University Information Systems. Administrative Computing Services. Contingency Plan. Overview

Size: px
Start display at page:

Download "University Information Systems. Administrative Computing Services. Contingency Plan. Overview"

Transcription

1 University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005

2 University Information Systems Administrative Computing Services Contingency Plan Overview Table of Contents i. Introduction...1 ii. iii. UIS Recovery Strategy...2 UIS Backup Strategy...3 iv. UIS Recovery Scope...5 v. UIS Contingency Planning Manual...6 vi. vii. UIS Recovery Organization...8 User Responsibilities...10 viii. Disaster at the User s Facilities...11 ix. Hypothetical Disaster Recovery Examples a. Initial Impact Assessment and Response...12 b. Hot Site Recovery Example...13 ii

3 i. Introduction The purpose of this document is to provide departments with important information regarding the University Information Systems (UIS) Contingency Plan. The overview is geared toward providing University departments an understanding of what happens if the UIS Computer Center was severely disabled. Computer users of the computer center should become familiar with this document. Users will find that the overview can be of value helping to define their own contingency planning procedures. This overview should provide sufficient information to enable departments to answer the following key questions: In the event of a recovery at the SunGard Hot site, what services and business applications will be recovered? When will these applications be recovered and what do computer users need to do? For recovery purposes only, how long should a department retain source documents used as mainframe input? Who is responsible for the recovery of departmental systems that have been severely disabled or destroyed? Departments that have any questions regarding the UIS Contingency Plan may contact the Director of Administrative Computing Services or the Assistant Director of Computer Services. 1

4 ii. UIS Recovery Strategy The current UIS Contingency Plan is based on the activation of a 'hot site' which will allow the University to re establish its administrative data processing environment in the event of an extended loss of services due to major damage at the UIS Computer Center. The University currently contracts with SunGard Availability Services for hot site recovery. The University's current recovery objective is to have a fully functional mainframe supporting production batch, on line, and WEB services (as outlined in the UIS Recovery Scope section) at the recovery center within forty eight (48) hours from the point in time when the disaster declaration is made by the University. A hot site is a functioning computer room which has been prepared with all necessary hardware including an operating mainframe, disk and tape storage equipment, communications equipment and printers. The only major component missing at the hot site is the University s data. The UIS Contingency Plan is tested twice a year by performing a full recovery of all production online and batch services (as noted in the UIS Recovery Scope section). By contract, the University can operate out of the hot site for up to a six week period. If services back at the University cannot be restored within this time frame, UIS will need to move its hot site to a 'cold site'. A cold site is a computer ready physical room with all appropriate environmental resources such as electrical power and air conditioning. A cold site does not contain any computer equipment. The University would need to acquire and move a new mainframe and all peripheral equipment into this site prior to the expiration of the six week period at the hot site. Processing at the cold site is available up to a six month period. 2

