SlideShare a Scribd company logo
APA Reference List Examples
Book with Single Author:
Gore, A. (2006). An inconvenient truth: The planetary
emergency of global warming and what
we can do about it. Emmaus, PA: Rodale.
In-text reference: (Gore, 2006)
Book with Two Authors:
Michaels, P. J., & Balling, R. C., Jr. (2000). The satanic gases:
Clearing the air about global
warming. Washington, DC: Cato Institute.
In-text reference: (Michaels & Balling, 2000)
Book with Editor as Author:
Galley. K. E. (Ed.). (2004). Global climate change and wildlife
in North America. Bethesda,
MD: Wildlife Society.
In-text reference: (Galley, 2004)
Brochure or Pamphlet:
New York State Department of Health. (2002). After a sexual
assault. [Brochure]. Albany, NY:
Author.
In-text reference: (New York, 2002)
An Anonymous Book:
Environmental resource handbook. (2001). Millerton, NY: Grey
House.
In-text reference: (Environmental Resource Handbook, 2001)
Articles in Reference Books (unsigned and signed):
Greenhouse effect. (2005). American heritage science
dictionary. Boston, MA: Houghton
Mifflin.
Schneider, S. H. (2000). Greenhouse effect. World book
encyclopedia (Millennium ed.
Vol. 8, pp. 382-383). Chicago, IL: World Book.
In-text references: (Greenhouse effect, 2005)
(Schneider, 2000)
Magazine Articles:
Allen, L. (2004, August). Will Tuvalu disappear beneath the
sea? Global warming threatens to
swamp a small island nation. Smithsonian, 35(5), 44-52.
Begley, S., & Murr, A. (2007, July 2). Which of these is not
causing global warming? A. Sport
utility vehicles; B. Rice fields; C. Increased solar output.
Newsweek, 150(2), 48-50.
In-text references: (Allen, 2004)
(Begley, 2007)
Newspaper Articles (unsigned and signed):
College officials agree to cut greenhouse gases. (2007, June
13). Albany Times Union, p. A4.
Landler, M. (2007, June 2). Bush’s Greenhouse Gas Plan
Throws Europe Off Guard.
New York Times, p. A7.
In-text references: (“College Officials”, 2007)
(Landler, 2007)
Journal Article with Continuous Paging:
Miller-Rushing, A. J., Primack, R. B., Primack, D., & Mukunda,
S. (2006). Photographs
and herbarium specimens as tools to document phonological
changes in response
to global warming. American Journal of Botany, 93, 1667-
1674.
In-text reference: (Miller-Rushing, Primack, Primack, &
Mukunda, 2006)
Journal Article when each issue begins with p.1:
Bogdonoff, S., & Rubin, J. (2007). The regional greenhouse gas
initiative: Taking action in
Maine. Environment, 49(2), 9-16.
In-text reference: (Bogdonoff & Rubin, 2007)
Journal Article from a Library Subscription Service Database
with a DOI (digital object
identifier):
Mora, C., & Maya, M. F. (2006). Effect of the rate of
temperature increase of the dynamic
method on the heat tolerance of fishes. Journal of Thermal
Biology, 31, 337-341.
doi: 10.101b/jtherbio.2006.01.055
In-text reference: (Mora & Maya, 2006)
Website:
United States Environmental Protection Agency. (2007, May 4).
Climate Change. Retrieved
From the Environmental Protection Agency website:
http://www.epa.gov/climatechange
In-text reference: (United States Environmental, 2007)
Gelspan, R. (2007). The Heat Is Online. Lake Oswego, OR:
Green House Network. Retrieved
from The Heat Is Online website: http://www.heatisonline.org
In-text reference: (Gelspan, 2007)
These are the MOST COMMON examples cited. For a complete
list of examples please consult Publication
manual of the American Psychological Association, 6
th
ed. (REF BF 76.7 .P83 2010). Feel free to ask for help at
the Library’s Reference/Information Desk (585-785-1432) or at
the Write Place (585-785-1601).
cc 01/2011rev
http://www.heatisonline.org/
<Client Name>
IT Disaster Recovery Plan
Template
By Paul Kirvan, CISA, CISSP, FBCI,
CBCP
All Rights Reserved, 2009, TechTarget
2
Revision History
REVISION DATE NAME DESCRIPTION
Original 1.0
All Rights Reserved, 2009, TechTarget
3
Table of Contents
Information Technology Statement of Intent
...................................................................... 5
Policy Statement
...............................................................................................
.................. 5
Objectives
...............................................................................................
............................ 5
Key Personnel Contact Info
...............................................................................................
. 6
Notification Calling Tree
..................................................................................... ..........
. 7
External Contacts
...............................................................................................
................. 8
External Contacts Calling Tree
..................................................................................... 10
1 Plan Overview
...............................................................................................
............ 11
1.1 Plan
Updating.................................................................................
................... 11
1.2 Plan Documentation
Storage............................................................................. 11
1.3 Backup Strategy
...............................................................................................
. 11
1.4 Risk Management
.............................................................................................
11
2 Emergency Response
...............................................................................................
. 12
2.1 Alert, escalation and plan invocation
................................................................ 12
2.1.1 Plan Triggering Events
................................................................................. 12
2.1.2 Assembly Points
............................................................................................
12
2.1.3 Activation of Emergency Response Team
.................................................... 12
2.2 Disaster Recovery Team
................................................................................... 13
2.3 Emergency Alert, Escalation and DRP Activation
........................................... 13
2.3.1 Emergency Alert
...........................................................................................
13
2.3.2 DR Procedures for Management
................................................................... 14
2.3.3 Contact with Employees
............................................................................... 14
2.3.4 Backup
Staff.......................................................................................
........... 14
2.3.5 Recorded Messages / Updates
...................................................................... 14
2.3.7 Alternate Recovery Facilities / Hot Site
....................................................... 14
2.3.8 Personnel and Family Notification
............................................................... 14
3 Media
........................................................................................... ....
......................... 15
3.1 Media Contact
...............................................................................................
.... 15
3.2 Media
Strategies............................................................................ ....
................ 15
3.3 Media Team
...............................................................................................
....... 15
3.4 Rules for Dealing with Media
........................................................................... 15
4 Insurance
...............................................................................................
.................... 15
5 Financial and Legal Issues
....................................................................................... . 16
5.1 Financial Assessment
........................................................................................ 16
5.2 Financial Requirements
.................................................................................... 16
5.3 Legal Actions
...............................................................................................
..... 16
6 DRP Exercising
...............................................................................................
.......... 16
Appendix A – Technology Disaster Recovery Plan
Templates........................................ 17
Disaster Recovery Plan for <System One>
.................................................................. 17
Disaster Recovery Plan for <System Two>
.................................................................. 19
Disaster Recovery Plan for Local Area Network
(LAN).............................................. 21
Disaster Recovery Plan for Wide Area Network (WAN)
............................................. 23
All Rights Reserved, 2009, TechTarget
4
Disaster Recovery Plan for Remote Connectivity
........................................................ 25
Disaster Recovery Plan for Voice Communications
.................................................... 27
Appendix B – Suggested Forms
....................................................................................... 29
Damage Assessment Form
............................................................................................
29
Management of DR Activities Form
............................................................................. 29
Disaster Recovery Event Recording Form
................................................................... 30
Disaster Recovery Activity Report Form
..................................................................... 30
Mobilizing the Disaster Recovery Team Form
............................................................. 31
Mobilizing the Business Recovery Team
Form............................................................ 31
Monitoring Business Recovery Task Progress
Form.................................................... 32
Preparing the Business Recovery Report Form
............................................................ 32
Communications
Form.......................................................................................
........... 33
Returning Recovered Business Operations to Business Unit
Leadership .................... 33
Business Process/Function Recovery Completion Form
.............................................. 34
All Rights Reserved, 2009, TechTarget
5
Information Technology Statement of Intent
This document delineates our policies and procedures for
technology disaster recovery, as well as
our process-level plans for recovering critical technology
platforms and the telecommunications
infrastructure. This document summarizes our recommended
procedures. In the event of an
actual emergency situation, modifications to this document may
be made to ensure physical
safety of our people, our systems, and our data.
Our mission is to ensure information system uptime, data
integrity and availability, and business
continuity.
Policy Statement
Corporate management has approved the following policy
statement:
recovery plan.
requirements for the
disaster recovery plan.
er all essential and
critical infrastructure
elements, systems and networks, in accordance with key
business activities.
simulated environment to
ensure that it can be implemented in emergency situations and
that the management
and staff understand how it is to be executed.
and their own respective
roles.
account changing
circumstances.
Objectives
The principal objective of the disaster recovery program is to
develop, test and document
a well-structured and easily understood plan which will help the
company recover as
quickly and effectively as possible from an unforeseen disaster
or emergency which
interrupts information systems and business operations.
Additional objectives include the
following:
• The need to ensure that all employees fully understand their
duties in implementing
such a plan
• The need to ensure that operational policies are adhered to
within all planned
activities
• The need to ensure that proposed contingency arrangements
are cost-effective
• The need to consider implications on other company sites
• Disaster recovery capabilities as applicable to key customers,
vendors and others
All Rights Reserved, 2009, TechTarget
6
Key Personnel Contact Info
Name, Title Contact Option Contact Number
Work
Alternate
Mobile
Home
Email Address
Alternate Email
Work
Alternate
Mobile
Home
Email Address
Alternate Email
Work
Alternate
Mobile
Home
Email Address
Alternate Email
Work
Alternate
Mobile
Home
Email Address
Alternate Email
Work
Alternate
Mobile
Home
Email Address
Alternate Email
Work
Alternate
Mobile
Home
Email Address
Alternate Email
All Rights Reserved, 2009, TechTarget
7
Notification Calling Tree
Person
Identifying
Incident
All Rights Reserved, 2009, TechTarget
8
External Contacts
Name, Title Contact Option Contact Number
Landlord / Property Manager
Account Number None
Work
Mobile
Home
Email Address
Power Company
Account Number Work
Mobile
Home
Email Address
Telecom Carrier 1
Account Number Work
Mobile
Fax
Home
Email Address
Telecom Carrier 2
Account Number Work
Mobile
Home
Email Address
Hardware Supplier 1
Account Number Work
Mobile
Emergency Reporting
Email Address
Server Supplier 1
Account Number. Work
Mobile
Fax
Email Address
Workstation Supplier 1
Account Number Work
Mobile
Home
Email Address
Office Supplies 1
Account Number C3095783 Work
Mobile
Home
Email Address
All Rights Reserved, 2009, TechTarget
9
Name, Title Contact Option Contact Number
Insurance – Name
Account Number Work
Mobile
Home
Email Address
Site Security –
Account Number Work
Mobile
Home
Email Address
Off-Site Storage 1
Account Number Work
Mobile
Home
Email Address
Off-Site Storage 2
Account Number User ID
Password
Home
Email Address
HVAC –
Account Number Work
Mobile
Home
Email Address
Power Generator –
Account Number Work
Mobile
Home
Email Address
Other –
Account Number Work
Mobile
Home
Email Address
All Rights Reserved, 2009, TechTarget
10
External Contacts Calling Tree
All Rights Reserved, 2009, TechTarget
11
1 Plan Overview
1.1 Plan Updating
It is necessary for the DRP updating process to be properly
structured and controlled.
Whenever changes are made to the plan they are to be fully
tested and appropriate
amendments should be made to the training materials. This will
involve the use of
formalized change control procedures under the control of the
IT Director.
1.2 Plan Documentation Storage
Copies of this Plan, CD, and hard copies will be stored in
secure locations to be defined
by the company. Each member of senior management will be
issued a CD and hard copy
of this plan to be filed at home. Each member of the Disaster
Recovery Team and the
Business Recovery Team will be issued a CD and hard copy of
this plan. A master
protected copy will be stored on specific resources established
for this purpose.
1.3 Backup Strategy
Key business processes and the agreed backup strategy for each
are listed below. The
strategy chosen is for a fully mirrored recovery site at the
company’s offices in _____.
This strategy entails the maintenance of a fully mirrored
duplicate site which will enable
instantaneous switching between the live site (headquarters) and
the backup site.
KEY BUSINESS PROCESS BACKUP STRATEGY
IT Operations Fully mirrored recovery site
Tech Support - Hardware Fully mirrored recovery site
Tech Support - Software Fully mirrored recovery site
Facilities Management Fully mirrored recovery site
Email Fully mirrored recovery site
Purchasing Fully mirrored recovery site
Disaster Recovery Fully mirrored recovery site
Finance Fully mirrored recovery site
Contracts Admin Fully mirrored recovery site
Warehouse & Inventory Fully mirrored recovery site
Product Sales Fully mirrored recovery site
Maintenance Sales Fully mirrored recovery site
Human Resources Off-site data storage facility
Testing Fully Mirrored Recovery site - Fully mirrored recovery
site
Workshop Fully Mirrored Recovery site - Fully mirrored
recovery site
Call Center Fully mirrored recovery site
Web Site Fully mirrored recovery site
1.4 Risk Management
There are many potential disruptive threats which can occur at
any time and affect the
normal business process. We have considered a wide range of
potential threats and the
All Rights Reserved, 2009, TechTarget
12
results of our deliberations are included in this section. Each
potential environmental
disaster or emergency situation has been examined. The focus
here is on the level of
business disruption which could arise from each type of
disaster.
Potential disasters have been assessed as follows:
Potential Disaster Probability Rating Impact Rating
Brief Description Of Potential
Consequences & Remedial
Actions
Flood 3 4 All critical equipment is located
on 1st Floor
Fire 3 4 FM200 suppression system
installed in main computer
centers. Fire and smoke
detectors on all floors.
Tornado 5
Electrical storms 5
Act of terrorism 5
Act of sabotage 5
Electrical power
failure
3 4 Redundant UPS array together
with auto standby generator
that is tested weekly & remotely
monitored 24/7. UPSs also
remotely monitored.
Loss of communications network
services
4 4 Two diversely routed T1 trunks
into building. WAN redundancy,
voice network resilience
Probability: 1=Very High, 5=Very Low Impact: 1=Total
destruction, 5=Minor annoyance
2 Emergency Response
2.1 Alert, escalation and plan invocation
2.1.1 Plan Triggering Events
Key trigger issues at headquarters that would lead to activation
of the DRP are:
• Total loss of all communications
• Total loss of power
• Flooding of the premises
• Loss of the building
2.1.2 Assembly Points
Where the premises need to be evacuated, the DRP invocation
plan identifies two
evacuation assembly points:
• Primary – Far end of main parking lot;
• Alternate – Parking lot of company across the street
2.1.3 Activation of Emergency Response Team
When an incident occurs the Emergency Response Team (ERT)
must be activated. The
ERT will then decide the extent to which the DRP must be
invoked. All employees must
be issued a Quick Reference card containing ERT contact
details to be used in the event
of a disaster. Responsibilities of the ERT are to:
All Rights Reserved, 2009, TechTarget
13
• Respond immediately to a potential disaster and call
emergency services;
• Assess the extent of the disaster and its impact on the
business, data center, etc.;
