Connors State College
|
|
- Rebecca Carter
- 8 years ago
- Views:
Transcription
1 Connors State College Page 1 Connors State College IT Systems Disaster Recovery Plan Connors State College Information Technology Systems
2 Connors State College Page 2 Disclaimer: The techniques for backup and recovery used in this plan do not guarantee zero data loss nor do they guarantee a level of zero downtime. The College Administration and personnel is willing to assume the risk of data loss and the possibility of operating without computing resources for a period of time after a disaster. Data recovery efforts in this plan are targeted at restoring systems to a functional level with the latest available intact backup sources. Significant effort will be made after primary system operation is restored to restore data integrity back to the point immediately prior to the disaster and also to combine that data with any new data collected from the point immediately following the disaster. This plan does not attempt to cover either of these two important aspects of data recovery. Instead, individual users and departments will need to develop their own Disaster Recovery Plans to cope with the unavailability of the computing systems during the restoration phase of this plan and to cope with the potential and unexpected loss of data and computing resources. This plan is a work in progress and is therefore a living document that is updated constantly. Please contact the CSC IT Systems department at it@connorsstate.edu to verify that you are using the most current revision. Connors State College Information Technology Systems
3 Connors State College Page 3 Introduction All Disaster Recovery Plans assume a certain amount of risk. Primarily, this refers to data lost during a disaster. There are compromises between the amount of time, effort, and money spent on the planning and preparation before, during, and after a disaster and the amount of data loss that can be sustained while still remaining operational. Many organizations simply cannot function without computers and the data required for it to be operational. Due to this, their recovery efforts may focus on quick recovery, or possibly even zero downtime, thus resulting in more expenses. Other organizations, however, may be able to accept a reasonable amount of downtime in order to save on expenses while still recovering their data and systems in a reasonable amount of time. And still yet, there are those organizations that cannot afford any type of recovery option. They are relying on their primary equipment and have no plan in place should a disaster occur. It should be noted that few organizations can successfully obtain a level of zero downtime through a disaster and few organizations want to be one that has no plan in place. A compromise of all of the above plans, that is one that provides recovery as quickly and efficiently as possible while keeping recovery costs to a minimum, is one that is desired by our institution. Background Connors State College is a two-year community college offering a variety of college-level courses. Currently Connors State College offers courses to approximately 2,000 students and employs approximately 200 faculty members and support staff. The Connors State College Information Technology Systems staff consists of three individuals: the Director of IT Systems, the Network Administrator, and the Desktop Administrator. These positions are complemented by two part-time positions as well as several student workers at any given time. Other relevant positions are located throughout the College and are very important to the overall success of the Disaster Recovery Plan. CSC Information Technology Systems manages equipment that consists of servers, switches, wireless access points, workstations, security devices, and other equipment. These devices are located across three geographically separated locations: one primary location in Warner, OK and two branch locations in Muskogee, Oklahoma. Connors State College Information Technology Systems
4 Connors State College Page 4 Focus of the Plan The primary focus of this document is to provide a plan to respond to a disaster that severely cripples or possibly destroys the Information Technology Systems infrastructure. The primary intent of this plan is to restore operations to the College as quickly and accurately as possible with the latest and most current data available. Objectives of the Plan 1. Present an orderly course of action for restoring critical computing capability to the affected CSC campus(es) within 14 days of initiation of the plan. 2. Set criteria for making the decision to recover at a cold site or repair the affected site(s). 3. Develop an organizational structure for carrying out the plan including providing information concerning personnel that will be required to carry out the plan and the computing expertise required to completely fulfill the plan. 4. Identify the equipment, floor plan, procedures, and other items necessary for the quickest and most complete data recovery process possible in the given situation. Overview of the Plan Damage Assessment This damage assessment is a preliminary step intended to establish the extent of damage to critical hardware, software, and other relative equipment as well as the facility that houses it. The primary goal is to determine where the recovery should take place and what hardware must be ordered immediately to aid in the recovery process. The recovery personnel should be liberal in their estimate of the time required to repair or replace a damaged resource. They must take into consideration cases where one repair cannot take place concurrently with another repair. This may be due to personnel limitations or perhaps chronological limitations that require one step to be completed before another step is begun. Estimates of repair time should include ordering, shipping, installation, and testing time. In considering the hardware items, we must separate items into two groups. One group will be composed of items that are missing or destroyed, thus termed unsalvageable. The second will be those that are neither missing nor destroyed but may be repaired. These "salvageable" items will have to be evaluated by hardware engineers and repaired as necessary. Based on input from Connors State College Information Technology Systems