5 iii. UIS Backup Strategy Currently, the Administrative Computer Center executes a series of data backups, both full and incremental, on a daily and weekly basis. A full back up represents a complete copy of all data stored on our disk storage equipment. On a daily basis, all data that has changed since its last back up is also backed up. This process is defined as incremental back ups. In addition, ADABAS, our database management system, generates data images of records before and after database updating. The actual creation of backup files for the ADABAS images, known as protection logs, is based on transaction volume and pre determined times. All backup files, including ADABAS protection logs, are written to two separate automated tape libraries. One tape copy is created and stored at the UIS Computer Center and a second copy is created and stored at our electronic vault which is located in a different building. Local and remote back up copies are created automatically and concurrently to ensure readability and to facilitate recovery. In the event of an activation of our SunGard hot site, the data from the electronic vault site would be physically shipped to SunGard and restored on the recovery mainframe platform. The transportation of the recovery data to SunGard, along with the data restoration and technical configuration process, is time consuming and is the basis of the estimated recovery schedule. In order to minimize the disruption a catastrophic incident can cause, UIS has installed an additional safeguard known as the checkpoint back up process. As stated above, the ADABAS protection logs are generated on the basis of transaction volume and pre determined times. Therefore, the creation of back up files from the ADABAS logs is not predictable. To increase the confidence that a severe failure at the computer center does not result in a major timeconsuming user recovery, the checkpoint back up process was developed and implemented. This process executes twice a day, seven days a week, at 8:00 AM and again at 4:30 PM. The checkpoint back up process forces the generation of the ADABAS protection log files to be backed up. The benefit of this additional protection minimizes user recovery. For example, if a catastrophic incident at the center occurs at 5:00 P.M. on Tuesday, the expected disruption would only be back to 4:30 PM. Users would be required to re enter all data from 4:30 PM to 5:00 PM. Without this change to the standard approach, user recovery would have required the re execution of all batch processing and re entry of all on line transactions from the last protection log back up or even as far back as the previous evening s incremental back ups. UIS mainframe users should base their internal recovery procedures on the two forced ADABAS protection logs which are backed up at 8:00 AM and 4:30 PM daily. To be on the safe side, it is recommended that source documents used as input for mainframe processing which do not have any other retention requirements other than for recovery, should be retained for twenty four (24) hours. As an important side issue, it is highly recommended that the source documents that are retained for recovery purposes are stored in a protective environment overnight. This is important to be able to recover the source documents in the event that a catastrophic event occurs that damages both the UIS Computer Center and the affected University department. 3

6 iii. UIS Backup Strategy (continued) In addition, the data stored on the two automated tape libraries is refreshed via a daily process that ensures the integrity of the physical tape and that the data written on any tape is readable. Since any physical data storage media (tapes, floppy disks, etc.) is vulnerable to defects, the refresh process constantly moves and writes data from one tape volume to another to ensure that any such defects are found in a timely manner. Keep in mind, if the tape media containing a back up file is detected as being damaged during a refresh process, the non damaged copy, either the remote or local tape media, is used as input to recreate the second copy. The refresh process is very important to ensure that in the event that no back up files survive a disaster at the UIS Computer Center, all back up files located at the vault are able to be read and are able to provide for a successful restoration of the University s data at the SunGard Recovery Center. 4

7 iv. UIS Recovery Scope The following represents the planned restoration schedule for services and applications in the event the UIS Computer Center is severely disabled. The recovery plan is based on technology available at the SunGard Recovery Center and availability of resources from external service providers. 1. Services to be recovered in the first 48 hours: All Production on line processes (except those noted in items 2 and 3 below) All Development on line processes All Production batch processes All LINK and WEB access applications Campus network connectivity to the University Information Systems mainframe at SunGard 2. Services to be recovered from 48 hours to six weeks: Dedicated links for business functions with Data Exchange Partners (Banks, Credit Card Clearinghouses) may be restored if dictated by the end user s contingency plans 3. Services to be recovered at the cold site: AF/Remote Automated Problem Notification System Recovery of distributed systems platforms Degree Audit, Universal ID Card, Online fax requests, SEVIS, Touchtone Telephone System, EOS Thin Client (2005), and Host On Demand (2005) 5

8 v. UIS Contingency Planning Manual University Information Systems has created a set of documents instruct personnel on actions during and after a disaster or emergency. The UIS Contingency Planning Manual is comprised of the following documents: BU Charles River Campus UIS Emergency Procedures UIS Disaster Response Plan Administrative Computing Services Recovery Procedures SunGard Recovery Procedures The objectives of these documents are as follows: Provide for orderly and timely recovery from an interruption of data processing services Reduce confusion during any chaotic period by having a clearly defined course of action Specify steps necessary to relocate the Computer Center to an alternate site Identify those systems which require priority scheduling Identify offsite locations where backup files, software, and documentation are stored Identify equipment configurations and procedures for repair or replacement during a disaster Establish the personnel responsible for Contingency Planning Identify all vendors and service providers for critical products and services Identify all software components and the supporting group, organization or company Identify all hardware components and the supporting group, organization, or company Plans to be used for the recovery of the UIS mainframe system and the establishment of communication methods at the SunGard hot site location 6