• Decide which elements of the DR Plan should be activated;
• Establish and manage disaster recovery team to maintain vital
services and return to
normal operation;
• Ensure employees are notified and allocate responsibilities
and activities as required.
2.2 Disaster Recovery Team
The team will be contacted and assembled by the ERT. The
team's responsibilities
include:
• Establish facilities for an emergency level of service within
2.0 business hours;
• Restore key services within 4.0 business hours of the incident;
• Recover to business as usual within 8.0 to 24.0 hours after the
incident;
• Coordinate activities with disaster recovery team, first
responders, etc.
• Report to the emergency response team.
2.3 Emergency Alert, Escalation and DRP Activation
This policy and procedure has been established to ensure that in
the event of a disaster or
crisis, personnel will have a clear understanding of who should
be contacted. Procedures
have been addressed to ensure that communications can be
quickly established while
activating disaster recovery.
The DR plan will rely principally on key members of
management and staff who will
provide the technical and management skills necessary to
achieve a smooth technology
and business recovery. Suppliers of critical goods and services
will continue to support
recovery of business operations as the company returns to
normal operating mode.
2.3.1 Emergency Alert
The person discovering the incident calls a member of the
Emergency Response Team in
the order listed:
Emergency Response Team
• _________
• _________
• _________
If not available try:
• _________
• _________
All Rights Reserved, 2009, TechTarget
14
The Emergency Response Team (ERT) is responsible for
activating the DRP for disasters
identified in this plan, as well as in the event of any other
occurrence that affects the
company’s capability to perform normally.
One of the tasks during the early stages of the emergency is to
notify the Disaster
Recovery Team (DRT) that an emergency has occurred. The
notification will request
DRT members to assemble at the site of the problem and will
involve sufficient
information to have this request effectively communicated. The
Business Recovery Team
(BRT) will consist of senior representatives from the main
business departments. The
BRT Leader will be a senior member of the company's
management team, and will be
responsible for taking overall charge of the process and
ensuring that the company
returns to normal working operations as early as possible.
2.3.2 DR Procedures for Management
Members of the management team will keep a hard copy of the
names and contact
numbers of each employee in their departments. In addition,
management team members
will have a hard copy of the company’s disaster recovery and
business continuity plans
on file in their homes in the event that the headquarters building
is inaccessible, unusable,
or destroyed.
2.3.3 Contact with Employees
Managers will serve as the focal points for their departments,
while designated
employees will call other employees to discuss the
crisis/disaster and the company’s
immediate plans. Employees who cannot reach staff on their
call list are advised to call
the staff member’s emergency contact to relay information on
the disaster.
2.3.4 Backup Staff
If a manager or staff member designated to contact other staff
members is unavailable or
incapacitated, the designated backup staff member will perform
notification duties.
2.3.5 Recorded Messages / Updates
For the latest information on the disaster and the organization’s
response, staff members
can call a toll-free hotline listed in the DRP wallet card.
Included in messages will be
data on the nature of the disaster, assembly sites, and updates
on work resumption.
2.3.7 Alternate Recovery Facilities / Hot Site
If necessary, the hot site at SunGard will be activated and
notification will be given via
recorded messages or through communications with managers.
Hot site staffing will
consist of members of the disaster recovery team only for the
first 24 hours, with other
staff members joining at the hot site as necessary.
2.3.8 Personnel and Family Notification
If the incident has resulted in a situation which would cause
concern to an employee’s
immediate family such as hospitalization of injured persons, it
will be necessary to notify
their immediate family members quickly.
All Rights Reserved, 2009, TechTarget
15
3 Media
3.1 Media Contact
Assigned staff will coordinate with the media, working
according to guidelines that have
been previously approved and issued for dealing with post-
disaster communications.
3.2 Media Strategies
1. Avoiding adverse publicity
2. Take advantage of opportunities for useful publicity
3. Have answers to the following basic questions:
3.3 Media Team
• ____________________________________________
• ____________________________________________
• ____________________________________________
3.4 Rules for Dealing with Media
Only the media team is permitted direct contact with the media;
anyone else contacted
should refer callers or in-person media representatives to the
media team.
4 Insurance
As part of the company’s disaster recovery and business
continuity strategies a number of
insurance policies have been put in place. These include errors
and omissions, directors
& officers liability, general liability, and business interruption
insurance.
If insurance-related assistance is required following an
emergency out of normal
business hours, please contact:
____________________________________________
Policy Name
Coverage
Type
Coverage
Period
Amount Of
Coverage
Person
Responsible
For Coverage
Next Renewal
Date
All Rights Reserved, 2009, TechTarget
16
5 Financial and Legal Issues
5.1 Financial Assessment
The emergency response team shall prepare an initial
assessment of the impact of the
incident on the financial affairs of the company. The assessment
should include:
5.2 Financial Requirements
The immediate financial needs of the company must be
addressed. These can include:
etc.
ay for supplies and
services required post-
disaster
5.3 Legal Actions
The company legal department and ERT will jointly review the
aftermath of the incident
and decide whether there may be legal actions resulting from
the event; in particular, the
possibility of claims by or against the company for regulatory
violations, etc.
6 DRP Exercising
Disaster recovery plan exercises are an essential part of the plan
development process. In
a DRP exercise no one passes or fails; everyone who
participates learns from exercises –
what needs to be improved, and how the improvements can be
implemented. Plan
exercising ensures that emergency teams are familiar with their
assignments and, more
importantly, are confident in their capabilities.
Successful DR plans launch into action smoothly and effectively
when they are needed.
This will only happen if everyone with a role to play in the plan
has rehearsed the role
one or more times. The plan should also be validated by
simulating the circumstances
within which it has to work and seeing what happens.
All Rights Reserved, 2009, TechTarget
17
Appendix A – Technology Disaster Recovery Plan Templates
Disaster Recovery Plan for <System One>
SYSTEM
OVERVIEW
PRODUCTION SERVER Location:
Server Model:
Operating System:
CPUs:
Memory:
Total Disk:
System Handle:
System Serial #:
DNS Entry:
IP Address:
Other:
HOT SITE SERVER Provide details
APPLICATIONS
(Use bold for Hot Site)
ASSOCIATED SERVERS
KEY CONTACTS
Hardware Vendor Provide details
System Owners Provide details
Database Owner Provide details
Application Owners Provide details
Software Vendors Provide details
Offsite Storage Provide details
BACKUP STRATEGY FOR
SYSTEM ONE
Daily Provide details
Monthly Provide details
Quarterly Provide details
SYSTEM ONE
DISASTER RECOVERY
PROCEDURE
Scenario 1
Total Loss of Data
Provide details
Scenario 2
Total Loss of HW
Provide details
All Rights Reserved, 2009, TechTarget
18
ADDENDUM
CONTACTS
File Systems <date>
File System as of
<date>
Minimal file systems to
be created and restored
from backup:
<List>
Filesystem kbytes Used Avail %used
Mounted on
<Provide details>
Other critical files to
modify
<Provide details>
Necessary directories to
create
<Provide details>
Critical files to restore <Provide details>
Secondary files to
restore
<Provide details>
Other files to restore <Provide details>
All Rights Reserved, 2009, TechTarget
19
Disaster Recovery Plan for <System Two>
SYSTEM
OVERVIEW
PRODUCTION SERVER Location:
Server Model:
Operating System:
CPUs:
Memory:
Total Disk:
System Handle:
System Serial #:
DNS Entry:
IP Address:
Other:
HOT SITE SERVER Provide details
APPLICATIONS
(Use bold for Hot Site)
ASSOCIATED SERVERS
KEY CONTACTS
Hardware Vendor Provide details
System Owners Provide details
Database Owner Provide details
Application Owners Provide details
Software Vendors Provide details
Offsite Storage Provide details
BACKUP STRATEGY for
SYSTEM TWO
Daily Provide details
Monthly Provide details
Quarterly Provide details
SYSTEM TWO
DISASTER RECOVERY
PROCEDURE
Scenario 1
Total Loss of Data
Provide details
Scenario 2
Total Loss of HW
Provide details
All Rights Reserved, 2009, TechTarget
20
ADDENDUM
CONTACTS
File Systems <date>
File System as of
<date>
Minimal file systems to
be created and restored
from backup:
<List>
Filesystem kbytes Used Avail %used
Mounted on
<Provide details>
Other critical files to
modify
<Provide details>
Necessary directories to
create
<Provide details>
Critical files to restore <Provide details>
Secondary files to
restore
<Provide details>
Other files to restore <Provide details>
All Rights Reserved, 2009, TechTarget
21
Disaster Recovery Plan for Local Area Network (LAN)
SYSTEM
OVERVIEW
SERVER Location:
Server Model:
Operating System:
CPUs:
Memory:
Total Disk:
System Handle:
System Serial #:
DNS Entry:
IP Address:
Other:
HOT SITE SERVER Provide details
APPLICATIONS
(Use bold for Hot Site)
ASSOCIATED SERVERS
KEY CONTACTS
Hardware Vendor Provide details
System Owners Provide details
Database Owner Provide details
Application Owners Provide details
Software Vendors Provide details
Offsite Storage Provide details
BACKUP STRATEGY for
SYSTEM TWO
Daily Provide details
Monthly Provide details
Quarterly Provide details
SYSTEM TWO
DISASTER RECOVERY
PROCEDURE
Scenario 1
Total Loss of Data
Provide details
Scenario 2
Total Loss of HW
Provide details
All Rights Reserved, 2009, TechTarget
22
ADDENDUM
CONTACTS
File Systems <date>
File System as of
<date>
Minimal file systems to
be created and restored
from backup:
<List>
Filesystem kbytes Used Avail %used
Mounted on
<Provide details>
Other critical files to
modify
<Provide details>
Necessary directories to
create
<Provide details>
Critical files to restore <Provide details>
Secondary files to
restore
<Provide details>
Other files to restore <Provide details>
All Rights Reserved, 2009, TechTarget
23
Disaster Recovery Plan for Wide Area Network (WAN)
SYSTEM
OVERVIEW
EQUIPMENT Location:
Device Type:
Model No.:
Technical Specifications:
Network Interfaces:
Power Requirements;
System Serial #:
DNS Entry:
IP Address:
Other:
HOT SITE EQUIPMENT Provide details
SPECIAL APPLICATIONS
ASSOCIATED DEVICES
KEY CONTACTS
Hardware Vendor Provide details
System Owners Provide details
Database Owner Provide details
Application Owners Provide details
Software Vendors Provide details
Offsite Storage Provide details
Network Services Provide details
BACKUP STRATEGY for
SYSTEM TWO
Daily Provide details
Monthly Provide details
Quarterly Provide details
SYSTEM TWO
DISASTER RECOVERY
PROCEDURE
Scenario 1
Total Loss of Network
Provide details
Scenario 2
Total Loss of HW
Provide details
All Rights Reserved, 2009, TechTarget
24
ADDENDUM
CONTACTS
Support Systems <date>
Support system
<Provide details>
Critical network assets <Provide details>
Critical interfaces <Provide details>
Critical files to restore <Provide details>
Critical network
services to restore
<Provide details>
Other services <Provide details>
All Rights Reserved, 2009, TechTarget
25
Disaster Recovery Plan for Remote Connectivity
SYSTEM
OVERVIEW
EQUIPMENT Location:
Device Type:
Model No.:
Technical Specifications:
Network Interfaces:
Power Requirements;
System Serial #:
DNS Entry:
IP Address:
Other:
HOT SITE EQUIPMENT Provide details
SPECIAL APPLICATIONS
ASSOCIATED DEVICES
KEY CONTACTS
Hardware Vendor Provide details
System Owners Provide details
Database Owner Provide details
Application Owners Provide details
Software Vendors Provide details
Offsite Storage Provide details
Network Services Provide details
BACKUP STRATEGY for
SYSTEM TWO
Daily Provide details
Monthly Provide details
Quarterly Provide details
SYSTEM TWO
DISASTER RECOVERY
PROCEDURE
Scenario 1
Total Loss of Network
Provide details
Scenario 2
Total Loss of HW
Provide details
All Rights Reserved, 2009, TechTarget
26
ADDENDUM
CONTACTS
Support Systems <date>
Support system
<Provide details>
Critical network assets <Provide details>
Critical interfaces <Provide details>
Critical files to restore <Provide details>
Critical network
services to restore
<Provide details>
Other services <Provide details>
All Rights Reserved, 2009, TechTarget
27
Disaster Recovery Plan for Voice Communications
SYSTEM
OVERVIEW
EQUIPMENT Location:
Device Type:
Model No.:
Technical Specifications:
Network Interfaces:
Power Requirements;
System Serial #:
DNS Entry:
IP Address:
Other:
HOT SITE EQUIPMENT Provide details
SPECIAL APPLICATIONS
ASSOCIATED DEVICES
KEY CONTACTS
Hardware Vendor Provide details
System Owners Provide details
Database Owner Provide details
Application Owners Provide details
Software Vendors Provide details
Offsite Storage Provide details
Network Services Provide details
BACKUP STRATEGY for
SYSTEM TWO
Daily Provide details
Monthly Provide details
Quarterly Provide details
SYSTEM TWO
DISASTER RECOVERY
PROCEDURE
Scenario 1
Total Loss of Switch
Provide details
Scenario 2
Total Loss of Network
Provide details
All Rights Reserved, 2009, TechTarget
28
ADDENDUM
CONTACTS
Support Systems <date>
Support system
<Provide details>
Critical network assets <Provide details>
Critical interfaces <Provide details>
Critical files to restore <Provide details>
Critical network
services to restore
<Provide details>
Other services <Provide details>
All Rights Reserved, 2009, TechTarget
29
Appendix B – Suggested Forms
Damage Assessment Form
Key Business
Process Affected
Description Of Problem Extent Of Damage
_____________
Management of DR Activities Form
• During the disaster recovery process all activities will be
determined using a standard
structure;
• Where practical, this plan will need to be updated on a regular
basis throughout the
disaster recovery period;
• All actions that occur during this phase will need to be
recorded.
Activity Name:
Reference Number:
Brief Description:
Commencement
Date/Time
Completion
Date/Time
Resources Involved In Charge
__________________
All Rights Reserved, 2009, TechTarget
30
Disaster Recovery Event Recording Form
• All key events that occur during the disaster recovery phase
must be recorded.
• An event log shall be maintained by the disaster recovery team
leader.
• This event log should be started at the commencement of the
emergency and a copy
of the log passed on to the business recovery team once the
initial dangers have been
controlled.
• The following event log should be completed by the disaster
recovery team leader to
record all key events during disaster recovery, until such time
as responsibility is
handed over to the business recovery team.
Description of Disaster:
Commencement Date:
Date/Time DR Team Mobilized:
Activities Undertaken by DR
Team
Date and
Time
Outcome
Follow-On Action
Required
Disaster Recovery Team's Work Completed: <Date>
Event Log Passed to Business Recovery Team: <Date>
_________________
Disaster Recovery Activity Report Form
• On completion of the initial disaster recovery response the
DRT leader should prepare
a report on the activities undertaken.
• The report should contain information on the emergency, who
was notified and when,
action taken by members of the DRT together with outcomes
arising from those
actions.
• The report will also contain an assessment of the impact to
normal business
operations.
• The report should be given to business recovery team leader,
with a copy to senior
management, as appropriate.
• A disaster recovery report will be prepared by the DRT leader
on completion of the
initial disaster recovery response.
• In addition to the business recovery team leader, the report
will be distributed to
senior management
All Rights Reserved, 2009, TechTarget
31
The report will include:
• A description of the emergency or incident
• Those people notified of the emergency (including dates)
• Action taken by members of the DRT
• Outcomes arising from actions taken
• An assessment of the impact to normal business operations
• Assessment of the effectiveness of the BCP and lessons
learned
• Lessons learned
__________
Mobilizing the Disaster Recovery Team Form
• Following an emergency requiring recovery of technology
infrastructure assets, the
disaster recovery team should be notified of the situation and
placed on standby.
• The format shown below can be used for recording the
activation of the DR team
once the work of the damage assessment and emergency
response teams has been
completed.
Description of Emergency:
Date Occurred:
Date Work of Disaster Recovery Team Completed:
Name of Team
Member
Contact
Details
Contacted On
(Time / Date)
By Whom Response
Start Date
Required
Relevant Comments (e.g., Specific Instructions Issued)
___________
Mobilizing the Business Recovery Team Form
recovery team, the
business recovery team should be notified of the situation and
placed on standby.
shown below will be used for recording the
activation of the business
recovery team once the work of the disaster recovery team has
been completed.
Description of Emergency:
Date Occurred:
Date Work of Business Recovery Team Completed:
Name of Team
Member
Contact
Details
Contacted On
(Time / Date)
By Whom Response
Start Date
Required
All Rights Reserved, 2009, TechTarget
32
Relevant Comments (e.g., Specific Instructions Issued)
____________
Monitoring Business Recovery Task Progress Form
• The progress of technology and business recovery tasks must
be closely monitored
during this period of time.
• Since difficulties experienced by one group could significantly
