How To Back Up A Computer System In Maruleng Local Municipality
|
|
- Victoria Dickerson
- 3 years ago
- Views:
Transcription
1 Maruleng Local Municipality BACKUP POLICY
2 Version control Version Date Author(s) Details /03/2012 Masilo Modiba New policy BACKUP POLICY 2
3 Table contents 1. Introduction 2. Scope 3. Definitions 4. Timings 5. Data backed up 6. Excluded extensions 7. Procedures 8. Tape Storage 9. Tape drive cleaning 10. Responsibilities 11. Data backed up 12. Restorations BACKUP POLICY 3
4 1. Introduction Computer information systems and electronic data are valuable assets to Department of Local Government and Housing (Maruleng Local Municipality) and a substantial investment in human and financial resources has been made to create these systems and information and, as such, a formalized policy has been implemented to: Safeguard the risk of losing data Safeguard the confidentiality and integrity of information contained within these systems Ensure availability of critical data so that information can be utilized as the valuable asset that it is Reduce business and legal risk. Departmental critical data and non-departmental critical data are stored on Fileservers, Exchange-servers (mail-box data) and Application-servers. This data can be categorized as: Personal User data Business Unit data Shared data Databases Application / System data 2. Scope The goal for IT SECTION: User Support division is to ensure that departmental data can be recovered within required and agreed business timescales. IT SECTION: User Support division is responsible for backing up File-servers, Exchange-servers and Application-servers, according to agreed cycles, and storing these backups in a secure designated area. In addition to backing up departmental data, IT SECTION: User Support division shall perform regular disk capacity management on all data servers and have the right to delete all non-departmental related data after consultation with involved employees. If the disposal of old or damaged tapes is required, such tapes will be destroyed to prevent the recovery of data from the media. Ownership of all electronic information residing on any departmental computer system vests in Maruleng Local Municipality and Management may peruse, monitor and take copies of any information or communication made or received utilizing any of the aforementioned systems. Therefore, IT SECTION requires BACKUP POLICY 4
5 that all requests to restore an employees user data, residing on File-servers or Exchange-servers (mail-box data), not requested by the employee or without the permission of such employee, must be authorized by a Senior Manager and may be assessed by the General Manager: IT SECTION. This policy defines the backup strategy for servers and data within Maruleng Local Municipality. 3. Definitions 3.1 Backup is the process of copying active files from online disk to tape so that files may be restored to a disk in the event of equipment failure, damage to or loss of data. 3.2 Archive is the process of moving inactive files form online disk to a tape, i.e. deleting the files from copying them, in order to release online storage for reuse. 3.3 Restore - The process of bringing off line storage data back from the offline media and putting it on an online storage system such as a file server. 4. Timings A grandfather -father-son rotation scheme is operated; incremental backups run overnight from Monday to Thursday (daily backup) and full backup (i.e weekly backup) run on Fridays are rotated on three weeks basis. One full backup each month (ie Monthly backup) will be made. 5. Data Backed up 5.1 Data to be backed up include the following Users data stored on the home directories ( My Documents ) of all servers Systems to be backup include: Exchange Information Store Mailboxes Excluded extensions On home directories folders ( My Documents ) not all files will be backed up; the following are extensions that will be omitted: BACKUP POLICY 5
6 Mpeg Mpa Mp2 Mp3 Mp4 Exe Vob Wsf Wma Wav 7. Procedures Incremental backups will be performed daily from Monday to Thursday. The tape will be add-on with new information created. A full systems and data backup will be performed weekly. Weekly backups will run on Fridays and the tapes will be rotated 3 times in the month. Monthly backups will be made on the last Friday of each month and stored for a minimum period of 5 (five) years there after it will be handed to Provincial Archives and archived where required under the classification system as in use by the Limpopo Government Administration. BACKUP POLICY 6
7 Data backup name Type of backup Scheduling of backup Time backup starts Overwrite/append period Media set name Barcode number on tape Backup strategy Exchange Information Store name Mailboxes User home directories Retired user data(archiving) Miscellaneous old user data Data backed to file and then to tapes using Ntbackup Data backup name Type of backup Scheduling of backup Time backup starts Overwrite/append period Full Every Saturday None/none Sysvol Full Every Saturday Presently not backed up Media set name Path to folder Backup strategy Weekly full BACKUP POLICY 7
