Midcontinent Communications Disaster Recovery/ Business Continuity Plan
|
|
- Trevor Craig
- 8 years ago
- Views:
Transcription
1 Midcontinent Communications Disaster Recovery/ Business Continuity Plan Disaster Prevention and Recovery As a provider of critical communications services, whether commercial or life-line residential, Midcontinent Communications has an obligation to minimize the impact of adverse events up to and including disasters. While many companies have disaster recovery plans, our unique position warrants that Midcontinent s focus is on disaster prevention with recovery components only for very low probability events outside the scope of prevention. As such, Midcontinent disaster planning is intrinsic to network and infrastructure planning as outlined in the following sections: Northern Plains Network Technical Facilities Central Technical Facility Human Resources Standby Power Fiber optic networks require sites for periodic amplification or regeneration. These sites can be primary facilities where service is dropped off (see facilities below) or OTNs (optical termination nodes). OTNs can be small buildings, huts, pedestals or even pole-mounted enclosures. NPNet contains thousands of OTNs. Short duration commercial power failures are common on a widely-distributed network. All components of our fiber optic network are deployed with standby power in the form of battery backup. Longer duration power failures such as those resulting from adverse weather conditions or disasters are less common but tend to occur somewhere on a yearly basis. Because of this, key locations on the core network also have LP, natural gas or diesel generators in addition to batteries for sustainable power backup. Core locations that are small and remote are equipped with extended battery banks for multi-day continuity. Northern Plains Network The Midcontinent fiber optic network (NPNet) provides private business circuits, voice, Internet and video services across a three state region. NPNet is our primary asset for providing service to customers. Path Diversity and Owned Fiber Core network paths are arranged as a ring or mesh architecture using diverse paths, which means key network locations have two routes in and out. The switching equipment that makes up the network is capable of choosing either path within 50 milliseconds. In the event of a fiber cut or facility event, the network is routed to an alternate path without impacting service. Upon subsequent repair, traffic is re-routed automatically and path redundancy restored. Whenever possible, Midcontinent owns, installs and maintains the fiber optic cable of NPNet. In some situations it may be necessary to lease fiber to complete redundancy. In the case of recent acquisitions or smaller, remote locations, NPNet may contain non-diverse and/or leased circuits until expanding the redundant core is warranted. Standby power sites in metro edge locations such as those in residential neighborhoods are numerous. Covering each location with continuous power backup beyond batteries is not practical. For edge locations, portable generators are maintained to provide continuous coverage to 10% of all locations in addition to their battery banks. Most extended power failures are localized and 10% is sufficient coverage. For city-wide outages lasting several days, portable generators are pulled in from adjacent communities as every community maintains a reserve of portable generators, trucks and qualified technicians. Concentrated business parks are considered key areas and are equipped with extended standby power capability. In addition, all standby power; small or large, is monitored by the NOC. Network Operations Center The Midcontinent Network Operations Center (NOC) is staffed by trained professionals, 24 hours per day, 365 days per year. The NOC is tasked
2 with monitoring all network components, basic troubleshooting, escalation, dispatch and ticket tracking, and serving as a central communications and command center. All network components are deployed with status monitoring that reports back to the NOC. The NOC monitors several management consoles and acts upon events or critical trends as appropriate. The NOC also schedules and coordinates planned maintenance and service advisories. The NOC has access to dynamic on-call scheduling as well as static escalation lists for various critical events and disasters. In the event of a disaster, the NOC executes an established escalation and communication plan to ensure that the right resources are notified and dispatched to problem locations. Public Network Interconnections NPNet includes interconnections with many public networks for business, Internet, and voice traffic. These interconnections are considered critical nexus points and receive special consideration for recoverability. First, Midcontinent maintains connections with multiple providers each capable of providing full or partial level redundancy for each other. Should we lose an entire Internet provider for instance, we have the ability to maintain operations with the remaining providers. In addition, provider networks are always reviewed when selecting new circuits to ensure that provider paths don t overlap geographically. Second, all interconnections to primary facilities remote from our own are accomplished by diverse network paths consisting of at least 50% Midcoowned fiber. This ensures instantaneous recovery from fiber cuts or localized disasters. Lastly, all equipment serving these local interconnections or MANs (metro area