affect other dependent
tasks it is important to ensure that each task is adequately
resourced and that the
efforts required to restore normal business operations have not
been underestimated.
Note: A priority sequence must be identified although, where
possible, activities will be carried out
simultaneously.
Recovery Tasks
(Order of Priority)
Person(s) Responsible
Completion Date Milestones
Identified
Other Relevant
Information Estimated Actual
1.
2.
3.
4.
5.
6.
7.
___________
Preparing the Business Recovery Report Form
should prepare a report
on the activities undertaken and completed.
ive
event, who was notified and
when, action taken by members of the BRT together with
outcomes arising from
those actions.
normal business
operations.
d to senior management, as
appropriate.
The contents of the report shall include:
taken
All Rights Reserved, 2009, TechTarget
33
business continuity plan
Communications Form
recovery activities that
all affected persons and organizations are kept properly
informed.
timely.
articular, any estimate of the timing to return to normal
working operations
should be announced with care.
with media queries.
Groups of Persons or
Organizations Affected
by Disruption
Persons Selected To Coordinate Communications
to Affected Persons / Organizations
Name Position Contact Details
Customers
Management & Staff
Suppliers
Media
Stakeholders
Others
____________
Returning Recovered Business Operations to Business Unit
Leadership
necessary to return the
responsibility for specific operations to the appropriate business
unit leader.
formalized in order to ensure that all
parties understand the
change in overall responsibility, and the transition to business-
as-usual.
responsibility may have been
assigned to the business recovery process lead.
involved throughout the
recovery, but in order for the recovery process to be fully
effective, overall
responsibility during the recovery period should probably be
with a business recovery
process team.
____________
All Rights Reserved, 2009, TechTarget
34
Business Process/Function Recovery Completion Form
The following transition form should be completed and signed
by the business recovery
team leader and the responsible business unit leader, for each
process recovered.
A separate form should be used for each recovered business
process.
Name Of Business Process
Completion Date of Work Provided by Business Recovery Team
Date of Transition Back to Business Unit Management
(If different than completion date)
I confirm that the work of the business recovery team has been
completed in accordance with the
disaster recovery plan for the above process, and that normal
business operations have been
effectively restored.
Business Recovery Team Leader Name:
________________________________________
Signature:
_____________________________________________________
___________
Date: __________________________
(Any relevant comments by the BRT leader in connection with
the return of this business process
should be made here.)
I confirm that above business process is now acceptable for
normal working conditions.
Name:
_____________________________________________________
______________
Title:
_____________________________________________________
_______________
Signature:
_____________________________________________________
___________
Date: __________________________
6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy
- CIO Journal - WSJ
https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery-
planning-10-lessons-learned-from-hurricane-sandy/ 1/6
One year ago, Hurricane Sandy struck, highlighting the crucial
role employees and
communications play in business continuity and the need to
create short-, medium-, and long-
range disaster recovery plans.
As Hurricane Sandy tore up the Atlantic coast in late October,
2012, 8.5 million homes and
businesses lost power, according to the U.S. Energy
Department. The protracted power outages,
widespread damage, and lost business wrought by the
hurricane—estimated to cost between
$30 and $50 billion, according to IHS Global Insight—taught
many companies unfortunate
lessons about the importance of disaster recovery planning.
David Sarabacha, a principal with Deloitte & Touche LLP who
specializes in resilience and
recovery planning, says Hurricane Sandy reminded business
leaders that thoughtful disaster
preparation can pay dividends for a company’s ability to
weather a storm. He identified 10
lessons from the recent hurricane that can help businesses better
prepare for the next crisis.
Lesson 1: Take care of your employees. When disaster strikes,
employees will rightfully put the
safety of their families and homes first. “It’s impossible for
employees to think about work when
they don’t have heat or electricity, water is rising in their
basements, their homes have been
destroyed, or they need to account for loved ones,” says
Sarabacha. “To the extent a company
can either help employees prepare for a disaster or get back on
their feet after one, the sooner it
can return to business as usual.”
Sarabacha advises organizations to do more for employees than
simply provide them with
suggestions for personal preparedness and home safety. For
example, he urges companies to
offer alternate communications capabilities to decision-makers.
He also recommends providing
basic necessities such as water, food, shelter, and daycare to
affected families, since private
companies may be able to mobilize faster than relief
organizations. And he counsels companies
to help employees find or get priority service from contractors
who can repair or rebuild their
homes.
CIO Insights and Analysis from Deloitte
CONTENT FROM OUR SPONSOR
Please note: The Wall Street Journal News Department was not
involved in the creation of the content below.
Disaster Recovery: 10 Lessons from
Hurricane Sandy
http://energy.gov/articles/hurricane-sandy-noreaster-situation-
reports
http://www.ihs.com/products/Global-Insight/industry-economic-
report.aspx?ID=1065972961
6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy
- CIO Journal - WSJ
https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery-
planning-10-lessons-learned-from-hurricane-sandy/ 2/6
While acknowledging that these “above-and-beyond” efforts can
grow costly, Sarabacha also
argues that the added investment may be justified if business
activities are truly time sensitive
and hinge on critical personnel.
Lesson 2: Crisis management, business continuity, and disaster
recovery plans should be
detailed. Sarabacha notes that many businesses’ disaster
recovery plans are fairly high level.
“Executives assume they’ll figure out the details when an event
takes place,” he says. “But if
business leaders don’t have sufficient lines of communication
available to share information,
make decisions, and disseminate instructions, their ability to
implement their plans will be
impaired.”
Sarabacha says disaster recovery plans should establish clear
chains of decision-making and
empower employees in the field to take action. They shouldn’t
have to wait for direction from a
senior leader, whose communications may be out of
commission.
“The sooner a company can take decisive actions in the event of
a disaster, the faster they may
be able to recover,” he says.
Lesson 3: Plan for different impacts, both in magnitude and
duration. One mistake
businesses make when drafting disaster recovery plans is
assuming an event will only affect their
organizations for 24 to 48 hours.
“Sandy brought to light the need for short-, medium-, and
longer-term business continuity plans,”
says Sarabacha. “Companies will likely need different disaster
recovery strategies for events of
different durations.”
For example, a two-day power outage may not require renting
back-up office space, but a two-
week power outage may. An investment bank may need to
transfer work to another office so that
it can process trades during a two-day or week-long outage, but
transferring work for longer
periods could result in burn-out for the employees taking on
additional responsibilities, notes
Sarabacha.
Lesson 4: Businesses can’t rely on employees’ ability to work
from home. Many
companies’ business continuity plans direct employees to
telecommute if they can’t get into the
office, according to Sarabacha. But, as Sandy illustrated, that
approach quickly falls apart if
employees lack power and can’t access the corporate network
from their homes.
One potential solution for large companies is to transfer work to
individuals at offices that haven’t
been affected. To implement this strategy effectively, says
Sarabacha, companies need to know
which individuals possess the skills to take on various
activities. Because their human resources
will be constrained and overwhelmed, they’ll also have to
prioritize what work gets done.
6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy
- CIO Journal - WSJ
https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery-
planning-10-lessons-learned-from-hurricane-sandy/ 3/6
“For example, if a company can only serve 50 percent of its
customers because it lacks capacity
in its call centers, the company needs to decide how it will
prioritize service,” says Sarabacha.
“Companies should seek to avoid a situation in which they are
devoting their scarce resources to
their least critical activities.”
Another possible solution is to set up alternate work sites
through real estate or insurance
companies that rent “just in time office space” on an hourly,
daily, or weekly basis. Companies
need to plan how they’ll get critical employees to these sites,
which may be located in
neighboring states, in the event air traffic or mass transit
systems are compromised, notes
Sarabacha. They will also need to board employees and their
families in hotels while employees
are working out of state, and they’ll have to cover, track, and
reimburse employees for incidentals
required while working off-site.
Lesson 5: Employ alternate forms of communication. During
Hurricane Sandy, the Federal
Communications Commission reported that 25 percent of cell
phone towers lost power, rendering
many mobile phones useless. Sarabacha advises companies to
use other communication
mechanisms, including satellite phones. “Be sure you can get a
sufficient uninterruptable power
supply (UPS) battery, diesel or other fueled generator to keep
the satellite phones charged,” he
says.
Lesson 6: Two alternate data center recovery sites are ideal.
After 9/11, many companies in
the Northeast moved their back-up data centers to sites closer to
home, in New Jersey, according
to Sarabacha. They switched from distant backup data centers to
closer ones because the
terrorist attacks shut down air travel, and companies wanted to
make sure their back-up locations
were within a commutable distance, he adds.
Because Sandy took out companies’ primary data centers in
New York and their back-up data
centers in New Jersey, the hurricane demonstrated the need to
ideally have two fallbacks, one
nearby and one far away. Sarabacha notes that not every
company can afford multiple data
centers, and some companies may have to accept that it could
take several days or a week to
recover their data centers.
Lesson 7: The cloud isn’t a panacea. Cloud-based applications
and storage have mitigated
some of the impact of disasters on companies. Because those
applications and data can still be
stored in the provider’s data center, the applications may still
be available to clients provided they
have power, and the data is at least theoretically recoverable or
protected.
“Too many organizations don’t fully understand what their
cloud providers offer in terms of
disaster recovery,” says Sarabacha. “They assume cloud data is
available. They need to know for
sure they can get their data and their apps, not to mention when
they can access them.”
http://www.fcc.gov/document/chairman-and-pshsb-chief-
statement-communications-network
6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy
- CIO Journal - WSJ
https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery-
planning-10-lessons-learned-from-hurricane-sandy/ 4/6
Lesson 8: Understand your vendors’ disaster recovery plans.
The Thursday after Sandy,
Sarabacha spoke with a client based in southern California
whose business was scrambling to
re-route products from its mid-Atlantic distribution center after
a logistics provider in the region
was shut down by the storm.
Sarabacha says his client’s conundrum illustrates the
importance of having insight into vendor
and service providers’ business continuity plans. His client
needed to know when and how the
logistics provider would restore service, given the pent-up
demand the storm created.
“Even if an event like a hurricane has a limited impact on your
organization, you need to realize
how it might affect your third parties and their plans for a
response given your reliance on them,”
he says.
Lesson 9: Test your plan. Sarabacha says few companies
extensively test their business
continuity and disaster recovery plans. They might test one data
center, but not another. They
might test data recovery, but not their ability to actively restore
dependent applications or to
synchronize disparate systems.
“I rarely see an integrated test that reflects what many
organizations were dealing with a few
weeks ago,” he says. “Realistic exercises and war games must
be developed and executed to
simulate both the anticipated and unknown circumstances an
organization may face.”
Lesson 10: Don’t make the same mistakes again. When
companies recover insurance money
for facilities lost or damaged by a natural disaster, they often
repair or rebuild those facilities
without applying lessons learned. Consequently, says
Sarabacha, those companies could find
themselves in the same position following the next storm.
In the aftermath of a disaster, Sarabacha advises clients to make
strategic and tactical
modifications to their operations and assets (e.g., buildings,
equipment, inventory, technology,
human resources, and vendors). For example, if a company kept
one kind of product in each
warehouse before a disaster, it might decide to diversify its
product mix across warehouses.
Making strategic and tactical changes might also mean
eliminating single points of failure,
upgrading equipment, hardening facilities, and using multiple
vendors for different services.
Companies that lack core competencies in crisis and disaster
risk management may consider
outsourcing or co-sourcing arrangements with third parties that
can help them plan, prepare, and
respond.
“Often it takes a swift reminder, whether an extreme weather
event such as Sandy or a
significantly lingering economic crisis, to demonstrate that
disaster preparations will continue to
be a good investment in protecting an organization’s personnel,
assets, and stock price.”
6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy
- CIO Journal - WSJ
https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery-
planning-10-lessons-learned-from-hurricane-sandy/ 5/6
November 29, 2012, 12:01 am
Questions? Write to deloitteeditor
Follow us on Twitter @Deloitte
This publication contains general information only and Deloitte
is not, by means of this publication, rendering accounting,
business, financial, investment, legal, tax, or other professional
advice or services. This publication is not a substitute for such
professional advice or services, nor should it be used as a basis
for any decision or action that may affect your business. Before
making any decision or taking any action that may affect your
business, you should consult a qualified professional advisor.
Deloitte shall not be responsible for any loss sustained by any
person who relies on this publication. About Deloitte: Deloitte
refers
to one or more of Deloitte Touche Tohmatsu Limited, a UK
private company limited by guarantee ("DTTL"), its network of
member
firms, and their related entities. DTTL and each of its member
firms are legally separate and independent entities. DTTL (also
referred to as "Deloitte Global") does not provide services to
clients. In the United States, Deloitte refers to one or more of
the US
member firms of DTTL, their related entities that operate using
the "Deloitte" name in the United States and their respective
affiliates. Certain services may not be available to attest clients
under the rules and regulations of public accounting. Please see
www.deloitte.com/us/about to learn more about our global
network of member firms. Copyright © 2019 Deloitte
Development LLC.
All rights reserved.
Search CIO Journal SEARCH
Related Deloitte Insights
DRaaS Offers Recovery Assurances Via Cloud
Most businesses would be crippled by an IT outage, yet building
and maintaining failover
capabilities is an expensive and daunting task. Businesses can
now leverage the cloud through
disaster recovery as a service to gain strategic business
continuity and disaster recovery
assurances.
How to Create IT Resilience
Without an effective IT resilience strategy, companies stand to
lose millions of dollars if critical systems fail. Learn
steps CIOs can take to help enhance and refine existing business
continuity and disaster recovery plans, and
lessen the impact of service disruption.
Editor's Choice
Cloud Accelerates AI Adoption
The cloud is democratizing access to AI, enabling more
companies to enjoy its benefits. Deloitte
Global predicts that organizations will accelerate their usage of
cloud-based AI software and
services this year, resulting in more cognitive-enabled
implementations, greater AI investments,
and increased rewards.
How Third-Party Data Can Enhance Analytics
A growing number of companies are seeking an analytical edge
by employing outside data
sources. Incorporating third-party information effectively,
however, can be tricky. To boost the
value of their companies’ analytics efforts, business leaders
may want to adopt some key
practices to navigate the complexity.
TMT CIOs: Business, IT Out of Sync on Cyber, Talent
An analysis from Deloitte’s Center for Technology, Media, and
Telecommunications (TMT) finds that many TMT
CIOs are looking to reshape their workforces by hiring talent
with problem-solving abilities, social aptitude, and
other soft skills. Survey results also indicate a need for more
collaboration related to cybersecurity and risk among
