESS: NAME: Adibo Stephen United Nations African Institute for the Prevention of Crime and the Treatment of Offenders P. O. Box 10590, Kampala. Uganda. Tel: +256703885155 E-mail: [email protected]
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
