Business Recovery Planning for Communications Leo A. Wrobel

Size: px
Start display at page:

Download "5-04-20 Business Recovery Planning for Communications Leo A. Wrobel"

Transcription

1 Business Recovery Planning for Communications Leo A. Wrobel Payoff Most businesses depend on their telephone networks to keep customer communications open. Lost service spells lost revenue. This article discusses the preliminary activities involved in getting a communications recovery planning project approved. Low-cost strategies to help prevent voice communications outages from occurring or to minimize their disruptive effect are emphasized. The information is intended to help IS and user managers who are assessing the risks in their organizations or are preparing to evaluate more advanced network protection measures. Problems Addressed Computer disaster recovery centers, which were merely a concept 10 years ago, currently represent a three-quarter-of-a-billion-dollar industry that serves to protect critical information systems. Surprisingly, however, of the 80 or more major computer outages that have led to the activation of a computer recovery facility since 1986, only a fraction resulted from an actual computer failure or from such incidents as flood, fire, or sabotage. In fact, the chief source of disaster has been telecommunications disruptions. In other words, organizations have had to mobilize expensive computer recovery facilities simply to use their telephones. All told, there have been no fewer than six major network failures in 1991 alone, affecting New York (three times), Washington DC, Atlanta, Los Angeles, and locations in New England. These failures do not include the scores of smaller, more regional disasters that happen frequently but do not make national news. One such incident involved a software failure in the Central Office of a Dallas telephone company that cut off phone service to a major hospital for more than three hours. In another incident, lightning struck a major long-distance carrier's facility, producing a day-long network outage. Hundreds of cable and fiber-optic cable disruptions also occur yearly that virtually isolate users, even though they may be unaware of the disruption. These disruptions take on a whole new dimension as the trend toward business automation and, in particular, online systems continues. Incoming 800 numbers and online point-of-sale terminals are ubiquitous in a modern economy. Companies have become highly dependent on the network for key elements of operations and customer service. When the telephone stops ringing, so does the cash register. This article discusses the preliminary work needed to get a communications recovery planning project approved. It then reviews the major threats to voice communications and recommends some low-cost strategies to eliminate avoidable risks and minimize the impact of risks that cannot be eliminated. Business's Reliance on Communications Many professionals in the disaster recovery and IS management fields have had to take a hard look at the communications network. Contingency planning is always timeconsuming and complicated, even when the manager's efforts are directed toward a more familiar IS environment. Compiling a contingency plan for the communications network is

2 especially complicated; still, the responsibility falls, for better or worse, on the business enterprise. A great deal of interest is centered on how to safeguard voice communications as part of an organization's overall disaster recovery plan. Failures of voice networks have plagued users over the past few years with ever-increasing frequency and severity. As a result, companies and disaster recovery service providers are designing more broad-based business recovery solutions in which voice communications plays an integral part. For example, in a service-oriented company, the average workstation serves as the front-line interface to the customer. Incoming calls are answered and some type of information processing takes place in real time an order is taken, a product is sold, or a service is rendered. These activities generate the cash flow that supports the business. Airline and transportation companies, bank card validation centers, or various inbound or outbound marketers rely heavily on workstation-based computing. In each case, the lowest common denominator is the person who calls in, requests a service, or purchases a product. In a service company, when the telephone is not answered, revenue is not produced. No amount of additional support personnel, money, or other resources can alter this fact. Assessing the Impact of Loss of Service A properly designed business recovery plan for such companies must require that not only individual workstations be restored but also incoming telephone service that turns customer calls into revenue for the company. Restoring computer function matters little if the customer cannot make use of it. On the surface, this example seems to reflect common sense; in practice, recovery of communications can be difficult to achieve without preplanning. The company may, for example, use a wide array of communications services, including incoming 800 numbers, outgoing Wide-Area Telecommunications Service lines, Direct Inward Dial circuits, custom circuits (e.g., private data and voice lines), and software-defined networks. It may also employ automated call-distributing (ACD) systems and other special call-handling equipment that resides on site. The risk to the company, then, includes not only internal threats to resident equipment from fire, flood, and sabotage (as in computer contingency planning) but threats from outside sources. Both can have an equally devastating effect on operations when disaster strikes. The major area of external exposure is undoubtedly the communications network. Preliminary Activities in Recovery Planning A persistent problem in addressing the need for network protection is the availability of funds and the required management support for these resources. Justifying money and people for disaster planning is difficult no matter how urgent the need. Developing a fullscale communications recovery plan is also a long-term project that has an average life of two or more years. One logical method of addressing the recovery planning project is to deal with it in three phases. Defining the Exposure in an Executive Summary Phase one examines what the business is really trying to protect and why. It involves a preliminary study of critical business systems. Senior managers in the major business units must be asked to estimate what the financial damage to the overall company would be

