Draft ICT Disaster Recovery Plan
|
|
|
- Eunice Ryan
- 10 years ago
- Views:
Transcription
1 Draft ICT Disaster Recovery Plan Version 3.0 Draft Date June 2014 Status Draft Approved By:
2 Table of Contents 1.0 Introduction Objectives of the Disaster Recovery Policy/plan Disaster Planning Risks and Prevention Electricity related damages to Equipment and Data Fire Flooding and Leakages Lightning Computer Crime /Hacking Theft, Terrorism and Sabotage Disaster Preparation Replication facilities Replacement Equipment Backups Backup Procedure Initiation of Emergency Procedures Disaster Notification List Disaster Recovery Team Activating the Disaster Recovery Plan Equipment Protection Protection Inventory Damage Assessment Emergency Procurement Initiation of Recovery Procedures Site Preparation System Platform Recovery Procedures Critical Applications Restoration of the Data center Maintaining the Disaster Recovery Plan...9 2
3 1.0 Introduction Mbarara University of Science and Technology started in 1989 with 43 students in the Faculty of Medicine. Currently the university boosts of 3,500 students in the 3 Faculties of: Faculty of Medicine, Science and Development Studies; and Institute of Computer Science. Coupled with growth in enrolment, the university continues to increase its reliance on Computer and Network based systems to improve the efficiency and effectiveness of its day-to-day business processes. Considerable efforts have been made at digitizing the Academic Registrar s Department, the library, the Dean of Students Department, together with the existing web services which include university web page, staff mail, student mail and an e-learning portal. This is in addition to the official information stored by both staff and students as they work on their respective desktop or laptop computers. At the centre of all these applications and services is the data processed and stored by the systems. This data is very crucial and must be kept safe in such a way that any possible scenario may not lead to loss and subsequent repercussions to the business processes in place. Currently, there is no central storage facility and disaster recovery plan. Computer system users individually store their data and information with very minimal safeguard controls in place. It should be noted that despite MUST s advancements in Information and Communications Technology, there still exists several risk factors, that could result into the worst catastrophic disasters of permanent loss of any data or information stored over a period of reliance on the use of Computer and Network based Systems. The primary aim of this Data Recovery Plan is to provide an action plan in response to a disaster that destroys the university s central computer systems run by the Computing Services Unit/Department located in the Main Data Centre in the Institute of Computer Science Block. It is however important to note that, this plan does not guarantee zero data loss in the event of a computer system related disaster at Mbarara University of Science and Technology. 1.1 Objectives of the Disaster Recovery Policy/plan To develop orderly course of action for restoring critical computing capability within the shortest possible time after the occurrence of a disaster. Outline criteria for making decisions to recover and repair data and equipment hosted in the university s data centre. Provide information about personnel and technical expertise required. Identify equipment and facilities necessary for recovery. Ensure full restoration of facility 3
4 2. 0 Disaster Planning 2.1 Risks and Prevention The Disaster planning process at Mbarara University should start by evaluating the risks currently existent at the University s Data Centre which could spark off a disaster, as highlighted below: Electricity related damages to Equipment and Data The greatest risk at Mbarara University is the inconsistent and ever fluctuating electricity supply to the data centre, through the national electricity grid. This can have severe effects of shortening the lifespan of the equipment and completely destroying the data stored on the storage media attached. The danger posed by the erratic nature of the electricity supply can be reduced by installing power back up systems to run for at least 10 hours in all designated data centers and server rooms at the university. The Computing Services Unit/Dept. shall implement a centralized data storage solution for all university data and information. The Computing Services Unit/Dept shall implement both real time and regular back up procedures of data hosted at all designated data centers in the university Fire The amount of electricity supplied to the university s main data center, the several electrical connections and fluctuating power supply could at anytime result in short circuits. Short circuits are known to be very common causes of fire outbreaks, which could destroy the equipment and data stored in the data center. Installation of fire and smoke detectors in the data centre. Installation of hand-held fire extinguishers in visible locations, throughout the building. Staff shall be required to undergo training on the proper fire fighting to take in the event of a fire. Periodic inspection of the facility by University Electricians at least thrice a year, to eliminate any possible short circuits that may cause fires. 4
