Connors State College

Size: px
Start display at page:

Download "Connors State College"

Transcription

1 Connors State College Page 1 Connors State College IT Systems Disaster Recovery Plan Connors State College Information Technology Systems

2 Connors State College Page 2 Disclaimer: The techniques for backup and recovery used in this plan do not guarantee zero data loss nor do they guarantee a level of zero downtime. The College Administration and personnel is willing to assume the risk of data loss and the possibility of operating without computing resources for a period of time after a disaster. Data recovery efforts in this plan are targeted at restoring systems to a functional level with the latest available intact backup sources. Significant effort will be made after primary system operation is restored to restore data integrity back to the point immediately prior to the disaster and also to combine that data with any new data collected from the point immediately following the disaster. This plan does not attempt to cover either of these two important aspects of data recovery. Instead, individual users and departments will need to develop their own Disaster Recovery Plans to cope with the unavailability of the computing systems during the restoration phase of this plan and to cope with the potential and unexpected loss of data and computing resources. This plan is a work in progress and is therefore a living document that is updated constantly. Please contact the CSC IT Systems department at it@connorsstate.edu to verify that you are using the most current revision. Connors State College Information Technology Systems

3 Connors State College Page 3 Introduction All Disaster Recovery Plans assume a certain amount of risk. Primarily, this refers to data lost during a disaster. There are compromises between the amount of time, effort, and money spent on the planning and preparation before, during, and after a disaster and the amount of data loss that can be sustained while still remaining operational. Many organizations simply cannot function without computers and the data required for it to be operational. Due to this, their recovery efforts may focus on quick recovery, or possibly even zero downtime, thus resulting in more expenses. Other organizations, however, may be able to accept a reasonable amount of downtime in order to save on expenses while still recovering their data and systems in a reasonable amount of time. And still yet, there are those organizations that cannot afford any type of recovery option. They are relying on their primary equipment and have no plan in place should a disaster occur. It should be noted that few organizations can successfully obtain a level of zero downtime through a disaster and few organizations want to be one that has no plan in place. A compromise of all of the above plans, that is one that provides recovery as quickly and efficiently as possible while keeping recovery costs to a minimum, is one that is desired by our institution. Background Connors State College is a two-year community college offering a variety of college-level courses. Currently Connors State College offers courses to approximately 2,000 students and employs approximately 200 faculty members and support staff. The Connors State College Information Technology Systems staff consists of three individuals: the Director of IT Systems, the Network Administrator, and the Desktop Administrator. These positions are complemented by two part-time positions as well as several student workers at any given time. Other relevant positions are located throughout the College and are very important to the overall success of the Disaster Recovery Plan. CSC Information Technology Systems manages equipment that consists of servers, switches, wireless access points, workstations, security devices, and other equipment. These devices are located across three geographically separated locations: one primary location in Warner, OK and two branch locations in Muskogee, Oklahoma. Connors State College Information Technology Systems

4 Connors State College Page 4 Focus of the Plan The primary focus of this document is to provide a plan to respond to a disaster that severely cripples or possibly destroys the Information Technology Systems infrastructure. The primary intent of this plan is to restore operations to the College as quickly and accurately as possible with the latest and most current data available. Objectives of the Plan 1. Present an orderly course of action for restoring critical computing capability to the affected CSC campus(es) within 14 days of initiation of the plan. 2. Set criteria for making the decision to recover at a cold site or repair the affected site(s). 3. Develop an organizational structure for carrying out the plan including providing information concerning personnel that will be required to carry out the plan and the computing expertise required to completely fulfill the plan. 4. Identify the equipment, floor plan, procedures, and other items necessary for the quickest and most complete data recovery process possible in the given situation. Overview of the Plan Damage Assessment This damage assessment is a preliminary step intended to establish the extent of damage to critical hardware, software, and other relative equipment as well as the facility that houses it. The primary goal is to determine where the recovery should take place and what hardware must be ordered immediately to aid in the recovery process. The recovery personnel should be liberal in their estimate of the time required to repair or replace a damaged resource. They must take into consideration cases where one repair cannot take place concurrently with another repair. This may be due to personnel limitations or perhaps chronological limitations that require one step to be completed before another step is begun. Estimates of repair time should include ordering, shipping, installation, and testing time. In considering the hardware items, we must separate items into two groups. One group will be composed of items that are missing or destroyed, thus termed unsalvageable. The second will be those that are neither missing nor destroyed but may be repaired. These "salvageable" items will have to be evaluated by hardware engineers and repaired as necessary. Based on input from Connors State College Information Technology Systems

5 Connors State College Page 5 this process, the recovery personnel can begin the process of acquiring replacements. With respect to the facility, the evaluation of the damage to the building structure, electrical system, air conditioning, and any other utilities should be conducted. If estimates from this process indicate that a recovery at the original, primary site will require more than 14 days, migration to the cold site is recommended. Personnel Immediately following a disaster, a planned sequence of events begins. Key personnel are notified and the Recovery Team is grouped to implement the plan. Personnel currently employed are listed in the plan. However, the plan has been designed to be usable even if some or all of the personnel are unavailable. In a disaster we must remember that people are our most valuable resource. The recovery personnel at the College who are working to restore the computing systems will likely be working at great personal sacrifice, especially in the early hours and days following a disaster. These personnel may have injuries hampering their physical abilities. The loss or injury of a loved one or coworker may affect their emotional ability. These individuals will most likely have physical needs such as those for food, shelter, and sleep. The College must take special pains to ensure that the recovery workers are provided with resources to meet their physical and emotional needs. This plan calls for the appointment of an individual whose job will be to secure these resources so they can concentrate on the task at hand. Appointment of Recovery Manager The first order of business is to appoint a Recovery Manager. The person most appropriate for this position is the current Director of Information Technology Systems. If, for any reason, the Director is unavailable, the appointment should be made by the Executive Vice President and/or by the President. This person must have information technology management experience and must have signature authority for the expenditures necessary during the recovery process. In any case that an appropriate person to fulfill these duties cannot be found within the institution, an appropriate third-party individual may be hired fulfill these duties. Establish the Recovery Management Site Connors State College Information Technology Systems