3 in the event of a communications outage affecting a critical system (e.g., a telemarketing center or order desk) for the duration of n days. The resulting figures are then crosschecked with other departments and with corporate financial managers to provide a reliable (although not exact) assessment of financial loss. The final report or presentation is made to senior management. This report must always concentrate on the business, not the technical, issues. Assigning a dollar value to an hour or day of downtime is an excellent strategy for obtaining management support, in terms of both money and personnel, to continue the project. Educating Personnel and Setting Audit Standards The IS department and internal audit function usually have defined and documented acceptable standards for auditing a data center's ability to recover from a disaster. A similar set of standards should be developed for the communications department and for the network itself. Phase two involves formulating these standards through a cooperative effort among departments. The result of this effort is a document everyone can claim ownership of and that ensures continuity so that all the involved departments IS, communications, operations, and internal audit are prepared for the third phase(implementation) of the project. Implementing the Network Disaster Recovery Plan It is not unusual for the implementation of a network recovery plan to take anywhere from 18 to 30 months. Whereas phase one involves only a high-level assessment of exposure, this phase deals with the specifics of the plan and requires detailed interviews with users and department managers and with personnel from virtually every internal department, from human resources to building security. The depth of study required accounts in part for the long time frame for implementing the plan. However, to be considered a true business recovery plan, it must include input from all departments. Contingency planners must tap the appropriate personnel to provide necessary information on market share, salaries (required to estimate losses in productivity in the event of a disaster), or legal issues. In addition, most of the organization's equipment and network vendors need to become involved and major network modifications may have to be made over time. During this phase, the company will remain exposed to many types of communications disasters; however, it can take a few proactive steps almost immediately to decrease the exposure. Much of the capital-intensive part of the task has already been paid for by the acquisition of the hardware set in place by the telephone companies. A local or long-distance carrier network can perform many disaster recovery functions; the organization must simply learn how to take advantage of them. By knowing how to avail itself of such technology and by taking a few rudimentary steps before disaster strikes an organization can improve its resistance to telecommunications disruptions immeasurably and at low cost. Identifying the Four Threats to Voice Communications One way to gain an understanding of the nature of the various threats to voice communications integrity is to divide the threats into four categories: The loss of the network's switching capability (e.g., a software glitch).

4 The loss of a network serving facility (e.g., a Central Office fire). Isolation from a network provider's serving facility (e.g., a cut cable). An internal disruption (i.e., a disruption inside the company's building). Each of these threats is discussed in the following sections along with an example and some suggestions for steps that can either prevent such outages from occurring or minimize their disruptive effect. The focus is on low-cost alternatives that can be undertaken with relative ease. This information is intended to help IS managers who are assessing similar exposure in their organizations or are preparing to evaluate more advanced network protection measures. Loss of Network Switching Capability The most notable example of this type of outage was the January 1990 failure of the AT&T network that resulted from a glitch in software that was, ironically, designed to increase reliability in the network. Approximately 50% of AT&T's regular traffic volume was blocked for most of a business day. Hardest hit were companies that depended on incoming 800 services or software-defined network services. The fact that Fortune 1000 companies had alternative carriers mattered little because incoming 800 numbers are not portable, or transferable, between carriers. Consequently, a user whose incoming AT&T 800 numbers were inoperative because of the outage could not have its other carriers process those calls, even if the connection to these carriers was available. Software-defined networks were similarly affected because they rely solely on the switching services of a single carrier, in this case AT&T. Long-Distance Access Codes During this type of outage, outbound services at least can be easily restored through the use of the long-established 10XXX dialing pattern. The surprise resulting from the AT&T incident was just how uninformed users were about the availability of 10XXX dialing or five-digit dialing codes. Because all major carriers can be dialed through an equal access end office, a disrupted long-distance user can in essence dial around a problem by selecting the access code for a long-distance carrier not affected by the outage (see Exhibit 1). Using 10XXX Dialing For example, an AT&T user who would usually dial 1 (214) could have instead dialed 10222, 1 or 0, then the regular number to complete the call on the MCI network. Similarly, the five-digit code would access US Sprint. It is ironic to think that the most widely available and useful and least expensive alternative for restoring long-distance calling capability was unknown to so many users. Companies would be prudent to keep a listing of such codes on hand at all times, because the long-distance company may not be able to provide them when an outage occurs. These codes are a costeffective insurance measure against long-distance outages.