9 v. UIS Contingency Planning Manual (continued) The UIS Contingency Planning Coordinator is responsible for ensuring that the plan is maintained and is current. In order to accomplish this, the Coordinator must ensure that the procedures and requirements outlined in the Contingency Plan are adhered to in accordance with the instructions of the plan. Semi annually, the Contingency Planning Coordinator reviews the entire Contingency Plan suite of documents and solicits updates from the University Information Systems community. Significant updates warrant a meeting of all team leaders to review changes. Reviews and tests of certain segments of the plan will be conducted throughout the calendar year. The Recovery Coordinator distributes a hard copy of the suite of documents to all ACS personnel after each update The documents are available to UIS staff online and are located in the ACS section within the University s WEB page. The hard copy is needed as personal computers may not be available in a disaster situation. Future plans for distributing the suite of documents involve creating a CD for distribution to all ACS personnel in addition to the hard copy. 7

10 vi. UIS Recovery Organization The UIS Contingency Planning Recovery Organization is made up of a hierarchy of teams. The individual recovery teams and roles are as follows: Disaster Management Team / Administrative Services Team The Disaster Management Team provides the initial activation authorization for the hot site. The team manages the overall direction of the University Information Systems recovery operations and restoration or relocation of the computing facility. The team provides a central focal point for all communications between recovery teams, vendors, internal service organization such as Buildings & Grounds and Information Technology, user departments and senior University management. The Administrative Services Team will provide overall administrative coordination of the disaster recovery effort and will serve as expediters of the administrative functions. Impact Assessment Team The Impact Assessment Team performs the initial assessment of damages to the Computer Center and equipment. They will provide a recovery recommendation to the Disaster Management Team. Applications Support Team The Applications Support Team provides the required production support between the end users, the Disaster Management Team and the hot site facility. User departments will receive updates on the status of the recovery from this team. Hardware Support Team The Hardware Support Team coordinates the procurement of replacement or substitution hardware for the Computer Center and the rebuilding of the original site. This team coordinates with SunGard and the hot site Recovery Team both primary and backup communications restoration with particular attention to restoring communications as soon as possible for the critical applications. The team will also coordinate the recovery of the offsite storage materials needed for hot site recovery. To facilitate 3270 access from the campus to SunGard, the University has contracted with SunGard to provide 100 personal computers available on a Quick Ship basis. These personal computers would be shipped to a location designated by the University within 48 hours of being requested. 8

11 vi. UIS Recovery Organization (continued) Hot Site Recovery Team The SunGard Hot site Recovery Team coordinates and manages the recovery of the SunGard hot site. This would include coordinating the delivery of the backup tapes, overseeing SunGard staff in the implementation of recovery procedures to restore normal production processing at the hot site, and verifying the establishment of the emergency communication links to the University's Boston campus. The team also performs any tasks required at the hot site facility until relieved, or until the original site has been restored to service Software Support Team The Software Support Team provides support services for the restoration of operating software and production data files at the hot site facility. This team would also be responsible for the restoration of operating software and production files upon return of the Data Center to the University. Computer Center Restoration Team / Buildings & Grounds Support Team This team provides for the reconstruction of the damaged UIS facility. Salvage and cleanup operations will also be coordinated by this team. 9