5 Connors State College Page 5 this process, the recovery personnel can begin the process of acquiring replacements. With respect to the facility, the evaluation of the damage to the building structure, electrical system, air conditioning, and any other utilities should be conducted. If estimates from this process indicate that a recovery at the original, primary site will require more than 14 days, migration to the cold site is recommended. Personnel Immediately following a disaster, a planned sequence of events begins. Key personnel are notified and the Recovery Team is grouped to implement the plan. Personnel currently employed are listed in the plan. However, the plan has been designed to be usable even if some or all of the personnel are unavailable. In a disaster we must remember that people are our most valuable resource. The recovery personnel at the College who are working to restore the computing systems will likely be working at great personal sacrifice, especially in the early hours and days following a disaster. These personnel may have injuries hampering their physical abilities. The loss or injury of a loved one or coworker may affect their emotional ability. These individuals will most likely have physical needs such as those for food, shelter, and sleep. The College must take special pains to ensure that the recovery workers are provided with resources to meet their physical and emotional needs. This plan calls for the appointment of an individual whose job will be to secure these resources so they can concentrate on the task at hand. Appointment of Recovery Manager The first order of business is to appoint a Recovery Manager. The person most appropriate for this position is the current Director of Information Technology Systems. If, for any reason, the Director is unavailable, the appointment should be made by the Executive Vice President and/or by the President. This person must have information technology management experience and must have signature authority for the expenditures necessary during the recovery process. In any case that an appropriate person to fulfill these duties cannot be found within the institution, an appropriate third-party individual may be hired fulfill these duties. Establish the Recovery Management Site Connors State College Information Technology Systems
6 Connors State College Page 6 The Recovery Management Site is the location from which the disaster recovery process will be initially coordinated. This site may also serve as a longterm recovery coordination site. The Recovery Manager should designate where the Recovery Management Site is to be established. The recommended Recovery Management Site would be the current IT Systems offices where the current data equipment is currently located; however, in the event of a disaster this location may not be available. The next recommended location would be any available location adjacent to the designated recovery site to aid in communication. Salvage Operations at Disaster Site Early efforts of the disaster recovery are targeted at protecting and preserving the computer equipment that was affected. In particular, any sensitive devices such as magnetic storage media (hard drives, magnetic tapes, diskettes) are identified and either protected from the elements or removed to a clean, dry environment away from the Disaster Site. Designate Recovery Site During early operations of the Disaster Recovery Plan a survey of the disaster scene is done by appropriate recovery personnel to estimate the amount of time required to put the current facility and equipment (in this case, the building, utilities, and computing equipment) back into working order. A decision is then made whether to use a cold site. This site would be a location some distance away from the scene of the disaster where computing and networking capabilities can be temporarily restored until the primary site is ready. Most likely, the cold site will be at one of our alternative campus locations as long as it was not affected by the initial disaster. Regardless of whether the current site or a cold site is selected, work will begin almost immediately at repairing or rebuilding any of the damages sustained at the primary site. This repairing and rebuilding process may take months, the details of which are beyond the scope of this document. Purchase New Equipment The recovery process relies heavily upon vendors and our relationship(s) with those vendors to quickly provide replacements for the resources that cannot be salvaged. The College will rely upon emergency procurement procedures that are approved by the College's purchasing office to quickly place orders for equipment, supplies, software, and any other needs necessary for the complete recovery of the computing systems. Begin Reassembly at Recovery Site Connors State College Information Technology Systems
7 Connors State College Page 7 Any and all necessary salvaged and new components are reassembled at the Recovery Site as quickly and accurately as possible. Since all plans of this type are subject to the inherent changes that occur in the computer industry, it may become necessary for recovery personnel to deviate from the plan, especially if the plan has not been properly kept up-to-date. If vendors cannot provide a certain piece of equipment on a timely basis, it may be necessary for the recovery personnel to make last-minute equipment substitutions which may delay the recovery process. Restore Data from Backups Once the equipment reassembly phase is completed, the work turns to concentrate on the data recovery procedures. Data recovery relies entirely upon the use of backups stored in locations off-site from the primary site and possibly any up-to-date data or backups still intact from the initial site. Backups can be in the form of magnetic tape, CDROMs, disk drives, hard drives, and other storage media. Early data recovery efforts focus on restoring the operating system(s) for each computer system. Next, first line recovery of applications and user data from the backup sources or existing, intact primary site storage devices is completed. Individual application owners may need to be involved at this point, so each major application area is reviewed individually to ensure that data is restored properly and completely. Restore Applications Data At this point, the Disaster Recovery Plans for users and departments (e.g., the application owners) must merge with the completion of the Computing Services plan. Since some time may have elapsed between the last and most current off-site backup time and the time of the disaster, application owners must have a way to restore each running application database to the point of the disaster. Application owners must also be able to take all new data collected since the time of the disaster and input it into the application database for a completely up-to-date database. When this process is complete, the College Information Technology Systems division can resume normal operations. Move Back to Restored Permanent Facility If the recovery process was able to be successfully completed at the initial site, then this step may be skipped. If this is true and the process was able to take place at the initial site then it will have already ensured that the computing systems are already located at a site that will provide a long-term location for the permanent installation of the recovered systems. However, if the recovery process has taken place at a cold site, physical restoration of the initial site (or an alternate facility) will have already begun. Connors State College Information Technology Systems
