DISASTER RECOVERY PROCEDURES
|
|
|
- Lucas Riley
- 10 years ago
- Views:
Transcription
1 DISASTER RECOVERY PROCEDURES THE RESOURCE CENTERS 4360 Northlake Blvd Ste 206 Palm Beach Gardens, FL Ph: (800) Fax: (561)
2 Should circumstances demand activation of a business recovery plan to insure continuation of all essential operations, the Resource Centers will implement and follow the procedures contained herein. The Disaster Recovery Procedure, last updated August, 2005, is incorporated in its entirety into the polices and operating procedures for the Resource Centers LLC and affiliated companies. Primary Notification Upon activation of the Disaster Recovery Plan, the following information will be immediately provided to the team leader(s): 1. Nature and location of disaster: 2. Name of Emergency Management Team Coordinator: Location: Phone number, fax number, and contact for Command Center: 3. Backup location: 4. Telephone number for staff to call for status updates: 5. Special instructions or considerations:
3 Procedures Notify Team Members & Determine Status of All Affected Personnel This manual includes lists to contact every employee of the company. Appendix A contains the Call List/ Team List, which shows the entire organization in a call tree. The call tree identifies the person responsible for calling other team members. The calling sequence can be implemented at any point along the tree, in the event that a person is not available. Appendix B contains the core recovery team list. The designated Emergency Management Team Coordinator will contact this team to implement the business recovery plan. The following items will be addressed: 1. Review the situation. 2. Determine if and where key personnel can meet to review plans in detail. 3. Using the team list, identify the additional members of the organization who will be called in to implement the business recover plan. 4. Using the team list, identify the personnel who will maintain essential operations and perform time critical tasks. 5. Using the team list, update the remaining staff regarding the situation. Staff will be notified of any temporary location for operations and any new contact information. The Emergency Management Team Coordinator will notify staff when they might be called to report to work. Initiate Recovery Progress Logs Appendix C contains a template for the Recovery Progress Log; however, any note pad will do. The daily log will include the following information: 1. Date. 2. Time. 3. Description of all tasks and processes implemented, with relevant comments. 4. Names and contact information for emergency managers, clients, or other persons assisting with recovery efforts. 5. Initials of the person making the entry (if multiple people use the same log). The log must document all major activities that occur. This information may be essential to continued recovery efforts, in addition to post recovery evaluation of the business recovery plan. Furthermore, the information will also be required for insurance and legal purposes. The Emergency Management Team Coordinator or designee shall take responsibility to enter information in a formal recovery actions log and transfer informal notes compiled by team members. The Coordinator will continue to update and maintain the log throughout the recovery process and during the return to a primary facility or base of ongoing operations.
4 Review Recovery Priorities Each business function has been assigned a priority level (high, medium, low) and a recovery sequence: Function Priority Recovery Required Equipment Level Sequence Recordkeeping Services High 1 Server Member Distributions High 2 Server, 4050 Printer, Mikr Toner, Check Stock Cash Movement High 3 Workstation/ Internet Access and/ or Fax Communication with Clients High 4 Workstation/ Internet/ Phone/ Fax Preparation for Meetings Medium 5 Server Compliance, Research Inquiries Medium 6 Server Client Service Calls Low 7 Server Presentation Preparation Low 8 Workstation Response to RFPs Low 9 Workstation
5 Systems Overview Network Overview The Resource Centers are essentially a technology driven organization. Therefore, operations necessarily depend on the maintenance and restoration of primary and secondary systems. Server Domain Controller 2kmain Server Sungard Server Sungard OmniPlus Server Sungard Server Backup Voice Server VoiceServ VoiceServ Backup Data Backup Server Tera Station 1 Tera Station 2 Primary Network Server Cluster Description Network Domain Controller, Data Server, Exchange Server Sungard Server and Data (Sungard OmniPlus Recordkeeping System) Fully Functional Backup Sungard Server & Backup Domain Controller Voice Recognition Server and Systems Fully Functional Backup Voice Server 1 TB Automated Daily On-Site Systems & Data Backup 1 TB Automated Daily Off-Site Systems & Data Backup