networks) have redundant power, components, spares or a fourhour depot replacement plan. As indicated above, all interconnection points are monitored by the NOC. We also monitor these points in the long term for capacity prediction since the turn up of additional service can have a long lead time. Network Security Midcontinent maintains a security manager who is organizationally separate from the network staff. The security department is charged with maintaining and auditing network security and proactively preventing and testing for threats. Network security is multi-layer with different protective zones for different resources. Technical Facilities Throughout our footprint, Midcontinent maintains several primary technical facilities. These reside in larger metropolitan areas and serve a region of smaller communities. Each facility is partially responsible for service delivery and maintenance in the region and also participates as part of the larger NPNet network. These primary facilities are considered critical. Geographically Diverse and Redundant Equipment The most important characteristic of our facilities from a disaster prevention and recovery aspect is that they are geographically diverse. Since the upper Midwest is not prone to hurricanes or earthquakes it s very unlikely that a disasterlevel event will affect multiple locations. The loss of one site will have a less than catastrophic impact on the network as a whole. All critical equipment is deployed in a redundant fashion or with spares available. On a temporary and emergency basis, the spares or redundancy of one site can be moved to recover a damaged site. In effect, each of our technical facilities has a backup depot nearby, but not near enough to be affected by the same disaster.
3 Internetworked Each of our primary sites is internetworked with other sites. We can move equipment between facilities as mentioned above but if some of the facility network remains intact we also have the option in many cases to restore service by leveraging this internetworking and using the resources of a sister site. Physical Security Each of our primary facilities is considered a secure location. Customer interaction is conducted at locations separate and distant from the technical facility. Most buildings are manned by technical staff during working hours. Non-manned facilities are NOC monitored and alarmed. Doors are locked at all times and entry controlled by a proximity card and ID system. Photo IDs must be worn by all personnel at all times. Facilities with staff have an additional entry challenge to specific technical areas accessible only by approved technical and managerial personnel. All door entry is logged with records stored at the NOC. Contractors must verify with on-site personnel and wear ID badges at all times. In remote locations contractors must be escorted at all times. Fire Suppression Each of our primary technical facilities is protected by fire alarming. The main technical areas also utilize an FM200 fire suppression system that is maintained and inspected on an annual basis. FM200 is a gas-based fire suppression system triggered by heat or smoke. Once deployed, FM200 extinguishes all fires in six seconds and doesn t damage or otherwise adversely affect running equipment. Standby Power Each facility is equipped with continuous standby power. The usual configuration is batteries for brief outages in technical spaces and generator backup for the entire facility for sustained power. In all cases, the generator is sized to backup HVAC to maintain proper operating temperatures. Generators are exercised on a monthly basis and batteries tested annually if not NOC monitored. NOC As mentioned previously, the NOC monitors all facilities and will issue alters and escalations as required per established procedures. The NOC also handles security and in some cases provides surveillance and alarm monitoring. In addition to standard security and equipment monitoring, the NOC also provides environmental monitoring for each facility and will detect spikes in temperature, power, etc. Central Technical Facility (CTF) For cost and practicality reasons, Midcontinent maintains a central technical facility that contains equipment that is not readily distributed or has better availability and less vulnerability as a centralized asset. Our voice call server is the most notable example. In the case of the central technical facility (CTF), extreme measures are taken to ensure protection and redundancy. Staffing Staffed 24 x 7, the NOC is housed in the CTF and provides security for the entire facility backed up by standard alarming. All staff is security trained and aware. ID badge and contractor procedures are strictly enforced. NOC personnel and equipment are housed in an inner physical security zone. CTF Physical Security The CTF has a multi-layer security system consisting of two main perimeters. The outer perimeter doors are locked at all times. Entry requires a proximity photo ID badge and all windows and doors are secured afterhours with an intrusion detection system. The inner perimeter is also card restricted but in combination with personal identification for entry in the form of a PIN number. Egress is monitored with an antipassback system that requires a card swipe for exit or all security is revoked. The entire building is monitored by multiple full-motion color security cameras including all doorways, passage areas and critical technical equipment. All security video is recorded and time stamped for correlation with other events.
