Title: DISASTER RECOVERY/ MAJOR OUTAGE COMMUNICATION PLAN

Size: px
Start display at page:

Download "Title: DISASTER RECOVERY/ MAJOR OUTAGE COMMUNICATION PLAN"

Transcription

1 POLICY: This policy is intended to address organizational wide communication executed during a or major IS service outage. When a disaster occurs or when any critical system/infrastructure component is unavailable for more than two hours the following procedure should be followed to ensure the appropriate contact occurs with management and end users. Examples of events or Major Outage are but not limited to Catastrophic loss of a Data Center Enterprise wide intrusion by hackers or a Computer virus/worm/trojan Horse Any complete outage of a critical system for more than 2 hours SCOPE: This policy applies without exception to all, and OCIO staff s. DEFINITIONS: I. Critical System Any application listed in the attached Critical Application List PROCEDURE: This section describes the detailed steps to be executed when this policy is activated ACTION 1. When any staff suspects may be experiencing a or Major Outage event follow the Identification. 2. Does the Identification indicate a or Major Outage a) If yes, refer to Policy # X.X.X: Problem Management Call Referral and Escalation / Notification b) If no, call the Help Desk to ensure the issue has been logged and assigned appropriately. End RESPONSIBLE PARTY DR-006 Recovery Communication Plan 9/8/2015 Page 1 of 5

2 ACTION 3. Is this a full scale expected to last more than 24 hours ( to be confirmed )? If yes, refer to Policy # X.X.X: DR Team Activation and go to step 4 If no, continue to step 6 4. Initiate Damage Assessment to determine the extent of the refer to Policy # X.X.X: Damage Assessment RESPONSIBLE PARTY 5. Does the DR Hot Site need to activated? Notify Executive Leadership of intent to declare. Contact Hot Site Vendor to activate the DR Hot Site. If yes, refer to Policy # X.X.X: Recovery Declaration If no, continue to 6 6. Is the / Major outage expected to last more than 8 hours (to be confirmed)? If yes, refer to Policy # X.X.X: Command Center Activation If no, continue to step 7 7. Ensure accurate and timely notifications and updates are distributed throughout management and user community. Refer to Policy # X.X.X Recovery / Major Outage Communication OCIO/ / Management Team 8. Refer to Policy # X.X.X / Major Outage Recovery Steps 9. Refer to Policy # X.X.X Post / Major Outage Analysis RELATED PROCEDURES: Identification. Problem Management Call Referral and Escalation / Notification DR Team Activation Damage Assessment Recovery Declaration Command Center Activation Recovery / Major Outage Communication / Major Outage Recovery Steps DR-006 Recovery Communication Plan 9/8/2015 Page 2 of 5

3 Post / Major outage Analysis ATTACHMENTS: A. Critical Application List B. Communication Scripts C. Management Notification Sheet D. Root Cause Analysis Report Template E. End User Contact Listings POLICY EXCEPTIONS: Date # Description Justification Signature None at this time DR-006 Recovery Communication Plan 9/8/2015 Page 3 of 5

4 PROCEDURAL PROCESS FLOW DIAGRAM: This Process flow represents the major steps to be taken in the event of a or Major Outage Staff Member identifies a or Major Outage / Major Outage Event Step1: Qualify / Quantify the extent of the Outage / 1 / Major Outage Identification No Notify Help Desk to ensure event has been resolved End Step 2: Ensure all, and staff are alerted to the severity of the situation 2 Call Escalation / Notification Step 4: Mobilize Damage Assessment Team to determine the full extent of the outage. Step3: Is the Outage / expected to last more than 24 hours. Initial Assessment Estimate Outage Duration < > hours Damage Assessment Declaration? < 24 hours Step 6: If the Outage / Is expected to last more than 8 hours the Command Center should be established Outage Duration to last more than 8 hours > 8 hours Command Center Activation Recovery Declaration procedure Step 5: Notify hot site vendor of intent to declare. Notify senior management of intent to declare disaster No Step 7: Ensure Management and users are fully informed during the Outage to facilitate patient safety and business continuity. Recovery Major OutageCommunication Step 8: This step outlines some guiding principles that should be observed throughout the recovery process. / Major Outage Recovery Post Major Outage Analysis Recovery / Outage Report and Action Plan Step 9: This procedure describes the analysis required to determine the root cause of the event and creation of a future avoidance plan DR-006 Recovery Communication Plan 9/8/2015 Page 4 of 5