6 Server Web Controller 2kweb Orgweb ISA Server ISA Server ISA/ Web Server Backup Perimeter Network Server Cluster Description Resource Centers SSL Web Server Omega SLL Web Server & FTP Site ISA Firewall (Security Network Server) Fully Functional Backup ISA and Web Server Network Description The Primary Network Server Cluster supports the following core functions: the Network Domain Controller; Data Servers; Exchange Server for local and global functions; Sungard OmniPlus Recordkeeping System supporting the defined contribution recordkeeping applications; Pyramid Voice Recognition System for voice defined contribution voice applications; primary Cash Management and defined benefit pension recordkeeping systems; software applications and data files; and the on-site and off-site daily systems and data backups. Each server that supports mission critical functions includes a fully operational mirror server in case of the failure of any single component. The Perimeter Network Server Cluster supports the Internet and web applications, FTP site for external transfer of data, and the ISA high security Firewall Server. These servers also include a fully operational backup server in case of the failure of any single component. The ISA Server provides an external security layer and an internal security layer to separate applications that allow external access of systems by Internet clients from the Primary Network Server Cluster. This security layer that separates the Perimeter Network Server Cluster from the Primary Network Server Cluster safeguards sensitive systems and data from external intrusion. External access is controlled through redundant high-speed Internet connections to insure continuous access in the event of a service failure by an external service provider. External Clients access the Perimeter Network Server Cluster through an encrypted Secure Socket Layer (SSL) connection. Both Adelphia (Comcast) and BellSouth provide high-speed Internet connections to the Perimeter Network Server Cluster. Each company provides Internet access to a static IP address. In the event of a service failure by either company, Internet access must be redirected to the backup IP address through the Network Solutions control panel. At a minimum, a single server and either Tera Station can support all operations from an alternate location with high-speed Internet access in a catastrophe.
7 Implementation Plan Call Personnel for High Impact (Essential) Operations Using the call list, the Coordinator will notify the individuals required to perform essential functions. These individuals should be advised where to report, along with any additional information that they will need to begin work. The Coordinator should also communicate such information as the hours the person will be expected to work, living arrangements if the person will be required to relocate, and the availability of amenities (items like restaurants, break rooms, restrooms, etc.) Depending on the circumstances, team members may need to travel to another location requiring overnight or extended stays. Notify Entire Staff Not all staff members may be required to implement the business recovery plan or provide immediate services, but these staff may be considered alternate or relief personnel. In some cases, the situation may already involve the entire staff. Anyone not required to immediately report should at least be called and updated on the situation, with an expected time frame to either report or resume normal operations. Refer Media Contacts to Management Ensure that personnel refer all media contacts to the Emergency Management Team Coordinator or other management designee. Verify Availability of Resources If the situation does not require operations to move to another facility/ location, then each affected area of operations must be assessed to determine the resources available on site, determine which resources are not available, and identify any unexpected needs. The team members should review the following categories of resources in order to compile a detailed inventory of assets, as well as equipment requiring repair or replacement: Availability of Power Hardware/ Software o Servers o Network Switch & Router o Network Cables/ Communication o Workstations o Printers Telecommunications o Phone o Fax o Internet Office Space
8 Condition/ Availability of Furniture Critical Records Forms & Supplies Items requiring repair or replacement should then be ranked according to the most important business functions identified in the recovery sequence. Relocate Essential Documents to Alternate Facility If operations must be provided from an alternate location, the following documentation should be available at that location: 1. Plan Documents/ Current Information 2. Client Contact Information 3. Legal Files and Contracts 4. Forms and Supplies Notify Support Services The following support services must be notified of changes: 1. Mail should be temporarily held or routed to the new location. 2. Incoming phone numbers should be reactivated/ switched to the new location. 3. Temporary and permanent connections for Internet and service should be established. 4. Courier services, if needed, should be arranged. Initiate Recovery of Servers The server incorporates the following safeguards: 1. The data servers write all data files simultaneously to a hard drive array. 2. Each server runs on a battery backup with redundant power supplies. Each mission critical server has a secondary backup server that mirrors the primary server. 3. All programs and data backup daily to two separate backup units, one on-site and one off-site. Each Tera Station data backup contains the files and data to run all critical functions when connected to a server. 4. At least one workstation contains current duplicates of all server functions and data. This laptop can function as a surrogate server at any location, or the laptop can run all essential functions as a standalone computer.
