ESKITP6036 IT Disaster Recovery Level 5 Role
|
|
- Jason Watts
- 8 years ago
- Views:
Transcription
1 Overview This sub-discipline is about the competencies required in order to manage all aspect of Disaster Recovery (DR), as it applies to IT within an organisation. ESKITP6036 1
2 Performance criteria You must be able to: Control the management of IT disaster recovery plans P1 P2 P3 P4 Develop effective disaster recovery plans that meet the needs of the business and are logistically, technically, and financially feasible, and support the organisation's brand, reputation and organisational effectiveness, presenting findings relating to their accuracy, currency and completeness to a wide range of sponsors, stakeholders and other individuals as directed by superiors Critically analyse all relevant information and knowledge relating to risks, vulnerabilities and threats that may need to be considered within disaster recovery plans Verify the assumptions contained within business continuity management plans that have a consequence on disaster recovery and the business requirements and criteria for restoration of specific IT/technology systems, services and assets Effectively manage the execution of disaster recovery plans, using triggers for invocation correctly and identifying and making decisions on the relative priorities of IT/technology systems, services and assets to be restored, where appropriate ESKITP6036 2
3 Monitor and maintain the IT disaster recovery plans You must be able to: P5 P6 P7 P8 P9 Design, develop, manage and monitor the operation of appropriate and comprehensive disaster recovery tests and dry runs that are sufficiently well constructed to provide an accurate, current and complete reflection of a real life scenario, presenting the findings to sponsors, stakeholders and other individuals Regularly and rigorously monitor the alignment of disaster recovery plans with business continuity management plans and all relevant legislation, regulations and external standards, reporting issues to superiors where appropriate Verify that disaster recovery tests and dry runs are sufficiently well constructed to provide an accurate, current and complete reflection of real life scenarios, in line with business needs and under the direction of superiors Critically analyse and clearly communicate/report the implications of business continuity management plans and assumptions on disaster recovery activities Critically analyse and clearly communicate/report the implications of the extent of disaster recovery provision for an organisation and their impact on business continuity plans to a wide range of sponsors, stakeholders, external bodies and other individuals P10 Apply best practice and relevant learning from other potentially disastrous/disastrous and real life disaster scenarios to improve own disaster recovery plans Communicate with others on matters relating to IT disaster recovery plans You must be able to: P11 Effectively manage relationships with external bodies who provide a range of disaster recovery services and communicate disaster recovery roles, responsibilities, processes and procedures to individuals who may be required to carry them out P12 Implement and maintain effective, current, comprehensive and complete education and training on disaster recovery plans and activities for all individuals within the organisation P13 Accurately identify the sponsors, stakeholders, individuals, external providers and partners who need to be involved in disaster recovery plans and activities and/or who need to be informed in the event of a disaster ESKITP6036 3
4 Knowledge and understanding You need to know and understand: Control the management of IT disaster recovery plans K1 Identify and select K1.1 the consequences of an IT/technology disaster scenario on the brand, reputation and operational effectiveness of an organisation K1.2 triggers that may result in the invocation of the disaster recovery plan K1.3 the range of appropriate approaches that can be taken to undertake disaster recovery activities and their appropriateness in a range of business, IT/technology contexts K1.4 the implications of disaster recovery plans on business continuity management activities K1.5 the external factors and their implications that may impact on disaster recovery K1.6 any other information relevant to disaster recovery activities K2 Source/gather/collate the cost and value of disaster recovery provision for IT/technology systems, services and assets K3 Use and apply: K3.1 the most appropriate approaches to undertake disaster recovery planning and activities information relating to the consequences of an IT/technology disaster on the brand, reputation and the operational effectiveness of an organisation K3.2 information relating to the individual(s) responsible for leading K3.3 disaster recovery activities K3.4 information relating to the named individuals and their roles within disaster recovery plans and activities K3.5 information generated by disaster recovery activities in order to determine when and how to return to normal operations K3.6 best practice in disaster recovery activities K3.7 learning from other potentially disastrous/disastrous and real life disaster scenarios to improve own disaster recovery plans K3.8 triggers in order to establish when to invoke a disaster