5 2.1.3 Flooding and Leakages The current data center faces the risk of water leakages emanating from the air-conditioning units installed there-in. There is also the possibility of flooding resulting from rain water over flow, from the windows of the facility. Periodic service maintenance shall have to be done for the air-conditioning units in the facility, in order to avert the occurrence of water leakages Periodic inspection of the facility by the University Estates and Works Department, to eliminate any possible causes of flooding and leakages Lightning There is always the looming risk of a lightning bolt striking in this part of the world. If this struck it could result into the permanent damage of the equipment within the data center. Lightening Arresters shall be installed and maintained on the roof of the building housing the data center Computer Crime /Hacking Computer related crimes like hacking are on the increase in the country and world over. The systems at Mbarara University would be an obvious target for hackers and crackers. This unauthorized access to the system could lead to the tampering or damage to the data hosted by the systems. The Computing Services Unit shall implement both software and hardware security controls to avert any hacking attempt into the university s computer and network systems e.g. Firewalls, Access Control lists etc Theft, Terrorism and Sabotage The university s data center may be physically accessed by unauthorized persons to carry out acts of theft, terrorism or sabotage. This could lead to destruction or the compromising of the data hosted in the facility. 5
6 The university s security office shall increase the vigilance of patrols around the facility, especially during the nights. The door to the datacenter should always be securely locked and access keys only issued to authorized personnel. Adequate lighting shall be provided around the facility during the nights. 3.0 Disaster Preparation 3.1 Replication facilities The university shall set up a number of replication facilities (hot sites) to mirror all the data hosted in the main data center. Any of these sites will automatically be the temporal main hosting site in case a disaster befell the main data center, before the facilities in the main data center are restored. The following options shall be considered in choosing the alternate replication facilities. Setting up a hot site data center within the university campus in the New Science Block. Setting up a Warm site data center at the university s proposed Kihumuro Campus Set up a Warm site data center with a hosting company at a cost. 3.2 Replacement Equipment In case of any disaster there shall be a sizeable amount of equipment, lost that will have to be replaced in order for the facility to be restored. The following shall therefore have to be in place: Preparation of a complete inventory of all the components of each computer and network system and their software that must be restored after a disaster by the Computing Services Unit. Provisions within the University s Procurement procedure to allow for emergency procurement situations like disasters. Prequalified suppliers/service providers to provide replacement equipment in case of disaster. 3.3 Backups The greatest insurance to computer data loss is making regular backups of the original data. The Computing Services Unit shall therefore implement backup processes on external hard drive infrastructure for all university data and information in the following ways; Real-time data backup within the main data center. Real-time data backup of the site in the New Science Block. Periodic data backup of the site at Kihumuro Periodic data backup of the site at the Hosting Company. 6
7 3.4 Backup Procedure Every Application system running within the university shall define and implement both automatic and scheduled back up procedures, in line with the available facilities, hardware and software. The Developers of the application systems shall clearly provide functionality for back up within the system and clearly indicate this in the documentation. 