6 Connors State College Page 6 The Recovery Management Site is the location from which the disaster recovery process will be initially coordinated. This site may also serve as a longterm recovery coordination site. The Recovery Manager should designate where the Recovery Management Site is to be established. The recommended Recovery Management Site would be the current IT Systems offices where the current data equipment is currently located; however, in the event of a disaster this location may not be available. The next recommended location would be any available location adjacent to the designated recovery site to aid in communication. Salvage Operations at Disaster Site Early efforts of the disaster recovery are targeted at protecting and preserving the computer equipment that was affected. In particular, any sensitive devices such as magnetic storage media (hard drives, magnetic tapes, diskettes) are identified and either protected from the elements or removed to a clean, dry environment away from the Disaster Site. Designate Recovery Site During early operations of the Disaster Recovery Plan a survey of the disaster scene is done by appropriate recovery personnel to estimate the amount of time required to put the current facility and equipment (in this case, the building, utilities, and computing equipment) back into working order. A decision is then made whether to use a cold site. This site would be a location some distance away from the scene of the disaster where computing and networking capabilities can be temporarily restored until the primary site is ready. Most likely, the cold site will be at one of our alternative campus locations as long as it was not affected by the initial disaster. Regardless of whether the current site or a cold site is selected, work will begin almost immediately at repairing or rebuilding any of the damages sustained at the primary site. This repairing and rebuilding process may take months, the details of which are beyond the scope of this document. Purchase New Equipment The recovery process relies heavily upon vendors and our relationship(s) with those vendors to quickly provide replacements for the resources that cannot be salvaged. The College will rely upon emergency procurement procedures that are approved by the College's purchasing office to quickly place orders for equipment, supplies, software, and any other needs necessary for the complete recovery of the computing systems. Begin Reassembly at Recovery Site Connors State College Information Technology Systems

7 Connors State College Page 7 Any and all necessary salvaged and new components are reassembled at the Recovery Site as quickly and accurately as possible. Since all plans of this type are subject to the inherent changes that occur in the computer industry, it may become necessary for recovery personnel to deviate from the plan, especially if the plan has not been properly kept up-to-date. If vendors cannot provide a certain piece of equipment on a timely basis, it may be necessary for the recovery personnel to make last-minute equipment substitutions which may delay the recovery process. Restore Data from Backups Once the equipment reassembly phase is completed, the work turns to concentrate on the data recovery procedures. Data recovery relies entirely upon the use of backups stored in locations off-site from the primary site and possibly any up-to-date data or backups still intact from the initial site. Backups can be in the form of magnetic tape, CDROMs, disk drives, hard drives, and other storage media. Early data recovery efforts focus on restoring the operating system(s) for each computer system. Next, first line recovery of applications and user data from the backup sources or existing, intact primary site storage devices is completed. Individual application owners may need to be involved at this point, so each major application area is reviewed individually to ensure that data is restored properly and completely. Restore Applications Data At this point, the Disaster Recovery Plans for users and departments (e.g., the application owners) must merge with the completion of the Computing Services plan. Since some time may have elapsed between the last and most current off-site backup time and the time of the disaster, application owners must have a way to restore each running application database to the point of the disaster. Application owners must also be able to take all new data collected since the time of the disaster and input it into the application database for a completely up-to-date database. When this process is complete, the College Information Technology Systems division can resume normal operations. Move Back to Restored Permanent Facility If the recovery process was able to be successfully completed at the initial site, then this step may be skipped. If this is true and the process was able to take place at the initial site then it will have already ensured that the computing systems are already located at a site that will provide a long-term location for the permanent installation of the recovered systems. However, if the recovery process has taken place at a cold site, physical restoration of the initial site (or an alternate facility) will have already begun. Connors State College Information Technology Systems

8 Connors State College Page 8 When this facility is ready for occupancy, the systems assembled at the cold site are to be moved back to their permanent, long-term home. This plan does not attempt to address the logistics of this move, which should be vastly less complicated than the work done to do the recovery itself at the cold site. Only let it be said that the move should be done as the plan itself: as quickly, carefully, and accurately as possible. Connors State College Information Technology Systems

9 Connors State College Page 9 Activating the Disaster Recovery Plan The appointment of a Recovery Manager sets the plan into motion. Early steps to take are as follows: 1. The Recovery Manager is to appoint the remaining members of the Recovery Team. This should be done in consultation with remaining members of the Information Technology Systems staff as well as Physical Plant management and staff along with help and approval of the College Administration. 2. The Recovery Manager is to call a meeting of the Recovery Team. The following agenda is suggested for this meeting: a) Each member of the Recovery Team is to be given distinct areas of responsibility and must review the status of these respective areas. b) After this review, the Recovery Team makes the final decision about where the recovery will take place. c) The Recovery Manager briefly reviews the Disaster Recovery Plan with the Recovery Team. d) Any adjustments to the Disaster Recovery Plan to any accommodate special circumstances are to be discussed and decided upon by the Recovery Team. e) Each member of the Recovery Team is charged with fulfilling his/her respective role in the recovery and to begin work as scheduled in the DRP. f) Each member of the Recovery Team is to review the makeup of any jobspecific, sub-categorized Recovery Teams that may need to be created. If an individual, key to a Recovery Team is unavailable, the Recovery Manager, along with the help of the Recovery Team and College Administration, is to assist in locating an individual who has the skills and experience necessary to adequately complete the Recovery Team. This individual may be acquired from outside the College, perhaps from other area computer centers or vendors. g) The next meeting of the Recovery Team is scheduled. It is suggested that the Recovery Team meet at least once each day for the first week of the recovery process. Once the first week is completed, the future frequency of recovery meetings is to be decided by the Recovery Team upon a proper review of the recovery status at that point. 3. The Recovery Team members are to immediately begin the process of contacting any people who will be required to help them fulfill their aspect of the recovery process. Meetings with these other individuals can be scheduled in order to set in motion each sub-categorized part of the recovery. 4. The Physical Plant management representative is responsible for immediately clearing and procuring the recovery location for occupation by the Recovery Team. This includes the immediate relocation of any personnel currently occupying the location. The Physical Plant management representative should be Connors State College Information Technology Systems