8 Sysvol DHCP Full Every Saturday Weekly full Full Every Saturday Weekly full Full Every 2 nd Saturday Weekly full Full Every 2 nd Saturday Weekly full Full BACKUP POLICY 8
9 8. Tape Storage All weekly and monthly tapes must be stored on the fire proof safe at Maruleng Local Municipality site building. The list as in Annexure A will be maintained that indicates the date of tape creation and the unique identification of the tape. 9. Tape drive cleaning Tape drive shall be cleaned monthly and the cleaning tape shall be replaced every second month. 10. Responsibility 8.1 IT SECTION The Department User Support manager shall delegate a member of the User Support division to perform regular backups. The delegated person shall develop a procedure for testing backups and test the ability to restore data from backups on a monthly basis. The designated person will take weekly and monthly tapes to offsite storage. 8.2 The Employee All business critical data on local computer and notebook hard drives must be copied or moved to a My Documents share on a file server, where it will be backed up. Where such an action is not possible, as in cases where it is done away from access to Maruleng Local Municipality network, the data must be copied over on the first available opportunity. It will be the sole responsibility of the employee, under all circumstances, to backup and maintain security regarding personal data. In addition to workstations, employees have been allocated space per user, secured per user logon ID, on the File-servers. The onus is on the employee to ensure that the server space allocated is utilized to the optimum. 11. Restorations Users that need files restored must submit a request to the IT help desk by completing IT SECTION Data Restore Request Form. Information regarding the request where possible must include the file creation date, the name of the file, the last time it was changed, and the date and time it was deleted or destroyed. BACKUP POLICY 9
BACK UP POLICY Page 1 of 7 BACK UP POLICY
BACK UP POLICY Page 1 of 7 BACK UP POLICY TABLE OF CONTENT 1. INTRODUCTION... 2 2. DEFINITIONS... 3 3. SCOPE... 3 4. TIMINGS... 4 5. DATA BACKED UP... 4 6. EXCLUDED EXTENSIONS... 4 7. PROCEDURES... 5 8.
More informationBACKUP POLICY Date: 04/12/2009
BACKUP POLICY Date: 04/12/2009 Approvals Head of Department Signature Date Municipal Manager Signature. Date Divisional Manager: Information Management Signature.. Date.. Table contents Heading Page Overview
More informationThis policy is not designed to use systems backup for the following purposes:
Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa
More informationIT Data Backup Policy
IT Data Backup Policy TABLE OF CONTENTS 1. Purpose and Intention of the Policy... 2 2. Definitions of concepts... 2 3. Legislative Authority... 2 4. Scope... 3 5. responsibilty... 3 6. Frequency of data
More informationAbout Backing Up a Cisco Unity System
CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues
More informationCLIENT. Report of Remote Backup Service
CLIENT Report of Remote Backup Service Summary Report from May 1, 2006 to May 31, 2006 Page: 2 of 5 31 May 06 Backup Process SafeComs utilizes the proven industry standard backup rotation strategy known
More informationSecure online file storage ITD CLIO Server Filestore
Secure online file storage ITD CLIO Server Filestore What is online file storage? ITD s server CLIO provides the University with a large, managed central online file storage. This is a service which allows
More informationBackup Policy (ITP004) Information Technology Services Department
Introduction This policy defines the backup guidelines for systems within the Central Dauphin School District. These systems are typically servers, Storage Area Network devices (SAN), or Network-Attached
More informationCHAPTER 9 System Backup and Restoration, Disk Cloning
CHAPTER 9 System Backup and Restoration, Disk Cloning Learning Objectives After completing this lesson, you should be able to: i. Explain the method of doing data backup and restoration. ii. Describe the
More informationBackup and Recovery Plan For Small Businesses
Backup and Recovery Plan For Small Businesses Disclaimer: This article is intended to serve as an informational reference source. While the information is based on sound principles for backup and recovery,
More informationEducation and Workforce Development Cabinet POLICY/PROCEDURE. Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012
Education and Workforce Development Cabinet POLICY/PROCEDURE Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012 Subject: Backup Procedures Tower and Server Farms Policy:
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More information2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM).