recovery plan K3.9 the processes, procedures, methods, tools and techniques to monitor the alignment of disaster recovery activities and their deliverables with all relevant legislation, regulations and external standards K4 Document the cost and value of disaster recovery provision for IT/technology systems, services and assets K5 Report: K5.1 the possible implications of business continuity management plans and assumptions on disaster recovery activities K5.2 the possible implications of disaster recovery plans and assumptions on business continuity management activities K6 Manage: K6.1 the alignment of disaster recovery activities with all relevant legislation, regulations and external standards K6.2 the alignment of disaster recovery activities with business continuity management needs K6.3 relationships with sponsors, stakeholders and external bodies and individuals on matters relating to disaster recovery activities K6.4 relationships with those individuals involved in business continuity ESKITP6036 4
5 management K6.5 relationships with external providers involved in business continuity management K6.6 external factors impacting on disaster recovery activities K7 Design and Develop: K7.1 processes, tools and techniques to monitor the alignment of disaster recovery activities and their deliverables with all relevant regulation and external standards K7.2 disaster recovery plans that meet the needs of the business and are logistically, technically, and financially feasible K7.3 education and training provided to all individuals within the organisation on disaster recovery plans and activities K7.4 disaster recovery tests and dry runs that are sufficiently well constructed to provide an accurate, current and complete reflection of a real life scenario K8 The need for legislation, regulations and external standards relating to disaster recovery K9 What are the: K9.1 range of approaches that can be taken to disaster recovery activities and their appropriateness in a range of business and IT/technology contexts K9.2 priorities for recovering IT/technology systems, services and assets impacted by a potential disaster and their relevance to business continuity management K9.3 actions that may be taken in the event of disaster recovery activities not supporting the business needs, brand and reputation K10 Who are the sponsors of and stakeholders for any disaster recovery activities Monitor and maintain the IT disaster recovery plans You need to know and understand: K11 Identify and select: K11.1 changes to IT/technology systems, services and assets, the business use of them and/or changes to the individuals involved in disaster recovery activities that will trigger an update to disaster recovery plans K11.2 information relating to the external environment, including legislation, external standards, market forces and technology, in order to keep disaster recovery plans current, complete and accurate K11.3 priorities for recovering IT/technology systems, services and assets impacted by a potential disaster and their relevance to business continuity management K12 Verify: K12.1 the business requirements and criteria for restoration of specific IT/technology systems, services and assets to support ongoing operation of an organisation K12.2 the assumptions contained with business continuity management plans that have a consequence on disaster recovery K12.3 that the requirements of business continuity management plans are supported by disaster recovery plans K12.4 that disaster recovery tests and dry runs are sufficiently well constructed to provide an accurate, current and complete reflection of real life scenarios ESKITP6036 5
6 K13 Implement and maintain: K13.1 the processes, tools and techniques relating to disaster recovery activities K13.2 the processes, tools and techniques to monitor the alignment of disaster recovery activities and their deliverables with all relevant regulation and external standards K13.3 education and training on disaster recovery plans and activities for all individuals within the organisation K13.4 disaster recovery tests and dry runs scenarios that are sufficiently well constructed to provide an accurate, current and complete reflection of real life scenarios K14 Monitor: K14.1 the alignment of disaster recovery work and its deliverables with all relevant legislation, regulations and external standards K14.2 the alignment of disaster recovery plans with business continuity management plans K14.3 disaster recovery activities during tests and dry runs K14.4 the effectiveness and quality of disaster recovery processes, procedures, methods, tools and techniques K14.5 compliance within the organisation to disaster recovery strategy, policies and procedures K15 Analyse/Interpret: K15.1 the implications of business continuity management plans and assumptions on disaster recovery activities K15.2 the implications of disaster recovery plans and assumptions on business continuity management activities K15.3 disaster recovery tests and dry runs to ensure they are sufficiently well constructed to provide an accurate, current and complete reflection of a real life scenario K15.4 the results gained from disaster recovery testing and dry runs K15.5 the results gained from monitoring the alignment of disaster recovery activities and their deliverables with