10 Connors State College Page 10 given any assistance that is needed in locating basic facilities and equipment for the recovery location. These may include, but are not limited to: a) Office desks, chairs, filing cabinets, etc. b) Telephones, cellular phones, and other communication devices. c) Personal computers. (Pentium 4, 512MB memory, 80.0GB hard drive, 128MB video card, SVGA 17-inch monitor, 56.6K modem, Ethernet card, CDROM drive, 3.5-inch diskette drive, keyboard, mouse, etc.) d) Printers. e) Fax machines. f) Copiers. 5. Communications are critical in the recovery process. As mentioned in section 4 above, these can include analog telephones, cellular phones, or any other type of communication device. Of all communication types, mobile communications will be, perhaps, the most important communication method during the early, if not all, phases of the recovery process. This will provide constant communication between Recovery Team members that can only be obtained through mobile equipment. This equipment requirement can be satisfied through the use of cellular telephones, two-way radios, or other portable electronic communication devices. Physical Plant has two-way radio units available as does the IT Systems department. 6. Once, the Recovery Team is composed, the Recovery Site is ready, and communication between members is intact, the Recovery Team may begin carrying out the Disaster Recovery Plan. Connors State College Information Technology Systems

11 Connors State College Page 11 Disaster Recovery Scenarios Equipment Failure Equipment failures are always a possibility. Having access to equipment replacements in a short amount of time is crucial. Fire There is always a possibility for fire. Usually, this type of disaster results in total devastation. Quick response from the local fire department is crucial. Flood There is always the possibility of a flood. However, in our service areas floods seldom occur. Human Error Human error is always a possibility. Whether this is referring to a software-based or hardware-based error, steps can be made prior to the discovery of an error by re-checking settings and configurations. Lightning The potential for lightning is always high, especially in an area where thunderstorms are prevalent. Lightning not only presents the potential for damaging single pieces of equipment but can also start fires. Power Outage Power outages may occur alone or in combination with any of the scenarios listed here and usually shut the entire campus down. Terrorist Attack Although unlikely, a terrorist attack is still a situation that can occur. This type of scenario can result in many of the other scenarios listed here such as equipment failures, fire, power outage, or theft. Theft This may be the most difficult scenario to plan for but steps can be made to prevent thefts. Tornado Tornados are also rampant in Oklahoma but one has never set down near the College. However, as unlikely as it may seem, a tornado is always perceived as a legitimate threat. However, the devastation involved with a tornado would most likely ensure the total loss of hardware, software, and data on the campus. Malicious Software Any kind of malicious software is always a threat, especially to software installations. Other As always, there are unknown problems that can occur that may disrupt availability of resources. Because of this, we cannot configure a proper step-by-step guide. In this case user discretion will take precedence. Connors State College Information Technology Systems

12 Connors State College Page 12 Disaster Recovery A Step-By-Step Guide Depending on the number of IT Systems employees readily available, multiple steps can be accomplished at the same time. If only one employee is available, however, the steps should be followed in order. If additional employees are available, then each employee moves to the next step and so on until the entire process is completed in order. Note: Do not skip any steps. Throughout all of these scenarios, data and equipment are deemed top priority due to the nature of the recovery process. However, the respect for human life should not be ignored and should be the foremost concern in every individual s mind while completing this process. Data can eventually be replaced but a human life can never be replaced. We do not recommend anyone risking their life or the lives of others to save any data through any of these scenarios. Please use your own judgment while completing these scenarios and protect yourself and others around you from harm. Equipment Failure Fire 1. Contact all IT Systems staff. 2. Determine the significance of the failure and how detrimental it is towards the College. 3. Gather the needed equipment replacements, if available on campus. 4. If equipment is not readily available on campus, check with local vendors to see if the desired equipment is available. 5. If steps 3 and 4 do not gain the equipment needed, check with vendors to obtain equipment and possibly use overnight or same-day shipping service to expedite the order. 6. Contact administration to update them on the incident status and also in order to gain approval to purchase the required equipment. 7. Prepare the site for implementation so equipment can be enabled as soon as possible after arrival. 8. Obtain equipment once it arrives and begin installation procedures. 9. Monitor equipment to ensure successful implementation and avoidance of identical failure. 10. Notify administration of equipment implementation and current incident status. 1. Once fire begins, efforts should be made to contain the fire if possible (i.e. Fire Extinguisher, Fire Blanket, etc. if available). If fire is too large, EVACUATE THE BUILDING. 2. Call local Fire Department to notify them of fire: 1. Muskogee Fire Department Warner Fire Department Connors State College Information Technology Systems

