Standard Operating Procedure-Speciation Data Processing Disaster Recovery Plan
|
|
|
- Clyde Kelley
- 10 years ago
- Views:
Transcription
1 Date: May 21,2008 Page 1 of7 Standard Operating Procedure-Speciation Data Processing Disaster Recovery Plan Environmental Industrial Sciences Division RTI International* Research Triangle Park, North Carolina Prepared by: Reviewed by: ~ r1 ~c--:- Approved by :{f(~taafr Date: Date: ffjrti INTERNATIONAL * RTI Intemational.is a trade name of Research Triangle Institute.
2 Contents Section Page Scope...3 Overview...3 Facility Recovery...3 Network Recovery...4 Hardware Recovery...4 Software Recovery...5 Data Recovery...6 Data Security...6 Appendix A...8
3 Standard Operating Procedure Speciation Data Processing Disaster and Recovery Plan Scope RTI has designed and maintained a database to compile, process, archive, and report PM 2.5 speciation data to the U.S. Environmental Protection Agency (EPA) under RTI projects 07565, 08166, 08604, and This standard operating procedure (SOP) describes the plans and procedures to preserve and recover chemical speciation data, computer hardware, and data processing software after an outage or disaster. This plan is intended for use only by RTI personnel and should be considered RTI confidential. Persons authorized to view this plan are listed, along with their responsibilities, in Appendix A of this SOP. Overview The scope of recovery activities will depend on the nature of the disaster. Recovery actions are discussed in the following sections that refer to the affected system. Response to an actual disaster may require implementing multiple sections of this SOP. Facility Recovery Loss of facilities or loss of use of facilities could be due to a variety of causes, including fire, inclement weather (e.g., floods, hurricanes, tornados), extended power failure, failure of heating or air conditioning systems, and chemical or biological contamination. RTI maintains a Safety and Security staff who are responsible for patrolling buildings on a regular basis (including nights, weekends, and holidays). In addition, the Facilities and Maintenance staff is on call 24 hours per day/7 days per week to respond to emergencies, such as flooding or other damages to the buildings. Contact information is included in Appendix A of this SOP. If there has been damage to the facilities, RTI security will notify the Information Technology Services (ITS) Server Administrator (see Appendix A of this SOP for contact information). The ITS Server Administrator will assess the damages and determine the scope of recovery operations. If the building could be safely entered, then surviving equipment will be relocated to another building and set up for operation (as described under the other sections of this plan). All of RTI s buildings in the Research Triangle Park, NC, area are connected to the internal Ethernet, and a relocated server could be immediately operable. If equipment was substantially damaged, then arrangements will be made to relocate activities on other RTI servers and/or acquire new hardware. In addition to the activities described in this plan, RTI s overall contingency plan (maintained by the RTI Safety and Security Office) includes provisions for long-term and/or severe damages to
4 facilities, along with general business interruption insurance. These provisions would be automatically implemented by RTI s Facilities and Maintenance and Security departments, if conditions warrant. Network Recovery RTI s ITS Department maintains a staff of network personnel who are on-call 24 hours per day/7 days per week. They would be notified (see Appendix A for contact information) in case of problems with network activities should arise. Their activities would proceed according to RTI s ITS Department s Business Continuity Plan (maintained by Anne Derby in Little 201). Disturbances to part of the network (such as the link between the Sample Handling and Archiving Laboratory [SHAL] facilities at Regent Place and RTI s main campus) can be worked around by either temporarily moving SHAL processing to the main campus or by moving the server to Regent Place (if a Microsoft Windows domain server is available there). Hardware Recovery 1. SHAL Processing Machines There are approximately 20 processing machines in the SHAL. Loss of one or even a few of these machines at the same time would not shut down SHAL operations. Recovery of these machines would be performed by the Desktop Support staff (see Appendix A for contact information). In addition to the machines in the SHAL, RTI staff in multiple buildings are currently operating many other suitable machines that could be used for SHAL processing in an emergency. Any machine running Microsoft Windows 2003 and Microsoft Access (Office) 2003 could be used as a temporary replacement, if needed. Should the need arise, the Desktop Support staff will contact Department, Center, and Division Managers to identify alternate equipment. 2. Bar-Code Scanners Bar-code scanners are used with each processing machine to improve productivity. These scanners are inserted into the keyboard cable and are transparent to the system (i.e., data appears as if they were entered on a keyboard). In an emergency, the keyboard could be used for any entry that would normally use the bar-code scanner. 3. Database, File, and Print Servers RTI s ITS Department maintains a staff who are on-call 24 hours per day/7 days per week. They would be notified (see Appendix A for contact information) in case of problems with server activities. Their activities would proceed according to RTI s ITS Department Business Continuity Plan.
