BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT



Similar documents
NETWORK AND INTERNET SECURITY POLICY STATEMENT

Education and Workforce Development Cabinet POLICY/PROCEDURE. Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012

StorageCraft Technology Corporation Leading the Way to Safer Computing 2009 StorageCraft Technology Corporation. All Rights Reserved.

ScoMIS Encryption Service

Tk20 Backup Procedure

TECHNICAL SECURITY AND DATA BACKUP POLICY

Understanding Backup and Recovery Methods

Online Backup Plus Frequently Asked Questions

Computer Backup Strategies

Planning a Backup Strategy

Backup Policy (ITP004) Information Technology Services Department

Data Security Policy

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Version: Page 1 of 5

About Backing Up a Cisco Unity System

Read this guide and you ll discover:

MFR IT Technical Guides

WDL RemoteBunker Online Backup For Client Name

Disaster Recovery for Small Businesses

ADMINISTRATION COMPUTER NETWORK

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE

Frequently Asked Questions About WebDrv Online (Remote) Backup

Modification after decommission of AX100 SAN (RVN00-FILEDR) /3/2009 Deputy IT Operations Manager

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

Backup & Disaster Recovery Options

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

BACKUP SOLUTIONS FOR SCHOOLS. Advice and Guidance. ICT Services 42 New Union Street Coventry CV1 2HN

HOW SAFE IS YOUR DATA??

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

MAXIMUM PROTECTION, MINIMUM DOWNTIME

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

Managing and Maintaining a Windows Server 2003 Network Environment

One Solution for Real-Time Data protection, Disaster Recovery & Migration

Creating a Complete Backup of Shelby v5 Data

16 Common Backup Problems & Mistakes

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Birkenhead Sixth Form College IT Disaster Recovery Plan

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

Welcome to My E-Book

M4 Systems. M4 Online Backup. M4 Systems Ltd Tel: International: +44 (0)

Managing and Maintaining a Microsoft Windows Server 2003 Environment

ICT Disaster Recovery Plan

Chapter 8: Security Measures Test your knowledge

Creating a Domain Tree

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

BACKUP SECURITY GUIDELINE

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0

BounceBack Server Solution Reference Guide

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

Page 1 of 5

CHAPTER 9 System Backup and Restoration, Disk Cloning

Countering and reducing ICT security risks 1. Physical and environmental risks

Disaster Recovery Planning Save Your Business

Windows 7 Hard Disk Recovery

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

Which Backup Option is Best?

This policy is not designed to use systems backup for the following purposes:

NCTE Advice Sheet Storage and Backup Advice Sheet 7

Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network

SOLUTION GUIDE AND BEST PRACTICES

Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see

Backup and Recovery in Laserfiche 8. White Paper

Data Protection Simple. Compliant. Secure. CONTACT US Call: Visit:

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

Disaster Prevention and Recovery Plan

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Suite. How to Use GrandMaster Suite. Backup and Restore

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

Our Cloud Offers You a Brighter Future

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Backup Strategies for Small Business

How to Plan for Disaster Recovery

Availability and Disaster Recovery: Basic Principles

The Microsoft Large Mailbox Vision

Westek Technology Snapshot and HA iscsi Replication Suite

StorageCraft Technology Corporation Leading the Way to Safer Computing StorageCraft Technology Corporation. All Rights Reserved.

Transcription:

TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004 Discussed with Leadership Group February 2004 Revised by ICT Strategy Group February 2004 Confirmed by Leadership Group April 2004 Confirmed by Governors June 2004 Reviewed November 2013 Next Review As Required

Backup Strategy and Disaster Recovery Policy Policy Statement The purpose of this policy is to set in place strategies to ensure the secure backup and recovery of important data that is stored on the school administration and curriculum networks. The data to backup includes school management data files, administration network user documents, teaching staff documents and student documents. The strategies in place will be robust enough to ensure the recovery of data in any circumstance, including fire, catastrophic hardware or software failure, file deletion or virus or hacker attack. Data can be destroyed by system malfunction or accidental or intentional means. Adequate backups will allow data to be readily recovered as necessary. The ongoing availability of important data is critical to the operation of the school. In order to minimise any potential loss or corruption of this data, people responsible for providing and operating administrative applications need to ensure that data is adequately backed up by establishing and following an appropriate system backup procedure. Statement of Authority and Scope This policy is intended to detail the accepted good practice policies in the backing up and restoring of data on networked computer systems. The Network Manager provides the framework, design and implementation of backup strategies employed at Tadcaster Grammar School. The Network Manager and authorised persons within the ICT \ Network Department are then responsible for the operation of these strategies. The Network Manager administers this policy with the full support of the Leadership Group and the Governing body. Disk Based Backups The following data will be backed up every weeknight onto the School s Backup SAN (Storage Area Network) MIS data files Finance data files Administration network user documents Curriculum network user documents Student documents School reports Shared documents on both the administration and curriculum networks 1