mailto:[email protected]
http://twitter.com/Deloitte
http://www.deloitte.com/us/about
https://deloitte.wsj.com/cio/2016/11/09/draas-offers-recovery-
assurances-via-cloud/?mod=Deloitte_cio_relatedInsights
https://deloitte.wsj.com/cio/2016/11/09/draas-offers-recovery-
assurances-via-cloud/?mod=Deloitte_cio_relatedInsights
https://deloitte.wsj.com/cio/2013/04/01/how-to-create-it-
resilience/?mod=Deloitte_cio_relatedInsights
https://deloitte.wsj.com/cio/2019/06/02/cloud-accelerates-ai-
adoption/?mod=Deloitte_cio_editorschoice
https://deloitte.wsj.com/cio/2019/06/02/cloud-accelerates-ai-
adoption/?mod=Deloitte_cio_editorschoice
https://deloitte.wsj.com/cio/2019/05/23/how-third-party-data-
can-enhance-analytics/?mod=Deloitte_cio_editorschoice
https://deloitte.wsj.com/cio/2019/05/23/how-third-party-data-
can-enhance-analytics/?mod=Deloitte_cio_editorschoice
https://deloitte.wsj.com/cio/2019/05/19/tmt-cios-business-it-
out-of-sync-on-cyber-talent/?mod=Deloitte_cio_editorschoice
6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy
- CIO Journal - WSJ
https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery-
planning-10-lessons-learned-from-hurricane-sandy/ 6/6
TMT CIOs, CISOs, and other leaders.
About Deloitte Insights
Deloitte Insights for CIOs couples broad business insights with
deep technical knowledge to help
executives drive business and technology strategy, support
business transformation, and
enhance growth and productivity. Through fact-based research,
technology perspectives and
analyses, case studies and more, Deloitte Insights for CIOs
informs the essential conversations
in global, technology-led organizations. Learn more
Copyright ©2017 Dow Jones & Company, Inc. All Rights
Reserved
This copy is for your personal, non-commercial use only. To
order presentation-ready copies for distribution to your
colleagues, clients or customers visit
http://www.djreprints.com.
https://deloitte.wsj.com/cio/2019/05/19/tmt-cios-business-it-
out-of-sync-on-cyber-talent/?mod=Deloitte_cio_editorschoice
http://www2.deloitte.com/us/en/pages/technology/articles/chief-
information-officer-cio-
insights.html?id=us:2el:3dc:ciopage:eng:cliexp:032317
Running Head: THE BRILLIANT, BARBAROUS AZTECS 1
THE BRILLIANT, BARBAROUS AZTECS
Submitted by
Jane Doe
El Centro College
HIST 1301, Section 55002, Summer 2016
Total Word Count: 1650
Running Head: THE BRILLIANT, BARBAROUS AZTECS 2
The term “Aztec” refers to the American Indian empire that
dominated central Mexico
(also known as Mesoamerica) when Hernán Cortés arrived on
the shores of the Yucatán
peninsula in 1519. Whenever we hear the term “Aztec” many
people usually imagine a culture
that was extremely violent and militaristic, a culture full of
human sacrifice and cannibalism. The
idea of the Aztecs as cannibals, savages, and generally
uncivilized peoples has its origins with
the conquest of the Aztecs by Cortés and Spanish colonists in
the sixteenth century, who used
such allegations as justifications for conquest and colonization.
But a careful examination of
Aztec history and society reveals another side to their
civilization. Their accomplishments in
mathematics, together with their techniques for measuring time
and surveying land use, as well
as their interest in astrology, enriches our understanding of
Aztec society. They were far more
sophisticated than a simple “civilized/uncivilized” binary
opposite, even by modern standards.
Thus, the central tenet of this essay is that the Aztecs were more
than barbarians and in fact were
quite sophisticated, especially in the areas of mathematics, their
techniques for measuring time
and surveying land use, and because of their interest in
astrology (Cartwright, 2014,
http://www.ancient.eu/Aztec_Civilization/; Bernal, 1963, pp 10-
11).
The Aztecs, according to their own legends, pinpoint their
origin to the place called
“Aztlan” which is located in northern Mexico or the modern-day
American Southwest. Many of
their own origin stories reference supernatural realms and
locations that anthropologist are still
trying to locate in geographic terms. In the twelfth century CE
before they rose to dominance in
central Mexico, the Aztecs lived on the margins of civilized
Mesoamerica (central Mexico). By
the thirteenth century the Aztecs had embarked on a period of
wandering and settled in the
Valley of Mexico. Later on, they continually fought with the
small city-states which also resulted
in shifting alliances. Afterwards, they took refuge on small
islands in Lake Texcoco in the Valley
http://www.ancient.eu/Aztec_Civilization/
Running Head: THE BRILLIANT, BARBAROUS AZTECS 3
of Mexico. In 1325 they founded the town of Tenochtitlán
(modern-day Mexico City). The story
of how the Aztec empire rose to dominance in the Valley of
Mexico during the 1300s is filled
with intrigue, violence, and bloodshed (Knight, 2002, pp 132-
134; Bernal, 1963, pp 12-15).
After the fall of the Toltec empire, which dominated the Valley
of Mexico, the region’s
politics were overshadowed by the external neighboring powers
and their successor states. “By
the thirteenth century, the Chichimec [Aztec] migrants were
establishing new territories in the
valley.” The dominant power in the Valley was the Tepanecas
based out of the city-state of
Azcapotzalco. In their migration the Aztecs had gradually
transitioned from being nomadic
hunters and gathers to learning how to farm corn. Throughout
their journey south to the Valley
of Mexico, which they had taken via Coatepec and Tula, they
periodically paused to farm. They
also became familiar with the rudiments of Mesoamerican
civilization such as military politics
and human sacrifice. Additionally, during their journey south
the Aztecs had developed a strong
belief in a Toltec deity named Huitzilopochtli, who eventually
became the top-ranking deity in
their pantheon (Knight, 2002, pp 132-134; Bernal, 1963, pp 16-
18).
When the Aztecs were newly arrived in the Valley of Mexico,
they occupied a low
position in regional politics and prestige. As their number
increased, they eventually established
themselves through military skill. Later on, in 1319, they were
attacked by the Tepanecas
because the Tepanecas were engaged in the struggle to dominate
the valley and they disdained
outsiders. As a result the Aztecs moved to the rocky, snake
infested island of Tizzapan on Lake
Texcoco (where today stands the central campus of UNAM,
Mexico’s national university
system). On the island the Aztecs survived by eating snakes.
Little by little the Aztecs on
Tizzapan began building homes, temples, and other structures
out of rocks and soil. They also
Running Head: THE BRILLIANT, BARBAROUS AZTECS 4
began serving as mercenaries in the wars between city-states in
the Valley (Knight, 2002, pp
137-138).
One colorful story related by the Aztecs tells how their war-
like nature set them apart
from the other, agricultural groups inhabiting the Valley. After
helping the city-state of Culhucan
win several important victories, the Culhua ruler named
Achitometl offered his beautiful
daughter to the Aztecs as a marriage gift. The Aztecs priests
flayed her and used her skin to
drape an Aztec priest. This resulted in a war between the two
groups. According to the Aztecs,
Huitzilopochtli spoke to the Aztec priests in visions and
dreams, advising, “Go from here calmly
and cautiously.” Again, they resumed their travels. In another
part of the Valley their priests had
another vision. Here, they beheld Huitzilopochtili’s prophecy
signaling the place to build a
permanent settlement: an eagle perched on a cactus, devouring a
snake. On this spot the Aztecs
began building Tenochtitlan, which would became a city on the
lake and later the Aztec capital
and location of Aztec advances in mathematics, time
measurement, and religion (Knight, 2002,
pp 137-139; Bernal, 1963 pp 18-20).
The mathematical accomplishment of the Aztecs is concerned
with their number system
and their notation of area. Unlike today’s mathematics, “they
followed a vigesimal system.” In
that system, their counting was based on the units of twenty,
and they also used subsets of units
of five. We can also observe this in the Nahuatl number where
the word for “six” actually means
“five plus one.” Additionally, to refer to large number such as
400 (20x20), they called it tzontli
which means hair or growth of garden herbs. Likewise, for 8000
(20x20x20), they referred it as
xiquipilli or bag of cocao beans. Furthermore, their vigesimal
system used number words for
numbers. For example, One-Ce, Two-Ome, Three-Ei or Yei,
Four- Macuilli and so forth.
Additionally, “the Aztec’s notation system was different than
the present [western] notation
Running Head: THE BRILLIANT, BARBAROUS AZTECS 5
system.” We write the numbers in the horizontal fashion
whereas the Aztecs wrote in the vertical
fashion. The value of that symbol was determined by the
location of the number in that vertical
stack or fashion (Van Tuerenhout, 2005, pp 225-226).
An Aztec manuscript titled the Matrícula de Tributos in Spanish
(the counting of tribute),
which details the taxes and other tribute collected from
neighboring city-states in the sixteenth
century, provides examples of this different notation system.
For example, a dot represented one,
a representation of flag represented ‘twenty’, and a rough
symbol of feather represented ‘400’
and so forth. The Matrícula de Tributos also shows symbol used
to refer to area. They used to
draw picture of mantle to represent area. Sometimes, they also
added another set of symbol to it
which represented the size of mantle. For example, they put two
finger on the top to signal that
the size of mantle requested is twice. Those fingers represented
two brazas which was a
measurement of distance and its metric equivalence is still
unknown. Two colonial-era
documents (i.e., written after 1519), the Codíce de Santa María
Asunción and the Codex
Vergara, relate that “the standard unit of measurement was
called Quahuitl which is
approximately equivalent to 2.5m.” They used dots and the lines
to represent the width and
length of the fields in Quahuitl. A dot was considered to be
valued as “20” and a line was
considered “1.” Archeologists and modern scholars, working
with the notion of Quahuitl, have
found that the Aztecs used a quantity similar to our hectare
(Van Tuerenhout, 2005, pp 226-227).
The Aztecs, who relied on the complex system of measurement
to calculate celestial data,
also used these data to structure their daily lives. As a result
they had a sophisticated calendar
system. The Aztec calendar consists of two cycles. One cycle
consisted of 260 days which they
called Tonalpohualli. The other consisted of 365 days and was
called Xihuitl. The term
Tonalpohualli meant “counting of the days.” This calendar was
comprised of 260 days obtained
Running Head: THE BRILLIANT, BARBAROUS AZTECS 6
by combining 13-day names with 20-day signs. Some of the
examples of the 20-day signs in this
calendar were Cipactli (alligator), Ehecatl (Wind), Calli
(House), Cuetzapalin (Lizard) and so
forth. The major purpose of the Tonalpohualli calendar was to
organize festivals for their patron
deities. Other Mesoamerican civilization used aspects of the
Tonalpohualli calendar. Unlike the
Tonalpohualli calendar, the “Xihuitl consisted of 365 days.” It
was made up of 18 units, and each
unit contained 20 days in them. The Aztecs added extra 5 days
to complete 365 days, and those
five days were called as nemontemi. In our calendar, we refer to
specific years by assigning
numbers to them. However, the Aztecs identified their calendar
years by the day name on which
they began. The months were named in the honor of gods and
the each month were associated
with belief system such as when to start war, when to sow
crops, when to harvest them and so
forth. The examples of Aztec months are Atlcahualo (sacrifice
of children for rain),
Tlacaxipeualitzili (slaves and war captives were sacrificed),
Tozoztontli (children were
sacrificed), Huei Tozoztli (self-sacrifice to impress goddess of
corn) and so forth (Van
Tuerenhout, 2005, pp 227-228).
Moreover, there was one more calendar known as Xiuhmolpilli,
which combined the
previous two calendars and consisted of a 52-year period. “This
calendar was the combination of
Tonalpohualli and Xihuitl, and was integrated to a much larger
cycle of 52 years.” In this
calendar, the dates were identified by their signed codes. These
signed codes were based on the
codes used in the previous shorter calendars. The combination
codes were designed in such a
way that they repeated themselves after every 52 years. From
this calendar, we can learn that the
Aztecs had planning and schedule for 52 years, similar to the
planning based on 100-year periods
used in western societies (i.e., the century). The Aztecs believed
that unless they celebrated the
passing of the 52 with great ceremony and pomp, creation
would be placed in jeopardy. The
Running Head: THE BRILLIANT, BARBAROUS AZTECS 7
Aztecs had a complex system of religious beliefs that combined
celestial calculations with belief
in omens (Van Tuerenhout, 2005, p 229; Bernal, 1963, 25-26).
Though not scientific in their approach to it, the Aztecs were
fascinated with astrology
and celestial phenomena. They had a complex understanding of
events in the night sky. They
went to great lengths to interpret celestial phenomena and
weave their understanding of it into
significant events affecting Aztec society. According Mexican
scholar Leon Miguel-Portilla, in
the years leading up to the conquest of Mexico by Spaniards,
“there were eight bad omens as
described in the original text of Nahuatl of Sahagún’s native
informants.” Bernardino de
Sahagún was a Spanish priest who trained Aztec scribes to write
in Spanish after the conquest.
Many of these scribes also wrote in Nahuatl. According to the
Nahuatl texts, “the first bad omen
appeared in the sky ten years before the Spaniards first came to
the valley.” The text mentions
that there was “flaming ears of corn” or fiery signals in the sky
which seemed to bleed fire. In the
fourth omen fire streamed through the sky while the sun was
still shining, flashing along the
horizon after sunset to where the sun rises. Though they did not
understand these celestial events
the Aztecs linked inexplicable phenomena to important,
historical events affecting their society.
This demonstrated the Aztecs’ interest in linking the various
complicated components of the
everyday world they inhabited, before and after the Spanish
conquest in the early sixteenth
century (Leon Portilla, 1992, pp 1-4; Bernal, 1963, pp125-126).
Considering the Aztecs traditional rule of human sacrifice, we
can conclude that their
civilization had violent and “barbarous” aspects, according to
our present standards. This
conclusion is supported by archaeologist Carla M. Sinopoli’s
article, in which Sinopoli states
that the Aztec empire had a “vast number of human sacrifice in
their culture.” Whenever we hear
the term “Aztec” many people usually imagine a culture that
was extremely violent and
Running Head: THE BRILLIANT, BARBAROUS AZTECS 8
militaristic, a culture full of human sacrifice and cannibalism.
Instead of a strict
“civilized/uncivilized” dichotomy, however, we can appreciate
their history and culture which
led to intellectual accomplishments in mathematics, techniques
for measuring time and surveying
land use, and their interest in astrology. These areas
demonstrate that the Aztecs were more than
barbarians or savages. Who today would argue that nations,
such as the United States, China,
England, France, and Russia, are not sophisticated, simply
because they have enormous military
potential? Together these countries have enough nuclear
weapons to destroy all life on earth, yet
few people would argue that as a result they are uncivilized
nations. On the contrary most people
would argue these nations lead the world in technological and
scientific accomplishments.
Similarly, it’s possible to argue that the Aztecs were not only
barbarous and violent, according to
our standards. They also had many sophisticated intellectual
accomplishments, even by our
standards (Sinopoli, 1994, pp 159-80).
T
Running Head: THE BRILLIANT, BARBAROUS AZTECS 9
Bibliography
Primary Source:
Leon Portilla, Miguel (Ed.). (1992). The broken spears: the
Aztec account of the conquest of
Mexico. Translated by Lysander Kemp. Boston, MA: Beacon
Press.
Scholarly Book:
Bernal, Igancio. (1963). Mexico before Cortez: art, history, and
legend.
Garden City, New York: Doubleday.
Knight, Alan. (2002). Mexico: from the beginning to the
Spanish conquest. Cambridge:
Cambridge University Press.
Van Tuerenhout, Dirk R. The Aztecs: new perspectives. Santa
Barbara, CA: ABC-CLIO.
Scholarly Journal Article:
Sinpoli, Carla M. (1994). The archaeology of empires. Annual
review of anthropology, 23 (1),
159-180.
Encyclopedia Article:
Cartwright, Mark. (2014). Aztec civilization. Retrieved from the
Ancient History Encyclopedia
website: http://www.ancient.eu/Aztec_Civilization/
http://www.ancient.eu/Aztec_Civilization/
FINAL RESEARCH PAPER RUBRIC
Dr. Moralez
2019
The purpose of the Rubric is to provide students with clear
guidelines about how your instructor
will evaluate your final research paper.
1. Thesis and APA Format: ______/35
Does the final draft have a clear, unambiguous thesis? Does it
follow APA format
for citations? Are page numbers from citations included? Are
there transitions
between sections? Is there a conclusion? Is the grammar and
spelling correct?
2. Primary Source: ______/10
Source must be integrated into overall argument; merely
mentioning it once is not
sufficient.
3. Scholarly book: ______/10
Source must be integrated into overall argument; merely
mentioning it once is not
sufficient.
4. Scholarly Journal Article: ______/10
Source must be integrated into overall argument; merely
mentioning it once is not
sufficient.
5. Encyclopedia Entry with Author: ______/10
Source must be integrated into overall argument; merely
mentioning it once is not
sufficient.
6. Word Count: ______/10
The paper must be 1400-1650 words, with word count on title
page.
7. References Page: ______/10
Must follow APA template provided by instructor.
8. Title Page: ______/5
Must follow APA template provided by instructor. Must list
total word count.
9. Final Total: ______/100
Final Grade:

More Related Content

Similar to APA Reference List Examples Book with Single Author .docx

Environmental scanning
Environmental scanningEnvironmental scanning
Environmental scanningKhushi Tamu
 
MGT 3319 Management Theory and Practice Milestone 2 F.docx
 MGT 3319 Management Theory and Practice Milestone 2 F.docx MGT 3319 Management Theory and Practice Milestone 2 F.docx
MGT 3319 Management Theory and Practice Milestone 2 F.docx
gertrudebellgrove
 
MGT 3319 Management Theory and Practice Milestone 2 F.docx
MGT 3319 Management Theory and Practice Milestone 2 F.docxMGT 3319 Management Theory and Practice Milestone 2 F.docx
MGT 3319 Management Theory and Practice Milestone 2 F.docx
gertrudebellgrove
 
THE WRITING PROCESS - WRITING YOUR RESEARCH REPORT
THE WRITING PROCESS - WRITING YOUR RESEARCH REPORTTHE WRITING PROCESS - WRITING YOUR RESEARCH REPORT
THE WRITING PROCESS - WRITING YOUR RESEARCH REPORT
merryccar023
 
Running head GLOBAL SOCIETAL ISSUE .docx
Running head GLOBAL SOCIETAL ISSUE                               .docxRunning head GLOBAL SOCIETAL ISSUE                               .docx
Running head GLOBAL SOCIETAL ISSUE .docx
cowinhelen
 
Dean R Berry Global Warming: Real or Fake News?
Dean R Berry Global Warming: Real or Fake News? Dean R Berry Global Warming: Real or Fake News?
Dean R Berry Global Warming: Real or Fake News?
Riverside County Office of Education
 
Parris Presentation
Parris PresentationParris Presentation
Parris PresentationNEXTDC
 
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docx
Tool  Opinion SpaceTypical Actions  Opinion mapping softwa.docxTool  Opinion SpaceTypical Actions  Opinion mapping softwa.docx
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docx
juliennehar
 
Bcrs coming to market power point
Bcrs coming to market power pointBcrs coming to market power point
Bcrs coming to market power point
Frank Davis
 
Outline Puzzle ApproachComplete this outline for the body porti.docx
Outline Puzzle ApproachComplete this outline for the body porti.docxOutline Puzzle ApproachComplete this outline for the body porti.docx
Outline Puzzle ApproachComplete this outline for the body porti.docx
jacksnathalie
 
Research essa.docx
Research essa.docxResearch essa.docx
Research essa.docx
tawnyataylor528
 
Apa Style Bibliographic Description
Apa Style Bibliographic DescriptionApa Style Bibliographic Description
Apa Style Bibliographic Description
Lauren Kipaan
 
Annotated Bibliography Definition Definitions annota.docx
Annotated Bibliography Definition Definitions  annota.docxAnnotated Bibliography Definition Definitions  annota.docx
Annotated Bibliography Definition Definitions annota.docx
justine1simpson78276
 
Eco america cred-2014-connecting-on-climate
Eco america cred-2014-connecting-on-climateEco america cred-2014-connecting-on-climate
Eco america cred-2014-connecting-on-climate
Sustainable Brands
 
Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...
Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...
Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...
climate central
 
COMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCE
COMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCECOMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCE
COMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCE
Lauren Bradshaw
 

Similar to APA Reference List Examples Book with Single Author .docx (20)

Apa style ubc
Apa style ubcApa style ubc
Apa style ubc
 
Apa _ orientações
Apa _ orientaçõesApa _ orientações
Apa _ orientações
 
Environmental scanning
Environmental scanningEnvironmental scanning
Environmental scanning
 
Tracy_Final_Power_Pt_Presentation_DBA_8522_
Tracy_Final_Power_Pt_Presentation_DBA_8522_Tracy_Final_Power_Pt_Presentation_DBA_8522_
Tracy_Final_Power_Pt_Presentation_DBA_8522_
 
MGT 3319 Management Theory and Practice Milestone 2 F.docx
 MGT 3319 Management Theory and Practice Milestone 2 F.docx MGT 3319 Management Theory and Practice Milestone 2 F.docx
MGT 3319 Management Theory and Practice Milestone 2 F.docx
 
MGT 3319 Management Theory and Practice Milestone 2 F.docx
MGT 3319 Management Theory and Practice Milestone 2 F.docxMGT 3319 Management Theory and Practice Milestone 2 F.docx
MGT 3319 Management Theory and Practice Milestone 2 F.docx
 
THE WRITING PROCESS - WRITING YOUR RESEARCH REPORT
THE WRITING PROCESS - WRITING YOUR RESEARCH REPORTTHE WRITING PROCESS - WRITING YOUR RESEARCH REPORT
THE WRITING PROCESS - WRITING YOUR RESEARCH REPORT
 
Running head GLOBAL SOCIETAL ISSUE .docx
Running head GLOBAL SOCIETAL ISSUE                               .docxRunning head GLOBAL SOCIETAL ISSUE                               .docx
Running head GLOBAL SOCIETAL ISSUE .docx
 
Dean R Berry Global Warming: Real or Fake News?
Dean R Berry Global Warming: Real or Fake News? Dean R Berry Global Warming: Real or Fake News?
Dean R Berry Global Warming: Real or Fake News?
 
Parris Presentation
Parris PresentationParris Presentation
Parris Presentation
 
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docx
Tool  Opinion SpaceTypical Actions  Opinion mapping softwa.docxTool  Opinion SpaceTypical Actions  Opinion mapping softwa.docx
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docx
 
Bcrs coming to market power point
Bcrs coming to market power pointBcrs coming to market power point
Bcrs coming to market power point
 
Outline Puzzle ApproachComplete this outline for the body porti.docx
Outline Puzzle ApproachComplete this outline for the body porti.docxOutline Puzzle ApproachComplete this outline for the body porti.docx
Outline Puzzle ApproachComplete this outline for the body porti.docx
 
Research essa.docx
Research essa.docxResearch essa.docx
Research essa.docx
 
Apa Style Bibliographic Description
Apa Style Bibliographic DescriptionApa Style Bibliographic Description
Apa Style Bibliographic Description
 
Annotated Bibliography Definition Definitions annota.docx
Annotated Bibliography Definition Definitions  annota.docxAnnotated Bibliography Definition Definitions  annota.docx
Annotated Bibliography Definition Definitions annota.docx
 
issue11
issue11issue11
issue11
 
Eco america cred-2014-connecting-on-climate
Eco america cred-2014-connecting-on-climateEco america cred-2014-connecting-on-climate
Eco america cred-2014-connecting-on-climate
 
Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...
Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...
Effects of Climate Variability and Change on Forest Ecosystems: A Comprehensi...
 
COMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCE
COMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCECOMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCE
COMPLETE GUIDE ON WRITING A DEFINITION ESSAY ON ENVIRONMENTAL SCIENCE
 

More from festockton

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
festockton
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
festockton
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
festockton
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docx
festockton
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
festockton
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docx
festockton
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
festockton
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docx
festockton
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docx
festockton
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docx
festockton
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docx
festockton
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docx
festockton
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
festockton
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
festockton
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docx
festockton
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docx
festockton
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docx
festockton
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docx
festockton
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docx
festockton
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
festockton
 

More from festockton (20)

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docx
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docx
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docx
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docx
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docx
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docx
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docx
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docx
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docx
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docx
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docx
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docx
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
Special education needs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
Sayali Powar
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Sourabh Kumar
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 