all legislation, regulations and external standards K15.6 information and knowledge relating to risks, vulnerabilities and threats that may need to be considered within disaster recovery plans K15.7 the implications of internal and external change on disaster recovery plans K15.8 any other information relevant to disaster recovery activities K16 Present: K16.1 the effectiveness of processes, tools and techniques relevant to disaster recovery planning K16.2 the accuracy, currency and completeness of disaster recovery plans K16.3 updates to disaster recovery plans as a result of changes that might have occurred K16.4 disaster recovery plans for completeness against information contained within risk registers and assessments and threat and vulnerability assessments K16.5 improvements to disaster recovery strategy and policies as a result of best practice and lessons learned from other potentially disastrous/disastrous scenarios and real life disaster scenarios K17 Make decisions: K17.1 on the relative priorities of IT/technology systems, services and assets ESKITP6036 6
7 to be restored K17.2 on when and how to use external providers of disaster recovery services K17.3 on the external providers of disaster recovery services to use K18 Take action: K18.1 to prioritise how and when IT/technology systems, services and assets may be restored during disaster recovery activities K18.2 to refresh disaster recovery plans in line with the impact of change from both internal and external sources K18.3 to ensure that individuals and other external resources involved in disaster recovery activities have adequate training and knowledge K18.4 to test disaster recovery strategy and plans and conduct dry runs to ensure they remain accurate, current and complete K18.5 to execute disaster recovery plans in the event of real life scenarios, as appropriate K18.6 to contain the impact and potential consequences of a IT/technology disaster scenario K18.7 to deal with issues arising as a result of disaster recovery activities K18.8 to deal with external factors on disaster recovery activities K19 The importance of: K19.1 effectively containing the impact and potential consequences of a IT/technology disaster scenario K19.2 correctly identifying triggers to ensure the timely invocation of the disaster recovery plan K20 The need for monitoring: K20.1 the effectiveness and quality of all disaster recovery and planning activities K20.2 the effectiveness and quality of external providers of disaster recovery and planning services K20.3 the cost and value of disaster recovery provision for IT/technology systems, services and assets K20.4 the effectiveness and quality of disaster recovery processes, procedures, methods, tools and techniques Communicate with others on matters relating to IT disaster recovery plans You need to know and understand: K21 Identify and select: K21.1 the sponsors of and stakeholders for any disaster recovery activities K21.2 the sponsors, stakeholders, external bodies and individuals who need to be informed in the event of a disaster K21.3 external providers and partners who need to be involved in disaster recovery plans and activities K22 Communicate: K22.1 disaster recovery roles, responsibilities, processes and procedures to individuals and external providers who may be required to carry them out K22.2 the implications of the extent of disaster recovery provision within an organisation to a wide range of sponsors, stakeholders, external bodies and other individuals K22.3 the implications of disaster recovery plans on business continuity management plans ESKITP6036 7
8 K22.4 with external bodies offering a range of disaster recovery services K23 Advise and guide others on: K23.1 all aspects of disaster recovery activities and their deliverables K23.2 the appropriateness of using external bodies offering a range of disaster recovery services K24 Negotiate: K24.1 with sponsors, stakeholders, external bodies and other individuals on how disaster recovery plans must restore IT/technology systems, services and assets K24.2 with external providers of disaster recovery services in line with organizational policies and procedures K25 The importance of : K25.1 informing sponsors, stakeholders, external bodies and individuals, as appropriate, in the event of a disaster K25.2 managing relationships with sponsors, stakeholders and external bodies and individuals in all aspects of disaster recovery activities ESKITP6036 8
9 Developed by e-skills UK Version number 1 Date approved September 2009 Indicative review date Validity Status Originating organisation March 2014 Current Original e-skills UK Original URN 6036 Relevant occupations Suite Key words Information and Communication Technology; Systems Support IT and Telecoms System recovery; Backup; Disaster planning ESKITP6036 9
ESKITP6034 IT Disaster Recovery Level 4 Role
Overview This sub-discipline is about the competencies required in order to manage all aspect of Disaster Recovery (DR), as it applies to IT within an organisation. ESKITP6034 1 Performance criteria You
More informationESKITP6032 IT Disaster Recovery Level 2 Role
Overview This sub-discipline is about the competencies required in order to manage all aspect of Disaster Recovery (DR), as it applies to IT within an. ESKITP6032 1 Performance criteria You must be able