5

6 Loss of a Network Serving Facility In any business, a total loss of a major facility is always a possibility, and communications providers are no exception. There have been dozens of cases of telephone Central Office being rendered inoperable over the past 10 years. Causes have included fires, floods, lightning, tornadoes, hurricanes, switch failure, and human error. The most far-reaching Central Office disaster occurred in May 1988 in Hinsdale IL when a fire in a suburban Chicago central office affected not only the 49,000 local telephone subscribers but more than half a million other users nationwide. Central office disasters are always messy; they affect a large area and the damage is not limited to basic dial-tone service. Other services that may be affected are data and voice private line circuits; cellular, paging, and long-distance access lines; and 911 emergency trunks. Given the magnitude of such disasters, however, a few measures can be taken at low cost by alert contingency planners who think ahead. Command and Control Emergency Response Cellular telephones operate from mobile telephone serving offices(mtsos) that are often diverse from an affected central office. Although only a limited number of cellular phones can be used in a given area because of limitations of the cellular network, they are indispensable for command and control. Other technologies not to be overlooked are radio telephones and two-way radios. Radio telephones can often be used for phone patches back to the public network by way of repeaters, whereas two-way radios are useful for communications in the immediate area. After police, fire, and other emergency services, the next class of service restored following a major central office disaster is usually pay telephones. Because Asynchronous Transfer Mode and other banking operations may be down for a significantly longer time, managers should keep some cash on hand, some of it in quarters, for incidentals. Isolation from a Serving Facility A cable cut is probably the most common cause of a communications disruption. A cut cable can affect any of the thousands of high-capacity fiber-optic lines that crisscross the United States. One well-publicized AT&T outage in New York was caused by a technician who unknowingly cut the wrong underground fiber-optic cable. Unfortunately, this particular fiber contained a 1.7G-bps carrier, or about 240,000 circuits (about 60% of New York's capacity, by some estimates). Often there is precious little that can be done about human error. People are fallible and accidents will happen, even to the best-prepared companies. Reasonable precautions include enforcing strict adherence to written policies as well as to procedures for maintenance and safety. Effective change control management of major software upgrades and revisions can also be an effective way to prevent disruption. Assessing Communications Rights-of-Way Telephone, electric, fiber-optic, gas, water, television, and other services are usually installed in the same public rights-of-way, mainly along streets and thoroughfares. In many cities, especially older ones like New York, Boston, and Philadelphia, these rights-of-way

7 date back decades. The result is that when contractors dig to repair or install facilities, they are never quite sure what they will hit on the way down. Although being invisible makes a telephone cable facility more secure, it makes it vulnerable in other ways. Record-keeping can be a problem, for example, when rights-ofway have been in continuous use for decades or more. Some companies have begun to use innovative schemes for installing communications facilities by laying fiber-optic cable in abandoned steam tunnels and subway tunnels. Although this eliminates one problem by making the facility more accessible, it can create another by making the facility visible and therefore vulnerable to disruptions caused by vandalism or tampering by unauthorized personnel. There are many methods to protect and diversify cables in a network. One inexpensive precautionary measure that addresses part of the problem is to meet with the account representative of the local operating company to assess the company's exposure in this area. Many times, alternate or diverse routing is available in the company's service area for little or no cost. Alternate and Diverse Routing. IS managers should understand the terminology and the difference between alternate and diverse routing. Many users, and the telephone companies for that matter, use the terms interchangeably. Generally, alternate routing refers to any cable facility that is different from the facility to which the company is currently assigned. Diverse routing refers to the use of not only a different facility but a completely different physical path. Most telephone companies can provide alternate routing with relative ease. Diverse routing is trickier, especially if the business is located far from its serving Central Office. An examination of the entrance facilities to the building is also recommended; it undermines the purpose of diverse routing if new facilities are simply brought in through the same building conduit. All construction activity in the vicinity of a business must also be taken into consideration. Pair Gain Units. Central offices and cables are not the only items to consider when the organization is assessing vulnerability in rights-of-way. Other components of the network that should be considered are telephone pedestals and pair gain units. The most common pair gain unit is called an SLC-96 pair gain unit (SLC stands for subscriber loop carrier). In areas where cable facilities are in short supply, distances are long, and laying new cable is expensive, these units are used to carry 544 simultaneous circuits on 16 pairs of copper cables. A fiber version also exists. Pair gain units work exceptionally well and have been broadly accepted by the local operating companies; however, pair gain units, pedestals, and fiber-optic repeaters are uniquely vulnerable to traffic hazards and can be suddenly disabled by an accident. For example, if a driver runs a car into a central office, a totaled car might be the only physical consequence. A similar collision with a pair gain unit would destroy the equipment, thereby isolating users. This is the same consequence as a total Central Office disaster, although probably for a shorter time because the equipment takes less time to replace.