APA Reference List Examples Book with Single Author .docx

  • 1. APA Reference List Examples Book with Single Author: Gore, A. (2006). An inconvenient truth: The planetary emergency of global warming and what we can do about it. Emmaus, PA: Rodale. In-text reference: (Gore, 2006) Book with Two Authors: Michaels, P. J., & Balling, R. C., Jr. (2000). The satanic gases: Clearing the air about global warming. Washington, DC: Cato Institute. In-text reference: (Michaels & Balling, 2000) Book with Editor as Author:
  • 2. Galley. K. E. (Ed.). (2004). Global climate change and wildlife in North America. Bethesda, MD: Wildlife Society. In-text reference: (Galley, 2004) Brochure or Pamphlet: New York State Department of Health. (2002). After a sexual assault. [Brochure]. Albany, NY: Author. In-text reference: (New York, 2002) An Anonymous Book: Environmental resource handbook. (2001). Millerton, NY: Grey House. In-text reference: (Environmental Resource Handbook, 2001)
  • 3. Articles in Reference Books (unsigned and signed): Greenhouse effect. (2005). American heritage science dictionary. Boston, MA: Houghton Mifflin. Schneider, S. H. (2000). Greenhouse effect. World book encyclopedia (Millennium ed. Vol. 8, pp. 382-383). Chicago, IL: World Book. In-text references: (Greenhouse effect, 2005) (Schneider, 2000) Magazine Articles: Allen, L. (2004, August). Will Tuvalu disappear beneath the sea? Global warming threatens to swamp a small island nation. Smithsonian, 35(5), 44-52.
  • 4. Begley, S., & Murr, A. (2007, July 2). Which of these is not causing global warming? A. Sport utility vehicles; B. Rice fields; C. Increased solar output. Newsweek, 150(2), 48-50. In-text references: (Allen, 2004) (Begley, 2007) Newspaper Articles (unsigned and signed): College officials agree to cut greenhouse gases. (2007, June 13). Albany Times Union, p. A4. Landler, M. (2007, June 2). Bush’s Greenhouse Gas Plan Throws Europe Off Guard. New York Times, p. A7. In-text references: (“College Officials”, 2007) (Landler, 2007) Journal Article with Continuous Paging:
  • 5. Miller-Rushing, A. J., Primack, R. B., Primack, D., & Mukunda, S. (2006). Photographs and herbarium specimens as tools to document phonological changes in response to global warming. American Journal of Botany, 93, 1667- 1674. In-text reference: (Miller-Rushing, Primack, Primack, & Mukunda, 2006) Journal Article when each issue begins with p.1: Bogdonoff, S., & Rubin, J. (2007). The regional greenhouse gas initiative: Taking action in Maine. Environment, 49(2), 9-16. In-text reference: (Bogdonoff & Rubin, 2007) Journal Article from a Library Subscription Service Database with a DOI (digital object identifier):
  • 6. Mora, C., & Maya, M. F. (2006). Effect of the rate of temperature increase of the dynamic method on the heat tolerance of fishes. Journal of Thermal Biology, 31, 337-341. doi: 10.101b/jtherbio.2006.01.055 In-text reference: (Mora & Maya, 2006) Website: United States Environmental Protection Agency. (2007, May 4). Climate Change. Retrieved From the Environmental Protection Agency website: http://www.epa.gov/climatechange In-text reference: (United States Environmental, 2007) Gelspan, R. (2007). The Heat Is Online. Lake Oswego, OR: Green House Network. Retrieved from The Heat Is Online website: http://www.heatisonline.org
  • 7. In-text reference: (Gelspan, 2007) These are the MOST COMMON examples cited. For a complete list of examples please consult Publication manual of the American Psychological Association, 6 th ed. (REF BF 76.7 .P83 2010). Feel free to ask for help at the Library’s Reference/Information Desk (585-785-1432) or at the Write Place (585-785-1601). cc 01/2011rev http://www.heatisonline.org/
  • 8. <Client Name> IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP
  • 9. All Rights Reserved, 2009, TechTarget 2 Revision History REVISION DATE NAME DESCRIPTION Original 1.0 All Rights Reserved, 2009, TechTarget 3 Table of Contents Information Technology Statement of Intent ...................................................................... 5 Policy Statement ............................................................................................... .................. 5
  • 10. Objectives ............................................................................................... ............................ 5 Key Personnel Contact Info ............................................................................................... . 6 Notification Calling Tree ..................................................................................... .......... . 7 External Contacts ............................................................................................... ................. 8 External Contacts Calling Tree ..................................................................................... 10 1 Plan Overview ............................................................................................... ............ 11 1.1 Plan Updating................................................................................. ................... 11 1.2 Plan Documentation Storage............................................................................. 11 1.3 Backup Strategy ............................................................................................... . 11 1.4 Risk Management
  • 11. ............................................................................................. 11 2 Emergency Response ............................................................................................... . 12 2.1 Alert, escalation and plan invocation ................................................................ 12 2.1.1 Plan Triggering Events ................................................................................. 12 2.1.2 Assembly Points ............................................................................................ 12 2.1.3 Activation of Emergency Response Team .................................................... 12 2.2 Disaster Recovery Team ................................................................................... 13 2.3 Emergency Alert, Escalation and DRP Activation ........................................... 13 2.3.1 Emergency Alert ........................................................................................... 13 2.3.2 DR Procedures for Management ................................................................... 14 2.3.3 Contact with Employees ............................................................................... 14
  • 12. 2.3.4 Backup Staff....................................................................................... ........... 14 2.3.5 Recorded Messages / Updates ...................................................................... 14 2.3.7 Alternate Recovery Facilities / Hot Site ....................................................... 14 2.3.8 Personnel and Family Notification ............................................................... 14 3 Media ........................................................................................... .... ......................... 15 3.1 Media Contact ............................................................................................... .... 15 3.2 Media Strategies............................................................................ .... ................ 15 3.3 Media Team ............................................................................................... ....... 15 3.4 Rules for Dealing with Media ........................................................................... 15 4 Insurance ............................................................................................... .................... 15
  • 13. 5 Financial and Legal Issues ....................................................................................... . 16 5.1 Financial Assessment ........................................................................................ 16 5.2 Financial Requirements .................................................................................... 16 5.3 Legal Actions ............................................................................................... ..... 16 6 DRP Exercising ............................................................................................... .......... 16 Appendix A – Technology Disaster Recovery Plan Templates........................................ 17 Disaster Recovery Plan for <System One> .................................................................. 17 Disaster Recovery Plan for <System Two> .................................................................. 19 Disaster Recovery Plan for Local Area Network (LAN).............................................. 21 Disaster Recovery Plan for Wide Area Network (WAN) ............................................. 23 All Rights Reserved, 2009, TechTarget
  • 14. 4 Disaster Recovery Plan for Remote Connectivity ........................................................ 25 Disaster Recovery Plan for Voice Communications .................................................... 27 Appendix B – Suggested Forms ....................................................................................... 29 Damage Assessment Form ............................................................................................ 29 Management of DR Activities Form ............................................................................. 29 Disaster Recovery Event Recording Form ................................................................... 30 Disaster Recovery Activity Report Form ..................................................................... 30 Mobilizing the Disaster Recovery Team Form ............................................................. 31 Mobilizing the Business Recovery Team Form............................................................ 31 Monitoring Business Recovery Task Progress Form.................................................... 32 Preparing the Business Recovery Report Form ............................................................ 32
  • 15. Communications Form....................................................................................... ........... 33 Returning Recovered Business Operations to Business Unit Leadership .................... 33 Business Process/Function Recovery Completion Form .............................................. 34 All Rights Reserved, 2009, TechTarget 5 Information Technology Statement of Intent This document delineates our policies and procedures for technology disaster recovery, as well as our process-level plans for recovering critical technology platforms and the telecommunications infrastructure. This document summarizes our recommended procedures. In the event of an actual emergency situation, modifications to this document may be made to ensure physical safety of our people, our systems, and our data.
  • 16. Our mission is to ensure information system uptime, data integrity and availability, and business continuity. Policy Statement Corporate management has approved the following policy statement: recovery plan. requirements for the disaster recovery plan. er all essential and critical infrastructure elements, systems and networks, in accordance with key business activities. simulated environment to ensure that it can be implemented in emergency situations and that the management and staff understand how it is to be executed. and their own respective roles.
  • 17. account changing circumstances. Objectives The principal objective of the disaster recovery program is to develop, test and document a well-structured and easily understood plan which will help the company recover as quickly and effectively as possible from an unforeseen disaster or emergency which interrupts information systems and business operations. Additional objectives include the following: • The need to ensure that all employees fully understand their duties in implementing such a plan • The need to ensure that operational policies are adhered to within all planned activities • The need to ensure that proposed contingency arrangements are cost-effective • The need to consider implications on other company sites • Disaster recovery capabilities as applicable to key customers,
  • 18. vendors and others All Rights Reserved, 2009, TechTarget 6 Key Personnel Contact Info Name, Title Contact Option Contact Number Work Alternate Mobile Home Email Address Alternate Email Work Alternate Mobile Home
  • 19. Email Address Alternate Email Work Alternate Mobile Home Email Address Alternate Email Work Alternate Mobile Home Email Address Alternate Email Work Alternate
  • 20. Mobile Home Email Address Alternate Email Work Alternate Mobile Home Email Address Alternate Email All Rights Reserved, 2009, TechTarget 7 Notification Calling Tree
  • 21. Person Identifying Incident All Rights Reserved, 2009, TechTarget 8 External Contacts Name, Title Contact Option Contact Number
  • 22. Landlord / Property Manager Account Number None Work Mobile Home Email Address Power Company Account Number Work Mobile Home Email Address Telecom Carrier 1 Account Number Work Mobile Fax Home Email Address
  • 23. Telecom Carrier 2 Account Number Work Mobile Home Email Address Hardware Supplier 1 Account Number Work Mobile Emergency Reporting Email Address Server Supplier 1 Account Number. Work Mobile Fax Email Address Workstation Supplier 1
  • 24. Account Number Work Mobile Home Email Address Office Supplies 1 Account Number C3095783 Work Mobile Home Email Address All Rights Reserved, 2009, TechTarget 9 Name, Title Contact Option Contact Number Insurance – Name Account Number Work Mobile Home
  • 25. Email Address Site Security – Account Number Work Mobile Home Email Address Off-Site Storage 1 Account Number Work Mobile Home Email Address Off-Site Storage 2 Account Number User ID Password Home Email Address
  • 26. HVAC – Account Number Work Mobile Home Email Address Power Generator – Account Number Work Mobile Home Email Address Other – Account Number Work Mobile Home Email Address
  • 27. All Rights Reserved, 2009, TechTarget 10 External Contacts Calling Tree
  • 28. All Rights Reserved, 2009, TechTarget 11 1 Plan Overview 1.1 Plan Updating It is necessary for the DRP updating process to be properly structured and controlled.
  • 29. Whenever changes are made to the plan they are to be fully tested and appropriate amendments should be made to the training materials. This will involve the use of formalized change control procedures under the control of the IT Director. 1.2 Plan Documentation Storage Copies of this Plan, CD, and hard copies will be stored in secure locations to be defined by the company. Each member of senior management will be issued a CD and hard copy of this plan to be filed at home. Each member of the Disaster Recovery Team and the Business Recovery Team will be issued a CD and hard copy of this plan. A master protected copy will be stored on specific resources established for this purpose. 1.3 Backup Strategy Key business processes and the agreed backup strategy for each are listed below. The strategy chosen is for a fully mirrored recovery site at the
  • 30. company’s offices in _____. This strategy entails the maintenance of a fully mirrored duplicate site which will enable instantaneous switching between the live site (headquarters) and the backup site. KEY BUSINESS PROCESS BACKUP STRATEGY IT Operations Fully mirrored recovery site Tech Support - Hardware Fully mirrored recovery site Tech Support - Software Fully mirrored recovery site Facilities Management Fully mirrored recovery site Email Fully mirrored recovery site Purchasing Fully mirrored recovery site Disaster Recovery Fully mirrored recovery site Finance Fully mirrored recovery site Contracts Admin Fully mirrored recovery site Warehouse & Inventory Fully mirrored recovery site Product Sales Fully mirrored recovery site Maintenance Sales Fully mirrored recovery site
  • 31. Human Resources Off-site data storage facility Testing Fully Mirrored Recovery site - Fully mirrored recovery site Workshop Fully Mirrored Recovery site - Fully mirrored recovery site Call Center Fully mirrored recovery site Web Site Fully mirrored recovery site 1.4 Risk Management There are many potential disruptive threats which can occur at any time and affect the normal business process. We have considered a wide range of potential threats and the All Rights Reserved, 2009, TechTarget 12 results of our deliberations are included in this section. Each potential environmental disaster or emergency situation has been examined. The focus here is on the level of business disruption which could arise from each type of
  • 32. disaster. Potential disasters have been assessed as follows: Potential Disaster Probability Rating Impact Rating Brief Description Of Potential Consequences & Remedial Actions Flood 3 4 All critical equipment is located on 1st Floor Fire 3 4 FM200 suppression system installed in main computer centers. Fire and smoke detectors on all floors. Tornado 5 Electrical storms 5 Act of terrorism 5 Act of sabotage 5 Electrical power failure 3 4 Redundant UPS array together with auto standby generator that is tested weekly & remotely monitored 24/7. UPSs also remotely monitored.
  • 33. Loss of communications network services 4 4 Two diversely routed T1 trunks into building. WAN redundancy, voice network resilience Probability: 1=Very High, 5=Very Low Impact: 1=Total destruction, 5=Minor annoyance 2 Emergency Response 2.1 Alert, escalation and plan invocation 2.1.1 Plan Triggering Events Key trigger issues at headquarters that would lead to activation of the DRP are: • Total loss of all communications • Total loss of power • Flooding of the premises • Loss of the building 2.1.2 Assembly Points Where the premises need to be evacuated, the DRP invocation plan identifies two evacuation assembly points: • Primary – Far end of main parking lot;
  • 34. • Alternate – Parking lot of company across the street 2.1.3 Activation of Emergency Response Team When an incident occurs the Emergency Response Team (ERT) must be activated. The ERT will then decide the extent to which the DRP must be invoked. All employees must be issued a Quick Reference card containing ERT contact details to be used in the event of a disaster. Responsibilities of the ERT are to: All Rights Reserved, 2009, TechTarget 13 • Respond immediately to a potential disaster and call emergency services; • Assess the extent of the disaster and its impact on the business, data center, etc.; • Decide which elements of the DR Plan should be activated; • Establish and manage disaster recovery team to maintain vital services and return to normal operation; • Ensure employees are notified and allocate responsibilities and activities as required.
  • 35. 2.2 Disaster Recovery Team The team will be contacted and assembled by the ERT. The team's responsibilities include: • Establish facilities for an emergency level of service within 2.0 business hours; • Restore key services within 4.0 business hours of the incident; • Recover to business as usual within 8.0 to 24.0 hours after the incident; • Coordinate activities with disaster recovery team, first responders, etc. • Report to the emergency response team. 2.3 Emergency Alert, Escalation and DRP Activation This policy and procedure has been established to ensure that in the event of a disaster or crisis, personnel will have a clear understanding of who should be contacted. Procedures have been addressed to ensure that communications can be quickly established while activating disaster recovery. The DR plan will rely principally on key members of management and staff who will
  • 36. provide the technical and management skills necessary to achieve a smooth technology and business recovery. Suppliers of critical goods and services will continue to support recovery of business operations as the company returns to normal operating mode. 2.3.1 Emergency Alert The person discovering the incident calls a member of the Emergency Response Team in the order listed: Emergency Response Team • _________ • _________ • _________ If not available try: • _________ • _________
  • 37. All Rights Reserved, 2009, TechTarget 14 The Emergency Response Team (ERT) is responsible for activating the DRP for disasters identified in this plan, as well as in the event of any other occurrence that affects the company’s capability to perform normally. One of the tasks during the early stages of the emergency is to notify the Disaster Recovery Team (DRT) that an emergency has occurred. The notification will request DRT members to assemble at the site of the problem and will involve sufficient information to have this request effectively communicated. The Business Recovery Team (BRT) will consist of senior representatives from the main business departments. The BRT Leader will be a senior member of the company's management team, and will be responsible for taking overall charge of the process and ensuring that the company
  • 38. returns to normal working operations as early as possible. 2.3.2 DR Procedures for Management Members of the management team will keep a hard copy of the names and contact numbers of each employee in their departments. In addition, management team members will have a hard copy of the company’s disaster recovery and business continuity plans on file in their homes in the event that the headquarters building is inaccessible, unusable, or destroyed. 2.3.3 Contact with Employees Managers will serve as the focal points for their departments, while designated employees will call other employees to discuss the crisis/disaster and the company’s immediate plans. Employees who cannot reach staff on their call list are advised to call the staff member’s emergency contact to relay information on the disaster. 2.3.4 Backup Staff If a manager or staff member designated to contact other staff