12 vii. User Responsibilities In the case of a catastrophic event that impacts the UIS Computer Center resulting in the activation of the hot site facility, certain emergency procedures need to take place at the departmental level. The following represents the user s role during a disaster recovery process: 1. Await notification from the Applications Support team: The Applications Support Team will notify all users that a disaster has occurred and keep end user groups informed as to the extent of the disaster and the progress of the recovery at the hot site. 2. Coordinate the replacement of special forms stock: The recovery staff will inform the departments of the loss of special forms stock stored in the Computer Center and will assist in the delivery of critical stock, such as checks, to the hot site. Arrangements will be made for deliveries of critical printed output from the hot site to the Boston campus. A minimum of a twelve (12) to twenty four (24) hour delay in receiving reports should be anticipated. Important: It should be noted that the use of the existing on line electronic reporting system, WSF2/ERD, becomes instrumental during this crisis period. On line viewing of reports will be available immediately upon completion of report job executions through ERD. In the near future, the web based product, EOS Thin Client will allow users to access their reports via any PC or laptop computer with access to the internet. EOS Thin Client is expected to be recoverable at a hot site in Retrieve all source documents that might be required: Some source documents might need to be re entered in to the system once it has been recovered at the hot site (see the section on Backup Strategy). User departments should have the last twenty four (24) hours worth of source documents retrieved from where they have been stored. 4. Coordinate the delivery of any outside agency tapes: All tapes that are normally created and sent out for processing or tapes that are brought in the computer center from outside agencies must have the deliveries re directed to the hot site facility. 5. Determine the quantity and location for the distribution of the Quick Ship personal computers: Departments will need to determine the number of 3270 mainframe connections required to perform business functions during a declared disaster and hot site activation. A limited number of personal computers will be delivered to the University by SunGard within forty eight hours. End users should provide a report on current critical business cycles should be communicated to the Applications Support Team and subsequently to the Disaster Management Team. The DMT and management will determine the distribution and installation based on the current critical business cycles. 10

13 vii. User Responsibilities (continued) 6. Perform data verification of the recovered hot site system: Once the connection to the recovered UIS mainframe has been established and the quick ship personal computers delivered, the Hardware Support Team will proceed to install the equipment and provide instructions on its use. After this has been accomplished, departmental staff will need to connect to the hot site and verify that the recovery has been successful by checking the appropriate records and files. 7. Notify their customers and outside agencies: The departments will need to notify their customers (students, staff, etc.) and outside agencies, such as banks, of the service outage and what services are being provided during and the estimated duration of the emergency. viii. Disaster at the User s Facilities The user department is responsible for the following recovery actions if a catastrophic event damages a user s department which disables or destroys the user s departmental computerized systems. Retention time of source documents used as mainframe input Replacement of damaged departmental system equipment Retrieval of departmental system back up files Restoration of the departmental systems Re entry of all data not restored While the scope of UIS Disaster Planning does not include the restoration of departmental facilities, UIS will make every effort to be of assistance to the end users during this time of need. 11

14 ix. Hypothetical Disaster Recovery Examples a. Initial Impact Assessment and Response The following is a hypothetical timeline for initial action during a possible disaster situation as defined by current UIS plans and guidelines. Time: 0 hour At the first indication of any total service outage UIS will initiate standard recovery and problem escalation procedures and attempt to resolve the problem at the operations level. The UIS Computer Center staff will escalate the problem to the appropriate management levels. Computer technical staff will attempt to expedite the problem resolution. Time: 0 24 th hour (concurrent with other actions) If the problem exhausts normal recovery/escalation procedures by the 24th hour or if damage to the facility/equipment appears severe any time prior to the 24th hour, the staff member or manager who is coordinating the problem resolution should notify the leader/alternate of the Impact Assessment Team. User departments are kept informed of events by the Application Support Team during this time period. Time: 1 st hour Upon receiving notification of an incident, the Impact Assessment Team Leader will notify the Impact Assessment Team that a major problem has occurred at the Computer Center and advise the team to precede onsite. Time: 2 nd hour The Impact Assessment Team will arrive and evaluate the situation. The Impact Assessment Team leader will contact the Disaster Management Team leader with an indication of the disaster category after an initial damage assessment has been performed. The Impact Assessment Team will continue with the preparation of a detailed Impact Analysis Report to be presented to the Disaster Management Team upon their arrival at the pre defined Control Center. The Contingency Planning Coordinator will notify the leaders of the Software Support Team, Hardware Support Team, Hot site Recovery Team, and Application Support Team that there has been an incident involving the computer center that may require a recovery process of declaration of a disaster. Each team leader will then be on call with the understanding that their team may be immediately activated pending management declaration of a disaster. The team leader would notify the members of his/her team of the situation. 12