13 Connors State College Page 13 Flood 3. Once the fire has been contained and permission is granted from the Fire Department, visit the location to determine the severity of the fire and the effected equipment. 4. If the fire affected the IT Systems offices, check that the fire-proof safe is intact and able to be retrieved. 5. If step 4 results in the ability to retrieve the safe, verify that the backups are good and verifiable. 6. If step 4 does not result in the ability to retrieve the safe or the fire-proof safe is not intact or available for retrieval, immediately send one member of the IT Systems staff to go to Muskogee to obtain a copy of the required software and paperwork from the safe located in the IT Systems office at the Muskogee Downtown Haskell Building. 7. If any servers or other significant equipment sustained damage and are unrecoverable, utilize the backups present from steps 4 and Backups are contained in the Warner fire-proof safe & also in the Muskogee Downtown Campus safe. 2. Backups are archived every week on Thursday Morning. This archive contains all the daily backups of the week from Thursday, Friday, Saturday, Monday, Tuesday, and Wednesday. 8. Gather the needed equipment replacements, if available on campus. 9. If equipment is not readily available on campus, check with local vendors to see if the desired equipment is available. 10. If steps 3 and 4 do not gain the equipment needed, check with vendors to obtain equipment and possibly use overnight or same-day shipping service to expedite the order. 11. Contact administration to update them on the incident status and also in order to gain approval to purchase the required equipment. 12. Prepare the site for implementation so equipment can be enabled as soon as possible after arrival. 13. Obtain equipment once it arrives and begin installation procedures. 14. Monitor equipment to ensure successful implementation and avoidance of identical failure. 15. Notify administration of equipment implementation and current incident status. 16. If the fire existed in the IT Systems offices and a temporary location has been used to setup the existing equipment, begin making plans to move the equipment to its new, eventual permanent location. 1. In the event of a potential flood, monitor the weather (flood warnings, flash flood warnings, etc.) and notify all IT Systems staff of the potential for flood. 2. Since our internet connection enters the campus through the library and our data storage is located in our IT Systems offices, determine if the library or IT offices are vulnerable to the flood. These two buildings are Connors State College Information Technology Systems

14 Connors State College Page 14 top priority. Gatlin Hall is secondary priority with other buildings following thereafter. 3. If any building, other than the priority buildings are in danger, and the priority buildings themselves are safe, steps should be made to protect the equipment on these buildings as noted in steps 4 through If any of these buildings are found to be vulnerable then steps must be made to preempt the flood and shut power down to the endangered equipment or possibly to the entire building before the water comes into contact with any electrical connections. 5. If step four results in the necessity to shut down power to the IT Systems offices or the library equipment, please see the Power Outage section below for detailed instructions. 6. If the water is in danger of reaching any equipment on the first floors of the library or IT Systems offices, the endangered equipment must be moved onto desks at least feet above the ground. 7. If there is any evidence that the water may overtake a building or any endangered equipment, evacuation of the equipment is a priority, however, if evacuation cannot take place, move the equipment to the highest safe point in the building. 8. Once the equipment is safe in all affected buildings, monitor the weather to verify when the water will recede. 9. Once the water recedes, work with cleaning crews to ascertain the steps needed to move the equipment back to its original location and restore power to the buildings affected. If the original location cannot be used, determine the new location where the equipment will reside. Human Error 1. Contact all IT Systems staff and notify them of the extent of the error. 2. Determine the significance of the failure and how detrimental it is towards the College. 3. Determine if any equipment replacements are required. If so, go to step 4. If not, go to step Gather the needed equipment replacements, if available on campus. 5. If equipment is not readily available on campus, check with local vendors to see if the desired equipment is available. 6. If steps 3 and 4 do not gain the equipment needed, check with vendors to obtain equipment and possibly use overnight or same-day shipping service to expedite the order. 7. Contact administration to update them on the incident status and also in order to gain approval to purchase the required equipment. 8. Prepare the site for implementation so equipment can be enabled as soon as possible after arrival. 9. Obtain equipment once it arrives and begin installation procedures. 10. Monitor equipment to ensure successful implementation and avoidance of identical failure. Go to step 13. Connors State College Information Technology Systems

15 Connors State College Page Resolve the human error as quickly as possible, using any available resources. 12. Notify administration of equipment implementation and current incident status. Lightning 1. Determine the location that the lightning struck. 2. Determine if any PCs at this location have suffered a surge and if any equipment failures are present. 3. If there is affected equipment present and they have possible hardware failures, see Equipment Failure scenario. 4. If there is a fire present please see the Fire scenario. 5. If everything at the affected location is in working order, begin checking (and possibly replacing) the surge protectors near the affected area. 6. Scan the remainder of the campus to verify that no other areas were affected by the lightning. Malicious Software 1. Contact all IT Systems staff. 2. Determine the significance of the infection and how detrimental it is towards the College. 3. Quarantine the affected equipment to prevent spreading the malicious software. 4. If multiple machines are found to be affected then quarantine them, if possible. 5. If quarantine is not possible, then ascertain what kind of malicious software is present. 6. If the software is being used to harm another entity outside of the College, then internet access may be shut off to the affected equipment, or even the entire campus prevent the attack from happening to the outside entity. 7. If the software is being used to harm equipment within the College, then internet access may also need to be shut off to the affected equipment, or even the entire campus to prevent the attack from continuing. 8. Once the affected equipment is essentially quarantined, clean the affected equipment. 9. Continually scan the network for traces of the malicious software. 10. Once the network is found to be clean, allow the affected equipment to be added back to the network. 11. Monitor the network closely for the next 24 hours and if any other traces are found of the malicious software, repeat this scenario again. 12. If, at any point, a data server is compromised, affected, or attacked, internet access to the College will be immediately severed and cleaning procedures will begin to rid the data server of the malicious software. 13. If a data server is compromised beyond repair, the equipment will be Connors State College Information Technology Systems