BACKUP POLICY POLICY ADOPTED BY COUNCIL ON 25 APRIL 2012 AT ITEM C.14.3 POLICY AMENDED BY COUNCIL ON 24 APRIL 2014 AT ITEM C.14.1 Cape Winelands District Municipality Backup Policy 1. 1. INTRODUCTION Computer
More information1. Backup and Recovery Policy
POLICY TITLE: POLICY #: IT - 2 DATE DRAFTED: 09/23/05 APPROVED DATE: 09/23/05 REVISION DATE: BRIEF DESCRIPTION: Backup and Recovery Policy Minimum requirements for the creation and retention of computer
More informationUniversity Systems Desktop Support Service Level Commitment
University Systems Desktop Support Service Level Commitment The Purpose of this Service Level Commitment (SLC) is to formally define the level of service University Systems will provide to UVic faculty,
More information16 Common Backup Problems & Mistakes
16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than
More informationUMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of
More informationCollege of Agriculture and Life Sciences Guidelines
College of Agriculture and Life Sciences Guidelines ENTERPRISE FILE SERVICE Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 GUIDELINE STATEMENT This guideline
More informationensure compliance with applicable statutes, regulations, and rules regarding data retention and management;
Texas A&M AgriLife Extension Service Procedures 29.01.99.X0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT
More informationA backup is a copy of your files that will be able to reproduce the original, if it is lost, damaged or stolen.
Backup Strategy Backup strategy A backup is a copy of your files that will be able to reproduce the original, if it is lost, damaged or stolen. Two or even three backups can be made. Backups should be
More informationDocument Management Plan Preparation Guidelines
Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations
More informationCity of Lawrence Administrative Policy
City of Lawrence Administrative Policy SUBJECT Server Backup Policy APPLIES TO Departments supported by Information Systems EFFECTIVE DATE September 1, 2009 REVISED DATE APPROVED BY City Manager TOTAL
More informationTHE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS
THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS 1010370-001 ii Contents About This Guide.................. v Why tape is ideal for backup... v automation - now available
More informationBACKUP SOLUTIONS FOR SCHOOLS. Advice and Guidance. ICT Services 42 New Union Street Coventry CV1 2HN
BACKUP SOLUTIONS FOR SCHOOLS Advice and Guidance ICT Services 42 New Union Street Coventry CV1 2HN Revision History and Approval Date Author Version Comments Approval 26/02/2014 Alison York 1.00 Initial
More information15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
More informationPowerSoftMD by Data Tec Backup Strategies
There are many steps to ensure proper backup. Here are some of the ones we highly recommend. Remember, Data Tec has no responsibility for your data backup or recovery; this is your responsibility. A: Server
More informationBACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
More informationExchange Brick-level Backup and Restore
WHITEPAPER BackupAssist Version 4 Exchange Mailbox Add-on www.backupassist.com 2 Contents 1. Introduction and Overview... 3 1.1 What does the Exchange Mailbox Add-on do?... 3 1.2 Who needs the Exchange
More informationDNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.
This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube
More informationICT Data Backup and Recovery Policy
ICT Data Backup and Recovery Policy TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
More informationHow do you test to determine which backup and restore technology best suits your business needs?