4 Structural Various physical security and anti-terrorist devices are employed including external bollards for vehicle protection, fencing and other non-disclosed measures. We are located in an urban area that is not on a flood plain. Our only adjacent building is a highly secured federal facility. The consulting firm of NCompass has estimated the CTF as being able to withstand an F2 Tornado. Fire Suppression and Flood All technical areas are protected by an FM200 fire suppression system, both above and below our raised floor. Technical equipment is not housed in low-lying areas and all such areas are equipped with NOC monitored water alarms. Power and HVAC The entire CTF is backed up by a series of battery banks (AC and DC) and a generator capable of providing continuous power to the entire facility. The generator is exercised monthly and the batteries are maintained by Midcontinent testing procedures and equipment. Cooling is N+1 redundant. We can lose any single unit and still maintain a normal operating temperature. Warm Site Backups Two additional Midcontinent facilities exist in reasonable proximity to the CTF interconnected on a ringed fiber network. In the event of a catastrophic disaster these sites will be used temporarily as warm sites to recover the functionality of the CTF and provide facilities for vendor replacement equipment, network and power access. Off-Site SAN and Backup Midcontinent maintains a SAN (storage area network) backup system for data that s capable of SAN storage. Other data is backed using traditional methods and stored off-site in a fireproof vault. The SAN is a shared, fully redundant hot-swap configuration. It is configured as two banks of disks that are geographically separated in different buildings miles away from each other. Redundant Equipment All equipment that supports redundancy is deployed as such. This means N+1 or 1+1 component redundancy. In certain cases redundancy also includes multiples of the entire unit. Specific, key resources are listed below: Call Server (phone switch) Complete N+1 component redundancy. Core network routers 1+1 processor and power, deployed on identical meshed routers. Internet routers 1+1 processor and power, deployed on identical meshed routers. DNS servers Deployed in load sharing pairs. DHCP servers Deployed in load sharing pairs. NOC servers and monitoring Deployed on VMware virtual redundant blades with 1+1 power. HUMAN RESOURCES Diverse Management and Succession Midcontinent maintains a diverse management structure with primary manager offices in multiple facilities in Sioux Falls, Minneapolis and several towns and cities in our region. In addition, we have documented succession plans that are refreshed yearly and stored at the office in Minneapolis. No single natural disaster or act of terrorism can entirely remove the management structure at Midcontinent. Travel Restrictions Midcontinent maintains a travel policy that limits the number of key personnel on charter flights. In addition, all such flights must be on a twin engine aircraft with two pilots.
5 Distributed Technicians and Engineers One of the strengths of NPNet is that we have general managers, technicians and engineers dispersed throughout our coverage area, each capable of responding to events or disasters in other areas. Flooding or an ice storm in one community will call in the resources of nearby communities within hours to implement disaster procedures and repairs. Pandemic Midcontinent maintains a pandemic team that meets regularly to discuss and plan actions in the unlikely event of a pandemic. Due to our extensive network that includes residential access, we have a unique capability to work from home en-masse to keep our services going without promoting the spread of disease by direct contact. In fact, we ve responded to inquiries of government agencies regarding this capability. Should a pandemic occur, Midcontinent expects to be an integral part of the solution for many businesses and government entities. Name: Mark Powell Signature: Title: Vice President of Business Solutions Company: Midcontinent Communications Address: 3901 N. Louise Ave., Sioux Falls, SD Telephone: Address: mark_powell@mmi.net
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
More informationToronto Public Library Disaster Recovery recommended safeguards and controls
BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston
More informationSWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
More informationDESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
More informationData Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
More informationData Center Overview Document
Overview NetSource is a Chicago area (Naperville) hosting company that owns and operates its own world class datacenter. The initial datacenter buildout was put into operation in 2007 and expanded in 2013.
More informationItron Cloud Services Offering
Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...