15 ix. Hypothetical Disaster Recovery Examples (continued) a. Initial Impact Assessment and Response (continued) Time: 2 nd hour (continued) Upon notification, the Disaster Management Team leader will notify senior University Management of the potential disaster situation and communicate the initial Impact Assessment Team findings. Time: 3 rd hour All team leaders will assemble at the designated control center. Time: 4 th hour The Disaster Management Team leader will conduct a briefing of team leaders after which each team will proceed according to their documented contingency plans. b. Hot Site Recovery Example The following timeline represents the high level steps taken in the event the University was to declare a disaster and was required to relocate computer facilities to the hot site location. Time: 0 hour SunGard receives official notification of a Boston University disaster declaration. Packing of backup tapes from the UIS electronic vault for shipment to the hot site begins. Time: 12 th Hour Twelve hours represents the minimum expected arrival time for backup tapes at the hotsite facility. This could extend past 12 hours depending on the nature of disaster and the location of the hot site (Philadelphia mega center is the primary site) SunGard staff begins to recover production systems using the UIS Contingency Planning Recovery Procedures. SunGard restores all University production data from data shipped from the UIS electronic vault. Time: th Hour Production system recovery is completed by SunGard staff and UIS services are ready for verification and access. Time: 0 48 th Hour (concurrent with above actions) The process to deliver emergency computer equipment for 3270 terminal access begins. 13

16 ix. Hypothetical Disaster Recovery Examples (continued) b. Hot Site Recovery Example (continued) Time: 48 th Hour Six Weeks Restoration of the damaged UIS Computer Center and offices commences. A determination as to the extent of outage is made. In this hypothetical scenario, the UIS Computer Center will be restored prior to 6 weeks. Accordingly, a decision is made to not use the cold site but instead direct the ordering of all new computer center equipment to commence for delivery to the original facility. Time: Day 6 Six Weeks The original facility restoration and equipment hookup is completed. All original dedicated communication links are rebuilt. Planning now begins for the backup of all data created at the hot site facility and the cut over from the hot site back to the original facility. At the appropriate time, the hot site is shutdown and final backups are taken. That data is then restored on to the system at the UIS Computer Center. 14

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

DATA BACKUP AND RECOVERY POLICY

DATA BACKUP AND RECOVERY POLICY DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...

More information

Business Continuity Plan Executive Overview

Business Continuity Plan Executive Overview Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 2016 DR Committee 1 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND

More information

Data Recovery Policy

Data Recovery Policy Data Recovery Policy The Marketware, Inc. Contingency Plan establishes procedures to recover Marketware, Inc. following a disruption resulting from a disaster. This Disaster Recovery Policy is maintained

More information

Contingency Planning

Contingency Planning Contingency Planning Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill Procedures are required that will permit

More information

University of Hawaii Hosted Website Service

University of Hawaii Hosted Website Service University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Contingency Planning Jan 22, 2008 Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Disaster recovery planning for health care data and HIPAA compliance regulations

Disaster recovery planning for health care data and HIPAA compliance regulations Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.

More information

INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN

INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN Revision History Revision Change Date 1.0 DRAFT Disaster Recovery Plan 8/8/2006 1.1 FINAL Disaster Recovery Plan 10/12/2009 2.0 Reviewed 10/15/2009

More information

Texas A&M AgriLife Research Procedures

Texas A&M AgriLife Research Procedures Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

JT BUSINESS CONTINUITY VOICE RE-ROUTING

JT BUSINESS CONTINUITY VOICE RE-ROUTING Application form and Service Description for JT BUSINESS CONTINUITY VOICE RE-ROUTING Site name Account no Copies held by 1 (the "Customer") Customer name 2. JT 24/7 Team Supervisor Hosting Services Engineers