8 Internal Disruptions Some of the least expensive insurance available to ensure network integrity involves the dedication of someone's time. It is a prudent idea to personally involve people from the IS department, because many contingency planning rules for the data center hold true for the communications network. IS Manager's Checklist A walkthrough of the site will enable IS managers to assess potential problems and to check that adequate precautions are being taken to protect the organization's communications equipment. A checklist of problems to look for would include the following items: Are all telephone closets and Private Branch exchange rooms locked and accessible only to authorized personnel? Do cable risers in multistory buildings pass through telephone closets belonging to other companies? Do they similarly restrict access, or do others have access to the organization's cables from other telephone closets? Are flammable materials stored in lower cable closets? Are the risers into the closets fire-stopped? Are backup copies of PBX software and assignments made regularly? Are they stored off site and included in the IS department's regular pick-up schedule? Are similar power conditioning schemes employed in the switch room as in the computer room? If not, can the switch room use computer room resources already in place, such as power conditioners and uninterruptible power supply (UPS) equipment? (The IS department's expertise in the area of power conditioning is valuable and should be shared.) Are sprinklers, air-conditioning pipes, and regular building plumbing located above the equipment? Do low sprinkler heads exist over pathways where equipment is rolled in? Are pipes in an area where they might freeze? Infrared Scanning The same technology that allows space satellites to look through clouds can be employed to identify electrical faults and shorts in walls before they cause fires. Infrared scanning is highly recommended for businesses residing in older buildings with dubious wiring or in new ones to reveal slipshod construction. AT&T and other companies provide infrared scanning (also called thermographics) service. Recommended Course of Action The interruption of critical business systems and communications networks is a risk that is often ignored until a disaster happens. Corporate management must shoulder the cost of a disaster recovery planning project. One way to influence corporate management is to initiate a study to quantify the extent of the company's dependence on the network and to quantify the impact loss of service would have on the company in terms of:

9 Lost sales (i.e., direct revenues). Lost market share. Lost customer confidence. Lost productivity (e.g., idle employees). Legal liability issues. These are terms that are understandable to executive management, and they will assist contingency planners in securing the necessary support and funding for the disaster recovery planning project. These figures must be quantified with the corporate controller, the vice-president of marketing, the sales vice-president, or corporate counsel, as appropriate. Consultants and outside resources can also be brought in when necessary. Establishing standards is another part of the disaster recovery planning project. Just as the organization has standards for the data center, standards for the network should be devised in connection with such physical security issues as fire protection and access control. Other issues directed toward the network itself for example, when backup circuits are appropriate must be included as well. All departments in the organization must have input to this process to ensure uniformity and compliance. After a formal network recovery plan has been implemented, all new services should be ordered with disaster recovery in mind. It is easier, for example, to require a switch, modem, or multiplexer vendor to provide guaranteed replacement times for equipment before the contract is signed. Otherwise, the organization could end up having to pay extra for the same service later. The task of disaster recovery planning for the communications network need not be put off because of budgetary constraints. There are many concrete actions the IS manager can and should be taking, both independently and with the aid of vendors, to protect the organization's critical network resources. Fault-tolerance in the network does not happen overnight. It evolves over time, through the collective impact of even the most minimal efforts, such as those described in this article. Any steps that can be taken, however small, result in a higher level of service to the company's customers and greater peace of mind to the organization. Author Biographies Leo A. Wrobel Leo A. Wrobel is president and CEO of Dallas-based Premiere Network Services, Inc., a telecommunications and disaster recovery consulting firm. He is a consultant in matters of telephone regulation and is also a city councilman. He is a member of the IEEE, the DPMA, and the Association of Contingency Planners.

