Establishing the IT Disaster Recovery Planning Construct
|
|
|
- Elfreda Houston
- 9 years ago
- Views:
Transcription
1 Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Proceedings Americas Conference on Information Systems (AMCIS) Establishing the IT Disaster Recovery Planning Construct Christopher Kadlec Georgia Southern University, Jordan Shropshire Georgia Southern University, Follow this and additional works at: Recommended Citation Kadlec, Christopher and Shropshire, Jordan, "Establishing the IT Disaster Recovery Planning Construct" (2009). AMCIS 2009 Proceedings. Paper This material is brought to you by the Americas Conference on Information Systems (AMCIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in AMCIS 2009 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact
2 Americas Conference on Information Systems AMCIS2009 San Francisco Establishing the IT Disaster Recovery Planning Construct Christopher Kadlec Georgia Southern University Jordan Shropshire Georgia Southern University ABSTRACT (REQUIRED) The concept of IT disaster recovery planning is receiving an increasing amount of attention from IT practitioners and business managers due to its importance in averting disasters and ensuring the continuity of organizations. Surprisingly, little research has been aimed at providing a comprehensive definition of this topic. Thus, this manuscript describes the process by which conceptual definition of IT disaster recovery planning is developed and an exhaustive listing of the construct s dimensions is derived via content analysis. In this meta-study, 72 articles were found to yield 572 individual planning recommentations related to IT disaster recovery planning. The data were analyzed using a clustering technique and formed into 7 dimensions and 16 sub-dimensions. The results can be used to guide organizations IT disaster recovery planning processes. Keywords (Required) IT disaster recovery planning, domain definition, content analysis, measurement INTRODUCTION Organizations have become more reliant on information technology (IT) which is becoming integrated into all parts of those organizations. This puts greater emphasis on the IT professional to keep the services provided by the technology working. In the U.S., regulations such as Sarbanes-Oxley and HIPAA require some organizations have a disaster recovery plan. In light of these government regulations and the importance of IT to organizations, 28% of IT executives either do not know what their plan to continue is or know they do not have one (AT&T Global Reports, 2008). For those organizations that have full scale data centers, 22% respond that their plan needs work (Symantec, 2008). These two surveys leave out the organizations that do not have a IT Executive or a Data Center. While Information Technology Disaster Recovery Planning (ITDRP) is included in IS/IT textbooks (Fitzgerald and Dennis, 2005), is cited as important in IS/IT literature (Guster, Krzenski & Lee, 2008; Kumar, Park & Subramaniam, 2008; Ramsaran, 2005), and described in practitioner journals (See Apendix B), neither a conceptual definition nor a process for the practitioner to follow has been offered by IS/IT literature. Thus, the purpose of this paper is to introduce a conceptual definition of IT Disaster Recovery Planning and the actions that make up the planning process. The definition is derived using content analysis. An a priori coding scheme, based on the work of Fitzgerald and Dennis (2005), was developed. Some 72 practitioner and academic articles, found in the Pro-Quest and Business Source Complete databases, were coded. Using the data cluster technique described by Krippendorff (1980), a conceptual definition was formed. As a result, ITDRP is defined as the set of actions which an organization follows in order to improve its ability to resume IT services following a disaster. The actions that an organization would follow, discussed in more depth later, are IT disaster identification and notification, preparing organizational members, IT services analysis, recovery process, backup procedures, offsite storage, and maintenance. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
3 DEFINING THE IT DISASTER RECOVERY PLANNING DOMAIN Historically, IT disaster recovery planning had a rather simplistic meaning; it was generally limited to backing up data and devising methods to restore data resources. With the integration of IT into all business functions and the reliance on technology among organizational members, the complexity of IT disaster recovery planning significantly escalates. There is little guidance in IS/IT literature for the practitioner to develop and maintain an IT disaster recovery plan. Existing guidance is often incomplete on its own and inconsistent with other parts of the literature. One area that has been confused in the literature is the difference between IT disaster recovery and business continuity. Business continuity planning address how an organization is to continue as an entity into the future, and is therefore a superset of IT Disaster Recovery. Business continuity planning is from the viewpoint of the organization and does not offer direct guidance to the IT professional. The ITDRP must be written to not conflict with the business continuity plan and must not allow the IT to sub-optimize as it is restored after the IT disaster. Another area of confusion is what constitutes an IT disaster. IT disasters impact the organization in which the IT service is employed. IT disasters range from the accidental deletion of a file to a hurricane that destroys the building that houses the data center along with the infrastructure (such as electrical power grid) in the area of the data center. Examples of IT services include internet connectivity, telecommunications, and data storage and processing. IT services add value by providing additional capabilities to organizational members. The provision of such services relies on a combination of inputs from multiple resources, including