More informationESKITP6026 IT Security Management Level 6 Role
Overview This sub-discipline is about the competencies required to ensure the security of all aspects of Information Technology services, systems and assets within an organisation. This includes the data,
More informationOverview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
More informationESKITP6033 IT Disaster Recovery Level 3 Role
Overview This sub-discipline is about the competencies required in order to manage all aspect of Disaster Recovery (DR), as it applies to IT within an. ESKITP6033 1 Performance criteria You must be able
More informationESKISP6046.02 Direct security architecture development
Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable
More informationContribute to IT architecture work
Overview This sub-discipline is concerned with the competencies required to create, maintain and manage IT architecture models representing the operating model for an organisation and their lower level
More informationESKISP6056.01 Direct security testing
Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being
More informationESKITP2034.03 Assist in the preparation of change management plans and assignments for IT enabled systems 1
Assist in the preparation of change management plans and assignments for IT Overview This sub-discipline, Change Management (203) is concerned with the competencies required to manage the introduction
More informationESKITP714401 Implement procedures and standards relating to metrics for IT service delivery
Overview This sub-discipline covers the competencies required to perform performance metrics. Monitoring service level performance is a complex task requiring collection of data, detailed analysis, and
More information702 IT/Technology Service Help Desk and Incident Management
702 IT/Technology Service Help Desk and Incident Management This sub-discipline is about the competencies required to manage the contacts made by customers of IT/technology systems, services and assets,
More informationESKITP7026 IT/Technology Service Help Desk and Incident Management Level 6 Role
IT/Technology Service Help Desk and Incident Management Level 6 Role Overview This sub-discipline is about the competencies required to manage the contacts made by customers of IT/technology systems, services
More informationESKITP7025 IT/Technology Service Help Desk and Incident Management Level 5 Role
IT/Technology Service Help Desk and Incident Management Level 5 Role Overview This sub-discipline is about the competencies required to manage the contacts made by customers of IT/technology systems, services
More informationESKITP2035.01 Identify change management opportunities and options for IT enabled systems 1
Identify change management opportunities and options for IT enabled Overview This sub-discipline, Change Management (203) is concerned with the competencies required to manage the introduction of business
More informationIT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
More informationESKITP5065 Software Development Process Improvement Level 5 Role
Software Development Process Improvement Level 5 Role Overview This sub-discipline covers the competencies required by an information technology and/or telecoms organisation to ensure that appropriate
More informationESKITP7102 IT/Technology Asset and Configuration Management Level 2 Role
IT/Technology Asset and Configuration Management Level 2 Role Overview This sub-discipline is about the competencies required to maintain the integrity and consistency of the IT/technology configuration
More informationESKITP4082 IT/Technology Infrastructure Design and Planning Level 2 Role
IT/Technology Infrastructure Design and Planning Level 2 Role Overview This sub-discipline is part of overall service design. It concerns the design of, and planning for, resilient IT/ technology infrastructure
More informationESKITP5064 Software Development Process Improvement Level 4 Role
Software Development Process Improvement Level 4 Role Overview This sub-discipline covers the competencies required by an information technology and/or telecoms organisation to ensure that appropriate
More informationESKITP5023 Software Development Level 3 Role
Overview This sub discipline covers the core competencies required to create software to address the needs of business problems and opportunities, resulting in a variety of software solutions, ranging
More informationESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationESKITP2035.02 Design and implement change management plans for IT enabled systems 1
Design and implement change management plans for IT enabled systems Overview This sub-discipline, Change Management (203) is concerned with the competencies required to manage the introduction of business
More informationESKISP6064.03 Conducts vulnerability assessment under supervision
Conducts vulnerability assessment under supervision Overview This standard covers the competencies required to conduct vulnerability assessments under supervision. This includes following processes for
More informationESKITP714601 Authorise strategy, policies and standards relating to IT service delivery performance metrics management
service delivery performance metrics Overview This sub-discipline covers the competencies required to direct the monitoring, analysis and communication of IT service delivery performance metrics. Monitoring
More informationESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
More informationService Management. 702 IT/Technology Service Help Desk and Incident Management
702 IT/Technology Service Help Desk and Incident Management This sub-discipline is about the competencies required to manage the contacts made by customers of IT/technology systems, services and assets,
More informationFINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation
Facilitate Business Continuity Planning and disaster recovery for a Overview This unit is suitable for those working in risk management roles who have responsibility for facilitating business continuity
More informationESKITP7052 IT/Technology Management and Support Level 2 Role
Overview This sub-discipline is about the competencies required to ensure that the infrastructure required to support the delivery of IT/technology systems, services and assets for an organisation remain
More informationESKITP7072 IT/Technology Capacity Management Level 2 Role
Overview This sub-discipline is about the competencies required to manage the capacity of IT/technology services, systems and assets that support an organisation. Capacity management covers a range of
More informationESKISP6053.01 Assist security testing, under supervision
Overview This standard covers the competencies required to assist security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationESKITP7145.01 Manage IT service delivery performance metrics
Overview This sub-discipline covers the competencies required to manage the monitoring, analysis and communication of IT service delivery performance metrics. Monitoring service level performance is a
More informationESKITP5022 Software Development Level 2 Role
Overview This sub discipline covers the core competencies required to create software to address the needs of business problems and opportunities, resulting in a variety of software solutions, ranging
More informationITSM Tools Operation Continuity Plan Example
ITSM Tools Operation Continuity Plan Example 1 Table of Contents 2 Introduction... 2 3 Invocation... 2 4 Scope... 2 5 Data Dependencies and Considerations... 3 6 Security and Access Considerations... 3
More informationESKITP7022 IT/Technology Service Help Desk and Incident Management Level 2 Role
IT/Technology Service Help Desk and Incident Management Level 2 Role Overview This sub-discipline is about the competencies required to manage the contacts made by customers of IT/technology systems, services
More informationPAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
More informationOverview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
More informationCCSAPAB2 Develop and agree objectives for archaeological projects
Develop and agree objectives for archaeological projects Overview This standard is relevant to archaeologists responsible for the development of projects on behalf of clients and the agreement of contracts
More informationBusiness Continuity Management Policy
Governance 1 Purpose The purpose of this policy is to communicate Business Continuity Management (BCM) framework, responsibilities and guiding principles for Victoria to effectively prepare for and achieve
More informationOverview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
More informationOverview COSCSMO10. Implement, monitor and control strategic procurement systems in construction management
Overview This standard is about agreeing and implementing with stakeholders what systems are most effective for managing the project. The systems identified will need to be prioritised and formalised if
More informationProposal for Business Continuity Plan and Management Review 6 August 2008
Proposal for Business Continuity Plan and Management Review 6 August 2008 2008/8/6 Contents About Newton IT / Quality of our services. BCM & BS25999 Overview 2. BCM Development in line with BS25999 3.
More informationCFAM&LBB2 Develop, maintain and evaluate business continuity plans and arrangements
Develop, maintain and evaluate business continuity plans and arrangements Overview This standard is about developing, maintaining and evaluating business continuity plans to ensure that organisations continue
More informationDATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.
More information
{Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect. {Add local information}
Job Description Business Analyst Organisation: Location: Reports to: Supervises: Working conditions: Last updated: {Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect
More informationNOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
More informationPAPER-6 PART-3 OF 5 CA A.RAFEQ, FCA
Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-3 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
More informationCouncil Policy Business Continuity Management
Policy Name: Business Continuity Management Council Policy Business Continuity Management ADOPTED BY COUNCIL: 19 th April 2016 DATE OF NEXT REVIEW: 18 th April 2020 RESPONSIBLE OFFICER: REFERENCES: Chief
More informationBusiness Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
More informationBusiness Continuity Management. Policy Statement and Strategy
Business Continuity Management Policy Statement and Strategy November 2011 Title Business Continuity Management Policy & Strategy Date of Publication: Cabinet Council Published by Borough Council of King