16 Connors State College Page 16 wiped and a new install will be made from a clean backup which will be verified by scanning this backup before implementing it. 14. Notify administration of the current incident status. Power Outage 1. Notify any and all IT Systems employees of the power outage. 2. All IT Systems employees must report to the first floor of our office building to begin the power outage shutdown process. Each employee receives a flashlight for working in the dark. 3. Power down equipment in the IT Systems offices. 1. Power down the data servers individually in the IT Systems offices. 2. Power down the phone system servers in the IT Systems offices. 3. Power down the core switch downstairs from the IT Systems offices. 4. Power down equipment in the Library. 1. Power down the CSC equipment in the OneNet room. 2. Do not turn off the OneNet equipment. 5. Power down equipment in Gatlin Hall. 1. Power down the switches linking the core offices in the IT Helpdesk room. 6. Contact Administration, Maintenance, and other departments if necessary to notify them of the power outage and its effect on the campus computing environment. 7. Once power is restored, restore power to the equipment in reverse order. 8. Power up equipment in the Library. 1. Power up the CSC equipment in the OneNet room. 2. Verify that the OneNet equipment is operational. 9. Power up equipment in the IT Systems offices. 1. Power up the core switch downstairs from the IT Systems offices. 2. Power up the data servers individually in the IT Systems offices. 3. Power up the phone system servers in the IT Systems offices. 10. Power up equipment in Gatlin Hall. 1. Power up the switches linking the core offices in the IT Helpdesk room. 11. Verify connectivity across campus. Terrorist Attack 1. At any point through a potential terrorist attack, abiding by the rules and advice of local law enforcement is crucial and should be regarded as top priority. This guide should only be followed if recommended by law enforcement and as long as the process does not endanger any lives. 2. In the event of a potential terrorist attack, report the incident to local police and College administration and notify all IT Systems staff of the current status of the College. 3. Continually monitor the local news for updates. Connors State College Information Technology Systems

17 Connors State College Page 17 Theft 4. Since our internet connection enters the campus through the library and our data storage is located in our IT Systems offices, determine if the library or IT Systems offices are vulnerable. These two buildings are top priority. Gatlin Hall is secondary priority with other buildings following thereafter. 5. If any building, other than the priority buildings are in danger, and the priority buildings themselves are safe, steps should be made to protect the equipment in these buildings as noted in steps 4 through If any of these buildings are found to be vulnerable then steps must be made to preempt the attack and lock down the endangered equipment or possibly shut down power to the entire building. 7. If a building must be locked down, we shall do so remotely and cycle all passwords to a value agreed upon by a majority of the members of the disaster recovery group at that time. 8. If any of the priority buildings are in danger, the buildings are to be immediately locked down locally, if possible, or remotely. 9. Once the equipment is safe in all affected buildings, monitor the current status of the situation. 10. Once the incident is resolved, work with local law enforcement to ascertain the steps needed to return all equipment back on and powered up to its original status. 1. Report theft of equipment to local police and College administration. 1. Muskogee Police Department Warner Police Department Place an incident report with Oklahoma OSF (Office of State Finance) on their Cyber Security Portal. 3. Inventory all details of the equipment, specifically, where the equipment was last located, the last person to use the equipment, and any specific identifying information (S/N, CSC#, Make, Model, etc.). 4. Maintain contact with local law enforcement and CSC administration to provide more information if needed. Tornado 1. In the event of a potential tornado, monitor the weather and notify all IT Systems staff of the potential for a tornado. 2. Secure all data backups in the safe. 3. Take cover in the lowest, interior area of the building you are in. 4. Once tornado has passed, assess damages to the campus buildings. 5. Since our internet connection enters the campus through the library and our data storage is located in our IT Systems offices, determine if the library or IT Systems offices and equipment are intact. These two buildings are top priority. Gatlin Hall is secondary priority with other Connors State College Information Technology Systems

18 Connors State College Page 18 buildings following thereafter. 6. If any building, other than the priority buildings are affected, and the priority buildings themselves are intact, steps should be made to begin the recovery process for these buildings. 7. If the priority buildings are affected, 8. Once the tornados dissipate, work with cleaning crews to ascertain the steps needed to move the equipment back to its original location and restore power to the buildings affected. Connors State College Information Technology Systems

19 Connors State College Page 19 Other Important Information: A copy of this plan will be located in the following areas: o Warner Campus, IT Systems Director s Office, Floor Safe o Warner Campus, President s Office o Warner Campus, Maintenance Office o Muskogee Campus, IT Systems Office, Floor Safe CSC IT Systems Full-Time Staff: o Heath Hodges, Director of IT Systems heathah@connorsstate.edu o Kevin Isom, Network Administrator kevinwi@connorsstate.edu o Neil Myers, Desktop Administrator cecilnm@connorsstate.edu CSC Maintenance: o Dale Berry, Director of Physical Plant kberry@connorsstate.edu o Larry Todd, Supervisor Custodians, Maintenance ltodd@connorsstate.edu CSC Administration: o Dr. Donnie Nero, President ndonnie@connorsstate.edu o Dr. JoLynn Digranes, Executive Vice President jdigran@connorsstate.edu Connors State College Information Technology Systems

20 Connors State College Page 20 Other Important Information (Continued): Connors State College, Warner Campus RR 1 Box 1000 Warner, OK Connors State College, Muskogee Downtown Campus 201 Court St. Muskogee, OK Connors State College, Muskogee Three Rivers Port Campus 2501 N. 41 st St. East Muskogee, OK Connors State College Information Technology Systems

21 Connors State College Page 21 Resources: NIST Special Publication SANS Institute Disaster Recovery: Survivability and Security Oklahoma State University Policies and procedures University of Arkansas Policies and Procedures Connors State College Information Technology Systems

22 Connors State College Page 22 The CSC IT Systems department strives to serve the Connors State College faculty, staff, and students by modifying this Disaster Recovery Plan as often as possible and also as quickly as possible when significant information within the plan changes. We apologize for any incorrect data that may have been inadvertently provided. Suggestions for improvement and notifications of incorrect data are always welcome and encouraged. These can be sent to our staff via Thank you. CSC IT Systems Connors State College Information Technology Systems

Business Continuity Planning (BCP) / Disaster Recovery (DR)

Business Continuity Planning (BCP) / Disaster Recovery (DR) Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

Disaster Recovery Plan for Center Moriches School District Information Technology Operations

Disaster Recovery Plan for Center Moriches School District Information Technology Operations 1900 Disaster Recovery Plan for Center Moriches School District Information Technology Operations I. Plan Overview II. Plan Approval III. Disaster Declaration IV. Plan Activation V. Plan Overview, Objectives