Snapshot Backups Snapshot backups (A full copy of the data at a particular point in time) are to be kept for a period of six months and stored on an external RAID device and external USB Device. This is to provide a means of restoring data from a backup at any time period, up to a maximum of six months previously. Due to the amount of data to be backed up and the storage space required to provide backups, only selective critical data will be stored in this way. This will include MIS data files Finance data files Shadow Copy Backups This is a means of restoring previous versions of documents that have inadvertently become corrupted over time, where the normal backup process is insufficient as it would be the corrupted file that is backed up. This is particularly prevalent with Microsoft Office and Corel documents where the end user doesn t close the document correctly or inserts objects (video, audio or graphic files that corrupt the document). Shadow Copy Backups allow any of the last fourteen saved instances of a document to be restored. Shadow Copy runs twice a day across the servers holding staff and student documents. Backup Hardware It is the responsibility of the Network Manager to determine the appropriate hardware necessary to provide reliable backup and archiving of data. As the amount of data to backup increases over time so the hardware requirements will need to be reviewed annually. This review will be submitted to the Leadership Group. Backup Software It is the responsibility of the Network Manager to determine the appropriate software necessary to provide reliable backup and archiving of data. As the amount of data to backup increases over time so the software requirements will need to be reviewed annually. This review will be submitted to the Leadership Group. 2

Frequency of Backups Disk backups are performed every weeknight on the backup server. Each backup, which is unattended runs through the night Snapshot backups are performed manually, once a week at the end of the day. Shadow copy backups are performed automatically twice a day. Off Site Storage It is established good practice to keep a copy of all important data stored offsite. In the event of normal backup and restore devices being unavailable due to fire for example, it is imperative that alternative backups are available in a separate location. Any sensitive data stored off-site is first encrypted. Backup Logs The Network Manager will monitor backup logs to ensure that network data has been fully backed up. Backup of data stored on Laptops \ Departmental computers All data should be stored centrally on the network servers, personal data should be stored in a user's home directory. There are instances though where users may want to store their data locally on the computers and \ or laptops hard drive. In this instance it is the responsibility of the user to ensure that their data is backed up. The means of doing this will be dependent on the capabilities of their machine, but could include floppy disk, USB data storage or CD-R. In the event of a user losing work that is stored locally on a Laptop or Desktop PC, the Network department using various undelete and disaster recovery software shall attempt recovery of these lost files. The success of this will be very dependent on a mixture of circumstances beyond the control of the Network Department. Disaster Recovery In the event of a complete network failure, power cut, server breakdown, fire or any other eventuality where the network is unavailable a disaster plan needs to be in place to ensure the continued smooth running of the school. This would include periods when the time taken to restore the network would take more than a day. The following emergency procedures would need to be in place To ensure that school timetabling, staff cover, financial transactions and any other critical school management systems can still run the member of 3

staff responsible for these areas should ensure that they have their own disaster recovery plan. This will then enable them to at least continue working in these areas. The person responsible for their particular area should follow the following guidelines in formulating their own disaster recovery plan Identify essential school management functions. Essential school functions are those functions that must take place in order to support an acceptable level of continuity for the school. Document procedures to implement this disaster recovery plan. Make sure the plan can work effectively in the event of a disaster. Make sure staff who work within these critical school management areas are aware of the plan and are able to carry it out effectively. Plan for the alternate processing of data to use during a disaster. This would include keeping hard copies of certain data and documents and documentation of any disaster plan. Make the Leadership Group aware of what strategies would be employed in the event of a disaster. When the server and network have been restored any new information can then be transferred or entered back into the network system. If a user on the administration network needs to load up an important document this should be possible due to the fact that extra backups are made independent of the network servers. A user could then work locally (not attached to the network) on their desktop PC or laptop with that document. When the server and network have been restored any new information can then be transferred or re-entered into the network system. On the curriculum network, as the amount of data files and documents is so much greater it may not always be possible to have an up to date backup stored on media separate from the network server backups. To provide the maximum protection against the possibility of server failure it is the schools policy that all network servers that are purchased have built in fault tolerance and redundancy. Server Backup and Restore Each Virtualised Server is backed up every weeknight, this backup includes the server operating system, configuration files and in the case of the Primary Domain Controller this would include network data such as usernames, policy and profile data and security information. In the event of complete server operating system failure the server operating system would initially need to be re-installed then the server backup restored. In the event of server hardware failure, the server would first need to be repaired, then the server backup restored. 4

Data Restoration Only the Network Manager and ICT Technicians will have access to the means to restore network data. The Network Manager will determine if a successful restoration is possible. Any requests for restoration of user data will be made to the Network Manager. In the event of complete server failure where a full restoration of school management software and data files is necessary, a member of the Leadership Group after discussion with the Network Manager will need to give approval. 5