5-04-25 Adding Communications Network Support to Existing Disaster Recovery Plans Leo A. Wrobel

5-04-25 Adding Communications Network Support to Existing Disaster Recovery Plans Leo A. Wrobel 5-04-25 Adding Communications Network Support to Existing Disaster Recovery Plans Leo A. Wrobel Payoff This article reviews the processes that must be documented in a recovery plan for a company's mission-critical

More information

5-04-45 Operating Standards and Practices for LANs Leo Wrobel

5-04-45 Operating Standards and Practices for LANs Leo Wrobel 5-04-45 Operating Standards and Practices for LANs Leo Wrobel Payoff Operating standards for LANs offer certain advantages for keeping expenses for procurement, maintenance, and support under control At

More information

Business Continuity White Paper

Business Continuity White Paper White Paper January 2011 Introduction In today s demanding business environment, few companies can afford having a key facility or branch location go off-line, or face service interruptions at headquarters.

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER

DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER Disasters or accidents would cause great harm on network infrastructure. It is unavoidable and the operation of network would be hampered for a long

More information

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

How To Set Up An Ip Trunk For A Business

How To Set Up An Ip Trunk For A Business Charter Business : White paper SIP Trunking: A new voice in communications service WHITE PAPER With the rise of next-generation technology, business customers have more options than ever from providers

More information

How To Manage A Disaster Recovery Plan

How To Manage A Disaster Recovery Plan 5-04-26 Testing Disaster Recovery Plans Leo A. Wrobel Payoff The true test of a disaster recovery plan is whether it can uncover failure points. Companies should consistently tighten testing criteria and

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

11 Common Disaster Planning Mistakes

11 Common Disaster Planning Mistakes 11 Common Disaster Planning Mistakes The world is full of risk. Floods, fires, hurricanes, thefts, IT system failures and blackouts are just a few of the incredibly damaging disasters that can and do strike

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff

85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff 85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff Because a business continuity plan affects all functional units within the organization, each functional unit must participate

More information

Audit Report. Management and Security of Office of Budget and Program Analysis Information Technology Resources. U.S. Department of Agriculture

Audit Report. Management and Security of Office of Budget and Program Analysis Information Technology Resources. U.S. Department of Agriculture U.S. Department of Agriculture Office of Inspector General Southeast Region Audit Report Management and Security of Office of Budget and Program Analysis Information Technology Resources Report No. 39099-1-AT

More information

1-01-80 Organizing for Disaster Recovery Leo A. Wrobel

1-01-80 Organizing for Disaster Recovery Leo A. Wrobel 1-01-80 Organizing for Disaster Recovery Leo A. Wrobel Payoff Consumed by daily network or computer operations, the IS technical staff often has little time for long-term planning pursuits such as disaster

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

White Paper AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS. Executive Summary

White Paper AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS. Executive Summary AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS Executive Summary Today s businesses rely heavily on voice communication systems and data networks to such

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005 AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT

More information

Redundancy for Corporate Broadband

Redundancy for Corporate Broadband Redundancy for Corporate Broadband WHITE PAPER December, 2012 Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless

More information

Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook

Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook Table of Contents 1. Introduction to Business Continuity Planning and Disaster

More information

IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines

IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines U.S. Department of Health and Human Services Administration for Children and Families Washington, D.C. 20447 Information

More information

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to

More information

TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING

TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING A.K. Tang 1 1 President, L&T Engineering and Project Management Consultant, Mississauga. Canada Email: alexktang@mac.com ABSTRACT: Telecommunication

More information

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information

More information

Building and Maintaining a Business Continuity Program

Building and Maintaining a Business Continuity Program Building and Maintaining a Business Continuity Program Successful strategies for financial institutions for effective preparation and recovery Table of Contents Introduction...3 This white paper was written

More information

Assuring Business Communications Continuity

Assuring Business Communications Continuity Assuring Business Communications Continuity An ebrief about Wireless Business Continuity When your business communications network is down, or when weather or other disasters keep your employees from getting

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

Risk Control Industry Guide Series. Telecommunications Industry

Risk Control Industry Guide Series. Telecommunications Industry Risk Control Industry Guide Series Telecommunications Industry This study reflects on information derived from insurance claims. These claims form a database that can be analyzed to determine the many

More information

Choosing the Right Business VoIP Option for Small Businesses

Choosing the Right Business VoIP Option for Small Businesses Choosing the Right Business VoIP Option for Small Businesses Copyright 2015 AireSpring Introduction A small business has many priorities; things such as finding new customers, recruiting and retaining

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Loop Start or Ground Start?