8 Connors State College Page 8 When this facility is ready for occupancy, the systems assembled at the cold site are to be moved back to their permanent, long-term home. This plan does not attempt to address the logistics of this move, which should be vastly less complicated than the work done to do the recovery itself at the cold site. Only let it be said that the move should be done as the plan itself: as quickly, carefully, and accurately as possible. Connors State College Information Technology Systems
9 Connors State College Page 9 Activating the Disaster Recovery Plan The appointment of a Recovery Manager sets the plan into motion. Early steps to take are as follows: 1. The Recovery Manager is to appoint the remaining members of the Recovery Team. This should be done in consultation with remaining members of the Information Technology Systems staff as well as Physical Plant management and staff along with help and approval of the College Administration. 2. The Recovery Manager is to call a meeting of the Recovery Team. The following agenda is suggested for this meeting: a) Each member of the Recovery Team is to be given distinct areas of responsibility and must review the status of these respective areas. b) After this review, the Recovery Team makes the final decision about where the recovery will take place. c) The Recovery Manager briefly reviews the Disaster Recovery Plan with the Recovery Team. d) Any adjustments to the Disaster Recovery Plan to any accommodate special circumstances are to be discussed and decided upon by the Recovery Team. e) Each member of the Recovery Team is charged with fulfilling his/her respective role in the recovery and to begin work as scheduled in the DRP. f) Each member of the Recovery Team is to review the makeup of any jobspecific, sub-categorized Recovery Teams that may need to be created. If an individual, key to a Recovery Team is unavailable, the Recovery Manager, along with the help of the Recovery Team and College Administration, is to assist in locating an individual who has the skills and experience necessary to adequately complete the Recovery Team. This individual may be acquired from outside the College, perhaps from other area computer centers or vendors. g) The next meeting of the Recovery Team is scheduled. It is suggested that the Recovery Team meet at least once each day for the first week of the recovery process. Once the first week is completed, the future frequency of recovery meetings is to be decided by the Recovery Team upon a proper review of the recovery status at that point. 3. The Recovery Team members are to immediately begin the process of contacting any people who will be required to help them fulfill their aspect of the recovery process. Meetings with these other individuals can be scheduled in order to set in motion each sub-categorized part of the recovery. 4. The Physical Plant management representative is responsible for immediately clearing and procuring the recovery location for occupation by the Recovery Team. This includes the immediate relocation of any personnel currently occupying the location. The Physical Plant management representative should be Connors State College Information Technology Systems
10 Connors State College Page 10 given any assistance that is needed in locating basic facilities and equipment for the recovery location. These may include, but are not limited to: a) Office desks, chairs, filing cabinets, etc. b) Telephones, cellular phones, and other communication devices. c) Personal computers. (Pentium 4, 512MB memory, 80.0GB hard drive, 128MB video card, SVGA 17-inch monitor, 56.6K modem, Ethernet card, CDROM drive, 3.5-inch diskette drive, keyboard, mouse, etc.) d) Printers. e) Fax machines. f) Copiers. 5. Communications are critical in the recovery process. As mentioned in section 4 above, these can include analog telephones, cellular phones, or any other type of communication device. Of all communication types, mobile communications will be, perhaps, the most important communication method during the early, if not all, phases of the recovery process. This will provide constant communication between Recovery Team members that can only be obtained through mobile equipment. This equipment requirement can be satisfied through the use of cellular telephones, two-way radios, or other portable electronic communication devices. Physical Plant has two-way radio units available as does the IT Systems department. 6. Once, the Recovery Team is composed, the Recovery Site is ready, and communication between members is intact, the Recovery Team may begin carrying out the Disaster Recovery Plan. Connors State College Information Technology Systems
11 Connors State College Page 11 Disaster Recovery Scenarios Equipment Failure Equipment failures are always a possibility. Having access to equipment replacements in a short amount of time is crucial. Fire There is always a possibility for fire. Usually, this type of disaster results in total devastation. Quick response from the local fire department is crucial. Flood There is always the possibility of a flood. However, in our service areas floods seldom occur. Human Error Human error is always a possibility. Whether this is referring to a software-based or hardware-based error, steps can be made prior to the discovery of an error by re-checking settings and configurations. Lightning The potential for lightning is always high, especially in an area where thunderstorms are prevalent. Lightning not only presents the potential for damaging single pieces of equipment but can also start fires. Power Outage Power outages may occur alone or in combination with any of the scenarios listed here and usually shut the entire campus down. Terrorist Attack Although unlikely, a terrorist attack is still a situation that can occur. This type of scenario can result in many of the other scenarios listed here such as equipment failures, fire, power outage, or theft. Theft This may be the most difficult scenario to plan for but steps can be made to prevent thefts. Tornado Tornados are also rampant in Oklahoma but one has never set down near the College. However, as unlikely as it may seem, a tornado is always perceived as a legitimate threat. However, the devastation involved with a tornado would most likely ensure the total loss of hardware, software, and data on the campus. Malicious Software Any kind of malicious software is always a threat, especially to software installations. Other As always, there are unknown problems that can occur that may disrupt availability of resources. Because of this, we cannot configure a proper step-by-step guide. In this case user discretion will take precedence. Connors State College Information Technology Systems