5 POLICY IDENTIFICATION: Policy Title: Recovery/ Major Outage Communication Plan Category: Recovery Original Date: Author: Approved By: Title Signature Stakeholder Representatives Executive Executive REVIEW/REVISION HISTORY: Version Review Date Next Review Date Changes (Y or N) Description of Change (section and description) Review/Revision by Revision(s) approved by Title Signature Title Signature 1.0 Original Initial draft DR-006 Recovery Communication Plan 9/8/2015 Page 5 of 5

Incident Manager. Notified. Major Incident? YES. Major Incident Declared. Initial Communication Drafted. MIH At A Glance. Major Incident Ended

Incident Manager. Notified. Major Incident? YES. Major Incident Declared. Initial Communication Drafted. MIH At A Glance. Major Incident Ended www.majorhling.com www.braunsblog.com A Major Hling Plan Model Desk Manager Business Resolver Teams (BRT) Communications Step 1 Record / Event Recieved Step 2 Classify Refer as Potential Major Manager

More information

Title: DESKTOP TICKET MANAGEMENT PROCEDURE

Title: DESKTOP TICKET MANAGEMENT PROCEDURE POLICY: This policy describes the methods by which help desk tickets will be accepted, managed and resolved by. A consistent, high-level process for ticket management is essential to the delivery of high-quality,

More information

Title: SLA INTRANET/EXTRANET

Title: SLA INTRANET/EXTRANET POLICY: Intranet/Extranet availability and response time will be monitored, tracked, and recorded by the Manager of I Net Development to: Insure that acceptable performance of the intranet and extranet

More information

How To Manage Change Management At Uni

How To Manage Change Management At Uni Change Management Process VERSION 1.0 Version Date: 1 May 2006 Table of Revisions REVISION NUMBER DESCRIPTION OF CHANGES (PARAGRAPH AND OR SECTION NUMBERS FOR REVISION TRACKING) DATE OF CHANGE REVIEWED

More information

Disaster Recovery Plan Documentation for Agencies Instructions

Disaster Recovery Plan Documentation for Agencies Instructions California Office of Information Security Disaster Recovery Plan Documentation for Agencies Instructions () November 2009 SCOPE AND PURPOSE The requirements included in this document are applicable to

More information

Technology Recovery Plan Instructions

Technology Recovery Plan Instructions State of California California Information Security Office Technology Recovery Plan Instructions SIMM 5325-A (Formerly SIMM 65A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF

More information

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1 Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4

More information

Organization. Project Name. Project Overview Plan Version # Date

Organization. Project Name. Project Overview Plan Version # Date Project Overview Plan Template Organization Project Name Project Overview Plan Version # Date REVISION HISTORY VERSION # REVISION DATE COMMENT 1 APPROVALS: Authorized Signature DATE 2 Table of Contents

More information

Technology Event Notification and Escalation Procedures. Procedure: Technology Event Notification and Escalation. Procedure Date: 10/27/2009

Technology Event Notification and Escalation Procedures. Procedure: Technology Event Notification and Escalation. Procedure Date: 10/27/2009 Procedure: Technology Event Notification and Escalation Procedure Date: 10/27/2009 1.0 Purpose Information Technology Services (ITS) provides and manages technology in support of the College mission. Changes

More information

[name of project] Service Level Agreement

[name of project] Service Level Agreement [name of project] Service Level Agreement Policies and Procedures Posting: Nov.2008 Rev# xxx CIO Sign-Off: Approved and Reviewed By: Date: Document ID: SLA Revision 001 Authors: Disclaimer: Document sign-off

More information

Communication systems must be readily available, reliable and properly maintained to support an emergency or disaster.