More information

Massachusetts Institute of Technology. Functional Area Recovery Management Team Plan Development Template

Massachusetts Institute of Technology. Functional Area Recovery Management Team Plan Development Template Massachusetts Institute of Technology Functional Area Recovery Management Team Plan Development Template Public Distribution Version For further information, contact: Jerry Isaacson MIT Information Security

More information

Disaster Recovery Plan

Disaster Recovery Plan Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the

More information

CHEEKTOWAGA CENTRAL SCHOOL DISTRICT TECHNOLOGY SERVICES DISASTER RECOVERY PLAN. Rev. 3/15/2012

CHEEKTOWAGA CENTRAL SCHOOL DISTRICT TECHNOLOGY SERVICES DISASTER RECOVERY PLAN. Rev. 3/15/2012 CHEEKTOWAGA CENTRAL SCHOOL DISTRICT TECHNOLOGY SERVICES DISASTER RECOVERY PLAN Rev. 3/15/2012 TABLE OF CONTENTS PART I. INTRODUCTION INTRODUCTION PLAN DISTRIBUTION PART II. DESIGN OF THE PLAN OVERVIEW

More information

ICT Disaster Recovery Plan

ICT Disaster Recovery Plan 7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the

More information

Workforce Solutions Business Continuity Plan May 2014

Workforce Solutions Business Continuity Plan May 2014 Workforce Solutions Business Continuity Plan May 2014 Contents 1. Purpose... 3 2. Declaration of Emergency... 4 3. Critical Operations... 4 3.1 Communication... 4 3.1.1 Internal Communication During Emergencies...

More information

DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS

DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble

More information

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,

More information

IT Service Management

IT Service Management IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

Birkenhead Sixth Form College IT Disaster Recovery Plan

Birkenhead Sixth Form College IT Disaster Recovery Plan Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Business Continuity Planning (BCP) / Disaster Recovery (DR)

Business Continuity Planning (BCP) / Disaster Recovery (DR) Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made

More information

How To Plan For A Disaster At The University Of Texas

How To Plan For A Disaster At The University Of Texas Disaster Recovery Planning The Process Introduction We began our planning processes after experiencing several disasters, including a building fire, an environmental contamination, faulty discharge of

More information

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business. www.integrit-network.com

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business. www.integrit-network.com Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business www.integrit-network.com Business Continuity & Disaster Survival Strategies for the Small & Mid Size Business AGENDA:

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Draft ICT Disaster Recovery Plan

Draft ICT Disaster Recovery Plan Draft ICT Disaster Recovery Plan Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction...3 1.1 Objectives of the Disaster Recovery Policy/plan... 3 2. 0 Disaster

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

How to Plan for Disaster Recovery

How to Plan for Disaster Recovery ImproMed LLC How to Plan for Disaster Recovery Revised January 27, 2015 2015 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Contract # 04-06. Accepted on: March 29, 2005. Starling Systems. 711 S. Capitol Way, Suite 301 Olympia, WA 98501

Contract # 04-06. Accepted on: March 29, 2005. Starling Systems. 711 S. Capitol Way, Suite 301 Olympia, WA 98501 Disaster Recovery Plan Starling Systems Deliverable #15 - Draft I Contract # 04-06 Accepted on: March 29, 2005 Starling Systems 711 S. Capitol Way, Suite 301 Olympia, WA 98501 DISASTER RECOVERY PLAN TABLE

More information

OKHAHLAMBA LOCAL MUNICIPALITY

OKHAHLAMBA LOCAL MUNICIPALITY OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1 Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4

More information

Disaster Recovery and Business Continuity Plan

Disaster Recovery and Business Continuity Plan Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix

More information

Remote Backup Solution: Frequently Asked Questions

Remote Backup Solution: Frequently Asked Questions Remote Backup Solution: Frequently Updated December 2014 Contents What is ECi Remote Backup?...3 What Levels of Protection are Available?...3 Why is ECi Remote Backup Important for Disaster Recovery?...3

More information

DISASTER RECOVERY PLAN

DISASTER RECOVERY PLAN DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and

More information

APPENDIX 7. ICT Disaster Recovery Plan

APPENDIX 7. ICT Disaster Recovery Plan APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 15 th October 2013 Signed: Chair of Governors Date: Ratified: Oct 2013 Review: Sep

More information

Wiley College Information Technology (IT) Disaster Recovery Plan

Wiley College Information Technology (IT) Disaster Recovery Plan Wiley College Information Technology (IT) Disaster Recovery Plan Dr. Haywood L. Strickland President and CEO Submitted by: Nathaniel E. Hewitt, III Vice President for Information Systems and Technology

More information

How To Prepare For A Disaster

How To Prepare For A Disaster Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services 3/26/2013 #1 Continuity Plan Testing Flowchart 3/26/2013 #2 1 Ongoing Multi-Year

More information

Read this guide and you ll discover:

Read this guide and you ll discover: BUSINESS ADVISOR REPORT Provided as an educational service by: Rick Reynolds, General Manager Read this guide and you ll discover: What remote, offsite, or managed backups are, and why EVERY business should

More information

MARQUIS DISASTER RECOVERY PLAN (DRP)

MARQUIS DISASTER RECOVERY PLAN (DRP) MARQUIS DISASTER RECOVERY PLAN (DRP) Disaster Recovery is an ongoing process to plan, develop, test and implement changes, processes and procedures supporting the recovery of the critical functions in

More information

Cyber Self Assessment

Cyber Self Assessment Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

What You Should Know About Cloud- Based Data Backup

What You Should Know About Cloud- Based Data Backup What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com

More information

SAMPLE IT CONTINGENCY PLAN FORMAT

SAMPLE IT CONTINGENCY PLAN FORMAT SAMPLE IT CONTINGENCY PLAN FORMAT This sample format provides a template for preparing an information technology (IT) contingency plan. The template is intended to be used as a guide, and the Contingency

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

Situation Manual Orange County Florida

Situation Manual Orange County Florida Situation Manual Orange County Florida 530 Minutes Situation Manual Tabletop Exercise 1 Disaster Resistant Communities Group www.drc-group.com Comeback Ordeal Start Exercise During the exercise it will

More information

DISASTER RECOVERY PLANNING

DISASTER RECOVERY PLANNING I Identify Critical Systems and Vital Records. Vital records are those records that if destroyed, lost, or inaccessible would cause severe difficulty in operating, or would cause probable financial loss.