12 Connors State College Page 12 Disaster Recovery A Step-By-Step Guide Depending on the number of IT Systems employees readily available, multiple steps can be accomplished at the same time. If only one employee is available, however, the steps should be followed in order. If additional employees are available, then each employee moves to the next step and so on until the entire process is completed in order. Note: Do not skip any steps. Throughout all of these scenarios, data and equipment are deemed top priority due to the nature of the recovery process. However, the respect for human life should not be ignored and should be the foremost concern in every individual s mind while completing this process. Data can eventually be replaced but a human life can never be replaced. We do not recommend anyone risking their life or the lives of others to save any data through any of these scenarios. Please use your own judgment while completing these scenarios and protect yourself and others around you from harm. Equipment Failure Fire 1. Contact all IT Systems staff. 2. Determine the significance of the failure and how detrimental it is towards the College. 3. Gather the needed equipment replacements, if available on campus. 4. If equipment is not readily available on campus, check with local vendors to see if the desired equipment is available. 5. If steps 3 and 4 do not gain the equipment needed, check with vendors to obtain equipment and possibly use overnight or same-day shipping service to expedite the order. 6. Contact administration to update them on the incident status and also in order to gain approval to purchase the required equipment. 7. Prepare the site for implementation so equipment can be enabled as soon as possible after arrival. 8. Obtain equipment once it arrives and begin installation procedures. 9. Monitor equipment to ensure successful implementation and avoidance of identical failure. 10. Notify administration of equipment implementation and current incident status. 1. Once fire begins, efforts should be made to contain the fire if possible (i.e. Fire Extinguisher, Fire Blanket, etc. if available). If fire is too large, EVACUATE THE BUILDING. 2. Call local Fire Department to notify them of fire: 1. Muskogee Fire Department Warner Fire Department Connors State College Information Technology Systems
13 Connors State College Page 13 Flood 3. Once the fire has been contained and permission is granted from the Fire Department, visit the location to determine the severity of the fire and the effected equipment. 4. If the fire affected the IT Systems offices, check that the fire-proof safe is intact and able to be retrieved. 5. If step 4 results in the ability to retrieve the safe, verify that the backups are good and verifiable. 6. If step 4 does not result in the ability to retrieve the safe or the fire-proof safe is not intact or available for retrieval, immediately send one member of the IT Systems staff to go to Muskogee to obtain a copy of the required software and paperwork from the safe located in the IT Systems office at the Muskogee Downtown Haskell Building. 7. If any servers or other significant equipment sustained damage and are unrecoverable, utilize the backups present from steps 4 and Backups are contained in the Warner fire-proof safe & also in the Muskogee Downtown Campus safe. 2. Backups are archived every week on Thursday Morning. This archive contains all the daily backups of the week from Thursday, Friday, Saturday, Monday, Tuesday, and Wednesday. 8. Gather the needed equipment replacements, if available on campus. 9. If equipment is not readily available on campus, check with local vendors to see if the desired equipment is available. 10. If steps 3 and 4 do not gain the equipment needed, check with vendors to obtain equipment and possibly use overnight or same-day shipping service to expedite the order. 11. Contact administration to update them on the incident status and also in order to gain approval to purchase the required equipment. 12. Prepare the site for implementation so equipment can be enabled as soon as possible after arrival. 13. Obtain equipment once it arrives and begin installation procedures. 14. Monitor equipment to ensure successful implementation and avoidance of identical failure. 15. Notify administration of equipment implementation and current incident status. 16. If the fire existed in the IT Systems offices and a temporary location has been used to setup the existing equipment, begin making plans to move the equipment to its new, eventual permanent location. 1. In the event of a potential flood, monitor the weather (flood warnings, flash flood warnings, etc.) and notify all IT Systems staff of the potential for flood. 2. Since our internet connection enters the campus through the library and our data storage is located in our IT Systems offices, determine if the library or IT offices are vulnerable to the flood. These two buildings are Connors State College Information Technology Systems
14 Connors State College Page 14 top priority. Gatlin Hall is secondary priority with other buildings following thereafter. 3. If any building, other than the priority buildings are in danger, and the priority buildings themselves are safe, steps should be made to protect the equipment on these buildings as noted in steps 4 through If any of these buildings are found to be vulnerable then steps must be made to preempt the flood and shut power down to the endangered equipment or possibly to the entire building before the water comes into contact with any electrical connections. 5. If step four results in the necessity to shut down power to the IT Systems offices or the library equipment, please see the Power Outage section below for detailed instructions. 6. If the water is in danger of reaching any equipment on the first floors of the library or IT Systems offices, the endangered equipment must be moved onto desks at least feet above the ground. 7. If there is any evidence that the water may overtake a building or any endangered equipment, evacuation of the equipment is a priority, however, if evacuation cannot take place, move the equipment to the highest safe point in the building. 8. Once the equipment is safe in all affected buildings, monitor the weather to verify when the water will recede. 9. Once the water recedes, work with cleaning crews to ascertain the steps needed to move the equipment back to its original location and restore power to the buildings affected. If the original location cannot be used, determine the new location where the equipment will reside. Human Error 1. Contact all IT Systems staff and notify them of the extent of the error. 2. Determine the significance of the failure and how detrimental it is towards the College. 3. Determine if any equipment replacements are required. If so, go to step 4. If not, go to step Gather the needed equipment replacements, if available on campus. 5. If equipment is not readily available on campus, check with local vendors to see if the desired equipment is available. 6. If steps 3 and 4 do not gain the equipment needed, check with vendors to obtain equipment and possibly use overnight or same-day shipping service to expedite the order. 7. Contact administration to update them on the incident status and also in order to gain approval to purchase the required equipment. 8. Prepare the site for implementation so equipment can be enabled as soon as possible after arrival. 9. Obtain equipment once it arrives and begin installation procedures. 10. Monitor equipment to ensure successful implementation and avoidance of identical failure. Go to step 13. Connors State College Information Technology Systems