Communication systems must be readily available, reliable and properly maintained to support an emergency or disaster. Approved By: Dr. Mark Peters, President & CEO, 2/07 POLICY: Communication systems must be readily available, reliable and properly maintained to support an emergency or disaster. PROCEDURE: 1. Phone System:

More information

Fermilab Computing Division Service Level Management Process & Procedures Document

Fermilab Computing Division Service Level Management Process & Procedures Document BMC Software Consulting Services Fermilab Computing Division Process & Procedures Document Client: Fermilab Date : 07/07/2009 Version : 1.0 1. GENERAL Description Purpose Applicable to Supersedes This

More information

Alabama State Port Authority

Alabama State Port Authority DISASTER RECOVERY HOTSITE REQUEST FOR PROPOSAL Alabama State Port Authority Issued April 27, 2010 Alabama State Port Authority Table of Contents 1.0 OVERVIEW... 1 1.1 INTRODUCTION... 1 1.2 SCHEDULE OF

More information

IRM Incident Communication and Response Plan

IRM Incident Communication and Response Plan I. Purpose A crisis communication plan provides policies and procedures for the communication of IT service interruption within the university. The goal of this communication plan is to establish guidelines

More information

Policies of the University of North Texas Health Science Center

Policies of the University of North Texas Health Science Center Policies of the University of North Texas Health Science Center 14.650 UNT Health IT Change Policy Chapter 14 UNT Health Policy Statement. It is the standard operating policy of UNT Health, UNTHSC Academic

More information

DOCUMENT HISTORY LOG. Description

DOCUMENT HISTORY LOG. Description Effective Date: 02/26/2013 Page 2 of 16 DOCUMENT HISTORY LOG Status (Baseline/ Revision/ Canceled) Document Revision Effective Date Baseline 1.0 02/19/2003 Revision 1.1 03/12/2003 Description Revision

More information

White Paper: BMC Service Management Process Model 7.6 BMC Best Practice Flows

White Paper: BMC Service Management Process Model 7.6 BMC Best Practice Flows White Paper: BMC Service Management Process Model 7.6 BMC Best Practice Flows October 2009 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website,

More information

Annex E 24/7 EMERGENCY CONTACT PROTOCOL

Annex E 24/7 EMERGENCY CONTACT PROTOCOL Annex E 24/7 EMERGENCY CONTACT PROTOCOL PRIMARY AGENCY: Cascade City-County Health Department INTRODUCTION Purpose The purpose of this protocol is to provide a point of contact for coordinating the response

More information

DIRECTIVE NUMBER: 141.03.04.001 v2.0. SUBJECT: Correctional Integration Systems Change Management Plan

DIRECTIVE NUMBER: 141.03.04.001 v2.0. SUBJECT: Correctional Integration Systems Change Management Plan DEPARTMENT OF CORRECTION SUPPORT Management Services DIRECTIVE NUMBER: SUBJECT: Correctional Integration Systems Change PAGE NUMBER: 1 of 10 Adopted: 12-15-03 01.00.00. POLICY OF THE DEPARTMENT It is the

More information

Systems Support - Standard

Systems Support - Standard 1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets

More information

Business Continuity Plan. Components and sequencing description

Business Continuity Plan. Components and sequencing description Business Continuity Plan Components and sequencing description This document is designed to help explain the contents of an example Business Continuity Plans, so that team members will have a better understanding

More information

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information

More information

IT Security Incident Management Policies and Practices

IT Security Incident Management Policies and Practices IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document

More information

Attachment N CPIC Vendor Resiliency Business Continuity Planning Questionnaire

Attachment N CPIC Vendor Resiliency Business Continuity Planning Questionnaire Instructions: Citizens Property Insurance Corporation (CPIC) distributes this survey to vendors and business partners used by groups within the Firm, who are critical to the operational readiness of Citizens

More information

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification

More information

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier

More information

SERVICE LEVEL AGREEMENT. CUIT Converged Infrastructure: Infrastructure Services for VM Hosting

SERVICE LEVEL AGREEMENT. CUIT Converged Infrastructure: Infrastructure Services for VM Hosting SERVICE LEVEL AGREEMENT CUIT Converged Infrastructure: Infrastructure Services for VM Hosting Version: 1.0 Author: CUIT Date: August, 2015 Table of Contents 1.0Document Change History 2.0 Overview 2.1

More information

Creating a Business Continuity Plan. What We ll Cover... What is a BCP? Micky Hogue, CRM

Creating a Business Continuity Plan. What We ll Cover... What is a BCP? Micky Hogue, CRM Creating a Business Continuity Plan Micky Hogue, CRM Sandia National Laboratories Albuquerque, NM 505-844-6640 Mlhogue@sandia.gov What We ll Cover... What is a Business Continuity Plan Why create a BCP?