hardware, software, data, human resources, and utilities. The loss of inputs leads to disaster only if it causes a failure in the associated IT services. IT disaster recovery plans are for restoring IT services, not necessarily for restoring specific hardware and software architectures. It may not be possible, feasible, or practical to return to pre-disaster conditions. Disaster recovery for a service is complete when the service has been brought back online and is considered sustainable. ITDRP does not involve simplification of IT services. The purpose of ITDRP is not to simplify IT services so that they are easier to restore, but to devise alternate ways of restoring IT services. When an organization evacuates the fit and function of the IT infrastructure while preparing an IT disaster plan, it is not prescribed that the underlying infrastructure should be simplified so as to make recovery easier. The IT services should be evaluated prior to the ITDRP process as to whether they should continue or not. Additionally, avoiding a disaster is not planning a way of planning to recovery from a disaster but disaster mitigation. ITDRP requires an in-depth understanding of the IT services offered in terms of: 1) how the technology works 2) how the technology is configured and 3) how that system is used within the organization. Without the knowledge of all three domains, a service may not be brought back to provide the functionality that was once there. Unfortunately, the extant literature lacks a comprehensive definition which could help organizations address these issues. This meta-study looks at the available literature and gives seven dimensions of IT disaster recovery planning and sixteen subdimensions that will help define for research and practice the areas that an IT disaster recovery plan should address. This will help guide future research but also guide practice to build highly reliable systems by providing a framework for the IT disaster recovery plan. METHOD The purpose of this analysis is to develop a conceptual definition of IT disaster recovery planning, including a comprehensive list of the dimensions which represent the elements of the construct. The technique used to derive this artifact is content analysis. Content analysis is a research method used in the social sciences to draw inferences from text (Weber, 1985). In this case, the text includes articles which concern IT disaster recovery planning. Each reference to an aspect of IT disaster recovery was categorized according to an a priori coding scheme. The investigators independently coded each reference unit, and later convened to compare results. The initial level of agreement was approximately 85% of cases. In cases of disagreement, the researchers collectively reviewed the attributes of reference units until a consensus was reached. Over 98% of coding disputes were resolved in this manner. An independent IT professional was asked to judge the remaining cases. The results of the coding operation were iteratively refined into clusters which formed the basis of the construct dimensions and conceptual definition. This qualitative methodology is often used by information systems researchers to define concepts and frameworks in cases in which little research currently exists (e.g. Byrd and Turner, 2000; Lewis et al., 2005; Templeton et al., 2002). Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
4 Sample The population consists of all periodical articles which discuss IT disaster recovery planning. The sample was drawn from this population as follows: the Pro-Quest Direct and Business Source Complete databases were queried using keywords such as IT, disaster recovery, and plan. Keywords were combined using Boolean search terms in order to achieve more specific results sets. Some 121 articles were initially found. After an initial inspection, 39 were culled because the content in the articles was not in any way related to this study. For example, several articles used in the keywords disaster recovery, but were focused solely on humanitarian issues following natural disasters; other culled articles discussed the civil engineering aspects which follow major disasters. An additional 10 articles did not contain any useable recommendations. Thus, 72 articles were ultimately included in the sample (see Appendix B). It should be noted that the majority of the articles were published in trade publications, industry-specific magazines, and IT practitioner oriented journals; few manuscripts came from academic or peer-reviewed sources. Many were written for audiences in the health care and financial fields. Recording Units Specific references to IT disaster recovery planning were identified in the articles. Each individual reference is referred to as a recording unit. For this research, each recording unit is defined as an idea regarding what should be included in the process of IT disaster recovery planning. Each specific IT disaster recovery planning recommendation was treated as a different recording unit to code. Thus, a sentence which reads organizations should create backup copies of data and store backups offsite would be coded in two separate units, with each idea belonging to only one category (Krippendorf, 1980). Coding Scheme An a priori coding scheme was used to categorize the data (Stemler, 2001). The coding scheme was initially based on a list of 9 elements of an IT disaster recovery plan (Fitzgerald and Dennis, 2005) (see Appendix A). This list is unique in that it does not advocate specific treatments, but provides general recommendations to consider when crafting an IT disaster recovery plan. This list was used to categorize the recording units derived from the first ten articles. After independently coding the first ten articles, the authors compared amendments and extensions to the coding scheme. Problematic portions of the coding scheme were addressed; categories were modified to the extent that they became mutually exclusive and exhaustive. As a