15 Connors State College Page Resolve the human error as quickly as possible, using any available resources. 12. Notify administration of equipment implementation and current incident status. Lightning 1. Determine the location that the lightning struck. 2. Determine if any PCs at this location have suffered a surge and if any equipment failures are present. 3. If there is affected equipment present and they have possible hardware failures, see Equipment Failure scenario. 4. If there is a fire present please see the Fire scenario. 5. If everything at the affected location is in working order, begin checking (and possibly replacing) the surge protectors near the affected area. 6. Scan the remainder of the campus to verify that no other areas were affected by the lightning. Malicious Software 1. Contact all IT Systems staff. 2. Determine the significance of the infection and how detrimental it is towards the College. 3. Quarantine the affected equipment to prevent spreading the malicious software. 4. If multiple machines are found to be affected then quarantine them, if possible. 5. If quarantine is not possible, then ascertain what kind of malicious software is present. 6. If the software is being used to harm another entity outside of the College, then internet access may be shut off to the affected equipment, or even the entire campus prevent the attack from happening to the outside entity. 7. If the software is being used to harm equipment within the College, then internet access may also need to be shut off to the affected equipment, or even the entire campus to prevent the attack from continuing. 8. Once the affected equipment is essentially quarantined, clean the affected equipment. 9. Continually scan the network for traces of the malicious software. 10. Once the network is found to be clean, allow the affected equipment to be added back to the network. 11. Monitor the network closely for the next 24 hours and if any other traces are found of the malicious software, repeat this scenario again. 12. If, at any point, a data server is compromised, affected, or attacked, internet access to the College will be immediately severed and cleaning procedures will begin to rid the data server of the malicious software. 13. If a data server is compromised beyond repair, the equipment will be Connors State College Information Technology Systems
16 Connors State College Page 16 wiped and a new install will be made from a clean backup which will be verified by scanning this backup before implementing it. 14. Notify administration of the current incident status. Power Outage 1. Notify any and all IT Systems employees of the power outage. 2. All IT Systems employees must report to the first floor of our office building to begin the power outage shutdown process. Each employee receives a flashlight for working in the dark. 3. Power down equipment in the IT Systems offices. 1. Power down the data servers individually in the IT Systems offices. 2. Power down the phone system servers in the IT Systems offices. 3. Power down the core switch downstairs from the IT Systems offices. 4. Power down equipment in the Library. 1. Power down the CSC equipment in the OneNet room. 2. Do not turn off the OneNet equipment. 5. Power down equipment in Gatlin Hall. 1. Power down the switches linking the core offices in the IT Helpdesk room. 6. Contact Administration, Maintenance, and other departments if necessary to notify them of the power outage and its effect on the campus computing environment. 7. Once power is restored, restore power to the equipment in reverse order. 8. Power up equipment in the Library. 1. Power up the CSC equipment in the OneNet room. 2. Verify that the OneNet equipment is operational. 9. Power up equipment in the IT Systems offices. 1. Power up the core switch downstairs from the IT Systems offices. 2. Power up the data servers individually in the IT Systems offices. 3. Power up the phone system servers in the IT Systems offices. 10. Power up equipment in Gatlin Hall. 1. Power up the switches linking the core offices in the IT Helpdesk room. 11. Verify connectivity across campus. Terrorist Attack 1. At any point through a potential terrorist attack, abiding by the rules and advice of local law enforcement is crucial and should be regarded as top priority. This guide should only be followed if recommended by law enforcement and as long as the process does not endanger any lives. 2. In the event of a potential terrorist attack, report the incident to local police and College administration and notify all IT Systems staff of the current status of the College. 3. Continually monitor the local news for updates. Connors State College Information Technology Systems
17 Connors State College Page 17 Theft 4. Since our internet connection enters the campus through the library and our data storage is located in our IT Systems offices, determine if the library or IT Systems offices are vulnerable. These two buildings are top priority. Gatlin Hall is secondary priority with other buildings following thereafter. 5. If any building, other than the priority buildings are in danger, and the priority buildings themselves are safe, steps should be made to protect the equipment in these buildings as noted in steps 4 through If any of these buildings are found to be vulnerable then steps must be made to preempt the attack and lock down the endangered equipment or possibly shut down power to the entire building. 7. If a building must be locked down, we shall do so remotely and cycle all passwords to a value agreed upon by a majority of the members of the disaster recovery group at that time. 8. If any of the priority buildings are in danger, the buildings are to be immediately locked down locally, if possible, or remotely. 9. Once the equipment is safe in all affected buildings, monitor the current status of the situation. 10. Once the incident is resolved, work with local law enforcement to ascertain the steps needed to return all equipment back on and powered up to its original status. 1. Report theft of equipment to local police and College administration. 1. Muskogee Police Department Warner Police Department Place an incident report with Oklahoma OSF (Office of State Finance) on their Cyber Security Portal. 3. Inventory all details of the equipment, specifically, where the equipment was last located, the last person to use the equipment, and any specific identifying information (S/N, CSC#, Make, Model, etc.). 4. Maintain contact with local law enforcement and CSC administration to provide more information if needed. Tornado 1. In the event of a potential tornado, monitor the weather and notify all IT Systems staff of the potential for a tornado. 2. Secure all data backups in the safe. 3. Take cover in the lowest, interior area of the building you are in. 4. Once tornado has passed, assess damages to the campus buildings. 5. Since our internet connection enters the campus through the library and our data storage is located in our IT Systems offices, determine if the library or IT Systems offices and equipment are intact. These two buildings are top priority. Gatlin Hall is secondary priority with other Connors State College Information Technology Systems