4.0 Initiation of Emergency Procedures 4.1 Disaster Notification List In the event that a disaster actually occurs there is a need for a list of important players to be notified immediately. The list shall be compiled and clearly displayed in case of any eventuality. University Security Office Uganda Police Fire Brigade Ambulance/Hospital Services Computing Services Unit/Department Staff Contacts Deans/Directors of Faculties and Institutes University Secretary Vice Chancellor 4.2 Disaster Recovery Team The Disaster Recovery Team shall be tasked with the responsibility of ensuring that all university systems, applications, data and information are restored for user access in the shortest possible time following the occurrence of a disaster. The team will suitably be headed by the Head of Computing Services and composed of all Systems, Web and Network Administrators and IT Officers Activating the Disaster Recovery Plan The greatest aim of the operation shall be to restore all systems functionality with no data loss. The following describes a series of actions to be performed after a disaster has occurred; Recovery Manager shall appoint a Recovery Management Team, in consultation with all university stakeholders. Recovery Manager convenes a meeting of the Recovery Management Team. Each member s responsibility in the recovery shall be reviewed. 7
8 Recovery manager shall review the recovery plan with the recovery team. Each member shall perform their respective responsibility. Next meeting of recovery team shall be scheduled. 5.0 Equipment Protection 5.1 Protection During the recovery process any equipment, magnetic media and other items damaged at the site shall be protected from any elements to avoid further damage. 5.2 Inventory As soon as practicable, a complete inventory of all salvageable equipment shall be taken along with estimates about when the equipment will be ready for use and the list of items to be freshly procured. 5.3 Damage Assessment There shall be a preliminary damage assessment intended to establish the extent of damage to critical hardware and the facility that houses it to determine what should be procured immediately. 5.4 Emergency Procurement Having fully established the equipment to be replaced, emergency procurement procedures shall be initiated for this equipment to be replaced as soon as practicable. 6.0 Initiation of Recovery Procedures Once the occurrence of a disaster results into the non-functioning of any application system or retrieval/access of information at the main data center, then any one of the replication sites referred to in section 3.1 shall be temporarily lit up to act as the main data center for the entire recovery process. The choice of which site to use shall depend on an evaluation by the Recovery team on which site is adequately prepared to take up the immediate role of hosting all data processes. 6.1 Site Preparation Having fully re-directed the central data processing activity to one of the replication sites, the recovery team shall embark on recovering the primary computing and network facilities. A process that shall be highly dependent on how quickly replacement equipment can be procured. 8
9 6.2 System Platform Recovery Procedures The Recovery shall thereafter recover and restore all university systems and run the restoration of the data backups of these systems 6.3 Critical Applications Throughout the recovery and restoration process, the recovery team shall decide which systems are critical enough to take precedence of others. 6.4 Restoration of the Data center Once all the restoration procedures have been performed and reviewed, the main data center shall undergo rigorous tests before it is re-established as the main datacenter and the others act as replication sites. 7.0 Maintaining the Disaster Recovery Plan In-order for this Disaster Recovery Plan to be maintained, it shall be made available to all relevant stakeholders. This plan shall also be reviewed at least once a year by the university s ICT Committee. It is important to note that since the university s computing infrastructure continues to change, the plan shall therefore have to change accordingly. 9
BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN
BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,
Business Continuity Plan
Business Continuity Plan IMMEDIATE ACTIONS Manager/Supervisor 1. Ensure emergency services contacted 2. Ensure safety of personnel 3. Co-ordinate with the emergency services 4. Contact Senior members of
ITMF Disaster Recovery and Business Continuity Committee Report for the UGA IT Master Plan
ITMF Disaster Recovery and Business Continuity Committee Report for the UGA IT Master Plan I. Executive Summary Planning for continued operation during unforeseen catastrophic events, and for returning
APPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 15 th October 2013 Signed: Chair of Governors Date: Ratified: Oct 2013 Review: Sep
Disaster Recovery Planning Process
Disaster Recovery Planning Process By Geoffrey H. Wold Part I of III This is the first of a three-part series that describes the planning process related to disaster recovery. Based on the various considerations
Connors State College
Connors State College Page 1 Connors State College IT Systems Disaster Recovery Plan Connors State College - 1 - Information Technology Systems Connors State College Page 2 Disclaimer: The techniques for
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
Disaster Recovery Plan
Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the
ICT & Communications Services Disaster & Recovery Plan
ICT & Communications Services Disaster & Recovery Plan Advanced IT Services with George Spencer Academy www.aitn.co.uk Advanced IT Services - Arthur Mee Road, Stapleford, Nottingham. NG9 7EW Email: [email protected]
MARQUIS DISASTER RECOVERY PLAN (DRP)
MARQUIS DISASTER RECOVERY PLAN (DRP) Disaster Recovery is an ongoing process to plan, develop, test and implement changes, processes and procedures supporting the recovery of the critical functions in
SCHEDULE 25. Business Continuity
SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or which TfL considers likely to render, it necessary or desirable
DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
Disaster Recovery Plan Checklist
Disaster Recovery Plan Checklist Your guide for setting up or updating a Disaster Recovery Plan for your business. ArcSource Disaster Recovery Plan Checklist 1. Compile Your Internal Contacts Information
How Small/ Mid Size Companies Can Protect Their Business. Introduction
Be Prepared How Small/ Mid Size Companies Can Protect Their Business By Sean W. O Donnell, President, Datacor, Inc. Introduction Recent disasters have brought the need for organizations to focus on business
SCHEDULE 25. Business Continuity
SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or is likely (in TfL s absolute discretion (subject to paragraph
DISASTER RECOVERY PLAN FOR MKHAMBATHINI MUNICIPALITY
DISASTER RECOVERY PLAN FOR MKHAMBATHINI MUNICIPALITY 1 Document Approval This document has been endorsed and approved by Council. Chairperson of the Council Date Document Version Control Name Status Version
Birkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
APPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
MATATIELE LOCAL MUNICIPALITY DISASTER RECOVERY PLAN
MATATIELE LOCAL MUNICIPALITY DISASTER RECOVERY PLAN INDEX Page PART 1: OBJECTIVE 3 PART 2: RESPONSIBILITES 3 PART 3: DOCUMENTATION 3 PART 4: DATA BACKUP 3 PART 5: DISASTER RECOVERY PROCEDURE 3 5.1 Power
Disaster Recovery (DR) Planning with the Cloud Desktop
with the Cloud Desktop [email protected] (866) 796-0310 www.os33.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering from a disaster
Business Continuity Planning (BCP) / Disaster Recovery (DR)
Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made
How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%.
How to write a DISASTER RECOVERY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A DRP AND HOW CAN IT HELP MY COMPANY? CHAPTER PREPARING TO WRITE YOUR DISASTER RECOVERY PLAN
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
Emergency Operations California State University Los Angeles
Business Continuity Plan Emergency Operations California State University Los Angeles 1. Objective & Scope 2. Definition of Disaster 3. Risk and Business Impact Analysis Summary 4. Business Continuity
ICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
Disaster Recovery. Policy - External
Disaster Recovery Policy - External Disaster Recovery Policy Modified by: Rob Wray, IT and Development Manager November 2008 Approved by: Alan Matthews, Managing Director Georgia Cogdon, Executive Assistant
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
DISASTER RECOVERY PLAN For UNIVERSITY COMPUTING. Fayetteville State University
DISASTER RECOVERY PLAN For UNIVERSITY COMPUTING Fayetteville State University PREFACE This document titled Disaster recovery plan is simply a plan that addresses immediate and temporary restoration of
Business Continuity Planning ebook
Business Continuity Planning ebook Table of Contents Increase Profits With Disaster Recovery...3 Global Overview of Disaster Recovery...5 Business Demand for Stringent Security...7 Selecting Individual
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Backup Strategies for Small Business
Backup Strategies for Small Business StarTech Group, Inc. Jim Scalise 11.15.2014 1 StarTech Group, Inc. 2771-29 Monument Rd. PMB 232 Jacksonville, FL 32225 CONTENTS BACKUP STRATEGIES.. 1 CLOUD BACKUP 2
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Disaster Recovery Planning
NASA IV & V ANNUAL WORKSHOP 202 The 4th International Workshop on Independent Verification & Validation of Software Disaster Recovery Planning Divya Krishnamoorthy Mailam Engineering College, Mailam. (Affiliated
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
TalentLink Disaster Recovery & Service Continuity
Technical Services Briefing Document TalentLink Disaster Recovery & Service Continuity Version 1.2 (January 2012) Contents Overview Planning for Service Continuity Disaster Recovery Process Business Continuity
BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Clinic Business Continuity Plan Guidelines
Clinic Business Continuity Plan Guidelines Published: January 2015 Table of Contents Emergency Notification Contacts Primary... 2 Emergency Notification Contacts Backups (in case primary is unavailable)...
RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan. January 23, 2012
RPI Employee s Federal Credit Union Business Continuity/Disaster Recovery Plan January 23, 2012 Purpose and Objectives 2 Disaster Recovery Organizational Structure 3 Appendices: Disaster Recovery Emergency
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
Amherst County Public Schools Technology Support Group Disaster Recovery Plan
Amherst County Public Schools Technology Support Group Disaster Recovery Plan Introduction This document is the disaster recovery plan for Amherst County Public Schools, Technology Support Group. The information
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
5-04-25 Adding Communications Network Support to Existing Disaster Recovery Plans Leo A. Wrobel
5-04-25 Adding Communications Network Support to Existing Disaster Recovery Plans Leo A. Wrobel Payoff This article reviews the processes that must be documented in a recovery plan for a company's mission-critical
HIPAA: Bigger and More Annoying
HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) [email protected] www.laneykay.com OFFICIAL
POLICY NAME IT DISASTER RECOVERY POLICY AND PLAN POLICY NUMBER POLICY FILE REFERENCE 3/3/6 DATE OF ADOPTION REVIEW OR AMENDMENT DATES
POLICY NAME IT DISASTER RECOVERY POLICY AND PLAN POLICY NUMBER P6 POLICY FILE REFERENCE 3/3/6 DATE OF ADOPTION REVIEW OR AMENDMENT DATES C O N T E N T S INTRODUCTION SECTION 1 DISASTER PREVENTION AND RECOVERY
Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc
By: Katie Tucker, Sales Representative, Rolyn Companies, Inc Are you and your facility disaster ready? As reported by the Red Cross, as many as 40 percent of small businesses do not reopen after a major
CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE
1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million
Jacksonville University Information Technology Department Disaster Recovery Plan. (Rev: July 2013)
Jacksonville University Information Technology Department Disaster Recovery Plan (Rev: July 2013) Table of Contents Introduction 3 Objectives/Constraints 4 Assumptions 4 Critical Systems 5 Incidents Requiring
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud
Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Security, Access Management and Key Control Policy and Procedures
1 Policy Security, Access Management and Key Control Policy 1.1.1 The goal of the Vice President, Business Affairs and Facilities and Services is to provide a safe, comfortable, secure learning environment
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
Continuity Planning and Disaster Recovery
Responsible Officer: AVP - Information Technology Services & UC Chief Information Officer Responsible Office: IT - Information Technology Services Issuance Date: 7/27/2007 Effective Date: 7/27/2007 Scope:
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
Clinic Business Continuity Plan Guidelines
Clinic Business Continuity Plan Guidelines Emergency notification contacts: Primary Role Name Address Home phone Mobile/Cell phone Business Continuity Plan Coordinator QSP Business Continuity Plan Coordinator
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
California State University, Chico. Information Security Incident Management Plan
Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...
CONTINUITY AND RECOVERY PLANNING GUIDE
CONTINUITY AND RECOVERY PLANNING GUIDE The Continuity Planning process is designed to assist an organization in determining action plans for disaster recovery or incident response. The process also aids
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Toronto Public Library Disaster Recovery recommended safeguards and controls
BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston
Disaster Recovery Plan for Center Moriches School District Information Technology Operations
1900 Disaster Recovery Plan for Center Moriches School District Information Technology Operations I. Plan Overview II. Plan Approval III. Disaster Declaration IV. Plan Activation V. Plan Overview, Objectives
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
CRISIS MANAGEMENT PLAN FOR THE DSK
CRISIS MANAGEMENT PLAN FOR THE DSK March, 2009 By Christa Dietterle Index: 1. Executive Summary page 2 2. Introduction page 3 3. Prevention and Mitigation page 6 4. Preparedness page 7 5. Response page
State of Oklahoma <Insert Agency Name Here> Disaster Recovery Plan Template
State of Oklahoma Disaster Recovery Plan Template Version 1.0 Page 2 of 72 TABLE OF CONTENTS DISASTER RECOVERY PLAN DOCUMENT CHANGE CONTROL... 6 EXECUTIVE SUMMARY... 7
Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP)
Preface Computer systems are the core tool of today s business and are vital to every business from the smallest to giant organizations. Money transactions, customer service are just simple examples. Despite
BUSINESS CONTINUITY ASSESSMENT CHECKLIST
BUSINESS CONTINUITY ASSESSMENT CHECKLIST This assessment checklist will help you put your business continuity plan together. The assessment has been split into sections for ease of reference. Document
Emergency/Disaster Response Plan
This EXAMPLE is for a small water system and represents the minimum information required. The information required for your plan will be based on the complexity of your water system. Emergency/Disaster
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