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Service Level Agreement Research Computing Environment and Managed Server Hosting

Service Level Agreement Research Computing Environment and Managed Server Hosting RCE SLA 2013 Service Level Agreement Research Computing Environment and Managed Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard- MIT Data Center (HMDC) August 1, 2013 1. Overview

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Tuskegee Backup and Offsite Policy and Procedures

Tuskegee Backup and Offsite Policy and Procedures TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored

More information

HPE Proactive 24 Service

HPE Proactive 24 Service Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services

More information

UCLA AUDIT & ADVISORY SERVICES

UCLA AUDIT & ADVISORY SERVICES UCLA AUDIT & ADVISORY SERVICES Edwin D. Pierce, CPA, CFE Director September 4, 2015 10920 Wilshire Boulevard, Suite 700 Los Angeles, California 90024-1366 310 794-6110 Fax: 310 794-8536 SENIOR VICE PRESIDENT/CHIEF

More information

INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES

INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES Document Control Panel File Reference Number File Name Owner Approver ICT Disaster Recovery-PP-01 ICT Disaster Recovery

More information

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018 Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5

More information

University Information Technology Data Backup and Recovery Policy

University Information Technology Data Backup and Recovery Policy University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Cybersecurity Checklist Business Action Items

Cybersecurity Checklist Business Action Items Cybersecurity Checklist Business Action Items This section provides a thorough (although not all-inclusive or exhaustive) checklist of action items within the three categories for Incident Management (Planning,

More information

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

Veritas NetBackup Vault Operator s Guide

Veritas NetBackup Vault Operator s Guide Veritas NetBackup Vault Operator s Guide UNIX, Windows, and Linux Release 6.5 12308356 Veritas NetBackup Vault Operator s Guide Copyright 2001-2007 Symantec Corporation. All rights reserved. NetBackup

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Service Level Agreement

Service Level Agreement This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Data Lifecycle Management No: Effective: OSC-1 May 1, 2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

Template. IT Disaster Recovery Planning: A Template

Template. IT Disaster Recovery Planning: A Template Template IT Disaster Recovery Planning: A Template When disaster strikes, business suffers. A goal of business planning is to mitigate disruption of product and services delivery to the greatest degree

More information

NN CS 704 NEURONEXT NETWORK STANDARD OPERATING PROCEDURE FOR DATA BACKUP, RECOVERY, AND CONTINGENCY PLANS

NN CS 704 NEURONEXT NETWORK STANDARD OPERATING PROCEDURE FOR DATA BACKUP, RECOVERY, AND CONTINGENCY PLANS NN CS 705 NEURONEXT NETWORK STANDARD OPERATING PROCEDURE FOR DATA BACKUP, RECOVERY, AND CONTINGENCY PLANS SOP: NN CS 705 Version No. 2.0 Effective Date: 21Oct2016 DATA BACKUP, RECOVERY, AND CONTINGENCY

More information

Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3)

Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3) Page 1 of 8 Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3) This document describes Cisco Technical Services Advantage support services. Related Documents: This document

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

PURPOSE The purpose is to establish policy regarding university computers. The goals of the policy are to:

PURPOSE The purpose is to establish policy regarding university computers. The goals of the policy are to: Information Resources Division COMPUTER PURCHASE AND REPLACEMENT POLICY Effective Date: June 1, 2016 Contact: Lisa Bazley, VP for Information Resources PURPOSE The purpose is to establish policy regarding

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan 0 BCP INTRODUCTION INFORMATION (REQUIRED)... LOCATION AND KEY CONTACT INFORMATION... PRIORITY BUSINESS PROCESSES... 0 BCP TEAM(S) (REQUIRED)... TEAM -... TEAM CONTACT INFORMATION...