More informationLas Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
More informationDISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
More informationTELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING
TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING A.K. Tang 1 1 President, L&T Engineering and Project Management Consultant, Mississauga. Canada Email: alexktang@mac.com ABSTRACT: Telecommunication
More informationPowering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
More informationTONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network
More informationOPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
More informationDISASTER RECOVERY AND BUSINESS CONTINUITY
DISASTER RECOVERY AND BUSINESS CONTINUITY ISO 9001/27001 PARTNER ONLY NODE4 LIMITED 03/01/2014 DISASTER RECOVERY PLAN This plan will be held at Node4 s premises located at Pride Park in Derby and also
More informationSITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
More informationDatacenter Assessment
The Netmagic team has compiled this Checklist to help you evaluate, compare and select datacenter facilities to meet your hosting, business continuity and disaster recovery needs. Based on industry best
More informationSecurity Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationKEEN - Reliable Infrastructure, Built to Last
KEEN - Reliable Infrastructure, Built to Last 2 KEEN--Reliable Infrastructure, Built to Last A strong network infrastructure is the underpinning of the Knowledge Elements Education Network (KEEN). It is
More informationUnderstanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationReduce the cost and delays associated with troubleshooting with the help of round-the-clock Service Desk Support.
Remote Support Reduce the cost and delays associated with troubleshooting with the help of round-the-clock Service Desk Support. SERVICE DEFINITION: REMOTE SUPPORT SERVICES ITI s Remote Support Service
More informationColocation Hosting Primer Making the Business and IT Case for Colocation
Where every interation matters. Colocation Hosting Primer Making the Business and IT Case for Colocation White Paper February 2012 By: Peer 1 Hosting Product Team www.peer1.com Contents Overview 3 Why
More informationData Center Presentation
Data Center Presentation The NetSource Datacenter. Agenda General Layout of Data Center Policies and Procedures Designed to Latest Standards High Performance High Reliability High Security Design Details
More informationFrankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
More informationHealthcareBookings.com Security Set Up
HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationSolveXia Business Continuity Planning
Business continuity planning is the term we use to describe all the steps we take at SolveXia to ensure that our service is up and running when you need it. As a 'Software as a Service' provider, our aim
More informationContents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined.
We Do It Better. Contents Introduction...3 Service and Support...3 Data Center Details...4 Security...4 Location...4 Power...4 Humidification...5 AC...5 Cooling...6 Datacenter Features...6 SAS 70...6 PCI
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationData Center Management
Data Center Management How Cisco IT Operates, Manages, and Protects Its Data Center A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview The Cisco IT Operations Data Center on the San Jose, California
More informationvcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service
vcloud SERVICES vcloud SERVICE Virtual Tech offers competitive pricing on vcloud hosted services at our world class Tier 4 data centre facility fully equipped with redundant power, cooling, internet connectivity
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More informationSecurity Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
More informationIT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
More informationColocation, Hybrid Cloud & Infrastructure As A Service
www.cloud-grid.net 305.438.7402 Colocation, Hybrid Cloud & Infrastructure As A Service IT managers today need to deal with an everincreasing set of business demands. High speed data networks have made
More informationExperience Matters...
Experience Matters... Travelport Data Center offers confidence and space to meet your demanding IT needs Transwestern presents the Travelport Data Center in Denver, Colorado totaling 267,000 SF with 121,600
More informationSYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES
More informationVerizon, 911 Service and the June 29, 2012, Derecho
Verizon, 911 Service and the June 29, 2012, Derecho August 13, 2012 Verizon, 911 Service, and the June 29, 2012 Derecho Late in the evening of Friday June 29, 2012, a severe storm hit the Mid-Atlantic
More informationAljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009
Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...