5 4. External Web Server for Remote Data Access (GEOS1) Currently, the external Web server (GEOS1) is used for state and local data contacts to download their monthly data reports. Copies of these reports are also maintained on RTINTS76 (for internal use). In an emergency, these copies could be placed on any of the external servers that are maintained by RTI s ITS Department, and the users would be notified of the new site location. 5. Printers The following three types of printers are used for speciation data processing: Laser printers for printing of module assembly forms and reports. Large numbers of the laser printers are being used at RTI, and another one could easily be substituted for one that is currently in use. Epson and C-Itoh C-650 dot-matrix impact printers for printing on multi-copy carbonless paper (custody forms and incoming air bills). There are currently four printers in use in the SHAL (two preloaded with 8.5'' x 11'' paper and two preloaded with FedEx air bills). An additional dot-matrix impact printer is used in Building 7 for printing sample custody forms. In case of failure of any one printer, the remaining printer would be used until a replacement printer could be ordered. Zebra bar-code label printer. One bar-code printer is currently used in the SHAL for printing inventory and aliquot labels. A second printer is used in Building 7. In case of failure of the SHAL printer, the printer currently in Building 7 would be moved to the SHAL and used for both facilities until a replacement could be ordered. 6. FedEx Powership System Currently, RTI is using a FedEx-owned Powership system for printing of bulk outgoing air bills. A second unit (differing only in its shipper ID) is also in use in RTI s main mail room and could serve as a backup unit (after the default ID was changed in the Powership Program used by the SHAL). If both systems were simultaneously unavailable, FedEx s Internet-based shipping system could also be used in an emergency. Software Recovery 1. SHAL Processing Machines There are approximately 20 processing machines in the SHAL. Loss of one or even a few at the same time would not impact SHAL operations. No special software is installed on these machines (other than a shortcut to the main application [EPA_SPEC.ade]). Recovery of the operating system and Microsoft
6 Office 2003 software would be performed by the Desktop Support staff using software that is kept on a secured server by RTI s ITS Department. 2. Database and File Server (RTINTS76) This server is backed up nightly by ITS staff as part of their normal operating procedures (SOP S : NT Server Data Backup and Storage of Backup Media, which is available on RTI s internal Web site). Data Recovery 1. SHAL Processing Machines No data are stored on the processing machines; processing machines simply run a copy of the database application that is stored on the local processing machine while all data are stored on the server. Thus, there are no local data to be backed up or recovered in case of machine failure. 2. Database and File Server (RTINTS76) This server is backed up nightly by ITS staff as part of their normal operating procedures (SOP S : NT Server Data Backup and Storage of Backup Media, which is available on RTI s internal Web site). Restoration would be handled by ITS according to their SOPs. Data Security 1. Access Policies Access to RTI computers is limited to authorized project personnel by use of access control lists for files, programs, and database access. All authentication (both for file and database access) is performed by the use of Windows NT domain accounts issued by RTI s ITS Department. 2. Password Policies All access to all machines and databases are controlled through an NT domain password that is issued by RTI s ITS Department. Password policies (ITS-ITS- POL-0002) are administered by ITS staff and include the following: Every user name (i.e., account) on all ITS systems has an associated password. No written or electronic record of passwords is generated. Automated controls are in place to ensure password quality (requiring a minimum length and a mix of uppercase, lowercase, numerals, and punctuation) and periodic (45-day) expiration of passwords. 3. Termination Policies Access to RTI systems is revoked for terminated personnel in one of two ways: a) RTI employees The RTI Human Resources Department automatically notifies ITS staff upon termination of an employee. ITS staff members automatically disable the employee s NT domain account, which is used
7 by all servers used in the Chemical Speciation Program to grant access to files and databases. b) Temporary service agency employees (in SHAL) The SHAL Supervisor notifies ITS (through Wayne Winstead, the contact for RTI s Environmental and Industrial Sciences Division, which oversees the SHAL computer facilities) of the employee s termination. ITS automatically disables his or her NT domain account, which is used by all servers used in the speciation program to grant access to files and databases. 4. Virus Protection All computers (i.e., desktops and file servers) have virus protection software installed. RTI has a site license for Network Associates McAfee virus protection products (product name varies with operating system). This software package has been set to automatically update its virus engine and definition files from an internal RTI ITS server, which is routinely updated by RTI s ITS Department from the McAfee site. Additional security updates and patches are monitored by RTI s ITS Department and are installed by the System Administrators and/or our Desktop Support staff, as needed.