More information

BUSINESS CONTINUITY MANAGEMENT REQUIREMENTS FOR SGX MEMBERS NEW RULES FOR INCLUSION IN SGX-ST RULES

BUSINESS CONTINUITY MANAGEMENT REQUIREMENTS FOR SGX MEMBERS NEW RULES FOR INCLUSION IN SGX-ST RULES BUSINESS CONTINUITY MANAGEMENT REQUIREMENTS FOR SGX MEMBERS NEW RULES FOR INCLUSION IN SGX-ST RULES New rule Current Rule Proposed Rule 4.6.21 Business Continuity Requirements The following requirements

More information

Enterprise UNIX Services - Systems Support - Extended

Enterprise UNIX Services - Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for

More information

Internal Help Desk. Bizagi Suite

Internal Help Desk. Bizagi Suite Internal Help Desk Bizagi Suite Internal Help Desk 2 Table of Contents Internal Help Desk... 4 Process Elements... 6 Case Opening... 6 Start... 6 Open Case... 6 Element... 7 Close Case... 7 Notify Case

More information

Hospital Authority. Enhanced Contingency Planning for IT System Failures

Hospital Authority. Enhanced Contingency Planning for IT System Failures For discussion on 27.5.2004 AOM-P325 Hospital Authority Enhanced Contingency Planning for IT System Failures Purpose This purpose of this paper is to highlight enhancements to HAHO and IT Contingency Planning

More information

B U S I N E S S C O N T I N U I T Y P L A N

B U S I N E S S C O N T I N U I T Y P L A N B U S I N E S S C O N T I N U I T Y P L A N 1 Last Review / Update: December 9, 2015 Table of Contents Purpose...3 Background...3 Books and Records Back-up and Recovery...4 Mission Critical Systems...

More information

Analytics Reporting Service

Analytics Reporting Service 1. Rate per month $19.00 per user 2. General Overview: The provides the technologies for transforming large quantities of raw data into useable information serving the agency s functions. includes interactive

More information

Manage IT Service Continuity and Availability

Manage IT Service Continuity and Availability Manage IT Service Continuity and Availability Description School jurisdictions are increasingly dependent upon IT services to support day-to-day activities. The process of managing IT ensures that IT services

More information

Professional Practice Six - Business Continuity Plan Development and Implementation

Professional Practice Six - Business Continuity Plan Development and Implementation Professional Practice Six - Business Continuity Plan Development and Implementation The Business Continuity Plan is a set of documented processes and procedures which will enable the entity to continue

More information

Critical Systems Guidelines

Critical Systems Guidelines Architecture, Standards and Planning Branch Office of the CIO Province of BC Document Version 1.0 April 2015 Table of Contents 1.0 Document Control... 3 2.0 Introduction... 4 3.0 Roles and Responsibilities...

More information

IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY

IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY Department of Health Government of Western Australia IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY 2004 Document Control Date Version Notes Author 10/11/2003 0.1 Initial

More information

SapphireIMS Service Desk Feature Specification

SapphireIMS Service Desk Feature Specification SapphireIMS Service Desk Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams

More information

State of Ohio Private Cloud Managing Severity 1 Tickets

State of Ohio Private Cloud Managing Severity 1 Tickets State of Ohio Private Cloud Managing Severity 1 Tickets April 29, 2014 Table of Contents 1 Document Overview... 3 1.1 Scope... 3 1.2 Action or Event that Requires the Procedure... 3 1.3 Goal of the Procedure...