More information

Perforce Backup Strategy & Disaster Recovery at National Instruments

Perforce Backup Strategy & Disaster Recovery at National Instruments Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

APPENDIX 7. ICT Disaster Recovery Plan

APPENDIX 7. ICT Disaster Recovery Plan APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval

More information

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Expecting the Unexpected. Disaster Preparedness Strategies for Small Business

Expecting the Unexpected. Disaster Preparedness Strategies for Small Business 2009 EDITION Expecting the Unexpected Disaster Preparedness Strategies for Small Business Expecting the Unexpected Disaster Preparedness Strategies for Small Business When it Comes to Disaster Readiness,

More information

Oklahoma Bar Association Disaster Plan

Oklahoma Bar Association Disaster Plan Oklahoma Bar Association Disaster Plan Introduction An emergency is a condition or situation that requires immediate attention beyond what can be provided in a routine manner. An emergency will exist when

More information

PPSADOPTED: OCT. 2012 BACKGROUND POLICY STATEMENT PHYSICAL FACILITIES. PROFESSIONAL PRACTICE STATEMENT Developing a Business Continuity Plan

PPSADOPTED: OCT. 2012 BACKGROUND POLICY STATEMENT PHYSICAL FACILITIES. PROFESSIONAL PRACTICE STATEMENT Developing a Business Continuity Plan PROFESSIONAL PRACTICE STATEMENT Developing a Business Continuity Plan OCT. 2012 PPSADOPTED: What is a professional practice statement? Professional Practice developed by the Association Forum of Chicagoland

More information

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability

More information

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009!

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009! Disaster Recovery Review FREE Promotional Offer Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009! This review is designed to help the small business better

More information

85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff

85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff 85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff Because a business continuity plan affects all functional units within the organization, each functional unit must participate

More information

How to Build a Comprehensive Business Continuity Plan

How to Build a Comprehensive Business Continuity Plan How to Build a Comprehensive Business Continuity Plan Business continuity planning is essential for any business. A business continuity plan carried out effectively will enable any business to continue

More information

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Overview. Responsibility

Overview. Responsibility Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed

More information

How To Handle A Disaster Recovery Plan

How To Handle A Disaster Recovery Plan Page 1 of 9 Policy Statement CSB Policy And Procedures The equipment, software systems, and databases that comprise the ephi System are critical components that enable the [CSB] to function in an effective

More information

SWITCH Library Consortium Disaster Recover Plan Rev. October 2008

SWITCH Library Consortium Disaster Recover Plan Rev. October 2008 SWITCH Library Consortium Disaster Recover Plan Rev. October 2008 Contents: 1. Purpose and Scope 2. Emergency Contact Information 3. Security and Data Backup Policies 4. Recovery of TOPCAT System 5. Recovery

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business Business Continuity & Disaster Survival Strategies for the Small and Mid Size Business AGENDA Welcome / Introduction

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information

RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan. January 23, 2012

RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan. January 23, 2012 RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan January 23, 2012 Purpose and Objectives 2 Disaster Recovery Organizational Structure 3 Appendices: Disaster Recovery Emergency

More information

The Essential Guide for Protecting Your Legal Practice From IT Downtime

The Essential Guide for Protecting Your Legal Practice From IT Downtime The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project

More information

Start Your Disaster Recovery Plan TODAY! Bob Boyd Agility Recovery. To download a copy of the slides, please visit: http://agil.

Start Your Disaster Recovery Plan TODAY! Bob Boyd Agility Recovery. To download a copy of the slides, please visit: http://agil. Start Your Disaster Recovery Plan TODAY! Bob Boyd Agility Recovery To download a copy of the slides, please visit: http://agil.me/agilityplan2day Agenda Prepare to Survive. 1. The Reality of Disasters

More information

How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%.

How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%. How to write a DISASTER RECOVERY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A DRP AND HOW CAN IT HELP MY COMPANY? CHAPTER PREPARING TO WRITE YOUR DISASTER RECOVERY PLAN

More information

Why Should Companies Take a Closer Look at Business Continuity Planning?

Why Should Companies Take a Closer Look at Business Continuity Planning? whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters

More information

LIMCO AIREPAIR, INC. Disaster Plan

LIMCO AIREPAIR, INC. Disaster Plan LIMCO AIREPAIR, INC. Disaster Plan 1 INDEX EMERGENCY CONTACTS!! 5 REVISION CONTROL PAGE..!! 6 PURPOSE! SCOPE..!! 7! PLAN OBJECTIVES...!! 7! ASSUMPTIONS..!! 7! DISASTER DEFINITION..!! 7! RECOVERY TEAMS.!!