8 Coating and Extracting Denuders for Ammonia Determination Revision No: 0 Date: February 14, 2008 Page 8 of 8 Appendix A Contact Information 1. Server administrators (please contact in order listed) ITS Help Desk at (919) Database administrators (please contact in order listed) Ed Rickman Office (919) Wayne Winstead Office (919) Desktop support contacts SEG-Computer Support Group Office (919) After hours, call the ITS Help Desk at (919) RTI Safety and Security Non-emergency (919) Emergency (919) RTI facilities 8:15 a.m. to 5:00 p.m. Sue Clark, (919) After hours (919) or contact through RTI Safety and Security 6. RTI IT Department Emergency Contacts 8:15 a.m. to 5:00 p.m. Engineering Group Help Desk (919) (or EG-CSG) ITS Help Desk at (919) (or USERSERV) After hours ITS Help Desk at (919) (or USERSERV) and listen for after-hours contact information In an emergency, you may also call (919) to page the person on call or [email protected], which is routed to an on-call person 7. RTI Department/Center Managers Mark Turner Office (919) R.K.M. Jayanty Office (919) Bill Gutknecht Office (919) Jim Flanagan Office (919)
USFSP Network Security Guidelines
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
Disaster Recovery Plan
Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the
Office of Information Technology Addendum to Managed Workstation Service Level Agreement
Office of Information Technology Addendum to Managed Workstation Service Level Agreement This Addendum further defines and explains the Basic Support, Extended Support and Premium Support Level Services
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Standard Operating Procedure for Database Operations
PM 2.5 Diltabase Operations Date: May 8 2008 Page I of 18 Standard Operating Procedure for Database Operations Environmental Health and Safety Division RTl lnternational* Research Triangle Park, North
JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician
COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician NOC CODE: 2281 STANDARD HOURS: 35 hours/week (non-management)
CENG Information Technology Services University of North Texas
CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS
University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary
University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary This Summary was prepared March 2009 by Ian Huggins prior to HSC adoption of the most recent
DRAFT Standard Operating Procedure for Long-Term Archiving of PM 2.5 Filters and Extracts
Page 1 of 6 DRAFT Standard Operating Procedure for Long-Term Archiving of PM 2.5 Filters and Extracts Environmental and Industrial Sciences Division Research Triangle Institute Research Triangle Park,
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
Georgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
CSG Windows Support Policy
CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics
FACILITIES MANAGEMENT DEPARTMENT QUICK REFERENCE Guide to Services
FACILITIES MANAGEMENT DEPARTMENT QUICK REFERENCE Guide to Services After-Hours Service Calls Air Conditioning and Heating Bicycle Racks Building Conditions Inspections Contract Construction (handled by
business continuity plan for:
business continuity plan for: Insert your company name here Our statement of Business Continuity is: > To ensure all employees are competent to do their tasks, and to provide adequate training > To review
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
Office of Information Technology (OIT) OIT Managed Desktop Support SLA Addendum Definitions and Details
Office of Information Technology (OIT) OIT Managed Desktop Support SLA Addendum Definitions and Details 1. Supported Users, Workstations, and Laptops This Service Level Agreement (SLA) Addendum further
Symmetry Networks. Corporate Managed Services Schedule
Symmetry Networks Corporate Managed Services Schedule A Managed Services Solution version 1.0 January 2015 This Service Schedule forms part of the Agreement between Us (Symmetry Networks Pty Ltd) and You
Remote Backup Solution: Frequently Asked Questions
Remote Backup Solution: Frequently Updated December 2014 Contents What is ECi Remote Backup?...3 What Levels of Protection are Available?...3 Why is ECi Remote Backup Important for Disaster Recovery?...3
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Services Agreement. Rev 12/10/08 TC v08 1
Services Agreement This Agreement is entered into by, herein referred to as Client, and Computer Crews, a Colorado Corporation, hereinafter referred to as Service Provider. The Parties agree as follows:
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
AUDIT GUIDELINES FOR SCHOOL DISASTER RECOVERY PLANNING
AUDIT GUIDELINES FOR SCHOOL DISASTER RECOVERY PLANNING Introduction It has become increasingly common for schools to place a great deal of reliance upon PC s and computer systems to manage and operate
Unit Network Infrastructure Maintenance. Standard Service Agreement (SA)
Unit Network Infrastructure Maintenance Standard Service Agreement (SA) University of Michigan Information and Technology Services (ITS) July 1, 2012 1.0 Overview 2.0 Purpose 3.0 Service Rates 4.0 Terms
Remote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
Managed ICT Services. User Guide. Possibilities that are built in. Telstra Corporation Limited ABN - 33 051 775 556
Possibilities that are built in www.telstra.com.au/networkcomputing Managed ICT Services User Guide Corporation Limited ABN - 33 051 775 556 Table of Contents 1. What does this User Guide do?... 3 2. Responsibilities...