Loop Start or Ground Start? Fire Alarm Notebook by Dean K. Wilson. P.E. Page 1 Loop Start or Ground Start? by Dean K. Wilson, P.E. Question: The new telephone system installed in our office building has telephone voice mail. To signal

More information

83-20-10 Secure Data Center Operations Gilbert Held Payoff

83-20-10 Secure Data Center Operations Gilbert Held Payoff 83-20-10 Secure Data Center Operations Gilbert Held Payoff The data center stores information necessary for the effective and efficient operation of the entire organization. Loss of this data, conveyance

More information

COMPONENTS OF A SUCCESSFUL LAN DISASTER RECOVERY PLAN

COMPONENTS OF A SUCCESSFUL LAN DISASTER RECOVERY PLAN COMPONENTS OF A SUCCESSFUL LAN DISASTER RECOVERY PLAN By Leo A. Wrobel Technologists often exhibit an unexpected response when asked by management to produce a disaster recovery plan for an automated system.

More information

Emergency Operations California State University Los Angeles

Emergency Operations California State University Los Angeles Business Continuity Plan Emergency Operations California State University Los Angeles 1. Objective & Scope 2. Definition of Disaster 3. Risk and Business Impact Analysis Summary 4. Business Continuity

More information

Table of Contents. Introduction to SMB Phone Systems. Types of Commercial Phone Systems. Sizing Office Phone Systems. Features of Office Phone Systems

Table of Contents. Introduction to SMB Phone Systems. Types of Commercial Phone Systems. Sizing Office Phone Systems. Features of Office Phone Systems Table of Contents Introduction to SMB Phone Systems Types of Commercial Phone Systems 3 3 PBX systems... 3 Key systems... 4 KSU-less systems... 4 VoIP phone systems... 5 Sizing Office Phone Systems Features

More information

Proven techniques and best practices for managing infrastructure changes

Proven techniques and best practices for managing infrastructure changes Proven techniques and best practices for managing infrastructure changes When a business expands an existing facility, adds a new location, incorporates an influx of new users, or upgrades an existing

More information

Schools and Libraries Universal Service Support Mechanism Eligible Services List

Schools and Libraries Universal Service Support Mechanism Eligible Services List Schools and Libraries Universal Service Support Mechanism Eligible Services List (WC Docket No. 13-184; CC Docket No. 02-6; GN Docket No. 09-51) The Federal Communications Commission s (FCC s) rules provide

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

PBX Fraud Educational Information for PBX Customers

PBX Fraud Educational Information for PBX Customers PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and

More information

Continuity of Operations Planning. A step by step guide for business

Continuity of Operations Planning. A step by step guide for business What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures

More information

White Paper VoIP Crash Phone Systems

White Paper VoIP Crash Phone Systems White Paper VoIP Crash Phone Systems John Purnell March 1 st, 2015 Page 2 of 10 Contents 1.0 Executive Summary... 3 2.0 Abbreviations and Definitions... 3 3.0 What is a Crash Phone System?... 4 4.0 Technology

More information

Analysis of Telephone PBX Requirements. E.Weiner. Research Triangle Institute 1615 M Street, NW, Suite 740 Washington, DC 20036

Analysis of Telephone PBX Requirements. E.Weiner. Research Triangle Institute 1615 M Street, NW, Suite 740 Washington, DC 20036 \-'a Analysis of Telephone PBX Requirements 0 EMyron E.Weiner n lmarch 1995 Research Triangle Institute 1615 M Street, NW, Suite 740 Washington, DC 20036 Municipal Finance and Management Project No. 5656

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

Business Telephone Systems:

Business Telephone Systems: Business Telephone Systems: A Buyer's Guide Visit Corporate Telecomm at http://www.corporatetelecomm.com/learn for more Learning Guides and additional resources. Page 2 Business Telephone Systems Introduction

More information

Deployment of Telecommunications Networks

Deployment of Telecommunications Networks Deployment of Telecommunications Networks Definition A telecommunications network is the combination of numerous network elements that are required to support voice, data, or video services in local or

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

VitalPBX. Hosted Voice That Works. For You

VitalPBX. Hosted Voice That Works. For You VitalPBX Hosted Voice That Works For You Vital Voice & Data s VitalPBX VVD Hosted PBX solutions provide you with the stability of a traditional telephone PBX system and the flexibility that only a next