More informationData Center Build vs. Buy
2014 Data Center Build vs. Buy More information available on our website: /page/whitepapers Data Center Build vs. Buy 2014 When considering colocating your data center, first you must understand your technical
More informationHow To Ensure Security At A Site Security Site
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
More informationBusiness Continuity & Recovery Plan Summary
Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity
More informationAssisted Living Facilities & Adult Care Comprehensive Emergency Management Plans
Assisted Living Facilities & Adult Care Comprehensive Emergency Management Plans STATUTORY REFERENCE GUIDANCE CRITERIA The Henrico County Division of Fire s Office of Emergency Management provides this
More informationMAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3
MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 Report on FORTRUST s Enterprise Data Center and Colocation Services System Relevant to Security and Availability For the Period October
More informationNetwork Router Monitoring & Management Services
Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER
More information7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS
7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing
More informationSupply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
More informationRisk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
More informationCommunity Anchor Institution Service Level Agreement
Community Anchor Institution Service Level Agreement Date: 3/13/2014 Version: 2.0 Prepared by: DC-Net Table of Contents 1 Service Level Agreement... 3 2 Definitions... 3 3 Service Delivery... 5 3.1 Network
More informationThe evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
More informationDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
More informationServer Monitoring & Management Services
Server Monitoring & Management Services Monitor and manage your applications and servers under enterprise-class monitoring solutions, and protect your business from planned and unplanned downtime. ITI
More informationOCDC. OMNIconnect Data Centre.
OCDC. OMNIconnect Data Centre. The OCDC OCDC Sales and Enquiries. 1300 662 457 enquiries@omniconnect.com.au OCDC Location. 14 Elite Way Carrum Downs Victoria Australia Company Overview. OMNIconnect Pty
More informationINSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
More information<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
More informationIT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
More informationUCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification
More informationDocument Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12
Document Details Title: Author: 247Time Backup & Disaster Recovery Plan Document Tracking Page 1 of 12 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 DEFINED REQUIREMENT... 3 2 DISASTER OVERVIEW...
More informationBusiness Checklist for Severe Weather
Business Checklist for Severe Weather When faced with a hurricane watch or warning, flood warning or other impending potential natural disaster, refer to this checklist for guidelines on how to prepare
More informationReport on FTHC, LLC d/b/a Miami Data Vault s Description of its Data Center System and on the Suitability of the Design and Operating Effectiveness
Report on FTHC, LLC d/b/a Miami Data Vault s Description of its Data Center System and on the Suitability of the Design and Operating (SOC 1) For the period August 1, 2014 through July 31, 2015 In Accordance
More informationOngoing Help Desk Management Plan
Ongoing Help Desk Management Plan HELP DESK IMPLEMENTATION /MANAGEMENT The Vendor shall provide in its Response to DIR a Help Desk Implementation Plan which shall include, but not be limited to: a. Customer
More informationNeuStar Ultra Services Physical Security Overview
NeuStar Ultra Services Physical Security Overview Mission-critical network operations must have the highest standards of quality, security and reliability. NeuStar Ultra Services currently locates its
More informationCherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426
Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.
More informationOur Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net
Our Hosting Infrastructure An introduction to our Platform, Data Centres and Data Security www.in-tuition.net UK Infrastructure Infrastructure Overview Intuition Networks has provided managed Internet
More informationPhotonic Switching Applications in Data Centers & Cloud Computing Networks
Photonic Switching Applications in Data Centers & Cloud Computing Networks 2011 CALIENT Technologies www.calient.net 1 INTRODUCTION In data centers and networks, video and cloud computing are driving an
More informationHIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
More informationAbout Dorset Connects
About Dorset Connects Dorset Connects, a Chadds Ford, PA based IT consulting firm, was founded on the premise of providing businesses with a simplified way to procure, implement and manage their technology
More informationStorage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
More informationSECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
More informationContent Index. 1. General... 3. 2. Location and Building... 4. 3. Telecommunication Feeds... 6. 4. Electric Power... 7. 5. Climate Control...
Content Index 1. General... 3 2. Location and Building... 4 3. Telecommunication Feeds... 6 4. Electric Power... 7 5. Climate Control... 8 6. Safety and Security... 9 7. Internal Procedures... 11 General
More informationBNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN
BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,
More informationPowerful Dedicated Servers
Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,
More informationX-tier Data Facility. Prepared by X-tier SAE Corporation
X-tier Data Facility Company Profile X-tier Corporation X-tier is based in Leawood, Kansas. X-tier provides business agnostic, security hardened, custom and turnkey Cloudbased software systems, services,
More informationTHE SIS MANAGED SOLUTION CENTER
AICPA Service Organization Control Reports THE SIS MANAGED SOLUTION CENTER S E R V I C E O R G A N I Z AT I O N S SOC aicpa.org/soc Formerly SAS 70 Reports 19,700 sq. ft General Building Information 1.
More informationCITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
More informationISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
More informationRajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
More informationMore than Just Monitoring - A Virtual Technician
Next Generation Monitoring of Substations More than Just Monitoring - A Virtual Technician C. Harper Anderton Contents Introduction... 1 Smoke signals vs fiber optic... 1 Standard response vs smart response...
More informationBusiness Continuity & Recovery Plan Summary
Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity
More informationExecutive s Guide to Selecting a Mainframe Disaster Recovery Provider
Executive s Guide to Selecting a Mainframe Disaster Recovery Provider What to Look for in a Disaster Recovery Services Provider Accelerate Outsourcing, Inc. www.accelout.com 1 Improve the Chance of a Successful
More informationAustin Independent School District Police Department Policy and Procedure Manual
Policy 8.07 Austin Independent School District Police Department Policy and Procedure Manual Life Safety Systems I. POLICY The proper operations of the AISD Life Safety Systems (LSS) are essential for
More informationUNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
More informationEmergency Restoration Plan (ERP) Components
Note: Each electric utility is different. The differences may include: System Configuration Designs and Construction Standards Construction and Line Materials Operating procedures and practices Work methods
More informationBrochure Achieving security with cloud data protection. Autonomy LiveVault
Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server
More informationFORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization
More informationUnit Network Infrastructure Maintenance. Standard Service Agreement (SA)
Unit Network Infrastructure Maintenance Standard Service Agreement (SA) University of Michigan Information and Technology Services (ITS) July 1, 2012 1.0 Overview 2.0 Purpose 3.0 Service Rates 4.0 Terms
More informationREVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
More informationData Center Hosting Services & Policies Plymouth, Minnesota Facilities Zayo Enterprise Networks
Data Center Hosting Services & Policies Plymouth, Minnesota Facilities Zayo Enterprise Networks Page 1 of 14 Table of Contents Table of Contents... 2 Available Data Center Services... 3 Data Center Overview...
More informationOFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
More informationThe Anatomy of a. High-Availability Rack. November 2009. Online Tech, Inc. 220 E. Huron Ann Arbor, MI 48104 (734) 213-2020. www.onlinetech.
Online Technologies Corporation September 2008 If you have questions, please contact: The Anatomy of a Onl (734) 213-2020 phone High-Availability Rack November 2009 Online Tech, Inc. 220 E. Huron Ann Arbor,
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More informationCoreSite A Carlyle Company. 70 Innerbelt Colocation Services
CoreSite A Carlyle Company 70 Innerbelt Colocation Services Independent Service Auditor s Report on s Placed in Operation and Tests of Operating Effectiveness For the Period of October 1, 2009, to March
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationNASCIO STATE RECOGNITION AWARDS 2015
DEPARTMENT OF TECHNOLOGY AND INFORMATION STATE OF DELAWARE 801 SILVER LAKE BLVD. DOVER, DELAWARE 19904 The Honorable James L. Collins, Chief Information Officer NASCIO STATE RECOGNITION AWARDS 2015 DELAWARE
More informationNational Aluminium Co. Ltd.
National Aluminium Co. Ltd. [NALCO] EXPRESSION OF INTEREST FOR DATA CENTRE CO-LOCATION SERVICES Address for Communication The Project Manager ERP P/1, NALCO BHAWAN NAYAPALLI, BHUBANESWAR 751061 E mail:
More informationQvidian Hosted Customer Technical Portfolio
Introduction The presents a description of Qvidian s Software as a Service (SaaS) deployment model, providing information on the Qvidian architecture and security practices. This document includes descriptions
More informationABT Business Continuation Plan
ABT Business Continuation Plan Contents Emergency Contact Persons... 3 ABT General Policy... 3 Significant Business Disruptions (SBDs)... 3 Primary Site Engineered Awareness... 3 Plan Location and Access...
More informationBOWMAN SYSTEMS SECURING CLIENT DATA
BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered
More information