9 The following applications and data locations should be verified following reactivation of the server: 1. Defined Pension Benefit Systems on shared data Drive F. These directories must all reside on the same network drive: Benrec Pension Payment and Cash Management Systems Penben Defined Benefit Recordkeeping Systems Letter Benefit Letter Extracts Upload ACH Files & Check Recon Files Spool Spooled Reports Check factory can reside on any network drive: Cfactory Check factory LFEWIN2.EXE The following environment variables must be set on each workstation: SET COBSW = +C +C4 aslmfnet = f:\mfaslmf 2. Macola (Accounting System) on shared data Drive M. 3. Common data files on shared data Drive S. 4. Microsoft Outlook for access. 5. Microsoft Exchange Server for office communications. 6. Internet access or connection. Coordinate Vendor and Service Support Coordination with vendors will be necessary to acquire resources or services not provided through the Resource Centers. Appendix D lists facility management contacts and phone numbers, phone numbers for telecommunication and Internet service providers, banking information, and contact/ phone numbers for additional computer systems support. Notify Key Client Contacts Appendix E contains contact sheets, with additional contact information for third party service providers, for all client groups. These individuals should be notified as soon as possible regarding the details for continuing account service during the disaster recovery period, including new office contact information, address if necessary, and anticipated time frame until full restoration of normal operations. The Resource Centers will update key contacts on recovery progress until normal operations are resumed.
10 Appendix A: Call List (Note: This page contains personal data and contact information for employees. Personal information was intentionally omitted.) Organizational Chart J. Scott Baur, CEO Plan Administration Denise McNeill, Operations The Resource Centers LLC Plan Administration Group Technology Group DC Recordkeeping Group Office Administration Payment Processing Accounting Group Margaret Adcock, Plan Administration Pension Resource Center LLC Sergio Giron Network Administrator James Jameson, Managing Partner Omega Recordkeeping Group Jackie Taylor (FRC) Office Manager Rachel Valdez Payment Manager Ed Scott Chief Accountant Nick Schiess (PRC) Plan Administrator Jennifer Vaughn Administrator Ellen Schaeffer Programmer Brian Girwood Operations Manager Elaine Bagdan Receptionist Dixie Martinez Payment Assistant Brian Smith Accountant Joe Dykers Cape Coral Assistant David Jakubiak Government Services Jennifer Daves Client Relatoinship Manager Brian Smith Recordkeeping Assistant
11 Appendix B: Core Recovery Team Team members may change depending on the location or nature of the disaster. The following chart details the composition for the standard recovery team: J. Scott Baur, CEO The Resource Centers LLC Sergio Giron Network Administrator Ellen Schaffer Programmer Denise McNeill, Operations The Resource Centers LLC Margaret Adcock, Plan Administration Pension Resource Center LLC James Jameson, Managing Partner Omega Recordkeeping Group LLC
12 Appendix C: Recovery Progress Log Log Entry Entry By: Date: Time: Contact Information Name: Phone: Reason/ Details for Contact: Procedures Implemented
13 Appendix D: Vendor & Service Support Contact List Description Service/ Contact Person ACP (Property Owner/ Manager) BellSouth (Phone and Internet Service) Contact Information Norma Protting, Property Manager 4360 Northlake Boulevard Palm Beach Gardens, FL (561) Adelphia (Internet Service) Florida Digital (Phone Service) Fidelity Banking Contacts Melissa J. Tyner, Vice President Business Development Phone: Fax: Mark Nuzolo, Vice President Cash Management Dept 205 Datura Street 3rd Fl West Palm Beach, Fl Phone: (561) Fax: (561) Patrick Tylander, Asst Vice President Business Development Officer Phone: (561) Fax: (561) Bank of America Contacts Mindy Nichols Bank of America 625 N. Flagler Drive West Palm Beach, FL Ph: x3503 Fax: Wachovia Contacts
14 Contact List Description Service/ Contact Person Northern Trust (Banking) Contact Information Stacey Halberg, Vice President Chris Storkerson, Vice President Northern Trust Bank 770 East Atlantic Avenue Delray Beach, FL Ph: (561) x204 Ph: (800) Fax: (561)
15 Appendix E: Group Client Contact List (Note: Contact lists for clients contain personal information; therefore, all client contact lists were intentionally omitted from the public distribution of the Disaster Recovery Procedures. The Resource Centers will only provide specific contact information to each respective client on request.)
Disaster Recovery Plan Documentation for Agencies Instructions
California Office of Information Security Disaster Recovery Plan Documentation for Agencies Instructions () November 2009 SCOPE AND PURPOSE The requirements included in this document are applicable to
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: [email protected]
Technology Recovery Plan Instructions
State of California California Information Security Office Technology Recovery Plan Instructions SIMM 5325-A (Formerly SIMM 65A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
CONTINUITY AND RECOVERY PLANNING GUIDE
CONTINUITY AND RECOVERY PLANNING GUIDE The Continuity Planning process is designed to assist an organization in determining action plans for disaster recovery or incident response. The process also aids
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009
Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...