  • 39. members is unavailable or incapacitated, the designated backup staff member will perform notification duties. 2.3.5 Recorded Messages / Updates For the latest information on the disaster and the organization’s response, staff members can call a toll-free hotline listed in the DRP wallet card. Included in messages will be data on the nature of the disaster, assembly sites, and updates on work resumption. 2.3.7 Alternate Recovery Facilities / Hot Site If necessary, the hot site at SunGard will be activated and notification will be given via recorded messages or through communications with managers. Hot site staffing will consist of members of the disaster recovery team only for the first 24 hours, with other staff members joining at the hot site as necessary. 2.3.8 Personnel and Family Notification If the incident has resulted in a situation which would cause concern to an employee’s immediate family such as hospitalization of injured persons, it will be necessary to notify
  • 40. their immediate family members quickly. All Rights Reserved, 2009, TechTarget 15 3 Media 3.1 Media Contact Assigned staff will coordinate with the media, working according to guidelines that have been previously approved and issued for dealing with post- disaster communications. 3.2 Media Strategies 1. Avoiding adverse publicity 2. Take advantage of opportunities for useful publicity 3. Have answers to the following basic questions: 3.3 Media Team • ____________________________________________
  • 41. • ____________________________________________ • ____________________________________________ 3.4 Rules for Dealing with Media Only the media team is permitted direct contact with the media; anyone else contacted should refer callers or in-person media representatives to the media team. 4 Insurance As part of the company’s disaster recovery and business continuity strategies a number of insurance policies have been put in place. These include errors and omissions, directors & officers liability, general liability, and business interruption insurance. If insurance-related assistance is required following an emergency out of normal business hours, please contact: ____________________________________________ Policy Name Coverage Type
  • 42. Coverage Period Amount Of Coverage Person Responsible For Coverage Next Renewal Date All Rights Reserved, 2009, TechTarget 16 5 Financial and Legal Issues 5.1 Financial Assessment The emergency response team shall prepare an initial assessment of the impact of the incident on the financial affairs of the company. The assessment
  • 43. should include: 5.2 Financial Requirements The immediate financial needs of the company must be addressed. These can include: etc. ay for supplies and services required post- disaster 5.3 Legal Actions The company legal department and ERT will jointly review the aftermath of the incident and decide whether there may be legal actions resulting from
  • 44. the event; in particular, the possibility of claims by or against the company for regulatory violations, etc. 6 DRP Exercising Disaster recovery plan exercises are an essential part of the plan development process. In a DRP exercise no one passes or fails; everyone who participates learns from exercises – what needs to be improved, and how the improvements can be implemented. Plan exercising ensures that emergency teams are familiar with their assignments and, more importantly, are confident in their capabilities. Successful DR plans launch into action smoothly and effectively when they are needed. This will only happen if everyone with a role to play in the plan has rehearsed the role one or more times. The plan should also be validated by simulating the circumstances within which it has to work and seeing what happens.
  • 45. All Rights Reserved, 2009, TechTarget 17 Appendix A – Technology Disaster Recovery Plan Templates Disaster Recovery Plan for <System One> SYSTEM OVERVIEW PRODUCTION SERVER Location: Server Model: Operating System: CPUs: Memory: Total Disk: System Handle: System Serial #: DNS Entry:
  • 46. IP Address: Other: HOT SITE SERVER Provide details APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor Provide details System Owners Provide details Database Owner Provide details Application Owners Provide details Software Vendors Provide details Offsite Storage Provide details BACKUP STRATEGY FOR SYSTEM ONE Daily Provide details
  • 47. Monthly Provide details Quarterly Provide details SYSTEM ONE DISASTER RECOVERY PROCEDURE Scenario 1 Total Loss of Data Provide details Scenario 2 Total Loss of HW Provide details
  • 48. All Rights Reserved, 2009, TechTarget 18 ADDENDUM CONTACTS File Systems <date> File System as of <date> Minimal file systems to be created and restored from backup: <List> Filesystem kbytes Used Avail %used Mounted on
  • 49. <Provide details> Other critical files to modify <Provide details> Necessary directories to create <Provide details> Critical files to restore <Provide details> Secondary files to restore <Provide details> Other files to restore <Provide details> All Rights Reserved, 2009, TechTarget 19
  • 50. Disaster Recovery Plan for <System Two> SYSTEM OVERVIEW PRODUCTION SERVER Location: Server Model: Operating System: CPUs: Memory: Total Disk: System Handle: System Serial #: DNS Entry: IP Address: Other: HOT SITE SERVER Provide details APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS
  • 51. KEY CONTACTS Hardware Vendor Provide details System Owners Provide details Database Owner Provide details Application Owners Provide details Software Vendors Provide details Offsite Storage Provide details BACKUP STRATEGY for SYSTEM TWO Daily Provide details Monthly Provide details Quarterly Provide details SYSTEM TWO DISASTER RECOVERY PROCEDURE
  • 52. Scenario 1 Total Loss of Data Provide details Scenario 2 Total Loss of HW Provide details All Rights Reserved, 2009, TechTarget 20 ADDENDUM CONTACTS
  • 53. File Systems <date> File System as of <date> Minimal file systems to be created and restored from backup: <List> Filesystem kbytes Used Avail %used Mounted on <Provide details> Other critical files to modify <Provide details> Necessary directories to create
  • 54. <Provide details> Critical files to restore <Provide details> Secondary files to restore <Provide details> Other files to restore <Provide details> All Rights Reserved, 2009, TechTarget 21 Disaster Recovery Plan for Local Area Network (LAN) SYSTEM OVERVIEW SERVER Location: Server Model: Operating System:
  • 55. CPUs: Memory: Total Disk: System Handle: System Serial #: DNS Entry: IP Address: Other: HOT SITE SERVER Provide details APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor Provide details System Owners Provide details Database Owner Provide details Application Owners Provide details
  • 56. Software Vendors Provide details Offsite Storage Provide details BACKUP STRATEGY for SYSTEM TWO Daily Provide details Monthly Provide details Quarterly Provide details SYSTEM TWO DISASTER RECOVERY PROCEDURE Scenario 1 Total Loss of Data Provide details Scenario 2
  • 57. Total Loss of HW Provide details All Rights Reserved, 2009, TechTarget 22 ADDENDUM CONTACTS File Systems <date> File System as of <date> Minimal file systems to
  • 58. be created and restored from backup: <List> Filesystem kbytes Used Avail %used Mounted on <Provide details> Other critical files to modify <Provide details> Necessary directories to create <Provide details> Critical files to restore <Provide details> Secondary files to restore <Provide details>
  • 59. Other files to restore <Provide details> All Rights Reserved, 2009, TechTarget 23 Disaster Recovery Plan for Wide Area Network (WAN) SYSTEM OVERVIEW EQUIPMENT Location: Device Type: Model No.: Technical Specifications: Network Interfaces: Power Requirements; System Serial #: DNS Entry:
  • 60. IP Address: Other: HOT SITE EQUIPMENT Provide details SPECIAL APPLICATIONS ASSOCIATED DEVICES KEY CONTACTS Hardware Vendor Provide details System Owners Provide details Database Owner Provide details Application Owners Provide details Software Vendors Provide details Offsite Storage Provide details Network Services Provide details BACKUP STRATEGY for SYSTEM TWO Daily Provide details Monthly Provide details
  • 61. Quarterly Provide details SYSTEM TWO DISASTER RECOVERY PROCEDURE Scenario 1 Total Loss of Network Provide details Scenario 2 Total Loss of HW Provide details All Rights Reserved, 2009, TechTarget 24
  • 62. ADDENDUM CONTACTS Support Systems <date> Support system <Provide details> Critical network assets <Provide details> Critical interfaces <Provide details> Critical files to restore <Provide details> Critical network services to restore <Provide details> Other services <Provide details>
  • 63. All Rights Reserved, 2009, TechTarget 25 Disaster Recovery Plan for Remote Connectivity SYSTEM OVERVIEW EQUIPMENT Location: Device Type: Model No.: Technical Specifications: Network Interfaces: Power Requirements; System Serial #: DNS Entry: IP Address: Other:
  • 64. HOT SITE EQUIPMENT Provide details SPECIAL APPLICATIONS ASSOCIATED DEVICES KEY CONTACTS Hardware Vendor Provide details System Owners Provide details Database Owner Provide details Application Owners Provide details Software Vendors Provide details Offsite Storage Provide details Network Services Provide details BACKUP STRATEGY for SYSTEM TWO Daily Provide details Monthly Provide details Quarterly Provide details
  • 65. SYSTEM TWO DISASTER RECOVERY PROCEDURE Scenario 1 Total Loss of Network Provide details Scenario 2 Total Loss of HW Provide details All Rights Reserved, 2009, TechTarget 26 ADDENDUM
  • 66. CONTACTS Support Systems <date> Support system <Provide details> Critical network assets <Provide details> Critical interfaces <Provide details> Critical files to restore <Provide details> Critical network services to restore <Provide details> Other services <Provide details>
  • 67. All Rights Reserved, 2009, TechTarget 27 Disaster Recovery Plan for Voice Communications SYSTEM OVERVIEW EQUIPMENT Location: Device Type: Model No.: Technical Specifications: Network Interfaces: Power Requirements; System Serial #: DNS Entry: IP Address: Other: HOT SITE EQUIPMENT Provide details SPECIAL APPLICATIONS
  • 68. ASSOCIATED DEVICES KEY CONTACTS Hardware Vendor Provide details System Owners Provide details Database Owner Provide details Application Owners Provide details Software Vendors Provide details Offsite Storage Provide details Network Services Provide details BACKUP STRATEGY for SYSTEM TWO Daily Provide details Monthly Provide details Quarterly Provide details SYSTEM TWO DISASTER RECOVERY
  • 69. PROCEDURE Scenario 1 Total Loss of Switch Provide details Scenario 2 Total Loss of Network Provide details All Rights Reserved, 2009, TechTarget 28 ADDENDUM CONTACTS
  • 70. Support Systems <date> Support system <Provide details> Critical network assets <Provide details> Critical interfaces <Provide details> Critical files to restore <Provide details> Critical network services to restore <Provide details> Other services <Provide details> All Rights Reserved, 2009, TechTarget 29
  • 71. Appendix B – Suggested Forms Damage Assessment Form Key Business Process Affected Description Of Problem Extent Of Damage _____________ Management of DR Activities Form • During the disaster recovery process all activities will be determined using a standard structure; • Where practical, this plan will need to be updated on a regular basis throughout the disaster recovery period;
  • 72. • All actions that occur during this phase will need to be recorded. Activity Name: Reference Number: Brief Description: Commencement Date/Time Completion Date/Time Resources Involved In Charge __________________
  • 73. All Rights Reserved, 2009, TechTarget 30 Disaster Recovery Event Recording Form • All key events that occur during the disaster recovery phase must be recorded. • An event log shall be maintained by the disaster recovery team leader. • This event log should be started at the commencement of the emergency and a copy of the log passed on to the business recovery team once the initial dangers have been controlled. • The following event log should be completed by the disaster recovery team leader to record all key events during disaster recovery, until such time as responsibility is handed over to the business recovery team. Description of Disaster: Commencement Date: Date/Time DR Team Mobilized:
  • 74. Activities Undertaken by DR Team Date and Time Outcome Follow-On Action Required Disaster Recovery Team's Work Completed: <Date> Event Log Passed to Business Recovery Team: <Date> _________________ Disaster Recovery Activity Report Form • On completion of the initial disaster recovery response the DRT leader should prepare a report on the activities undertaken. • The report should contain information on the emergency, who
  • 75. was notified and when, action taken by members of the DRT together with outcomes arising from those actions. • The report will also contain an assessment of the impact to normal business operations. • The report should be given to business recovery team leader, with a copy to senior management, as appropriate. • A disaster recovery report will be prepared by the DRT leader on completion of the initial disaster recovery response. • In addition to the business recovery team leader, the report will be distributed to senior management All Rights Reserved, 2009, TechTarget 31 The report will include: • A description of the emergency or incident • Those people notified of the emergency (including dates) • Action taken by members of the DRT • Outcomes arising from actions taken
  • 76. • An assessment of the impact to normal business operations • Assessment of the effectiveness of the BCP and lessons learned • Lessons learned __________ Mobilizing the Disaster Recovery Team Form • Following an emergency requiring recovery of technology infrastructure assets, the disaster recovery team should be notified of the situation and placed on standby. • The format shown below can be used for recording the activation of the DR team once the work of the damage assessment and emergency response teams has been completed. Description of Emergency: Date Occurred: Date Work of Disaster Recovery Team Completed: Name of Team Member Contact Details
  • 77. Contacted On (Time / Date) By Whom Response Start Date Required Relevant Comments (e.g., Specific Instructions Issued) ___________ Mobilizing the Business Recovery Team Form recovery team, the business recovery team should be notified of the situation and placed on standby. shown below will be used for recording the activation of the business recovery team once the work of the disaster recovery team has been completed. Description of Emergency:
  • 78. Date Occurred: Date Work of Business Recovery Team Completed: Name of Team Member Contact Details Contacted On (Time / Date) By Whom Response Start Date Required All Rights Reserved, 2009, TechTarget 32 Relevant Comments (e.g., Specific Instructions Issued) ____________
  • 79. Monitoring Business Recovery Task Progress Form • The progress of technology and business recovery tasks must be closely monitored during this period of time. • Since difficulties experienced by one group could significantly affect other dependent tasks it is important to ensure that each task is adequately resourced and that the efforts required to restore normal business operations have not been underestimated. Note: A priority sequence must be identified although, where possible, activities will be carried out simultaneously. Recovery Tasks (Order of Priority) Person(s) Responsible Completion Date Milestones Identified Other Relevant Information Estimated Actual 1.
  • 80. 2. 3. 4. 5. 6. 7. ___________ Preparing the Business Recovery Report Form should prepare a report on the activities undertaken and completed. ive event, who was notified and when, action taken by members of the BRT together with outcomes arising from those actions. normal business operations.
  • 81. d to senior management, as appropriate. The contents of the report shall include: taken All Rights Reserved, 2009, TechTarget 33 business continuity plan Communications Form
  • 82. recovery activities that all affected persons and organizations are kept properly informed. timely. articular, any estimate of the timing to return to normal working operations should be announced with care. with media queries. Groups of Persons or Organizations Affected by Disruption Persons Selected To Coordinate Communications to Affected Persons / Organizations Name Position Contact Details Customers Management & Staff Suppliers Media Stakeholders
  • 83. Others ____________ Returning Recovered Business Operations to Business Unit Leadership necessary to return the responsibility for specific operations to the appropriate business unit leader. formalized in order to ensure that all parties understand the change in overall responsibility, and the transition to business- as-usual. responsibility may have been assigned to the business recovery process lead. involved throughout the recovery, but in order for the recovery process to be fully effective, overall responsibility during the recovery period should probably be with a business recovery process team.
  • 84. ____________ All Rights Reserved, 2009, TechTarget 34 Business Process/Function Recovery Completion Form The following transition form should be completed and signed by the business recovery team leader and the responsible business unit leader, for each process recovered. A separate form should be used for each recovered business process. Name Of Business Process Completion Date of Work Provided by Business Recovery Team Date of Transition Back to Business Unit Management (If different than completion date)
  • 85. I confirm that the work of the business recovery team has been completed in accordance with the disaster recovery plan for the above process, and that normal business operations have been effectively restored. Business Recovery Team Leader Name: ________________________________________ Signature: _____________________________________________________ ___________ Date: __________________________ (Any relevant comments by the BRT leader in connection with the return of this business process should be made here.) I confirm that above business process is now acceptable for normal working conditions. Name: _____________________________________________________ ______________ Title: _____________________________________________________ _______________ Signature:
  • 86. _____________________________________________________ ___________ Date: __________________________ 6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy - CIO Journal - WSJ https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery- planning-10-lessons-learned-from-hurricane-sandy/ 1/6 One year ago, Hurricane Sandy struck, highlighting the crucial role employees and communications play in business continuity and the need to create short-, medium-, and long- range disaster recovery plans. As Hurricane Sandy tore up the Atlantic coast in late October, 2012, 8.5 million homes and businesses lost power, according to the U.S. Energy Department. The protracted power outages, widespread damage, and lost business wrought by the hurricane—estimated to cost between $30 and $50 billion, according to IHS Global Insight—taught many companies unfortunate lessons about the importance of disaster recovery planning. David Sarabacha, a principal with Deloitte & Touche LLP who specializes in resilience and recovery planning, says Hurricane Sandy reminded business
  • 87. leaders that thoughtful disaster preparation can pay dividends for a company’s ability to weather a storm. He identified 10 lessons from the recent hurricane that can help businesses better prepare for the next crisis. Lesson 1: Take care of your employees. When disaster strikes, employees will rightfully put the safety of their families and homes first. “It’s impossible for employees to think about work when they don’t have heat or electricity, water is rising in their basements, their homes have been destroyed, or they need to account for loved ones,” says Sarabacha. “To the extent a company can either help employees prepare for a disaster or get back on their feet after one, the sooner it can return to business as usual.” Sarabacha advises organizations to do more for employees than simply provide them with suggestions for personal preparedness and home safety. For example, he urges companies to offer alternate communications capabilities to decision-makers. He also recommends providing basic necessities such as water, food, shelter, and daycare to affected families, since private companies may be able to mobilize faster than relief organizations. And he counsels companies to help employees find or get priority service from contractors who can repair or rebuild their homes. CIO Insights and Analysis from Deloitte CONTENT FROM OUR SPONSOR
  • 88. Please note: The Wall Street Journal News Department was not involved in the creation of the content below. Disaster Recovery: 10 Lessons from Hurricane Sandy http://energy.gov/articles/hurricane-sandy-noreaster-situation- reports http://www.ihs.com/products/Global-Insight/industry-economic- report.aspx?ID=1065972961 6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy - CIO Journal - WSJ https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery- planning-10-lessons-learned-from-hurricane-sandy/ 2/6 While acknowledging that these “above-and-beyond” efforts can grow costly, Sarabacha also argues that the added investment may be justified if business activities are truly time sensitive and hinge on critical personnel. Lesson 2: Crisis management, business continuity, and disaster recovery plans should be detailed. Sarabacha notes that many businesses’ disaster recovery plans are fairly high level. “Executives assume they’ll figure out the details when an event takes place,” he says. “But if business leaders don’t have sufficient lines of communication available to share information, make decisions, and disseminate instructions, their ability to implement their plans will be impaired.”