result, the list eventually grew to a scheme of 30 elements (see Appendix A). This method has been advocated by qualitative researchers such as Weber (1990). Although the process of decoding is inherently subjective, it is expected that this can be minimized by taking additional steps such as coding independently and comparing results. The amended scheme was applied to the remainder of the units. Periodic quality control checks confirmed the enumeration. Clustering A total of 572 recording units were identified and coded. The resulting data were organized into a series of 7 IT disaster recovery planning dimensions and 16 sub-dimensions. As with coding, clustering is a qualitative research technique. Thus, the most rigorous method of clustering was used (Krippendorff, 1980). The technique by which the clusters were created follows a series of 3 steps: First, the units which were most similar were identified. By similar, it is meant that their merger would have the smallest effect on the observed differences in the data as a whole. Second, the units were grouped together, taking account of the losses incurred within the newly-formed cluster. Third, the data were modified to reflect the latest configuration of clusters on which the next merger is computed. This procedure was repeated until nothing more could be merged without changing the meaning of the data. RESULTS The results of the content analysis and subsequent clustering led to the development of a conceptual definition of IT disaster recovery planning: the set of actions (IT disaster identification and notification, preparing organizational members, IT services analysis, recovery process, backup procedures, offsite storage, and maintenance) which an organization follows in order to improve its ability to resume IT services following a disaster (see Table 1). Although the articles in the content analysis prescribed specific recommendations or unique IT disaster recovery plans, the construct is defined in relatively global terms. Because the definition is independent of specific technologies, IT architectures, and organizational governance schemes, it can be applied to a wide range of organizations. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
5 Dimension Description Sub-Dimension Description IT Disaster Identification and Notification Procedures which have been developed for detecting IT disasters, for communicating during emergencies, and for warning IT disaster recovery team members and other stakeholders. Detection Warning Means of Warning / Communication Procedures for detecting IT disasters. Procedures for informing IT disaster recovery team members and stakeholders that an IT disaster has occurred. Establishment or formalization of communication channels to be used in the event of an emergency. Preparing Organizational Members Procedures for IT disaster recovery team training, briefing for key nonteam members, and the formalization of a decision-making structure. ITDR Team Preparations Non-ITDR Team Preparations Team assignments and responsibilities during the disaster. Training and briefing of non-team members in the event of a disaster. Decision Making Formalization of a decision making structure. IT Services Analysis Procedures for cataloging IT services, prioritizing IT services in terms of reactivation, and identifying potential threats. IT Services Identification Prioritizing IT Services Risks to IT Services Identification of IT services. Listing of the order in which services need to be reactivated. Identification of risks to IT services and infrastructure. Recovery Process Backup Procedures Offsite Storage Procedures for creating backup copies of data, software, configuration files, and the IT disaster recovery plan. The degree to which a routine has been developed for creating backups. Procedures for ensuring that systems, software and data are made as portable as possible, and those offsite locations have been selected for use as backup storage sites. Recovery Procedures Alternative Facilities Alternative facilities and procedures for switching operations to those facilities. Recovery procedures for service inputs such as human resources, facilities, communications technologies, servers, application systems, and data. Backup copies of data, software, configuration files, and IT disaster recovery plans. Portability Offsite Backup Locations Procedures for ensuring that systems, software, and data are as portable as possible. Offsite locations to backup data, software, configuration files, the IT disaster recovery plans. Maintenance Procedures for testing and updating the IT disaster recovery plan and its associated documentation, and for ensuring that the IT disaster recovery plan fits within the scope of the business continuity plan. Testing and Updating Documentation Synchronizing Procedures to ensure adequate testing and updating of the disaster recovery plan. Documentation of configuration and changes to systems, hardware, and software. Procedures to ensure the IT disaster recovery plan is part of the business continuity plan. Table 1. Dimensions of the IT Disaster Recovery Planning Construct Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