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

BUSINESS CONTINUITY PLAN

BUSINESS CONTINUITY PLAN BUSINESS CONTINUITY PLAN Signed Governor Print Name Date: November 2016 Review: November 2017 1 To provide guidance to school staff, governors and external parties on how to react to disruption major or

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT 1 The material appearing in this presentation is for informational purposes only and is not legal or accounting

More information

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES RECORDS MANAGEMENT DEPARTMENT OF THE TREASURY, DIVISION OF REVENUE AND ENTERPRISE SERVICES, RECORDS MANAGEMENT SERVICES RECORDS MANAGEMENT SERVICES Records Management Services, Division of Revenue and

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science

More information

Business Continuity Planning Keeping Pace with New Technology

Business Continuity Planning Keeping Pace with New Technology Business Continuity Planning Keeping Pace with New Technology Old issues, new threats Force Majeure Increasing severe weather incidents, terrorist attacks Legacy modernization Cutover issues, system crashes,

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate

More information

Aras Innovator 11. Backup and Recovery Procedures

Aras Innovator 11. Backup and Recovery Procedures Document #: 11.0.02015040601 Last Modified: 1/4/2018 Copyright Information Copyright 2018 Aras Corporation. All Rights Reserved. Aras Corporation 300 Brickstone Square Suite 700 Andover, MA 01810 Phone:

More information

JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE

JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE Jersey Application form and Service Description for JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE : Account no: Copies held by 1 (the "Customer") 2. JT Hosting Services Application for Service

More information

IT Services Policy/Policy Document

IT Services Policy/Policy Document IT Services Policy/Policy Document DG26 System Backup and Recovery Prepared by: < Shelim Miah> Version: 2.2 Page 1 of 8 Effective Date: 17/03/17 Review Date: 17/03/18 Reviewers: Steve Wicks, Servers &

More information

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 23, 2018

More information

10 Reasons Why Your DR Plan Won t Work

10 Reasons Why Your DR Plan Won t Work 10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies

More information

UF CEMP Support Group Annex: IT Group

UF CEMP Support Group Annex: IT Group UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking

More information

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up. Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 10, 2018

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY Manual OCTOBER 2, 2016 CHILDREN IN FREEDOM (CIF) CIF P.O.Box 25286-00100, Kenya, Africa, NY, USA (c) 2016 Page 1 Contents ACKNOWLEDGEMENT... 0 1.0 STATEMENT...

More information

Technology Disaster Recovery Plan updated 06/16/16

Technology Disaster Recovery Plan updated 06/16/16 Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education

More information

Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration

Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Syncsort Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration With the introduction of IBM s POWER9

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

securivy INFORMATION SYSTEMS MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad

securivy INFORMATION SYSTEMS MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad information technology & management INFORMATION SYSTEMS securivy t MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad 2008 Ray Trygstad Director of

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Critical Cyber Asset Identification Security Management Controls

Critical Cyber Asset Identification Security Management Controls Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.

More information

DATA SECURITY THE PROTECTION OF YOUR INFORMATION IS OUR PRIME DIRECTIVE

DATA SECURITY THE PROTECTION OF YOUR INFORMATION IS OUR PRIME DIRECTIVE DATA SECURITY THE PROTECTION OF YOUR INFORMATION IS OUR PRIME DIRECTIVE OVERVIEW building security theft alarms point of entry interior & exterior closed-circuit camera monitoring impact-resistant windows

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

Veritas NetBackup Vault Operator's Guide

Veritas NetBackup Vault Operator's Guide Veritas NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 8.1.1 Veritas NetBackup Vault Operator's Guide Last updated: 2018-09-19 Document version: NetBackup 8.1 Legal Notice Copyright

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Business Continuity Management Standards A Side-by-Side Comparison

Business Continuity Management Standards A Side-by-Side Comparison Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

HP 3PAR Storage System Installation and Startup Service

HP 3PAR Storage System Installation and Startup Service HP 3PAR Storage System Installation and Startup Service HP Care Pack Services Technical data For smooth startup, the HP 3PAR Storage System Installation and Startup Service provides deployment of your