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
How to Plan for Disaster Recovery
ImproMed LLC How to Plan for Disaster Recovery Revised January 27, 2015 2015 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January
UNIVERSITY INFORMATION TECHNOLOGY SERVICES (UITS) & INFORMATION WAREHOUSE FUNCTIONAL ANNEX 13
UNIVERSITY INFORMATION TECHNOLOGY SERVICES (UITS) & INFORMATION WAREHOUSE FUNCTIONAL ANNEX 13 Revision: December 19, 2012 Supersedes: June 9, 2009 Effective Date: January 30, 2012 OBJECTIVES The primary
ITA Mail Archive Setup Guide
This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than
Unit Guide to Business Continuity/Resumption Planning
Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions
SOP # 3.1.002 version e1.0 Records Management and Documentation. CTRNet Standard Operating Procedure. Database Backup Systems
CTRNet Standard Operating Procedure SOP Number: 3.1.002 Version e1.0 SOP # 3.1.002 version e1.0 Supersedes: Effective Date 09 Jan 08 Subject: Category Records Management and Documentation Prepared By:
Backup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
TECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
Module 7: System Component Failure Contingencies
Module 7: System Component Failure Contingencies Introduction The purpose of this module is to describe procedures and standards for recovery plans to be implemented in the event of system component failures.
Business Unit CONTINGENCY PLAN
Contingency Plan Template Business Unit CONTINGENCY PLAN Version 1.0 (Date submitted) Submitted By: Business Unit Date Version 1.0 Page 1 1 Plan Review and Updates... 3 2 Introduction... 3 2.1 Purpose...
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Disaster Recovery Plan
Disaster Recovery Plan Reciprocal arrangement between (Client X) and (Client X) Overview...3 1a. General principles...3 1b. Definition of a disaster...4 1c. Period of service...4 Prerequisites...4 Alignment...4
Service Level Agreement
Service Level Agreement Occupational Studies Administration Occupational Studies Computer Lab Contract Date 1/25/2005 to 12/31/2005 SLA Contract and Responsible Parties This Service Level Agreement is
Security Features: Lettings & Property Management Software
Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...
SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010
SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")
Disaster Recovery Plan Checklist
Disaster Recovery Plan Checklist Your guide for setting up or updating a Disaster Recovery Plan for your business. ArcSource Disaster Recovery Plan Checklist 1. Compile Your Internal Contacts Information
DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk)
COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk) NOC CODE: 2171 STANDARD HOURS: 35 hours/week (non-management)
TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS IT Services Service Level Agreement:LRC
HELP DESK SUPERVISOR
HELP DESK SUPERVISOR Occupational Code: 1551 Salary Range: 28A Status: Classified FLSA: Exempt Established: 7/04 Revised: 11/05 2/06 4/06 NATURE OF WORK: Technical specialized work responsible for supervising
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Birkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
UNC Charlotte Facilities Management 16 July 2012 Facilities Information Systems. Building Automation Systems (BAS) Critical Alarm Standards
UNC Charlotte Facilities Management FM/FIS SOP 200A 16 July 2012 Facilities Information Systems Building Automation Systems (BAS) Critical Alarm Standards NOTICE: This standard operating procedure is available
TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for TICKETING DATABASE
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for TICKETING DATABASE IT Services Service Level Agreement:Ticketing Database This service level agreement
Standard Operating Procedure for Training for Staff Working on the PM 2.5 Chemical Speciation Program
PMz.s-Staff Training Page 101'6 Standard Operating Procedure for Training for Staff Working on the PM 2.5 Chemical Speciation Program Environmental and Industrial Sciences Division RTI International* Research
GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET
FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either
SAMPLE IT CONTINGENCY PLAN FORMAT
SAMPLE IT CONTINGENCY PLAN FORMAT This sample format provides a template for preparing an information technology (IT) contingency plan. The template is intended to be used as a guide, and the Contingency
Scomis Remote Backup Service 1 st April 2014 until 31 st March 2015
Scomis Remote Backup Service 1 st April 2014 until 31 st March 2015 This service offers remote backup of part or all of a school's data, including SIMS, on a daily basis during term time. The Customer
MATATIELE LOCAL MUNICIPALITY DISASTER RECOVERY PLAN
MATATIELE LOCAL MUNICIPALITY DISASTER RECOVERY PLAN INDEX Page PART 1: OBJECTIVE 3 PART 2: RESPONSIBILITES 3 PART 3: DOCUMENTATION 3 PART 4: DATA BACKUP 3 PART 5: DISASTER RECOVERY PROCEDURE 3 5.1 Power
For FY 2016 the new Desktop Support Program rates will be: Business Class - $481/device Enterprise Class - $721/device
Division/Department Representative Dear Rep, The Desktop Support Program is announcing changes to our rates for FY 2016. As a Cost Recovery Service we are expected to recover expenses related to the operations
Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
DATABASE ANALYST I DATABASE ANALYST II
CITY OF ROSEVILLE DATABASE ANALYST I DATABASE ANALYST II DEFINITION To perform professional level work in designing, installing, managing, updating, and securing a variety of database systems, including
CONTINUITY AND RECOVERY PLANNING GUIDE
CONTINUITY AND RECOVERY PLANNING GUIDE The Continuity Planning process is designed to assist an organization in determining action plans for disaster recovery or incident response. The process also aids
VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY
ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and
Disaster Prevention and Recovery Plan
Disaster Prevention and Recovery Plan for Windows Based Networks by Jeff Kendrick, 1. Prevention A. Daily tape backups B. Monthly Automated System Restore (ASR) or Windows 2008 backups and updates C. Alternate
How To Use An Icc (Ucop) Service Catalog
UCOP DESKTOP and SERVER SUPPORT SERVICE LEVEL AGREEMENT (SLA) Information Resources and Communications University of California Office of the President June 22, 2010 Desktop and Server Support Agreement
Service Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support
Service Support 1.1. First Level Support First Level Support (Tier I) provides immediate response to emergencies and customer questions TSD - First Level Support Office: Sub-Division: Extension: E-mail:
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians
TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for ROOM RESERVATION SYSTEM IT Services Service Level Agreement: Room Reservation System This service level
TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for PLACEMENT TESTING LAB
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for PLACEMENT TESTING LAB IT Services Service Level Agreement:Placement Testing Lab This service level agreement
REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange
Technology Recovery Plan Instructions
State of California California Information Security Office Technology Recovery Plan Instructions SIMM 5325-A (Formerly SIMM 65A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF
Sheridan/Gillette College IT Help Desk Service Level Agreement
Sheridan/Gillette College IT Help Desk Service Level Agreement Information Technology Help Desk The IT Help Desk is the single point of contact for all computer, telephone, networking, video conference
System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array
System Requirements The system requirements are shown below for each type of installation, software, and peripherals. Should you have questions about the system requirements or replacement peripherals
Yale Business Continuity Program Emergency Response Guide
Contents Yale Business Continuity Program Emergency Response Guide March 2016 Introduction Immediate Actions Assess the Damage Determining Business Disruption Determining Plan of Action Relocation Checklist
RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan. January 23, 2012
RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan January 23, 2012 Purpose and Objectives 2 Disaster Recovery Organizational Structure 3 Appendices: Disaster Recovery Emergency