6 CONCLUSION This research represents one of the first efforts at providing a systematically-developed definition of IT disaster recovery planning. A limitation of the current study is that it relied heavily on trade literature. This limitation is an extension of the cited need for this study; little research has been aimed at providing a comprehensive definition of the topic of IT disaster recovery planning. Future research should focus on the refinement of this definition. For instance, incorporating feedback from representative practitioner groups and conducting empirical evaluations will provide subsequent improvements to the current conceptualization. Additional research should aim at developing a measure for this construct, so that it may be incorporated in further research. Despite the need for additional attention, the current 7 dimension, 16 sub-dimension construct is a considerable advancement for an under-studied field. The results can not only guide future research but practitioners as they try to guard their organizations against disaster. REFERENCES 1. Anderson, J. (2008) New trends in backup: Is your disaster recovery plan keeping up? The esecurity Advisor, 8, 2, Anthes, G. (2008) Apocalypse Soon, Computer World, 42, 23, April, C. and Gryco, E. (2001) Users fortifying enterprise walls, InfoWorld, 6, 10, Ashton, H. (2008) How prepared is your business for a calamity? Japan Inc, 12, 1, AT&T (2008) Business continuity survey: 2008, AT&T Reports, Dallas. 6. Baker, S. (2008) Lessons learned: A devastating hurricane caused this CIO to rethink his carrier s disaster recovery plans, Tech Decisions, 3, 10, Baltazar, H. (2005) Are you prepared? eweek, 8, 13, Beaman, B. and Albin, B. (2008) Steps to disaster recovery planning, Network World, 25, 6, Bowen, T. (1999) Planning for recovery, Info World, 4, 8, Bradbury, C. (2008) Disaster! Creating and testing an effective recovery plan, British Journal of Administrative Management, 23, 4, Brodkin, J. (2008) When one data center is not enough, Network World, 25, 5, Buckley, M. (2002) Calm during crisis, Health Management Technology, 8, 11, Budko, R. (2007) Messaging disaster recovery A necessity for disaster recovery, Government Procurement, 14, 10, Byrd, T., Turner, D. (2000) Measuring the flexibility of information technology infrastructure: exploratory analysis of a construct, Journal of Management Information Systems, 17, 1, Chisholm, P. (2008) Disaster recovery planning is business critical, the CPA Journal, 21, 7, Connor, D. (2005) Users assess plans for data protection, disaster recovery, Network World, 22, 10, Connor, D. (2005) IT was prepared for Hurricane Rita, Network World, 22, 9, Cox, J. (2007) The case of the great hot-swap site, Network World, 24, 30, Crowe, M. (2007) Today s disaster recovery: A holistic approach to remediation, Illinois Banker, 43, 12, Curtis, G. (2008) Beyond disaster recovery, Directorship, 23, 2, D agostino, D. (2006) Stormy weather, CIO, 19, 8, Davis, C. (2001) Planning for the unthinkable: IT contingencies, International Education Journal, 21, 4, Defelice, A. (2008) Preparing for the worst, Accounting Technology, 20, 4, Denyer, C. (2008) Like the boy scouts, be prepared, Employee Benefit News, 19, 3, Dignan, L. (2004) Pop culture, Baseline, 13, 47, 18. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
7 26. Drill, S. (2005) Assume the worst in IT disaster recovery plan, National Underwriter, 32, 2, FitzGerald, J. Dennis, A. (2005) Business data communications and networking, 9 th edition, Wiley, New York. 28. Fonseca, B. (2004) NY IT prepares for IT disaster recovery, eweek, 7, 32, Gagnon, R. (2008) When disasters strike, Mass Builder, 25, 3, Gale, S. and Scott, R. (2008) In for the long haul, PM Network, 19, 2, Giannacopoulos, P. (2004) Paranoia is good, Strategic Finance, 32, 1, Gold, L. (2007) Disaster recovery planning: How do you measure up? Accounting Today, 21, 7, Gold, L. (2008) Security still tops tech concerns, Accounting Today, 22, 3, Green, R. (2005) Peace of mind: Disaster recovery plans can keep your business alive, California CPA, 33, 2, Griffin, J. (2008) Rental industry preps responds to hurricane disasters, Underground Construction, 8, 11, Grygo, E., Prencipe, L., Schwartz, E., Scannell, E., Krill, P. (2001) IT recovery efforts forge ahead, Info World, 6, 9, Guster, D. McCann, B., Krzenski, K., Lee, O. (2008) A cost effective, safe, and simple method to provide a disaster recovery plan to small and medium businesses, Review of Business Research, 8, 4, Hall, M. (2007) On the Mark, Computer World, 21, 11, Harney, (2004) Business continuity and disaster recovery: Backup or shutdown, edoc Magazine, 3, 3, Havenstein, H., Fisher, S., Thibodeau, P. (2006) IT execs race against time along Gulf coast, Computer World, 40, 6, Hayes, J. (2005) Reaping the whirlwind, IEE Review, 13, 3, Hoge, J. (2005) Business continuity planning must extend to vendors, Bank Technology News, 11, 3, Holliday, K. (2008) Planning for the worst, Community Banker, 22, 8, Hurdis, B. (2008) Disaster recovery and business continuity planning: A strategic investment, Illinois Banker, 44, 3, Jackson, R. (2008) In times of crisis, Internal Auditor, 31, 4, Jaques, M. (2006) Securing your IT continuity, Financial Director, 28, 7, Jepson, K. (2008) How 1 small CU perfected its own recipe for disaster recovery, Credit Union Journal, 23, 9, Kepczyk, R. (2008) In-firm view of the AICPA top technology initiatives, CPA Technology Advisor, 18, 3, Krippendorff, K. (1980) Content analysis: An introduction to its methodology, Sage, London. 50. Kumar, R., Park, S., Subramaniam, C. (2008) Understanding the value of countermeasure portfolios in information system security, Journal of Management Information Systems, 25, 2, Laliberte, B. (2007) How disaster-tolerant is your company, Business Communications Review, 32, 4, Landa, H. (2008) Planning for disaster, Associations Now, 11, 3, Lanter, A. (2008) Staying ahead of the disaster recovery plan: Requirements are changing at record speeds, Illinois Banker, 44, 4, Lewis B., Templeton, G., Byrd, T. (2004) A methodology for construct development in MIS research. European Journal of Information Systems, 14, 2, Lindstedt, D. (2007) Grounding the discipline of business continuity planning: What needs to be done to take it forward? Journal of Business Continuity & Emergency Planning, 2, 2, Lohrman, D. (2007) Disaster Recovery: A process not a destination, Public CIO, 8, 2, Lundequist, E. (2001) Disaster plans tied to business success, eweek, 4, 5, McAdams, J. (2008) Highlight: Hardrock hotel and casino, Computer World, 42, 23, 35. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