KEY CRITERIA WHEN SELECTING BACKUP AND RESTORE TECHNOLOGY FOR WINDOWS SYSTEMS How do you test to determine which backup and restore technology best suits your business needs? Real-Time Recovery delivers
More informationSECTION 5 RECORDED INFORMATION MANAGEMENT
SECTION 5 RECORDED INFORMATION MANAGEMENT 5.02 POLICY RESPONSIBILITIES AUTHORITY: EXECUTIVE COUNCIL / ARCHIVES ACT, R.S.P.E.I. 1988, CAP. A-19 ADMINISTRATION: DEPARTMENT OF EDUCATION PUBLIC ARCHIVES AND
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationCENTER FOR NUCLEAR WASTE REGULATORY ANALYSES
Page 1 of 5 ELECTRONIC FILE ARCHIVAL AND BACKUP PROCEDURES EFFECTIVITY AND APPROVAL Revision 1 of this procedure became effective on July 6, 2004. This procedure consists of the pages and changes listed
More informationFixed Destinations. BackupAssist Quick-Start Guide for. BackupAssist installation, configuration and setup. www.backupassist.com.
BackupAssist Quick-Start Guide for Fixed Destinations BackupAssist installation, configuration and setup Contents 1.1 Introduction... 2 2.1 Before you begin... 2 Applies to Local directory 3.1 Installation...
More informationCompetitive Analysis Retrospect And Our Competition
Competitive Analysis And Our Competition September 2013 Competitive Analysis: for Windows and our top competitors We ve taken a hard look at our competition and how we stack up. Here is a comparison of
More informationRECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY PURPOSE The purpose of this policy is to: Assist departments in effective utilization of space and efficient information retrieval; Establish guidelines for disposal of records;
More informationWith a Data Backup Plan, Your Business is Safe. NCGIT.com
With a Data Backup Plan, Your Business is Safe NCGIT.com With a Data Backup Plan, Your Business is Safe 2 NCGIT.com Why do I need a backup and disaster recovery plan? Your company s most valuable asset
More informationOnline Backup Solution with Disaster Recovery
Online Backup Solution with Disaster Recovery Backup Replacement - Online For Businesses looking for Consistent, Reliable and Offsite Backup, with Minimal Data loss, Generational Management and Disaster
More informationEasyDent by Data Tec Backup Strategies
There are many steps to ensure proper backup. Here are some of the ones we highly recommend. Remember, Data Tec has no responsibility for your data backup or recovery; this is your responsibility. A: Server
More informationBackupAssist Common Usage Scenarios
WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with
More informationHyper-V backup implementation guide
Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V
More informationComputer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
More informationLocal Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
More informationA guide from Chiltern Business Computing Ltd
Backing IT Up A guide from Chiltern Business Computing Ltd Every business depends on its computer systems to some degree or other. For many, systems are vital to business survival and success. This brief
More informationW H I T E P A P E R. Disaster Recovery: You Can Afford It
W H I T E P A P E R Disaster Recovery: You Can Afford It Preparing for a data disaster is one of those projects that is always getting delayed in small and medium sized businesses. The daily proverbial
More informationUsing Backup Exec System Recovery's Offsite Copy for disaster recovery
Using Backup Exec System Recovery's Offsite Copy for disaster recovery The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationData Management and Retention for Standards Consortia
Data Management and Retention for Standards Consortia An Overview 15 May, 2006 Prepared by: Jeremy Towsey-French jfrench@kavi.com Kavi Corporation 1 of 6 Copyright 2006 All rights reserved Data Management
More information6. FINDINGS AND SUGGESTIONS
6. FINDINGS AND SUGGESTIONS 6.1 Introduction: The advancements in ICT and their proper utilization by research and academic librarians are not only strengthening the capabilities of libraries but also
More informationACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
More informationEurobackup PRO Exchange Databases Backup Best Practices
P a g e 1 Eurobackup PRO Exchange Databases Backup Best Practices P a g e 2 Contents Introduction... 3 How to configure Exchange database backup with Eurobackup PRO... 4 Daily backup of Exchange databases...