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

VoIP Deployment Options

VoIP Deployment Options AN ATLANTIC-IT.NET WHITEPAPER VoIP Deployment Options Whether cloud-based or on premises, IP-based voice platforms can deliver a wide range of significant business benefits. 2 VoIP Deployment Options EXECUTIVE

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

Disaster Preparedness for Persons with Mental Health Needs

Disaster Preparedness for Persons with Mental Health Needs Disaster Preparedness: The impact of hurricanes, tornadoes, acts of terrorism, and floods are all clear in the minds of everyone today. But, even though we all know what CAN happen, are we prepared? Can

More information

What You Should Know About Cloud- Based Data Backup

What You Should Know About Cloud- Based Data Backup What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Monitoring, Managing, Remediating

Monitoring, Managing, Remediating MANAGED SERVICES Packages include: Fault management Troubleshooting & escalation Proactive monitoring WAN status 800# Incident & inventory management Quarterly reviews Managed device database Online dashboard

More information

Voice and Delivery Data Networks

Voice and Delivery Data Networks Voice and Delivery Data Networks Chapter 11 Learning Objectives After reading this chapter, you should be able to: Identify the basic elements of a telephone system Describe the composition of the telephone

More information

IF DISASTER STRIKES IS YOUR BUSINESS READY?

IF DISASTER STRIKES IS YOUR BUSINESS READY? 1 IF DISASTER STRIKES IS YOUR BUSINESS READY? DISASTER RECOVERY and BUSINESS CONTINUITY: WHAT YOU NEED TO KNOW Realize the Power of Technology Many business owners put off disaster planning, perhaps thinking

More information

STATE OF OHIO I. AUTHORITY

STATE OF OHIO I. AUTHORITY STATE OF OHIO SUBJECT: PAGE 1 OF 8. Telecommunication Services SECTION: 05-OIT-12 RULE/CODE REFERENCE: SUPERSEDES: Ohio IT Policy ITP H.2 05-OIT-12 dated 08/19/14 RELATED ACA STANDARDS: EFFECTIVE DATE:

More information

A Brief on the Benefits of Going Green and Taking Your Market Paperless. Why Deploy Document Management in Your Market

A Brief on the Benefits of Going Green and Taking Your Market Paperless. Why Deploy Document Management in Your Market A Brief on the Benefits of Going Green and Taking Your Market Paperless Why Deploy Document Management in Your Market March 11, 2009 Introduction As a leader in your organization and your community, you

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Planning for disaster.

Planning for disaster. Page 1 of 7 The CPA Journal Online June 1994 Planning for disaster. by Smith, L. Murphy Search Software Personal Help Abstract- The string of natural and man-made disasters that had recently devastated

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%.

How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%. How to write a DISASTER RECOVERY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A DRP AND HOW CAN IT HELP MY COMPANY? CHAPTER PREPARING TO WRITE YOUR DISASTER RECOVERY PLAN

More information

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain 1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business

More information

nexvortex VOIP DISASTER RECOVERY BUSINESS SOLUTION

nexvortex VOIP DISASTER RECOVERY BUSINESS SOLUTION nexvortex VOIP DISASTER RECOVERY BUSINESS SOLUTION Terry Prime Chief Technology Officer February 2007 Copyright 2007 Introduction The telephone service is a strategic component of any business or government

More information

Overview of how to test a. Business Continuity Plan

Overview of how to test a. Business Continuity Plan Overview of how to test a Business Continuity Plan Prepared by: Thomas Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com BRP/DRP Test Plan Creation and Exercise Page: 1 Table of Contents BCP/DRP Test

More information

With 360 Cloud VoIP, your company will benefit from more advanced features:

With 360 Cloud VoIP, your company will benefit from more advanced features: Voice over IP (VoIP) has emerged as the new leader in cost-effective standards based communications. 360 Cloud VoIP enables customers have the benefits of an Enterprise PBX for a fraction of the cost of

More information

VoIP Logic: Disaster Recovery and Resiliency

VoIP Logic: Disaster Recovery and Resiliency VoIP Logic: Disaster Recovery and Resiliency VoIP Logic: Options for Disaster Recovery and Resiliency The ability to keep telephone systems operating in the event of a service impairment or a catastrophic

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery

More information

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC.

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC. CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC. S EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD.

More information

IT Relocation Checklist

IT Relocation Checklist This IT Relocation Checklist will help you prepare & manage your entire IT Relocation safely, efficiently and without disruption to services. Your IT & Telecom Solution Provider IT Relocation - the importance

More information

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009!