8 59. McLaughlin, L. (2008) Rethinking disaster recovery, CIO, 21, 6, Mearian L. (2004) Key financial firms compare notes on disaster recovery, Computer World, 38, 31, Mearian, L. (2005) Users are rethinking disaster recovery plans, Computer World, 39, 36, Mearian, L. (2005) Hurricane, floods, put IT staff to the test, Computer World, 39, 36, Mearian, L. (2005) IT execs must fight for disaster recovery money, Computer World, 39, 35, Mearian L., Weiss, T. (2005) lessons learned, IT managers steel for Rita, Computer World, 39, 39, Pabrai, U. (2004) Contingency planning and disaster recovery, Certification Magazine, 5, 8, Patel, R. (2003) Disaster recovery planning, Automotive Industries, 42, 23, Plotnick, N. (1999) When disaster plans fall short, PC Week, 28, 2, Postal, A. (2007) Disaster recovery plan seen as critical to GEB s survival, National Underwriter, 35, 4, Pregmon, M. (2007) IT disaster recovery planning: Are you up and ready? Part 1: Risk analysis, Journal of the Quality Assurance Institute, 27, 2, Pregmon, M. (2007) IT disaster recovery planning: Are you up and ready? Part 2: Internal Control, Journal of the Quality Assurance Institute, 27, 3, Pregmon, M. (2007) IT disaster recovery planning: Are you up and ready? Part 3: The recovery planning process, Journal of the Quality Assurance Institute, 27, 4, Pregmon, M. (2008) IT disaster recovery planning: Are you up and ready? Part 4: IT virtualization, Journal of the Quality Assurance Institute, 28, 1, Preimesberger, C. (2008) On the brink of disaster, eweek, 11, 2, Price, E. (2004) The new scope of business continuity, edoc Magazine, 3, 4, Ramsaran, C. (2005) Running ahead of the pack, Bank Systems & Technology, 1, 4, Retelle, M. (2008) Plan for disaster, Credit Union Magazine, 21, 9, Rolich, P. (2008) Setting priorities: Business continuity from an IT perspective is it better to be right or liked? Tech Decisions, 9, 2, Saccomanno, P., Mangialardi, V. (2008) Be prepared for IT disasters, Canadian Consulting Engineer, 32, 4, Sheth, S., McHugh J., Jones, F. (2008) A dashboard for measuring capability when designing, implementing and validating business continuity and disaster recovery projects, Journal of Business Continuity & Emergency Planning, 2, 3, Sliwa, C. (2005) Retailers unsure about the status of stores, systems, Computer World, 39, 3, Sliwa, C. (2008) Marriott goes underground with disaster recovery, CIO, 13, 8, Snow, C. (2008) Can t stop, won t stop, American City and County, 4, 11, Stemler, S. (2001) An overview of content analysis, Practical Assessment, Research, & Evaluation, 17, 2, Stoller, J. (2008) Contemplating the unthinkable disaster recovery and the Canadian business environment, CMA Management, 37, 3, Sturdevant, C. (2001) A business plan to survive the big one, eweek, 4, 8, Symantec, (2008) State of the data center regional data Global, Second annual report, Cupertino, CA. 87. Templeton, G. Lewis, B., Snyder, C. (2002) Development of a measure for the organizational learning construct, Journal of Management Information Systems, 19, 2, Thibodeau, P., Mearian, L. (2005) Users start to weigh long-term IT issues, Computer World, 39, 37, Tueros, M. (2008) When disaster strikes, Smart Business Miami, 6, 2, 18. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
9 90. Vijayan, J. (2005) Data security risks missing from disaster recovery plans, Computer World, 39, 41, Weber, R. (1985) Basic content analysis, Sage, London. 92. Weiss, T. (2008) Gustav finds IT execs prepared for the worst, Computer World, 42, 32, Wild R., Griggs, K., Li, E. (2005) An architecture for distributed scenario building and evaluation, Communications of the ACM, 48, 11, Zalud, B. (2008) Continuity behind the lines, Security, 4, 2, 108. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
10 APPENDIX A: CODING SCHEMES Initial coding scheme, adopted from Fitzgerald and Dennis (2005): The name of the decision-making manager who is in charge of the disaster recovery operation; a second manager should be indicated in case the first manager is unavailable. Staff Assignments and responsibilities during the disaster A pre-established list of priorities that states what is to be fixed first Location of alternative facilities operated by the company or a professional disaster recovery firm and procedures for switching operations to those facilities using backups of data and software Recovery procedures for the data communication facilities (backbone network, metropolitan area network, wide area network, and local area network), servers, and application systems; this includes information on the location of circuits and devices, whom to contact for information, and the support that can be expected from vendors, along with the name and telephone number of the person at each vendor to contact Action to be taken in case of partial damage or threats such as bomb threats, fire, water or electrical damage, sabotage, civil disorders, and vendor failures Manual processes to be used until the network is functional Procedures to ensure adequate updating and testing of the disaster recovery plan Storage of the data, software, and the disaster recovery plan itself in a safe area where they cannot be destroyed by a catastrophe. This area must be accessible, however, to those who need to use the plan Final coding scheme: Procedures for detecting IT disasters Procedures for informing IT disaster recovery team members that an IT disaster has occurred Procedures for informing stakeholders that an IT disaster has occurred Establishment or formalization of communication channels to be used in the event of an emergency Formalization of a decision making structure Staff assignments and responsibilities during the disaster Training and briefing of personnel in the event of a disaster Identification of IT services Identification of risks to IT services and infrastructure Listing of the order in which services need to be reactivated Alternative facilities and procedures for switching operations to those facilities Recovery procedures for service inputs such as human resources Recovery procedures for service inputs such as facilities Recovery procedures for service inputs such as