More informationDisk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
More informationJuly 30, 2009. Internal Audit Report 2009-08 Information Technology Business Continuity Plan Information Technology Department
Internal Audit Report 2009-08 Introduction. The Municipality depends heavily on technology and automated information systems, and their disruption for even a few days could have a severe impact on critical
More informationHow To Backup Your Hard Drive With Pros 4 Technology Online Backup
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
More informationBackupAssist v5 vs. v6
COMPARISON www.backupassist.com 2 What s new in BackupAssist version 6? There are three main reasons why you should upgrade to BackupAssist v6: 1. To keep up with the latest best practice backup standards
More informationDirectory Backup and Restore
Directory Backup and Restore Overview Active Directory is backed up as part of system state, a collection of system components that depend on each other. You must backup and restore system state components
More informationWhite Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
More informationBackup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
More informationtechsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01
techsafe Features Page 1/9 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 5 Security File Compression Encryption Transmission
More information1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
More informationMANAGEMENT AUDIT REPORT SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106. City of Albuquerque Office of Internal Audit and Investigations
MANAGEMENT AUDIT REPORT OF SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106 City of Albuquerque Office of Internal Audit and Investigations Securing Critical Data Citywide Report No. 09-106 Executive
More informationHow To Restore Your Email From Backup On An Exchange 2003 2003 Service Pack 1 On A Windows 7.2.1 (Windows 7) On A Microsoft Powerbook 2.5.1.2 (Windows) On An Ubuntu 2003 Power
Restoring Exchange Server 2003 with NTBackup Version 1.00 Need to Know TM Exchange server holds all the email messages for network users. NTBackup software can backup the Exchange data for recovery. There
More informationEvolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
More informationHow To Backup Your Data From A Datatron Tape To A Backup From A Backup To A Disk Drive
Critical Notification: PROPER BACKUPS ARE YOUR SOLE RESPONSIBILITY AND NEITHER DATARON NOR AUTOLOGUE WILL IN ANY WAY BE RESPONSIBLE FOR THEM OR ANY LOSS RESULTING FROM THEM. If you do not understand everything
More informationComparison Document. Comparison between LepideMigrator for Exchange & Lepide Exchange Recovery Manager
Comparison between LepideMigrator for Exchange & Lepide Exchange Recovery Manager Lepide Software Private Limited 1 http://www.lepide.com/ Introduction Managing an Exchange Server is not that easy. Even
More informationTiburon Master Support Agreement Exhibit 6 Back Up Schedule & Procedures. General Notes on Backups
General Notes on Backups This document describes the procedures to backup the minimum set of files required to recover application and/or data files in the event of a hardware failure or data loss. These
More informationSVA Backup Plus Features
1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most
More informationSaving To Your Network Drive
Saving To Your Network Drive SAVING TO YOUR NETWORK DRIVE FREQUENTLY ASKED QUESTIONS & ANSWERS Q: What is a network drive? A: A network drive is an area of storage that is reserved for the individual faculty
More informationTransferring AIS to a different computer
Transferring AIS to a different computer AIS can easily be transferred from one computer to another. There are several different scenarios for transferring AIS to another computer. Since AIS is designed
More informationCMS IT - Requirements For Electronic Storage
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Disk Space Storage Management August 2004 Document Number: CMS-CIO-POL-INF02-01
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationMapGuide Open Source Repository Management Back up, restore, and recover your resource repository.
MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. Page 1 of 5 Table of Contents 1. Introduction...3 2. Supporting Utility...3 3. Backup...4 3.1 Offline
More informationTECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
More informationState of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
More informationHow To Use A Court Record Electronically In Idaho
Idaho Judicial Branch Scanning and Imaging Guidelines DRAFT - October 25, 2013 A. Introduction Many of Idaho s courts have considered or implemented the use of digital imaging systems to scan court documents
More informationSan Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
More informationData Containers. User Guide
Data Containers User Guide Contents 1. Overview... 2 The backup... 2 The problem... 2 The solution... 2 Other advantages... 2 RDX granular restore... 2 Portable backups... 2 2. Creating a Data container
More informationBI-STATE DEVELOPMENT AGENCY D/B/A ELECTRONIC RECORDS MANAGEMENT PROCEDURES
BI-STATE DEVELOPMENT AGENCY D/B/A ELECTRONIC RECORDS MANAGEMENT PROCEDURES Contents Overview... 3 Electronic Storage Capabilities provided to Authorized Metro Employees... 3 Department/Division Electronic
More informationEmail Retention 7/11/2014 1
Email Retention 7/11/2014 1 What is an Email Retention Policy? What is an Electronic (Email/Instant Messaging) Communications Retention Policy? An electronic retention policy is list of parameters created
More informationProtecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.
Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation
More information1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
More informationHow To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
More informationComputer disaster scenarios: Disaster plan requirements:
Windows NT Computer disaster scenarios: Virus infection (perhaps on every NT node) Physical/hardware failure Malicious hacking Disaster plan requirements: Continue data-taking as long as possible Quick
More informationCLPCCD DATA BACKUP DISTRICT ADMINISTRATIVE SYSTEMS
CLPCCD DATA BACKUP DISTRICT ADMINISTRATIVE SYSTEMS INTRODUCTION A comprehensive backup solution is essential in ensuring timely recovery of critical user information in the event of accidental deletion,
More informationCreating a Complete Backup of Shelby v5 Data
Creating a Complete Backup of Shelby v5 Data Backup the Shelby folder and all its contents Since the Shelby v5 software now stores information in the \Shelby\ssv5.dat folder as well as in the SQL database;
More informationDoes it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
More informationDeath to PST Files. The Hidden Costs of Email
WHITE PAPER: EMAIL MANAGEMENT........................................ Death to PST Files Who should read this paper IT professionals looking for an easy storage, search and retrieval system for email that
More informationPORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT. Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL
Page 1 of 1 PORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL This revision supersedes all previous revisions.
More informationICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
More informationISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
7.1 ESTABLISH RESPONSIBILITY FOR ASSETS 1 GOAL Do you protect your organization s assets? 2 GOAL Do you use controls to protect your assets? 3 GOAL Do you account for your organization s assets? 4 GOAL
More informationIntroduction. Ease-of-Use
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
More informationManaged Exchange. Access secure email from any Internet connection in the world
Managed Exchange Access secure email from any Internet connection in the world Business grade email capabilities: Increased security against viruses and hackers Ability to access your email from any web
More informationBackup & Recovery: Time is Never an Ally
Backup & Recovery: Time is Never an Ally Chris Schin Zetta VP Products February 2012 Why do you do backups? Degree of difficulty Site disaster Frequency of Occurrence Server recovery Revert to older file
More informationMille Lacs County Data Services - Backup Policy
Mille Lacs County Data Services - Backup Policy Produced by: Information Services Date: April, 2010 Version: 1.3 Document status: Active Date effective from: 5/18/2010 Date of review: Author: Michael Virnig
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationBACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January
More informationSymantec Backup Exec 2014 Icon List
Symantec Backup Exec 2014 Icon List Alerts Image Description Alert needs attention Alerts Alert needs attention Alert needs attention Alert needs attention Error Error Error Error Informational alert Informational
More informationPhysical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
More informationUsing Depositit to Backup Microsoft Exchange Server
Using Depositit to Backup Microsoft Exchange Server If you have subscribed to use Depositit s Microsoft Exchange Server backup facility, please make sure you have the Depositit software installed on the
More informationClick to begin. Maitre'D Full System Backup & Restore
Click to begin Maitre'D Full System Backup & Restore Full System Backup & Restore This document will guide you through the Backup of the Maitre D Database from a Source computer and the Restoration on
More information