18 Connors State College Page 18 buildings following thereafter. 6. If any building, other than the priority buildings are affected, and the priority buildings themselves are intact, steps should be made to begin the recovery process for these buildings. 7. If the priority buildings are affected, 8. Once the tornados dissipate, work with cleaning crews to ascertain the steps needed to move the equipment back to its original location and restore power to the buildings affected. Connors State College Information Technology Systems
19 Connors State College Page 19 Other Important Information: A copy of this plan will be located in the following areas: o Warner Campus, IT Systems Director s Office, Floor Safe o Warner Campus, President s Office o Warner Campus, Maintenance Office o Muskogee Campus, IT Systems Office, Floor Safe CSC IT Systems Full-Time Staff: o Heath Hodges, Director of IT Systems heathah@connorsstate.edu o Kevin Isom, Network Administrator kevinwi@connorsstate.edu o Neil Myers, Desktop Administrator cecilnm@connorsstate.edu CSC Maintenance: o Dale Berry, Director of Physical Plant kberry@connorsstate.edu o Larry Todd, Supervisor Custodians, Maintenance ltodd@connorsstate.edu CSC Administration: o Dr. Donnie Nero, President ndonnie@connorsstate.edu o Dr. JoLynn Digranes, Executive Vice President jdigran@connorsstate.edu Connors State College Information Technology Systems
20 Connors State College Page 20 Other Important Information (Continued): Connors State College, Warner Campus RR 1 Box 1000 Warner, OK Connors State College, Muskogee Downtown Campus 201 Court St. Muskogee, OK Connors State College, Muskogee Three Rivers Port Campus 2501 N. 41 st St. East Muskogee, OK Connors State College Information Technology Systems
21 Connors State College Page 21 Resources: NIST Special Publication SANS Institute Disaster Recovery: Survivability and Security Oklahoma State University Policies and procedures University of Arkansas Policies and Procedures Connors State College Information Technology Systems
22 Connors State College Page 22 The CSC IT Systems department strives to serve the Connors State College faculty, staff, and students by modifying this Disaster Recovery Plan as often as possible and also as quickly as possible when significant information within the plan changes. We apologize for any incorrect data that may have been inadvertently provided. Suggestions for improvement and notifications of incorrect data are always welcome and encouraged. These can be sent to our staff via Thank you. CSC IT Systems Connors State College Information Technology Systems
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
More informationLocal Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
More informationCyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
More informationDisaster Recovery Plan for Center Moriches School District Information Technology Operations
1900 Disaster Recovery Plan for Center Moriches School District Information Technology Operations I. Plan Overview II. Plan Approval III. Disaster Declaration IV. Plan Activation V. Plan Overview, Objectives
More informationMassachusetts Institute of Technology. Functional Area Recovery Management Team Plan Development Template
Massachusetts Institute of Technology Functional Area Recovery Management Team Plan Development Template Public Distribution Version For further information, contact: Jerry Isaacson MIT Information Security
More informationDisaster Recovery Plan
Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the
More informationCHEEKTOWAGA CENTRAL SCHOOL DISTRICT TECHNOLOGY SERVICES DISASTER RECOVERY PLAN. Rev. 3/15/2012
CHEEKTOWAGA CENTRAL SCHOOL DISTRICT TECHNOLOGY SERVICES DISASTER RECOVERY PLAN Rev. 3/15/2012 TABLE OF CONTENTS PART I. INTRODUCTION INTRODUCTION PLAN DISTRIBUTION PART II. DESIGN OF THE PLAN OVERVIEW
More informationICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
More informationWorkforce Solutions Business Continuity Plan May 2014
Workforce Solutions Business Continuity Plan May 2014 Contents 1. Purpose... 3 2. Declaration of Emergency... 4 3. Critical Operations... 4 3.1 Communication... 4 3.1.1 Internal Communication During Emergencies...
More informationDISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
More informationBNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN
BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,
More informationIT Service Management
IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction
More informationBusiness Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
More informationBirkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationBusiness Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
More informationHow To Plan For A Disaster At The University Of Texas
Disaster Recovery Planning The Process Introduction We began our planning processes after experiencing several disasters, including a building fire, an environmental contamination, faulty discharge of
More informationBusiness Continuity and Disaster Survival Strategies for the Small and Mid Size Business. www.integrit-network.com
Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business www.integrit-network.com Business Continuity & Disaster Survival Strategies for the Small & Mid Size Business AGENDA:
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationInformation Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
More informationIT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
More informationDraft ICT Disaster Recovery Plan
Draft ICT Disaster Recovery Plan Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction...3 1.1 Objectives of the Disaster Recovery Policy/plan... 3 2. 0 Disaster
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationHow to Plan for Disaster Recovery
ImproMed LLC How to Plan for Disaster Recovery Revised January 27, 2015 2015 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationContract # 04-06. Accepted on: March 29, 2005. Starling Systems. 711 S. Capitol Way, Suite 301 Olympia, WA 98501
Disaster Recovery Plan Starling Systems Deliverable #15 - Draft I Contract # 04-06 Accepted on: March 29, 2005 Starling Systems 711 S. Capitol Way, Suite 301 Olympia, WA 98501 DISASTER RECOVERY PLAN TABLE
More informationOKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
More informationHIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
More informationThe University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
More informationDisaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
More informationRemote Backup Solution: Frequently Asked Questions