More information

Disaster Recovery & Business Continuity. James Adamson Library Systems Office

Disaster Recovery & Business Continuity. James Adamson Library Systems Office Disaster Recovery & Business Continuity James Adamson Library Systems Office Library Management Information Data Services Financial Procurement Cataloging Inventory/searching Circulation Central Library

More information

1. Backup and Recovery Policy

1. Backup and Recovery Policy POLICY TITLE: POLICY #: IT - 2 DATE DRAFTED: 09/23/05 APPROVED DATE: 09/23/05 REVISION DATE: BRIEF DESCRIPTION: Backup and Recovery Policy Minimum requirements for the creation and retention of computer

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

Disaster Recovery: Protect Your Business & Prepare Your Digital Prepress Operations

Disaster Recovery: Protect Your Business & Prepare Your Digital Prepress Operations Eastman Kodak Company 343 State Street Rochester, NY 14650-0238 USA Revision date: March 2014 White Paper Contact Name Robyn Lundstrom PSSG Specialist, KODAK Unified Workflow Solutions robyn.lundstrom@kodak.com

More information

Backup and Recovery Plan For Small Businesses

Backup and Recovery Plan For Small Businesses Backup and Recovery Plan For Small Businesses Disclaimer: This article is intended to serve as an informational reference source. While the information is based on sound principles for backup and recovery,

More information

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: dbird@quatro.com

More information

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS

THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS 1010370-001 ii Contents About This Guide.................. v Why tape is ideal for backup... v automation - now available

More information

Unit Guide to Business Continuity/Resumption Planning

Unit Guide to Business Continuity/Resumption Planning Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Clinic Business Continuity Plan Guidelines

Clinic Business Continuity Plan Guidelines Clinic Business Continuity Plan Guidelines Emergency notification contacts: Primary Role Name Address Home phone Mobile/Cell phone Business Continuity Plan Coordinator QSP Business Continuity Plan Coordinator

More information

All-Hazard Continuity of Operations Plan. [Department/College Name] [Date]

All-Hazard Continuity of Operations Plan. [Department/College Name] [Date] d All-Hazard Continuity of Operations Plan [Department/College Name] [Date] TABLE OF CONTENTS SECTION I: INTRODUCTION... 3 Executive Summary... 3 Introduction... 3 Goal... 4 Purpose... 4 Objectives...

More information

The 7 Disaster Planning Essentials

The 7 Disaster Planning Essentials The 7 Disaster Planning Essentials For Any Small Business Little-Known Facts, Mistakes And Blunders About Data Backup And IT Disaster Recovery Every Business Owner Must Know To Avoid Losing Everything

More information

THE CEO S GUIDE TO BUILDING A FAIL-SAFE DISASTER RECOVERY PLAN

THE CEO S GUIDE TO BUILDING A FAIL-SAFE DISASTER RECOVERY PLAN THE CEO S GUIDE TO BUILDING A FAIL-SAFE DISASTER RECOVERY PLAN By Stuart Avera, Executive Vice President Nexxtep Technology Services, Inc. Nexxtep s Leadership Team About Nexxtep 2010 Nexxtep Technology

More information

Jacksonville University Information Technology Department Disaster Recovery Plan. (Rev: July 2013)

Jacksonville University Information Technology Department Disaster Recovery Plan. (Rev: July 2013) Jacksonville University Information Technology Department Disaster Recovery Plan (Rev: July 2013) Table of Contents Introduction 3 Objectives/Constraints 4 Assumptions 4 Critical Systems 5 Incidents Requiring

More information

Clinic Business Continuity Plan Guidelines

Clinic Business Continuity Plan Guidelines Clinic Business Continuity Plan Guidelines Published: January 2015 Table of Contents Emergency Notification Contacts Primary... 2 Emergency Notification Contacts Backups (in case primary is unavailable)...

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Emergency Operations California State University Los Angeles

Emergency Operations California State University Los Angeles Business Continuity Plan Emergency Operations California State University Los Angeles 1. Objective & Scope 2. Definition of Disaster 3. Risk and Business Impact Analysis Summary 4. Business Continuity

More information

BACKUP SECURITY GUIDELINE

BACKUP SECURITY GUIDELINE Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect

More information

Disaster Recovery Planning

Disaster Recovery Planning NASA IV & V ANNUAL WORKSHOP 202 The 4th International Workshop on Independent Verification & Validation of Software Disaster Recovery Planning Divya Krishnamoorthy Mailam Engineering College, Mailam. (Affiliated

More information

Implementation Date: May 5, 2009. Table of Contents. Section Description Page. 1.0 Description 1. 2.0 Initial Response 2

Implementation Date: May 5, 2009. Table of Contents. Section Description Page. 1.0 Description 1. 2.0 Initial Response 2 Recommended by Emergency Preparedness Committee: April 21, 2009 Recommended by President s Council: May 1, 2009 Approved by Executive Committee: May 5, 2009 NAIT Procedures CS1.2.6 Flood Implementation

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

REGIONAL CENTER DISASTER RECOVERY PLAN

REGIONAL CENTER DISASTER RECOVERY PLAN APPENDIX L REGIONAL CENTER DISASTER RECOVERY PLAN I. ADMINISTRATIVE INFORMATION: A. Introduction to Operational Recovery Plan B. Procedures to update and Distribute ORP C. Process to test ORP D. Plans

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

BACKUP AND CONTIGENCY PLANS (DISASTER RECOVERY)

BACKUP AND CONTIGENCY PLANS (DISASTER RECOVERY) BACKUP AND CONTIGENCY PLANS (DISASTER RECOVERY) PURPOSE The purpose of this policy is to describe the backup and contingency plans, including disaster recovery planning, that will be implemented to ensure

More information

EMERGENCY PREPAREDNESS PLAN FOR

EMERGENCY PREPAREDNESS PLAN FOR EMERGENCY PREPAREDNESS PLAN FOR Name of Child Care Center Provided by: 2014 Emergency Preparedness Plan Page 1 TABLE OF CONTENTS Page I: Introduction... 3 II: Emergency Response Organization... 3 III:

More information

HOME OFFICE POLICY AND PROGRAM. Nebraska Department of Health and Human Services

HOME OFFICE POLICY AND PROGRAM. Nebraska Department of Health and Human Services HOME OFFICE POLICY AND PROGRAM Nebraska Department of Health and Human Services Effective Date August 7, 2008 TABLE OF CONTENTS Introduction... 1 Policy... 1 Applicability... 1 Principles of Home Officing...

More information