communications technologies Recovery procedures for service inputs such as servers Recovery procedures for service inputs such as application systems Recovery procedures for service inputs such as data Backup copies of data Backup copies of software Backup copies of configuration files Backup copies of the IT disaster recovery plan Offsite locations to backup data Offsite locations to backup software Offsite locations to backup configuration files Offsite locations to backup the IT disaster recovery plan Measures for ensuring that systems, software, and data are as portable as possible Documentation of configuration and changes to systems, hardware, software Procedures to ensure adequate testing of the disaster recovery plan Procedures to ensure continual updating disaster recovery plans Procedures to ensure the IT disaster recovery plan is part of the business continuity plan Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
11 APPENDIX B: ARTICLES INCLUDED IN CONTENT ANALYSIS The following articles were included in the content analysis: Anderson, 2008 Anthes, 2008 April and Gryco, 2008 Ashton, 2008 Baker, 2008 Baltazar, 2005 Beaman and Albin, 2008 Bowen, 1999 Brodkin, 2008 Buckley, 2002 Budko, 2007 Chisholm, 2008 Connor, 2005a Connor, 2005b Cox, 2007 Crowe, 2007 Curtis, 2008 D agostino, 2006 Davis, 2001 Defelice, 2008 Denyer, 2008 Dignan, 2004 Drill, 2005 Fonseca, 2004 Gagnon, 2008 Gale, and Scott, 2008 Giannacopoulos, 2004 Gold, 2007 Gold, 2008 Green, 2005 Griffin, 2008 Grygo, et al., 2001 Guster, et al., 2008 Hall, M. (2007 Harney, (2004 Havenstein, H., Fisher, S., Thibodeau, P. (2006 Hayes, 2005 Hoge, 2005 Holliday, 2008 Hurdis, 2008 Jackson, 2008 Jaques, 2006 Jepson, 2008 Kepczyk, 2008 Kumar, et al., 2008 Laliberte, 2007 Landa, 2008 Lanter, 2008 Lindstedt, 2007 Lohrman, 2007 Lundequist, 2001 McAdams, 2008 McLaughlin, 2008 Mearian 2004 Mearian, 2005a Mearian, 2005b Mearian, 2005c Mearian and Weiss, 2005 Pabrai, 2004 Patel, 2003 Plotnick, 1999 Postal, 2007 Pregmon, 2007a Pregmon, 2007b Pregmon, 2007c Pregmon, 2008 Preimesberger, 2008 Ramsaran, 2005 Retelle, 2008 Rolich, 2008 Saccomanno and Mangialardi, 2008 Sheth, et al., 2008 Sliwa, 2005 Sliwa, 2008 Snow, 2008 Stoller, 2008 Sturdevant, 2001 Thibodeau, and Mearian, 2005 Tueros, 2008 Vijayan, 2005 Weiss, 2008 Wild and Griggs, 2005 Zalud, 2008 Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th
DEVELOPING THE IT DISASTER RECOVERY PLANNING CONSTRUCT
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Association of Management DEVELOPING THE IT DISASTER RECOVERY PLANNING CONSTRUCT JORDAN SHROPSHIRE INFORMATION TECHNOLOGY
A Proposed Model for IT Disaster Recovery Plan
I.J. Modern Education and Computer Science, 2014, 4, 57-67 Published Online April 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.04.08 A Proposed Model for IT Disaster Recovery Plan
How to achieve excellent enterprise risk management Why risk assessments fail
How to achieve excellent enterprise risk management Why risk assessments fail Overview Risk assessments are a common tool for understanding business issues and potential consequences from uncertainties.
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
Course Title: Disaster Recovery, 1st Edition
Course Title: Disaster Recovery, 1st Edition Page 1 of 8 Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised of two books that are designed to fortify disaster recovery
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager
Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that
WDL RemoteBunker Online Backup For Client Name
WDL RemoteBunker Online Backup For Client Name November, 2011 Contact Phone: +234 802 698 7025 Email: [email protected] [email protected] http://remotebunker.webdatalinks.com INTRODUCTION
Information Security Management: Business Continuity Planning. Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt.
Information Security Management: Business Continuity Planning Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt. Overview BCP: Definition BCP: Need for (Why?) BCP: When BCP: Who
Data Loss in a Virtual Environment An Emerging Problem
Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios
White Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
Disaster Recovery Plan
Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information
85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff
85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff Because a business continuity plan affects all functional units within the organization, each functional unit must participate
Business Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: [email protected] Fax: (718) 380-7322
Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
SCHEDULE 25. Business Continuity
SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or which TfL considers likely to render, it necessary or desirable
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster
With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS
How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning The world has experienced a great deal of natural and man-made upheaval and destruction in the past few years, including tornadoes,
0.00 2000 2001 2002 2003 2004 2005 Year
1 Background 1.1 Healthcare organisations are increasingly generating and thus storing information in electronic format. This is an eclectic mix of Email, Microsoft Office Documents, Images as well as
FINAL. Internal Audit Report. Data Centre Operations and Security
FINAL Internal Audit Report Data Centre Operations and Security Document Details: Reference: Report nos from monitoring spreadsheet/2013.14 Senior Manager, Internal Audit & Assurance: ext. 6567 Engagement
Qlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
Business Continuity Plan For Disaster Recovery in the event of a Critical Incident
Business Continuity Plan For Disaster Recovery in the event of a Critical Incident April 2013 Table of Contents 1.0 Introduction... 3 2.0 Definitions... 3 3.0 General Information... 3 3.1 Review and Training...