More informationBy. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd
BS 25999 Business Continuity Management By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd 1 Contents slide BSI British Standards 2006 BS 25999(Business Continuity) 2002 BS 15000
More informationBusiness Continuity Business Continuity Management Policy
Business Continuity Business Continuity Management Policy : Date of Issue: 28 January 2009 Version no: 1.1 Review Date: January 2010 Document Owner: Patricia Hughes Document Authoriser: Tony Curtis 1 Version
More informationESKITP5022v2 Perform software development activities under direction
Perform development activities under direction Overview This sub discipline covers the core competencies required to create to address business problems and realise opportunities, resulting in a variety
More informationInformation Security Policy. Chapter 11. Business Continuity
Information Security Policy Chapter 11 Business Continuity Author: Policy & Strategy Team Version: 0.5 Date: July 2008 Version 0.5 Page 1 of 6 Document Control Information Document ID Document title Sefton
More informationLot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
More informationESKITP7082 Change and Release Management Level 2 role
Overview This sub-discipline is about the competencies required for the management of changes required to the operational IT/technology configuration and environment in which it operates. The competencies
More informationBusiness Continuity Management
Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective
More informationThe PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
More informationThe PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
More informationBusiness Continuity Management Charter
Province of Nova Scotia Business Continuity Management Charter Department, Agency or Commission Name Business Continuity Coordinator Name 3/14/2014 Program Charter for Business Continuity Management Program
More informationBUSINESS CONTINUITY MANAGEMENT POLICY
BUSINESS CONTINUITY MANAGEMENT POLICY AUTHORISED BY: DATE: Andy Buck Chief Executive March 2011 Ratifying Committee: NHS Rotherham Board Date Agreed: Issue No: NEXT REVIEW DATE: 2013 1 Lead Director John
More informationCOSCSMO10 - SQA Unit Code FM1W 04 Implement strategic sourcing partnerships
Overview This Unit is about identifying and agreeing with the stakeholders what systems are most effective for managing the project. The systems identified will need to be prioritised and formalised if
More informationCompany Management System. Business Continuity in SIA
Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT
More informationFlinders University IT Disaster Recovery Framework
Flinders University IT Disaster Recovery Framework Establishment: Flinders University, 1 August 2013 Last Amended: Manager, ITS Security Services, 4 October 2013 Nature of Amendment: Initial release Date
More informationSFJIB11 Provide first line money and debt legal advice
Overview This standard is about providing clients with direct money management and debt information and advice at the point of initial contact with the service. You will establish their needs and expectations
More informationRoles within ITIL V3. Contents
Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for
More informationRelease: 1. BSBPMG509A Manage project procurement
Release: 1 BSBPMG509A Manage project procurement BSBPMG509A Manage project procurement Modification History Not applicable. Unit Descriptor Unit descriptor This unit describes the performance outcomes,
More informationBusiness Continuity Planning (BCP) 101
2011/EPWG/WKSP/004 Intro 1 Business Continuity Planning (BCP) 101 Submitted by: Business Continuity Management Institute Workshop on Private Sector Emergency Preparedness Sendai, Japan 1-3 August 2011
More informationBSBCCO501B Develop business continuity strategy
BSBCCO501B Develop business continuity strategy Release 2 BSBCCO501B Develop business continuity strategy Modification History Release Release 2 Comments New release of this Unit with version 7.0 of BSB07
More informationOverview TECHIS60341. Carry out security architecture and operations activities
Overview The protection of information, services and systems relies on a range of technical and procedural activities, often grouped in a framework. The framework will contain technical and logical, physical
More informationRelease: 1. BSBPMG510A Manage projects
Release: 1 BSBPMG510A Manage projects BSBPMG510A Manage projects Modification History Not applicable. Unit Descriptor Unit descriptor This unit describes the performance outcomes, skills and knowledge
More informationBUSINESS CONTINUITY MANAGEMENT FRAMEWORK
BUSINESS CONTINUITY MANAGEMENT FRAMEWORK Document Author: Civil Contingencies Service - Authorised by the CCS Joint Management Board - Version 1.0. Issued December 2012 Page 1 FRAMEWORK STATEMENT Business
More informationExternal Supplier Control Requirements BCM
External Supplier Control Requirements BCM BCM Requirement Description BCM Tiers Recovery Time Objective Why this is important 1. Business Continuity Policy Supplier will have a documented Business Continuity
More informationShankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.