More information

15-271 PROPOSED. Section A: Position Profile

15-271 PROPOSED. Section A: Position Profile STATE OF CALIFORNIA CALIFORNIA DEPARTMENT OF TECHNOLOGY DUTY STATEMENT TECH 052 (REV. 10/2015) ALERT: This form is mandatory for all Requests for Personnel Action (RPA). INSTRUCTIONS: Before completing

More information

IT Disaster Recovery and Business Resumption Planning Standards

IT Disaster Recovery and Business Resumption Planning Standards Information Technology Disaster Recovery and Business IT Disaster Recovery and Business Adopted by the Information Services Board (ISB) on May 28, 1992 Policy No: Also see: 500-P1, 502-G1 Supersedes No:

More information

Continuity of Operations Planning. A step by step guide for business

Continuity of Operations Planning. A step by step guide for business What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures

More information

Service Desk Management Process

Service Desk Management Process Service Desk Management Process [Month, year] Document No. : Version.Rev : Authorized by: Signature/: Date Prepared by Title Location Version no. Version date Document control sheet Contact for enquiries

More information

Broadridge Business Process Outsourcing, LLC Business Continuity Plan Disclosure

Broadridge Business Process Outsourcing, LLC Business Continuity Plan Disclosure Broadridge Business Process Outsourcing, LLC Business Continuity Plan Disclosure I. Summary In accordance with FINRA Rule 4370, Broadridge Business Process Outsourcing, LLC (the Firm ) is providing you

More information

Service Level Management

Service Level Management Process Guide Service Level Management Company ABC Service Improvement Program (SIP) Process Guide Service Level Management Table of Contents Document Information... 3 Approval... 4 Section 1: Process

More information

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview

More information

Patent Public Advisory Committee Meeting. OCIO Update

Patent Public Advisory Committee Meeting. OCIO Update Patent Public Advisory Committee Meeting OCIO Update John B. Owens II Chief Information Officer September 27, 2012 USPTO Seal IT INFRASTRUCTURE IMPROVEMENT PORTFOLIO - ROAD MAP The Business Problem [In

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

Objectives: This incident response plan has been developed to meet the following objectives:

Objectives: This incident response plan has been developed to meet the following objectives: Incident Response Plan Template For use by all churches in the Presbytery of Middle Tennessee Developed by The Disaster Recovery Team of the Presbytery of Middle Tennessee Authored by Rebecca Penza, using

More information

Best Practices in Disaster Recovery Planning and Testing

Best Practices in Disaster Recovery Planning and Testing Best Practices in Disaster Recovery Planning and Testing axcient.com 2015. Axcient, Inc. All Rights Reserved. 1 Best Practices in Disaster Recovery Planning and Testing Disaster Recovery plans are widely

More information

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic

More information

Position Description

Position Description Position Description Position Title: Group/Division/Team: WebCenter / UCM Technical Support Business Technology Services Group / IT Operations Division Date: December 2011 Reports To: Roles Reporting To

More information

Incident Management Policy

Incident Management Policy Incident Management Policy Draft SEC Subsidiary Document DCC Public 01 July 2015 BASELINED VERSION 1 DEFINITIONS Term Black Start CPNI Code of Connection Crisis Management Disaster HMG Incident Party Interested

More information

CISM Certified Information Security Manager

CISM Certified Information Security Manager CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective

More information

Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Disaster Recovery and Business Continuity Barbara Nollau Rupert King/Getty Images Computer Systems Quality and Compliance discusses practical aspects of computer systems and provides useful information

More information

OCIO Leader On-Call Training

OCIO Leader On-Call Training OCIO Leader On-Call Training Agenda Definitions, Roles, Key Timelines IT Incident Process Communication Tools Helpful Hints Incident Reporting Review Scenarios Definitions From MUHA C170 Information Technology

More information

State Data Center. VMAX Data Migration Guide

State Data Center. VMAX Data Migration Guide State Data Center VMAX Data Migration Guide Version 1.0 June 26, 2013 Prepared by: Steve Lovaas, Enterprise Projects Client Liaison Contents DOCUMENT REVISION HISTORY... 3 INTRODUCTION AND PURPOSE... 4

More information

RSA SecurID Tokens Service Level Agreement (SLA)

RSA SecurID Tokens Service Level Agreement (SLA) RSA SecurID Tokens Service Level Agreement (SLA) 1. Agreement This Agreement defines RSA SecurID services provided to a Customer. Service definitions include responsibilities, hours, availability, support

More information

Contracting Guidelines with EHR Vendors

Contracting Guidelines with EHR Vendors Doctors Office Quality - Information Technology (DOQ-IT) Project Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written

More information

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745 ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Real Time Monitoring: Features, Functions & Benefits. Technology for the way you do Business!