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009! Disaster Recovery Review FREE Promotional Offer Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009! This review is designed to help the small business better

More information

Disaster Recovery. July 2015. Specialists in IT Outsourcing and Consultancy

Disaster Recovery. July 2015. Specialists in IT Outsourcing and Consultancy Disaster Recovery July 2015 Copyright, Ltd SITOC 2015 and StorageCraft SITOC Company Registration Number: 05278300 21-23 Croydon Road, Caterham, Surrey, CR3 6PA Contents WHY YOU MIGHT BE PUTTING IT OFF...

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

Inside the Business VoIP Revolution. The Rise of Cloud-based Phone Systems Over Traditional Service

Inside the Business VoIP Revolution. The Rise of Cloud-based Phone Systems Over Traditional Service Inside the Business VoIP Revolution The Rise of Cloud-based Phone Systems Over Traditional Service INTRODUCTION The business phone solution marketplace has reached a tipping point where companies seeking

More information

WHAT IS DISASTER RECOVERY

WHAT IS DISASTER RECOVERY WHAT IS DISASTER RECOVERY The definition of Disaster Recovery' tends to vary widely from company to company and is a difficult term to define because it changes and is so varied in each situation. And

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

IT Disaster Recovery Plan Template

IT Disaster Recovery Plan Template HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned

More information

7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters

7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters 7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters If You Depend On Your Computer Network To Run Your Business,

More information

WHY CLOUD BACKUP: TOP 10 REASONS

WHY CLOUD BACKUP: TOP 10 REASONS WHITE PAPER DATA PROTECTION WHY CLOUD BACKUP: TOP 10 REASONS Contents REASON #1: Achieve disaster recovery with secure offsite cloud backup REASON #2: Freedom from manual and complex tape backup tasks

More information

Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP)

Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP) Preface Computer systems are the core tool of today s business and are vital to every business from the smallest to giant organizations. Money transactions, customer service are just simple examples. Despite

More information

IT Service Management

IT Service Management IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction

More information

Availability Digest. The Planet Blows Up. September 2008

Availability Digest. The Planet Blows Up. September 2008 the Availability Digest The Planet Blows Up September 2008 On Saturday, May 31, 2008, an explosion blew out three walls in the Houston data center of The Planet, one of the world s largest providers of

More information

Increase your network s security by making the right premise cabling decisions

Increase your network s security by making the right premise cabling decisions Increase your network s security by making the right premise cabling decisions André Mouton, Product Line Manager Benoit Chevarie, Product Line Manager August 2006 Revision 2 Increase your network s security

More information

MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION

MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION MANAGEMENT AUDIT REPORT OF DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION REPORT NO. 13-101 City of Albuquerque Office of Internal Audit

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK Federal Financial Institutions Examination Council FFIEC Business Continuity Planning BCP FEBRUARY 2015 IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Board and Senior Management Responsibilities

More information

Business Continuity Plan (BCP)

Business Continuity Plan (BCP) 1. Emergency Contact Persons CSCM s primary emergency contact persons are: John Stepp, Managing Director and CEO Phone #: 913 485 8809 Michael Horton, Branch Manager Phone #: 316 259 4449 These names will

More information

Managed IT Services:

Managed IT Services: Managed IT Services: The Smart Technology Solution for Business Owners Managed services is the practice of outsourcing day-to-day management responsibilities as a strategic method for improving operations

More information

Emergency Telephone Systems

Emergency Telephone Systems Standard Issued Date: 22 May 2014 Important Warning This document is one of a set of standards developed solely and specifically for use on the rail network owned or managed by the NSW Government and its

More information

BUSINESS CONTINUITY PLANNING AT THE NATIONAL GALLERY OF AUSTRALIA. Erica Persak

BUSINESS CONTINUITY PLANNING AT THE NATIONAL GALLERY OF AUSTRALIA. Erica Persak BUSINESS CONTINUITY PLANNING AT THE NATIONAL GALLERY OF AUSTRALIA Erica Persak Thank you for giving me the opportunity to speak on behalf of the National Gallery on the subject of business continuity planning

More information

Getting Your Practice Ahead

Getting Your Practice Ahead Volume 4: Data Backup Essentials For Physicians Edited By : Vinod Venugopal Disclaimer: The following document was created for free distribution by Technical Doctor Inc. The document contains reference

More information

Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member

Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member City of Gainesville Inter-Office Communication April 3, 2012 TO: FROM: SUBJECT: Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member Brent

More information