Business Continuity Management & Disaster Recovery Planning Presented by: Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. 1 What is Business Continuity Management? Is a holistic management
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationESKIPU1 Improving productivity using IT
Overview This is the ability to plan, evaluate and improve procedures involving the use of IT tools and systems in order to improve the productivity and efficiency of tasks and activities. ESKIPU1 1 Performance
More informationSmart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version)
Smart Meters Programme Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Amendment History
More informationState Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationBusiness Continuity Management Group Policy
THE WAREHOUSE GROUP LIMITED ( the Company ) 1. Purpose of Policy This policy is to communicate The Warehouse Group Limited ( TWG ) governance requirements and arrangements for developing and sustaining
More informationBusiness Continuity Policy
Business Continuity Policy 1 NHS England INFORMATION READER BOX Directorate Medical Commissioning Operations Patients and Information Nursing Trans. & Corp. Ops. Commissioning Strategy Finance Publications
More informationCode Subsidiary Document No. 0007: Business Continuity Management. September 2015
Code Subsidiary Document No. 0007: September 2015 Change History Version Number Date of Issue Reason For Change Change Control Reference Sections Affected 20150511 11 May 2015 For industry consultation
More informationCentral Bank of India. Business Continuity Management Policy
Central Bank of India Business Continuity Management Policy DataCenter Version 1.0 February 2012 Table of Contents 1. Purpose... 3 2. Objective... 3 3. Scope... 4 4. Policy Statement... 4 5. Top Management
More informationBUSINESS CONTINUITY PLAN
How to Develop a BUSINESS CONTINUITY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A BUSINESS CONTINUITY PLAN? CHAPTER PREPARING TO WRITE YOUR BUSINESS CONTINUITY PLAN CHAPTER
More informationInformation Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer
Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related
More informationUniversity of Michigan Disaster Recovery / Business Continuity Administrative Information Systems 4/6/2004 1
University of Michigan Disaster Recovery / Business Continuity Administrative Information Systems. 1 Michigan Administrative Information Services (MAIS) MAIS is responsible for the production support of
More informationUniversity of Ulster Policy Cover Sheet
University of Ulster Policy Cover Sheet Document Title Custodian Approving Committee Information Technology Disaster Recovery and Data Backup Policy 1.2 Deputy Director of Finance and Information Services
More informationInformation Resource Management Directive 5000.13 USAP Contingency & Disaster Recovery Program
The National Science Foundation Polar Programs United States Antarctic Program Information Resource Management Directive 5000.13 USAP Contingency & Disaster Recovery Program Organizational Function Policy
More informationCybersecurity Framework Security Policy Mapping Table
Cybersecurity Framework Security Policy Mapping Table The following table illustrates how specific requirements of the US Cybersecurity Framework [1] are addressed by the ISO 27002 standard and covered
More informationSustainability through Business Continuity Management
Sustainability through Business Continuity Management R Vaidhyanathan (RV) MBCI,CBCP, TE BS25999, BS25999LA, BCCE, 27001LA, ITIL Practice Head for Crisis Management & BCM Continuity and Resilience (CORE)
More informationNOS for Data Management (801) September 2014 V1.3
NOS for Data Management (801) September 2014 V1.3 NOS Reference ESKITP801301 ESKITP801401 ESKITP801501 ESKITP801601 NOS Title Assist in Delivering the Data Management Infrastructure to Support Data Analysis
More informationPARKES SHIRE COUNCIL BUSINESS CONTINUITY POLICY
PARKES SHIRE COUNCIL BUSINESS CONTINUITY POLICY PARKES SHIRE COUNCIL BUSINESS CONTINUITY POLICY CONTENTS INTRODUCTION... 1 PURPOSE... 1 POLICY... 1 DEFINITIONS... 1 RESPONSIBILITY... 1 RELATED DOCUMENTATION...
More informationHow To Manage A Disruption Event
BUSINESS CONTINUITY FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Manager Organisational
More informationG-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification
G-Cloud Service Description Atos: Cloud Professional Services: Requirements Specification Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and
More informationBusiness Continuity Policy
Business Continuity Policy St Mary Magdalene Academy V1.0 / September 2014 Document Control Document Details Document Title Document Type Business Continuity Policy Policy Version 2.0 Effective From 1st
More informationASTFM320 Disaster recovery and contingency planning
Overview This unit is for first-line managers/supervisors at work in the FM environment. It is concerned with managing disaster recovery and contingency planning in your area of responsibility. This unit
More informationESKICAS1 Computerised accounting software
Overview This is the ability to select and use a computerised accounting or bookkeeping software application to input and process data for orders and invoices, receipts and payments and prepare management
More informationWEST YORKSHIRE FIRE & RESCUE SERVICE. Business Continuity Management Strategy
WEST YORKSHIRE FIRE & RESCUE SERVICE Business Continuity Management Strategy Date Issued: 12 November 2012 Review Date: 12 November 2015 Version Control Version Number Date Author Comment 0.1 June 2011
More informationLeveraging the IT Service Continuity Management framework Gord Novoselnik Business Continuity Office Enterprise Solutions Division
Leveraging the IT Service Continuity Management framework Gord Novoselnik Business Continuity Office Enterprise Solutions Division 1 MTS Allstream Inc. proprietary. Use pursuant to company instructions./
More informationBusiness Continuity Policy
Business Continuity Policy Page 1 of 15 Business Continuity Policy First published: Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/14 Vicky Ryan Updated to include
More informationDisaster Recovery Policy
Disaster Recovery Policy INTRODUCTION This policy provides a framework for the ongoing process of planning, developing and implementing disaster recovery management for IT Services at UCD. A disaster is
More information