Real Time Monitoring: Features, Functions & Benefits. Technology for the way you do Business! Real Time Monitoring: Features, Functions & Benefits Technology for the way you do Business! Features, Functions & Benefits - 24x7 s Windows Services s s every 5 or 15 minutes to ensure Windows services

More information

Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011

Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011 Mohawk DI-r: Privacy Breach Management Procedure Version 2.0 April 2011 Table of Contents 1 Purpose... 3 2 Terminology... 5 3 Identifying a Privacy Breach... 5 4 Monitoring for Privacy Breaches... 6 5

More information

Recovery Management. Release Data: March 18, 2012. Prepared by: Thomas Bronack

Recovery Management. Release Data: March 18, 2012. Prepared by: Thomas Bronack Recovery Management Release Data: March 18, 2012 Prepared by: Thomas Bronack Section Table of Contents 8. RECOVERY MANAGEMENT... 4 8.1. INTRODUCTION TO RECOVERY MANAGEMENT... 4 8.1.1. DEFINITION... 4 8.1.2.

More information

Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement

Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department

More information

Manager, Support and Equity Unit Approved by

Manager, Support and Equity Unit Approved by Recovery Team Procedure Related Policy Recovery Team Policy Responsible Officer Manager, Support and Equity Unit Approved by Manager, Support and Equity Unit Approved and commenced March, 2011 Review by

More information

Template K Implementation Requirements Instructions for RFP Response RFP #

Template K Implementation Requirements Instructions for RFP Response RFP # Template K Implementation Requirements Instructions for RFP Response Table of Contents 1.0 Project Management Approach... 3 1.1 Program and Project Management... 3 1.2 Change Management Plan... 3 1.3 Relationship

More information

8 Best Practices for IT Incident Management

8 Best Practices for IT Incident Management Solutions for Unified Critical Communications 8 Best Practices for IT Incident Management With Dan Barthelemy, Endurance International Group Agenda Webinar with Endurance International Group + Introduction

More information

Offsite Disaster Recovery Plan

Offsite Disaster Recovery Plan 1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive

More information

Attachment M Explore IRP Change Control Process

Attachment M Explore IRP Change Control Process Attachment M Explore IRP Change Control Process 1.0 Purpose This project is a joint effort between The Michigan Department of State and Explore Information Services, LLC for the implementation of an IRP

More information

How to Plan for Disaster Recovery and Business Continuity

How to Plan for Disaster Recovery and Business Continuity A TAMP Systems White Paper TAMP Systems 1-516-623-2038 www.drsbytamp.com How to Plan for Disaster Recovery and Business Continuity By Tom Abruzzo, President and CEO Contents Introduction 1 Definitions

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This Service Level Agreement (SLA) applies for all Services agreed through a Yorcard Limited Order Form. All issues and queries (hereafter referred to as issues) should first be

More information

DETAILED RISK ASSESSMENT REPORT

DETAILED RISK ASSESSMENT REPORT DETAILED RISK ASSESSMENT REPORT Executive Summary During the period June 1, 2004 to June 16, 2004 a detailed information security risk assessment was performed on the Department of Motor Vehicle s Motor

More information

Agenda. Creating a Robust Testing Program. Notification Tests. Overview of Testing. Beverly Schulz, CBCP

Agenda. Creating a Robust Testing Program. Notification Tests. Overview of Testing. Beverly Schulz, CBCP Agenda Overview of Testing Notification Tests Tabletop or Walk-through Tests Simulations Technology Outage Tests Third Party Outage Tests Workplace Outage Tests Workforce Outage Tests Reporting Creating

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode) HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

N e t w o r k E n g i n e e r Position Description

N e t w o r k E n g i n e e r Position Description Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority

More information

Six sigma project management

Six sigma project management Six sigma project management Bizagi Suite Six sigma project management 1 Table of Contents Six Sigma Project Management... 3 Process Elements... 9 Project Charter... 9 Define... 11 Measure...12 Analyze...12

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322 Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery

More information

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Incident Management help topics for printing

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Incident Management help topics for printing HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Incident Management help topics for printing Document Release Date: July 2014 Software Release Date: July

More information

Networx Training Q+As Repairs / Trouble Tickets

Networx Training Q+As Repairs / Trouble Tickets For repair tickets, what's the difference between CLOSED and RESOLVED? Resolved status means the issue reported has a fix and Verizon is pending verification by the customer before the ticket is closed.