Remote Backup Solution: Frequently Updated December 2014 Contents What is ECi Remote Backup?...3 What Levels of Protection are Available?...3 Why is ECi Remote Backup Important for Disaster Recovery?...3
More informationDISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
More informationAPPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 15 th October 2013 Signed: Chair of Governors Date: Ratified: Oct 2013 Review: Sep
More informationWiley College Information Technology (IT) Disaster Recovery Plan
Wiley College Information Technology (IT) Disaster Recovery Plan Dr. Haywood L. Strickland President and CEO Submitted by: Nathaniel E. Hewitt, III Vice President for Information Systems and Technology
More informationHow To Prepare For A Disaster
Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services 3/26/2013 #1 Continuity Plan Testing Flowchart 3/26/2013 #2 1 Ongoing Multi-Year
More informationRead this guide and you ll discover:
BUSINESS ADVISOR REPORT Provided as an educational service by: Rick Reynolds, General Manager Read this guide and you ll discover: What remote, offsite, or managed backups are, and why EVERY business should
More informationMARQUIS DISASTER RECOVERY PLAN (DRP)
MARQUIS DISASTER RECOVERY PLAN (DRP) Disaster Recovery is an ongoing process to plan, develop, test and implement changes, processes and procedures supporting the recovery of the critical functions in
More informationCyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More informationWhat You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com
More informationSAMPLE IT CONTINGENCY PLAN FORMAT
SAMPLE IT CONTINGENCY PLAN FORMAT This sample format provides a template for preparing an information technology (IT) contingency plan. The template is intended to be used as a guide, and the Contingency
More informationOhio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
More informationSituation Manual Orange County Florida
Situation Manual Orange County Florida 530 Minutes Situation Manual Tabletop Exercise 1 Disaster Resistant Communities Group www.drc-group.com Comeback Ordeal Start Exercise During the exercise it will
More informationDISASTER RECOVERY PLANNING
I Identify Critical Systems and Vital Records. Vital records are those records that if destroyed, lost, or inaccessible would cause severe difficulty in operating, or would cause probable financial loss.
More informationPerforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationAPPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval
More informationEMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
More informationMAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
More informationExpecting the Unexpected. Disaster Preparedness Strategies for Small Business
2009 EDITION Expecting the Unexpected Disaster Preparedness Strategies for Small Business Expecting the Unexpected Disaster Preparedness Strategies for Small Business When it Comes to Disaster Readiness,
More informationOklahoma Bar Association Disaster Plan
Oklahoma Bar Association Disaster Plan Introduction An emergency is a condition or situation that requires immediate attention beyond what can be provided in a routine manner. An emergency will exist when
More informationPPSADOPTED: OCT. 2012 BACKGROUND POLICY STATEMENT PHYSICAL FACILITIES. PROFESSIONAL PRACTICE STATEMENT Developing a Business Continuity Plan
PROFESSIONAL PRACTICE STATEMENT Developing a Business Continuity Plan OCT. 2012 PPSADOPTED: What is a professional practice statement? Professional Practice developed by the Association Forum of Chicagoland
More informationSierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
More informationOur Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009!
Disaster Recovery Review FREE Promotional Offer Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009! This review is designed to help the small business better
More information85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff
85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff Because a business continuity plan affects all functional units within the organization, each functional unit must participate
More informationHow to Build a Comprehensive Business Continuity Plan
How to Build a Comprehensive Business Continuity Plan Business continuity planning is essential for any business. A business continuity plan carried out effectively will enable any business to continue
More informationCloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud
Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits
More informationDISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
More informationThe 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationOverview. Responsibility
Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed
More informationHow To Handle A Disaster Recovery Plan
Page 1 of 9 Policy Statement CSB Policy And Procedures The equipment, software systems, and databases that comprise the ephi System are critical components that enable the [CSB] to function in an effective
More informationSWITCH Library Consortium Disaster Recover Plan Rev. October 2008
SWITCH Library Consortium Disaster Recover Plan Rev. October 2008 Contents: 1. Purpose and Scope 2. Emergency Contact Information 3. Security and Data Backup Policies 4. Recovery of TOPCAT System 5. Recovery
More informationChapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
More informationBusiness Continuity and Disaster Survival Strategies for the Small and Mid Size Business
Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business Business Continuity & Disaster Survival Strategies for the Small and Mid Size Business AGENDA Welcome / Introduction
More informationCyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
More informationRPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan. January 23, 2012
RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan January 23, 2012 Purpose and Objectives 2 Disaster Recovery Organizational Structure 3 Appendices: Disaster Recovery Emergency
More informationThe Essential Guide for Protecting Your Legal Practice From IT Downtime
The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project
More informationStart Your Disaster Recovery Plan TODAY! Bob Boyd Agility Recovery. To download a copy of the slides, please visit: http://agil.
Start Your Disaster Recovery Plan TODAY! Bob Boyd Agility Recovery To download a copy of the slides, please visit: http://agil.me/agilityplan2day Agenda Prepare to Survive. 1. The Reality of Disasters
More informationHow to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%.
How to write a DISASTER RECOVERY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A DRP AND HOW CAN IT HELP MY COMPANY? CHAPTER PREPARING TO WRITE YOUR DISASTER RECOVERY PLAN
More informationWhy Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
More informationLIMCO AIREPAIR, INC. Disaster Plan
LIMCO AIREPAIR, INC. Disaster Plan 1 INDEX EMERGENCY CONTACTS!! 5 REVISION CONTROL PAGE..!! 6 PURPOSE! SCOPE..!! 7! PLAN OBJECTIVES...!! 7! ASSUMPTIONS..!! 7! DISASTER DEFINITION..!! 7! RECOVERY TEAMS.!!