The handouts and presentations attached are copyright and trademark protected and provided for individual use only.
The handouts and presentations attached are copyright and trademark protected and provided for individual use only. READINESS RESOURCES American Bar Association -- www.abanet.org Disaster Recovery: www.abanet.org/lpm/lpt/articles/slc02051.html
Analytics Reporting Service
1. Rate per month $19.00 per user 2. General Overview: The provides the technologies for transforming large quantities of raw data into useable information serving the agency s functions. includes interactive
Statement of Business Continuity Management
Statement of Business Continuity Management National Financial, a Fidelity Investments Company, National Financial Services LLC Revision Date: December 1, 2009 At National Financial and National Financial
Prepared by Rod Davis, ABCP, MCSA November, 2011
Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
CHAPTER 6 NETWORK DESIGN
CHAPTER 6 NETWORK DESIGN Chapter Summary This chapter starts the next section of the book, which focuses on how we design networks. We usually design networks in six network architecture components: Local
Five Core Principles of Successful Business Architecture
Five Core Principles of Successful Business Architecture Authors: Greg Suddreth and Whynde Melaragno Strategic Technology Architects (STA Group, LLC) Sponsored by MEGA Presents a White Paper on: Five Core
TO AN EFFECTIVE BUSINESS CONTINUITY PLAN
5 STEPS TO AN EFFECTIVE BUSINESS CONTINUITY PLAN Introduction The Snowpocalypse of 2015 brought one winter storm after another, paralyzing the eastern half of the United States. It knocked out power for
CHIEF INFORMATION OFFICER (CIO) San Francisco, California ORGANIZATIONAL OVERVIEW
CHIEF INFORMATION OFFICER (CIO) San Francisco, California ORGANIZATIONAL OVERVIEW As the University of California's first law school, UC Hastings College of the Law boasts a rich history of achievement
OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
Contingency Planning Guide
Institutional and Sector Modernisation Facility ICT Standards Contingency Planning Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/CP Version: 1.20 Project Funded by the European Union 1 Document
Discovery Recovery Plans (DRP) and Business Continuity Plans (BCP) By Vivian Ip ACC 626
Discovery Recovery Plans (DRP) and Business Continuity Plans (BCP) By Vivian Ip ACC 626 Introduction: Businesses have been placing greater reliance on technology in handling their various operational areas
A Business Continuity Plan for Government. George Bomar Dianne Casey Texas Department of Licensing and Regulation
A Business Continuity Plan for Government George Bomar Dianne Casey Texas Department of Licensing and Regulation A practiced logistical plan for how an organization will recover and restore partially or
ICT & Communications Services Disaster & Recovery Plan
ICT & Communications Services Disaster & Recovery Plan Advanced IT Services with George Spencer Academy www.aitn.co.uk Advanced IT Services - Arthur Mee Road, Stapleford, Nottingham. NG9 7EW Email: [email protected]
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
Disaster Preparedness & Response
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B C E INTRODUCTION AND PURPOSE REVIEW ELEMENTS ABBREVIATIONS NCUA REFERENCES EXTERNAL REFERENCES Planning - Ensuring
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
Audit of the Disaster Recovery Plan
Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE
Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP)
Preface Computer systems are the core tool of today s business and are vital to every business from the smallest to giant organizations. Money transactions, customer service are just simple examples. Despite
Strategic HR Partner Assessment (SHRPA) Feedback Results
Strategic HR Partner Assessment (SHRPA) Feedback Results January 04 Copyright 997-04 Assessment Plus, Inc. Introduction This report is divided into four sections: Part I, The SHRPA TM Model, explains how
Texas Universities Recover from Hurricane Ike University of Texas Medical Branch Galveston and Texas A&M University Galveston
Texas Universities Recover from Hurricane Ike University of Texas Medical Branch Galveston and Texas A&M University Galveston Business Continuity and Disaster Recovery State of Texas Executive Summary
Managing information technology in a new age
IBM Global Services Managing information technology in a new age Key Topics Keeps pace with the new purpose and structure of IT Describes a dynamic, flexible IT management construct Incorporates techniques
Disaster Prevention and Recovery for School System Technology
The Optimal Reference Guide: Disaster Prevention and Recovery for School System Technology Extraordinary insight into today s education topics Glynn D. Ligon, Ph.D., ESP Solutions Group Evangelina Mangino,
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
11 Common Disaster Planning Mistakes
11 Common Disaster Planning Mistakes The world is full of risk. Floods, fires, hurricanes, thefts, IT system failures and blackouts are just a few of the incredibly damaging disasters that can and do strike
Table of Contents... 1
... 1 Chapter 1 Introduction... 4 1.1 Executive Summary... 4 1.2 Goals and Objectives... 5 1.3 Senior Management and Board of Directors Responsibilities... 5 1.4 Business Continuity Planning Processes...
DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES
APPENDIX 1 DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES March 2008 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS EXECUTIVE SUMMARY...1
BCP and DR. P K Patel AGM, MoF
BCP and DR P K Patel AGM, MoF Key difference between BS 25999 and ISO 22301 ISO 22301 puts a much greater emphasis on setting the objectives, monitoring performance and metrics aligning BC to top management
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
SwiftStack Global Cluster Deployment Guide
OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read
Regulatory Notice 13-25
Regulatory Notice 13-25 FINRA, the SEC and CFTC Issue Joint Advisory on Executive Summary Following Hurricane Sandy, which caused widespread damage on the northeast coast of the United States in October
Business Continuity and the Cloud. Aaron Shaver US Signal, Solution Architect
Business Continuity and the Cloud Aaron Shaver US Signal, Solution Architect Overview What is BC/DR? Why should businesses have a strategy? Why do many business choose not to? How does the cloud change
Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc
By: Katie Tucker, Sales Representative, Rolyn Companies, Inc Are you and your facility disaster ready? As reported by the Red Cross, as many as 40 percent of small businesses do not reopen after a major
Business Continuity Policy
Business Continuity Policy Software, consultancy and services for global trade and supply chain management Business Continuity Policy Companies using AEB solutions for managing and monitoring their logistics
NHS Hardwick Clinical Commissioning Group. Business Continuity Policy
NHS Hardwick Clinical Commissioning Group Business Continuity Policy Version Date: 26 January 2016 Version Number: 2.0 Status: Approved Next Revision Due: January 2017 Gordon Stevens MBCI Corporate Assurance
SUBJECT: REPLACEMENT OF CORPORATE ELECTRONIC DATA STORAGE, BACKUP AND DISASTER RECOVERY SOLUTIONS
REPORT TO CABINET TO BE HELD ON 15 SEPTEMBER 2015 Key Decision No Forward Plan Ref No 23K Corporate Priority The proposals in this report contribute to the delivery of all the Council s priorities Cabinet
Desktop Scenario Self Assessment Exercise Page 1
Page 1 Neil Jarvis Head of IT Security & IT Risk DHL Page 2 From reputation to data loss - how important is business continuity? Neil Jarvis Head of IT Security (EMEA) DHL Logistics IT Security Taking
Chapter 1: An Overview of Emergency Preparedness and Business Continuity
Chapter 1: An Overview of Emergency Preparedness and Business Continuity After completing this chapter, students will be able to: Describe organization and facility stakeholder needs during and after emergencies.
THE VIRTUAL EMERGENCY OPERATIONS CENTER: AN INTERNET APPROACH TO EMERGENCY MANAGEMENT WORK
THE VIRTUAL EMERGENCY OPERATIONS CENTER: AN INTERNET APPROACH TO EMERGENCY MANAGEMENT WORK by Walter G. Green III, Ph.D., VaPEM Assistant Professor of Emergency Management University of Richmond A Paper
TECHNOLOGY AND INNOVATION DEPARTMENT BACKUP AND RECOVERY REVIEW AUDIT 14-08 SEPTEMBER 23, 2014
TECHNOLOGY AND INNOVATION DEPARTMENT BACKUP AND RECOVERY REVIEW AUDIT 14-08 SEPTEMBER 23, 2014 CITY OF TAMPA Bob Buckhorn, Mayor Internal Audit Department Christine Glover, Internal Audit Director September
Which Backup Option is Best?
Which Backup Option is Best? Which Backup Option is Best? Why Protect Your Data? Data loss disasters happen more frequently than you would think, for many different reasons: Human error and accidental
Business Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
PHASE 5: DESIGN PHASE
PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed
Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster
WHITE PAPER: DON'T WAIT UNTIL IT'S TOO LATE: CHOOSE NEXT-GENERATION................. BACKUP........ TO... PROTECT............ Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your
Eastern Illinois University information technology services. strategic plan. January,
Eastern Illinois University information technology services strategic plan January, 2014 Introduction With the selection of emerging technologies as one of the six themes of the university s recent strategic
Backup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
Welcome to My E-Book
Welcome to My E-Book I decided to write this e-book as a response to the many questions that I get from business owners about data backup solutions. I have seen first-hand that business owners are very
How To Improve Your Data Center Service With A Microsoft Server 2007 Monitoring Software
Microsoft Server Product Portfolio Customer Solution Case Study Data Center Services Provider Boosts Service Levels with Monitoring Software Overview Country or Region: United States Industry: Professional
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business. www.integrit-network.com
Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business www.integrit-network.com Business Continuity & Disaster Survival Strategies for the Small & Mid Size Business AGENDA:
IT Service Management
IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction
Resource Ordering and Status System. User Business Resumption Plan
Resource Ordering and Status System User Business Resumption Plan I. INTRODUCTION This document is the disaster preparedness and recovery plan for users of the Resource Ordering and Statusing System (ROSS).
DISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
Business Continuity Planning. Presentation and. Direction
Business Continuity Planning Presentation and Direction Thomas Bronack, president Data Center Assistance Group, Inc. 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Email: [email protected]