More information

Office of Presidential Libraries; Proposed Disposal of George H.W. Bush and Clinton. Agency: National Archives and Records Administration (NARA)

Office of Presidential Libraries; Proposed Disposal of George H.W. Bush and Clinton. Agency: National Archives and Records Administration (NARA) This document is scheduled to be published in the Federal Register on 06/28/2013 and available online at http://federalregister.gov/a/2013-15564, and on FDsys.gov Billing Code 7515-01U NATIONAL ARCHIVES

More information

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Module 4 STORAGE NETWORK BACKUP & RECOVERY Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,

More information

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013 Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal

More information

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar

More information

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria)

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria) Objective of Survey The purpose of this survey is to identify and understand 1) the nature of critical and sensitive campus-wide applications and/or data, 2) where the data is located, 3) how the data

More information

BCP At Bangkok Bank, Thailand

BCP At Bangkok Bank, Thailand BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in

More information

HP StorageWorks MSA/P2000 Family Disk Array Installation and Startup Service

HP StorageWorks MSA/P2000 Family Disk Array Installation and Startup Service HP StorageWorks MSA/P2000 Family Disk Array Installation and Startup Service HP Services Technical data The HP StorageWorks MSA/P2000 Family Disk Array Installation and Startup Service provides the necessary

More information

ADVANCED CUSTOMER SUPPORT ORACLE STANDARD SYSTEM INSTALLATION ( OSSI ) with SITE AUDIT SERVICES EXHIBIT

ADVANCED CUSTOMER SUPPORT ORACLE STANDARD SYSTEM INSTALLATION ( OSSI ) with SITE AUDIT SERVICES EXHIBIT ADVANCED CUSTOMER SUPPORT ORACLE STANDARD SYSTEM INSTALLATION ( OSSI ) with SITE AUDIT SERVICES EXHIBIT This exhibit incorporates by reference the terms of your order for Oracle Standard System Installation

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

ADVANCED CUSTOMER SUPPORT ORACLE STANDARD SYSTEM INSTALLATION ( OSSI ) without SITE AUDIT SERVICES EXHIBIT

ADVANCED CUSTOMER SUPPORT ORACLE STANDARD SYSTEM INSTALLATION ( OSSI ) without SITE AUDIT SERVICES EXHIBIT ADVANCED CUSTOMER SUPPORT ORACLE STANDARD SYSTEM INSTALLATION ( OSSI ) without SITE AUDIT SERVICES EXHIBIT This exhibit incorporates by reference the terms of your order for Oracle Standard System Installation

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology

More information

COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services

COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG 50400 BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services October, 2015 This document is copyright to County Government of Busia and

More information

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: May 26, 2017

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: May 26, 2017 CUNY Graduate Center Information Technology IT for & Effective Date: May 26, 2017 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video

More information

HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family

HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family Data sheet HPE Data Replication Solution Service for HPE Business Copy for P9000 XP Disk Array Family HPE Lifecycle Event Services HPE Data Replication Solution Service provides implementation of the HPE

More information

StruxureWare TM Data Center Operation Periodic Maintenance. Statement Of Work. 2.0 Features & Benefits

StruxureWare TM Data Center Operation Periodic Maintenance. Statement Of Work. 2.0 Features & Benefits - 1 - StruxureWare TM DC Operation Periodic Maintenance Service Integration Service Statement Of Work 1. Executive summary StruxureWare TM Data Center Operation Periodic Maintenance Table of Contents 1.0

More information

Office of Human Resources 3/28/13 Page 1 of 7

Office of Human Resources 3/28/13   Page 1 of 7 JOB FAMILY CONCEPT This job family consists of eight levels of Information Systems Technical work distinguished by the complexity of the responsibilities assigned and characterized by the type of equipment,

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: 1/30/2017.

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: 1/30/2017. Aljex Software, Inc. Business Continuity & Disaster Recovery Plan Last Updated: 1/30/2017 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure... 3 On-Site Disruption Procedures...

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information