More informationDisaster Recovery & Business Continuity. James Adamson Library Systems Office
Disaster Recovery & Business Continuity James Adamson Library Systems Office Library Management Information Data Services Financial Procurement Cataloging Inventory/searching Circulation Central Library
More information1. Backup and Recovery Policy
POLICY TITLE: POLICY #: IT - 2 DATE DRAFTED: 09/23/05 APPROVED DATE: 09/23/05 REVISION DATE: BRIEF DESCRIPTION: Backup and Recovery Policy Minimum requirements for the creation and retention of computer
More informationNETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
More informationDisaster Recovery: Protect Your Business & Prepare Your Digital Prepress Operations
Eastman Kodak Company 343 State Street Rochester, NY 14650-0238 USA Revision date: March 2014 White Paper Contact Name Robyn Lundstrom PSSG Specialist, KODAK Unified Workflow Solutions robyn.lundstrom@kodak.com
More informationBackup and Recovery Plan For Small Businesses
Backup and Recovery Plan For Small Businesses Disclaimer: This article is intended to serve as an informational reference source. While the information is based on sound principles for backup and recovery,
More informationBusiness Continuity and Disaster Recovery Planning from an Information Technology Perspective
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: dbird@quatro.com
More informationASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
More informationTHE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS
THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS 1010370-001 ii Contents About This Guide.................. v Why tape is ideal for backup... v automation - now available
More informationUnit Guide to Business Continuity/Resumption Planning
Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationClinic Business Continuity Plan Guidelines
Clinic Business Continuity Plan Guidelines Emergency notification contacts: Primary Role Name Address Home phone Mobile/Cell phone Business Continuity Plan Coordinator QSP Business Continuity Plan Coordinator
More informationAll-Hazard Continuity of Operations Plan. [Department/College Name] [Date]
d All-Hazard Continuity of Operations Plan [Department/College Name] [Date] TABLE OF CONTENTS SECTION I: INTRODUCTION... 3 Executive Summary... 3 Introduction... 3 Goal... 4 Purpose... 4 Objectives...
More informationThe 7 Disaster Planning Essentials
The 7 Disaster Planning Essentials For Any Small Business Little-Known Facts, Mistakes And Blunders About Data Backup And IT Disaster Recovery Every Business Owner Must Know To Avoid Losing Everything
More informationTHE CEO S GUIDE TO BUILDING A FAIL-SAFE DISASTER RECOVERY PLAN
THE CEO S GUIDE TO BUILDING A FAIL-SAFE DISASTER RECOVERY PLAN By Stuart Avera, Executive Vice President Nexxtep Technology Services, Inc. Nexxtep s Leadership Team About Nexxtep 2010 Nexxtep Technology
More informationJacksonville University Information Technology Department Disaster Recovery Plan. (Rev: July 2013)
Jacksonville University Information Technology Department Disaster Recovery Plan (Rev: July 2013) Table of Contents Introduction 3 Objectives/Constraints 4 Assumptions 4 Critical Systems 5 Incidents Requiring
More informationClinic Business Continuity Plan Guidelines
Clinic Business Continuity Plan Guidelines Published: January 2015 Table of Contents Emergency Notification Contacts Primary... 2 Emergency Notification Contacts Backups (in case primary is unavailable)...
More informationTameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
More informationManaged Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationEmergency Operations California State University Los Angeles
Business Continuity Plan Emergency Operations California State University Los Angeles 1. Objective & Scope 2. Definition of Disaster 3. Risk and Business Impact Analysis Summary 4. Business Continuity
More informationBACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
More informationDisaster Recovery Planning
NASA IV & V ANNUAL WORKSHOP 202 The 4th International Workshop on Independent Verification & Validation of Software Disaster Recovery Planning Divya Krishnamoorthy Mailam Engineering College, Mailam. (Affiliated
More informationImplementation Date: May 5, 2009. Table of Contents. Section Description Page. 1.0 Description 1. 2.0 Initial Response 2
Recommended by Emergency Preparedness Committee: April 21, 2009 Recommended by President s Council: May 1, 2009 Approved by Executive Committee: May 5, 2009 NAIT Procedures CS1.2.6 Flood Implementation
More informationNetwork & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
More informationREGIONAL CENTER DISASTER RECOVERY PLAN
APPENDIX L REGIONAL CENTER DISASTER RECOVERY PLAN I. ADMINISTRATIVE INFORMATION: A. Introduction to Operational Recovery Plan B. Procedures to update and Distribute ORP C. Process to test ORP D. Plans
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationBACKUP AND CONTIGENCY PLANS (DISASTER RECOVERY)
BACKUP AND CONTIGENCY PLANS (DISASTER RECOVERY) PURPOSE The purpose of this policy is to describe the backup and contingency plans, including disaster recovery planning, that will be implemented to ensure
More informationEMERGENCY PREPAREDNESS PLAN FOR
EMERGENCY PREPAREDNESS PLAN FOR Name of Child Care Center Provided by: 2014 Emergency Preparedness Plan Page 1 TABLE OF CONTENTS Page I: Introduction... 3 II: Emergency Response Organization... 3 III:
More informationHOME OFFICE POLICY AND PROGRAM. Nebraska Department of Health and Human Services
HOME OFFICE POLICY AND PROGRAM Nebraska Department of Health and Human Services Effective Date August 7, 2008 TABLE OF CONTENTS Introduction... 1 Policy... 1 Applicability... 1 Principles of Home Officing...
More information