Disaster Recovery Plan
Disaster Recovery Plan This guide sets forth items to consider in the review of the firm s disaster recovery plan. You should form a committee to assess the plan and should assign activities under the
Business Continuity Plan (BCP)
1. Emergency Contact Persons CSCM s primary emergency contact persons are: John Stepp, Managing Director and CEO Phone #: 913 485 8809 Michael Horton, Branch Manager Phone #: 316 259 4449 These names will
MCAPS 3000 DISASTER RECOVERY GUIDE
MCAPS 3000 DISASTER RECOVERY GUIDE Manual Part Number 99875294-1 FEBRUARY 2004 REGISTERED TO ISO 9001:2000 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical Support:
OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN
BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,
Overview of how to test a. Business Continuity Plan
Overview of how to test a Business Continuity Plan Prepared by: Thomas Bronack Phone: (718) 591-5553 Email: [email protected] BRP/DRP Test Plan Creation and Exercise Page: 1 Table of Contents BCP/DRP Test
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Antelope Enterprise. Electronic Documents Management System and Workflow Engine
Antelope Enterprise Electronic Documents Management System and Workflow Engine Antelope Enterprise v4 High Availability Edition Information in this document applies to the Antelope Enterprise v4 High Availability.
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Creating a Business Continuity Plan. What We ll Cover... What is a BCP? Micky Hogue, CRM
Creating a Business Continuity Plan Micky Hogue, CRM Sandia National Laboratories Albuquerque, NM 505-844-6640 [email protected] What We ll Cover... What is a Business Continuity Plan Why create a BCP?
Cloud Services for Backup Exec. Planning and Deployment Guide
Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information
Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com
Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com 1 1.1 Introduction 1.2 Purpose 1.3 Priorities 2.1 About your business 2.1.1 Business
White Paper AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS. Executive Summary
AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS Executive Summary Today s businesses rely heavily on voice communication systems and data networks to such
WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery
WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed
MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION
MANAGEMENT AUDIT REPORT OF DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION REPORT NO. 13-101 City of Albuquerque Office of Internal Audit
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
Customized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
Tailored Technologies LLC
685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations
85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff
85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff Because a business continuity plan affects all functional units within the organization, each functional unit must participate
Tk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
Backup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
BME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
When Your Networkʼs Down, Call Crown
When Your Networkʼs Down, Call Crown 521 W. Broad Avenue Albany, GA 31701 Phone: 229.317.7940 Fax: 229.317.7941 [email protected] MANAGED SERVICES & FLAT RATE I.T. SUPPORT Our Managed Services,
JANSSEN PARTNERS, INC. Business Continuity Plan (BCP)
JANSSEN PARTNERS, INC. Business Continuity Plan (BCP) Emergency Contact Persons Our firm s two emergency contact persons are: Peter Janssen, President, Tel. 641-209-5940, Cell 516-456-7059, Fax 641-843-7036,
North Street Global, LLC. Business Continuity Plan
Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
Disaster Recovery Planning Procedures and Guidelines
Disaster Recovery Planning Procedures and Guidelines A Mandatory Reference for ADS Chapter 545 New Reference: 06/01/2006 Responsible Office: M/DCIO File Name: 545mal_060106_cd44 Information System Security
15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
How to Plan for Disaster Recovery
ImproMed LLC How to Plan for Disaster Recovery Revised January 27, 2015 2015 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Riverhead Central School District
Riverhead Central School District Data Disaster Recovery Plan The following pages outline the data recovery process for the Riverhead Central School District **This document should be kept in paper form**
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
UNIVERSITY INFORMATION TECHNOLOGY SERVICES (UITS) & INFORMATION WAREHOUSE FUNCTIONAL ANNEX 13
UNIVERSITY INFORMATION TECHNOLOGY SERVICES (UITS) & INFORMATION WAREHOUSE FUNCTIONAL ANNEX 13 Revision: December 19, 2012 Supersedes: June 9, 2009 Effective Date: January 30, 2012 OBJECTIVES The primary