More information

Blackboard Managed Hosting SM Disaster Recovery Planning Document

Blackboard Managed Hosting SM Disaster Recovery Planning Document BLACKBOARD MANAGED HOSTING Blackboard Managed Hosting SM Disaster Recovery Planning Document Prepared By: MH Services Modified Date: March 2009 Revision: 1.8 1. OBJECTIVES... 3 2. SCOPE... 3 3. ASSUMPTIONS...

More information

Support and Service Management Service Description

Support and Service Management Service Description Support and Service Management Service Description Business Productivity Online Suite - Standard Microsoft Exchange Online Standard Microsoft SharePoint Online Standard Microsoft Office Communications

More information

Overview of Service Support & Service

Overview of Service Support & Service Overview of Service Support & Service Delivery Functions ITIL Service Support / Delivery- 1 Service Delivery Functions Availability Management IT Services Continuity Management Capacity Management Financial

More information

Customer Care Center Details

Customer Care Center Details Enterprise IT Shared Services Service Level Agreement Customer Care Center Details (Revision Date: October 7, 2010) Going From Good to Great DOCUMENT CONTROL REVISION HISTORY DATE DESCRIPTION 9.15.10 INITIAL

More information

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic

More information

HIPAA RISK ASSESSMENT

HIPAA RISK ASSESSMENT HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation

More information

SECURITY THROUGH PROCESS MANAGEMENT

SECURITY THROUGH PROCESS MANAGEMENT SECURITY THROUGH PROCESS MANAGEMENT Jennifer L. Bayuk Price Waterhouse, LLP Headquarters Plaza North Morristown, NJ 07962 jennifer_bayuk@notes.pw.com Overview This paper describes the security management

More information

Oregon Public Employees Retirement System

Oregon Public Employees Retirement System Oregon Public Employees Retirement System Signature Paul Cleary Policy/: Security Breach Response Objective: References: Posted date November 24, 2009 Approval date November 13, 2009 Number Page 1 of 5

More information

Annex 9: Technical proposal template. Table of contents

Annex 9: Technical proposal template. Table of contents UNFCCC/CCNUCC Page 1 Annex 9: Technical proposal template Table of contents Annex 9... 3 9.1 Technical proposal... 3 9.1.1 Vendor s name... 3 9.2 Engagement model... 3 9.2.1 Type of engagement... 3 9.2.2

More information

Business Continuity. Client Briefing

Business Continuity. Client Briefing Business Continuity Client Briefing About this document This document describes Mediaocean s disaster recovery and business continuity policy. Mediaocean LLC. Mediaocean Systems Limited 2015 This manual

More information

MEASURING FOR PROBLEM MANAGEMENT

MEASURING FOR PROBLEM MANAGEMENT MEASURING FOR PROBLEM MANAGEMENT Problem management covers a variety of activities related to problem detection, response and reporting. It is a continuous cycle that encompasses problem detection, documentation

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Service Desk help topics for printing

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Service Desk help topics for printing HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Service Desk help topics for printing Document Release Date: July 2014 Software Release Date: July 2014 Legal

More information

For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis

For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets

More information

IT Help Desk Call Priorities

IT Help Desk Call Priorities Author Zachary Nashed Document Name Call Priorities Version Control IT Help Desk Priorities_1.01 03/07/08 -Updated IT Help Desk Priorities_1.02 05/08/09-Updated IT Help Desk Priorities_1.03 24//08/09-Updated

More information

Instructions for Completing the Information Technology Examination Officer s Questionnaire

Instructions for Completing the Information Technology Examination Officer s Questionnaire Instructions for Completing the Information Technology Examination Officer s Questionnaire Please answer the following information security program questions as of the examination date pre-determined by

More information