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
Perforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
Computer and Telecommunication Services Energy Management Plan. Introduction. Level Zero Standard Operating Procedures
Computer and Telecommunication s Energy Management Plan Standard Operating Procedures Consolidation Reduction Cessation Introduction Technology is an integral component of university operations. Technology
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage NAS User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
UMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY DISASTER RECOVERY PLAN TEMPLATE DRAFT TO BE COMPLETED BY THE MUNICIPALITY TABLE OF CONTENTS 1. INTRODUCTION... 4 2. SCOPE OF THIS PLAN... 4 3. DISASTER SCENARIOS... 4 4. CURRENT
[Insert Company Logo]
[Insert Company Logo] Business Continuity and Disaster Recovery Planning (BCDRP) Manual 1 Table of Contents Critical Business Information 4 Business Continuity and Disaster Recover Planning (BCDRP) Personnel
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
security in the cloud White Paper Series
security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),
Emergency Contact Person - Firm Policy And Operation
Business Continuity Plan I. Emergency Contact Persons The Firm s emergency contact persons ( Executive Representatives ) are: Dean Cash Chairman and CEO () Pari Choksi Executive Vice President, CFO and
Managed Information Technology Services For the Town of Moraga
Request for Qualifications Managed Information Technology Services For the Town of Moraga Deadline for Submittal: Wednesday, December 5, 2012 No later than 2:00 p.m. Prepared by: Stephanie Hom Administrative
Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
THORNBURG INVESTMENT MANAGEMENT THORNBURG INVESTMENT TRUST. Business Continuity Plan
THORNBURG INVESTMENT MANAGEMENT THORNBURG INVESTMENT TRUST Business Continuity Plan June 2012 Purpose The purpose of this Business Continuity Plan ( BCP ) is to define the strategies and the plans which
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
VIRGINIA ASSOCIATION OF COMMUNITY SERVICES BOARDS HIPAA READINESS STEERING COMMITTEE
VIRGINIA ASSOCIATION OF COMMUNITY SERVICES BOARDS HIPAA READINESS STEERING COMMITTEE HIPAA CHECKLIST FOR INFORMATION TECHNOLOGY AND COMPUTER SYSTEMS SECURITY AREA OF CONCERN QUESTIONS Workstations Software/Hardware
How To Use Quantum Rbs Inc. Small Business Backup
Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files
Business Unit CONTINGENCY PLAN
Contingency Plan Template Business Unit CONTINGENCY PLAN Version 1.0 (Date submitted) Submitted By: Business Unit Date Version 1.0 Page 1 1 Plan Review and Updates... 3 2 Introduction... 3 2.1 Purpose...
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
General Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
Remote Backup Solution: Frequently Asked Questions
Remote Backup Solution: Frequently Updated December 2014 Contents What is ECi Remote Backup?...3 What Levels of Protection are Available?...3 Why is ECi Remote Backup Important for Disaster Recovery?...3
Disaster Recovery Plan
Disaster Recovery Plan Date: February 2, 2009 Revision: 9.0 EXTERNAL BUSINESS CONTINUITY PLAN PAGE 1 of 13 Federal regulation states, and internal corporate policies require, that Penson Financial Services,
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
Business Continuity Management
Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore
Disaster Recovery Plan
Disaster Recovery Plan Date: Revision: 8.0 EXTERNAL BCP PLAN PAGE 1 OF 12 Federal regulation states, and internal corporate policies require, that Penson Financial Services, Inc. (Penson) develop Business
RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 (3938. 3938/5049/5050) Course KC3065 5 Days OVERVIEW COURSE OBJECTIVES AUDIENCE
Microsoft Exchange, Upgrade from Exchange 2000/2003 COURSE OVERVIEW This instructor-led course offers Microsoft Exchange Server administrators with the skills they need to manage a Microsoft Exchange infrastructure.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?
QUESTION 1 Your network contains the following: 20 Hyper-V hosts 100 virtual machines 2,000 client computers You need to recommend an update infrastructure design to meet the following requirements: Deploy
Cloud Hosting Option For New OnSite Customers
Cloud Hosting Option For New OnSite Customers 1655 Palm Beach Lakes Blvd. Ste 708 West Palm Beach, FL 33401 Ph: 561-491-6000 Fx: 877-491-5860 Published: 10/29/14 Introduction To Cloud Hosting? In the past
Boston Financial Data Services Business Continuity Executive Summary. November 2009
Boston Financial Data Services Business Continuity Executive Summary Boston Financial continues to maintain an active business continuity program that effectively supports the ability to survive a disruption