  • 89. Sarabacha says disaster recovery plans should establish clear chains of decision-making and empower employees in the field to take action. They shouldn’t have to wait for direction from a senior leader, whose communications may be out of commission. “The sooner a company can take decisive actions in the event of a disaster, the faster they may be able to recover,” he says. Lesson 3: Plan for different impacts, both in magnitude and duration. One mistake businesses make when drafting disaster recovery plans is assuming an event will only affect their organizations for 24 to 48 hours. “Sandy brought to light the need for short-, medium-, and longer-term business continuity plans,” says Sarabacha. “Companies will likely need different disaster recovery strategies for events of different durations.” For example, a two-day power outage may not require renting back-up office space, but a two- week power outage may. An investment bank may need to transfer work to another office so that it can process trades during a two-day or week-long outage, but transferring work for longer periods could result in burn-out for the employees taking on additional responsibilities, notes Sarabacha. Lesson 4: Businesses can’t rely on employees’ ability to work from home. Many companies’ business continuity plans direct employees to
  • 90. telecommute if they can’t get into the office, according to Sarabacha. But, as Sandy illustrated, that approach quickly falls apart if employees lack power and can’t access the corporate network from their homes. One potential solution for large companies is to transfer work to individuals at offices that haven’t been affected. To implement this strategy effectively, says Sarabacha, companies need to know which individuals possess the skills to take on various activities. Because their human resources will be constrained and overwhelmed, they’ll also have to prioritize what work gets done. 6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy - CIO Journal - WSJ https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery- planning-10-lessons-learned-from-hurricane-sandy/ 3/6 “For example, if a company can only serve 50 percent of its customers because it lacks capacity in its call centers, the company needs to decide how it will prioritize service,” says Sarabacha. “Companies should seek to avoid a situation in which they are devoting their scarce resources to their least critical activities.” Another possible solution is to set up alternate work sites through real estate or insurance companies that rent “just in time office space” on an hourly, daily, or weekly basis. Companies need to plan how they’ll get critical employees to these sites,
  • 91. which may be located in neighboring states, in the event air traffic or mass transit systems are compromised, notes Sarabacha. They will also need to board employees and their families in hotels while employees are working out of state, and they’ll have to cover, track, and reimburse employees for incidentals required while working off-site. Lesson 5: Employ alternate forms of communication. During Hurricane Sandy, the Federal Communications Commission reported that 25 percent of cell phone towers lost power, rendering many mobile phones useless. Sarabacha advises companies to use other communication mechanisms, including satellite phones. “Be sure you can get a sufficient uninterruptable power supply (UPS) battery, diesel or other fueled generator to keep the satellite phones charged,” he says. Lesson 6: Two alternate data center recovery sites are ideal. After 9/11, many companies in the Northeast moved their back-up data centers to sites closer to home, in New Jersey, according to Sarabacha. They switched from distant backup data centers to closer ones because the terrorist attacks shut down air travel, and companies wanted to make sure their back-up locations were within a commutable distance, he adds. Because Sandy took out companies’ primary data centers in New York and their back-up data centers in New Jersey, the hurricane demonstrated the need to ideally have two fallbacks, one nearby and one far away. Sarabacha notes that not every
  • 92. company can afford multiple data centers, and some companies may have to accept that it could take several days or a week to recover their data centers. Lesson 7: The cloud isn’t a panacea. Cloud-based applications and storage have mitigated some of the impact of disasters on companies. Because those applications and data can still be stored in the provider’s data center, the applications may still be available to clients provided they have power, and the data is at least theoretically recoverable or protected. “Too many organizations don’t fully understand what their cloud providers offer in terms of disaster recovery,” says Sarabacha. “They assume cloud data is available. They need to know for sure they can get their data and their apps, not to mention when they can access them.” http://www.fcc.gov/document/chairman-and-pshsb-chief- statement-communications-network 6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy - CIO Journal - WSJ https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery- planning-10-lessons-learned-from-hurricane-sandy/ 4/6 Lesson 8: Understand your vendors’ disaster recovery plans. The Thursday after Sandy, Sarabacha spoke with a client based in southern California whose business was scrambling to re-route products from its mid-Atlantic distribution center after
  • 93. a logistics provider in the region was shut down by the storm. Sarabacha says his client’s conundrum illustrates the importance of having insight into vendor and service providers’ business continuity plans. His client needed to know when and how the logistics provider would restore service, given the pent-up demand the storm created. “Even if an event like a hurricane has a limited impact on your organization, you need to realize how it might affect your third parties and their plans for a response given your reliance on them,” he says. Lesson 9: Test your plan. Sarabacha says few companies extensively test their business continuity and disaster recovery plans. They might test one data center, but not another. They might test data recovery, but not their ability to actively restore dependent applications or to synchronize disparate systems. “I rarely see an integrated test that reflects what many organizations were dealing with a few weeks ago,” he says. “Realistic exercises and war games must be developed and executed to simulate both the anticipated and unknown circumstances an organization may face.” Lesson 10: Don’t make the same mistakes again. When companies recover insurance money for facilities lost or damaged by a natural disaster, they often repair or rebuild those facilities without applying lessons learned. Consequently, says
  • 94. Sarabacha, those companies could find themselves in the same position following the next storm. In the aftermath of a disaster, Sarabacha advises clients to make strategic and tactical modifications to their operations and assets (e.g., buildings, equipment, inventory, technology, human resources, and vendors). For example, if a company kept one kind of product in each warehouse before a disaster, it might decide to diversify its product mix across warehouses. Making strategic and tactical changes might also mean eliminating single points of failure, upgrading equipment, hardening facilities, and using multiple vendors for different services. Companies that lack core competencies in crisis and disaster risk management may consider outsourcing or co-sourcing arrangements with third parties that can help them plan, prepare, and respond. “Often it takes a swift reminder, whether an extreme weather event such as Sandy or a significantly lingering economic crisis, to demonstrate that disaster preparations will continue to be a good investment in protecting an organization’s personnel, assets, and stock price.” 6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy - CIO Journal - WSJ https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery- planning-10-lessons-learned-from-hurricane-sandy/ 5/6
  • 95. November 29, 2012, 12:01 am Questions? Write to deloitteeditor Follow us on Twitter @Deloitte This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. About Deloitte: Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/us/about to learn more about our global network of member firms. Copyright © 2019 Deloitte Development LLC. All rights reserved. Search CIO Journal SEARCH
  • 96. Related Deloitte Insights DRaaS Offers Recovery Assurances Via Cloud Most businesses would be crippled by an IT outage, yet building and maintaining failover capabilities is an expensive and daunting task. Businesses can now leverage the cloud through disaster recovery as a service to gain strategic business continuity and disaster recovery assurances. How to Create IT Resilience Without an effective IT resilience strategy, companies stand to lose millions of dollars if critical systems fail. Learn steps CIOs can take to help enhance and refine existing business continuity and disaster recovery plans, and lessen the impact of service disruption. Editor's Choice Cloud Accelerates AI Adoption The cloud is democratizing access to AI, enabling more companies to enjoy its benefits. Deloitte Global predicts that organizations will accelerate their usage of cloud-based AI software and services this year, resulting in more cognitive-enabled implementations, greater AI investments, and increased rewards. How Third-Party Data Can Enhance Analytics A growing number of companies are seeking an analytical edge by employing outside data sources. Incorporating third-party information effectively, however, can be tricky. To boost the value of their companies’ analytics efforts, business leaders
  • 97. may want to adopt some key practices to navigate the complexity. TMT CIOs: Business, IT Out of Sync on Cyber, Talent An analysis from Deloitte’s Center for Technology, Media, and Telecommunications (TMT) finds that many TMT CIOs are looking to reshape their workforces by hiring talent with problem-solving abilities, social aptitude, and other soft skills. Survey results also indicate a need for more collaboration related to cybersecurity and risk among mailto:[email protected] http://twitter.com/Deloitte http://www.deloitte.com/us/about https://deloitte.wsj.com/cio/2016/11/09/draas-offers-recovery- assurances-via-cloud/?mod=Deloitte_cio_relatedInsights https://deloitte.wsj.com/cio/2016/11/09/draas-offers-recovery- assurances-via-cloud/?mod=Deloitte_cio_relatedInsights https://deloitte.wsj.com/cio/2013/04/01/how-to-create-it- resilience/?mod=Deloitte_cio_relatedInsights https://deloitte.wsj.com/cio/2019/06/02/cloud-accelerates-ai- adoption/?mod=Deloitte_cio_editorschoice https://deloitte.wsj.com/cio/2019/06/02/cloud-accelerates-ai- adoption/?mod=Deloitte_cio_editorschoice https://deloitte.wsj.com/cio/2019/05/23/how-third-party-data- can-enhance-analytics/?mod=Deloitte_cio_editorschoice https://deloitte.wsj.com/cio/2019/05/23/how-third-party-data- can-enhance-analytics/?mod=Deloitte_cio_editorschoice https://deloitte.wsj.com/cio/2019/05/19/tmt-cios-business-it- out-of-sync-on-cyber-talent/?mod=Deloitte_cio_editorschoice 6/15/2019 Disaster Recovery: 10 Lessons from Hurricane Sandy - CIO Journal - WSJ https://deloitte.wsj.com/cio/2012/11/29/disaster-recovery-
  • 98. planning-10-lessons-learned-from-hurricane-sandy/ 6/6 TMT CIOs, CISOs, and other leaders. About Deloitte Insights Deloitte Insights for CIOs couples broad business insights with deep technical knowledge to help executives drive business and technology strategy, support business transformation, and enhance growth and productivity. Through fact-based research, technology perspectives and analyses, case studies and more, Deloitte Insights for CIOs informs the essential conversations in global, technology-led organizations. Learn more Copyright ©2017 Dow Jones & Company, Inc. All Rights Reserved This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com. https://deloitte.wsj.com/cio/2019/05/19/tmt-cios-business-it- out-of-sync-on-cyber-talent/?mod=Deloitte_cio_editorschoice http://www2.deloitte.com/us/en/pages/technology/articles/chief- information-officer-cio- insights.html?id=us:2el:3dc:ciopage:eng:cliexp:032317 Running Head: THE BRILLIANT, BARBAROUS AZTECS 1
  • 99. THE BRILLIANT, BARBAROUS AZTECS Submitted by Jane Doe El Centro College HIST 1301, Section 55002, Summer 2016 Total Word Count: 1650 Running Head: THE BRILLIANT, BARBAROUS AZTECS 2 The term “Aztec” refers to the American Indian empire that dominated central Mexico (also known as Mesoamerica) when Hernán Cortés arrived on
  • 100. the shores of the Yucatán peninsula in 1519. Whenever we hear the term “Aztec” many people usually imagine a culture that was extremely violent and militaristic, a culture full of human sacrifice and cannibalism. The idea of the Aztecs as cannibals, savages, and generally uncivilized peoples has its origins with the conquest of the Aztecs by Cortés and Spanish colonists in the sixteenth century, who used such allegations as justifications for conquest and colonization. But a careful examination of Aztec history and society reveals another side to their civilization. Their accomplishments in mathematics, together with their techniques for measuring time and surveying land use, as well as their interest in astrology, enriches our understanding of Aztec society. They were far more sophisticated than a simple “civilized/uncivilized” binary opposite, even by modern standards. Thus, the central tenet of this essay is that the Aztecs were more than barbarians and in fact were quite sophisticated, especially in the areas of mathematics, their techniques for measuring time and surveying land use, and because of their interest in
  • 101. astrology (Cartwright, 2014, http://www.ancient.eu/Aztec_Civilization/; Bernal, 1963, pp 10- 11). The Aztecs, according to their own legends, pinpoint their origin to the place called “Aztlan” which is located in northern Mexico or the modern-day American Southwest. Many of their own origin stories reference supernatural realms and locations that anthropologist are still trying to locate in geographic terms. In the twelfth century CE before they rose to dominance in central Mexico, the Aztecs lived on the margins of civilized Mesoamerica (central Mexico). By the thirteenth century the Aztecs had embarked on a period of wandering and settled in the Valley of Mexico. Later on, they continually fought with the small city-states which also resulted in shifting alliances. Afterwards, they took refuge on small islands in Lake Texcoco in the Valley http://www.ancient.eu/Aztec_Civilization/ Running Head: THE BRILLIANT, BARBAROUS AZTECS 3 of Mexico. In 1325 they founded the town of Tenochtitlán
  • 102. (modern-day Mexico City). The story of how the Aztec empire rose to dominance in the Valley of Mexico during the 1300s is filled with intrigue, violence, and bloodshed (Knight, 2002, pp 132- 134; Bernal, 1963, pp 12-15). After the fall of the Toltec empire, which dominated the Valley of Mexico, the region’s politics were overshadowed by the external neighboring powers and their successor states. “By the thirteenth century, the Chichimec [Aztec] migrants were establishing new territories in the valley.” The dominant power in the Valley was the Tepanecas based out of the city-state of Azcapotzalco. In their migration the Aztecs had gradually transitioned from being nomadic hunters and gathers to learning how to farm corn. Throughout their journey south to the Valley of Mexico, which they had taken via Coatepec and Tula, they periodically paused to farm. They also became familiar with the rudiments of Mesoamerican civilization such as military politics and human sacrifice. Additionally, during their journey south the Aztecs had developed a strong belief in a Toltec deity named Huitzilopochtli, who eventually
  • 103. became the top-ranking deity in their pantheon (Knight, 2002, pp 132-134; Bernal, 1963, pp 16- 18). When the Aztecs were newly arrived in the Valley of Mexico, they occupied a low position in regional politics and prestige. As their number increased, they eventually established themselves through military skill. Later on, in 1319, they were attacked by the Tepanecas because the Tepanecas were engaged in the struggle to dominate the valley and they disdained outsiders. As a result the Aztecs moved to the rocky, snake infested island of Tizzapan on Lake Texcoco (where today stands the central campus of UNAM, Mexico’s national university system). On the island the Aztecs survived by eating snakes. Little by little the Aztecs on Tizzapan began building homes, temples, and other structures out of rocks and soil. They also Running Head: THE BRILLIANT, BARBAROUS AZTECS 4 began serving as mercenaries in the wars between city-states in the Valley (Knight, 2002, pp
  • 104. 137-138). One colorful story related by the Aztecs tells how their war- like nature set them apart from the other, agricultural groups inhabiting the Valley. After helping the city-state of Culhucan win several important victories, the Culhua ruler named Achitometl offered his beautiful daughter to the Aztecs as a marriage gift. The Aztecs priests flayed her and used her skin to drape an Aztec priest. This resulted in a war between the two groups. According to the Aztecs, Huitzilopochtli spoke to the Aztec priests in visions and dreams, advising, “Go from here calmly and cautiously.” Again, they resumed their travels. In another part of the Valley their priests had another vision. Here, they beheld Huitzilopochtili’s prophecy signaling the place to build a permanent settlement: an eagle perched on a cactus, devouring a snake. On this spot the Aztecs began building Tenochtitlan, which would became a city on the lake and later the Aztec capital and location of Aztec advances in mathematics, time measurement, and religion (Knight, 2002,
  • 105. pp 137-139; Bernal, 1963 pp 18-20). The mathematical accomplishment of the Aztecs is concerned with their number system and their notation of area. Unlike today’s mathematics, “they followed a vigesimal system.” In that system, their counting was based on the units of twenty, and they also used subsets of units of five. We can also observe this in the Nahuatl number where the word for “six” actually means “five plus one.” Additionally, to refer to large number such as 400 (20x20), they called it tzontli which means hair or growth of garden herbs. Likewise, for 8000 (20x20x20), they referred it as xiquipilli or bag of cocao beans. Furthermore, their vigesimal system used number words for numbers. For example, One-Ce, Two-Ome, Three-Ei or Yei, Four- Macuilli and so forth. Additionally, “the Aztec’s notation system was different than the present [western] notation Running Head: THE BRILLIANT, BARBAROUS AZTECS 5 system.” We write the numbers in the horizontal fashion whereas the Aztecs wrote in the vertical
  • 106. fashion. The value of that symbol was determined by the location of the number in that vertical stack or fashion (Van Tuerenhout, 2005, pp 225-226). An Aztec manuscript titled the Matrícula de Tributos in Spanish (the counting of tribute), which details the taxes and other tribute collected from neighboring city-states in the sixteenth century, provides examples of this different notation system. For example, a dot represented one, a representation of flag represented ‘twenty’, and a rough symbol of feather represented ‘400’ and so forth. The Matrícula de Tributos also shows symbol used to refer to area. They used to draw picture of mantle to represent area. Sometimes, they also added another set of symbol to it which represented the size of mantle. For example, they put two finger on the top to signal that the size of mantle requested is twice. Those fingers represented two brazas which was a measurement of distance and its metric equivalence is still unknown. Two colonial-era documents (i.e., written after 1519), the Codíce de Santa María Asunción and the Codex
  • 107. Vergara, relate that “the standard unit of measurement was called Quahuitl which is approximately equivalent to 2.5m.” They used dots and the lines to represent the width and length of the fields in Quahuitl. A dot was considered to be valued as “20” and a line was considered “1.” Archeologists and modern scholars, working with the notion of Quahuitl, have found that the Aztecs used a quantity similar to our hectare (Van Tuerenhout, 2005, pp 226-227). The Aztecs, who relied on the complex system of measurement to calculate celestial data, also used these data to structure their daily lives. As a result they had a sophisticated calendar system. The Aztec calendar consists of two cycles. One cycle consisted of 260 days which they called Tonalpohualli. The other consisted of 365 days and was called Xihuitl. The term Tonalpohualli meant “counting of the days.” This calendar was comprised of 260 days obtained Running Head: THE BRILLIANT, BARBAROUS AZTECS 6 by combining 13-day names with 20-day signs. Some of the
  • 108. examples of the 20-day signs in this calendar were Cipactli (alligator), Ehecatl (Wind), Calli (House), Cuetzapalin (Lizard) and so forth. The major purpose of the Tonalpohualli calendar was to organize festivals for their patron deities. Other Mesoamerican civilization used aspects of the Tonalpohualli calendar. Unlike the Tonalpohualli calendar, the “Xihuitl consisted of 365 days.” It was made up of 18 units, and each unit contained 20 days in them. The Aztecs added extra 5 days to complete 365 days, and those five days were called as nemontemi. In our calendar, we refer to specific years by assigning numbers to them. However, the Aztecs identified their calendar years by the day name on which they began. The months were named in the honor of gods and the each month were associated with belief system such as when to start war, when to sow crops, when to harvest them and so forth. The examples of Aztec months are Atlcahualo (sacrifice of children for rain), Tlacaxipeualitzili (slaves and war captives were sacrificed), Tozoztontli (children were sacrificed), Huei Tozoztli (self-sacrifice to impress goddess of
  • 109. corn) and so forth (Van Tuerenhout, 2005, pp 227-228). Moreover, there was one more calendar known as Xiuhmolpilli, which combined the previous two calendars and consisted of a 52-year period. “This calendar was the combination of Tonalpohualli and Xihuitl, and was integrated to a much larger cycle of 52 years.” In this calendar, the dates were identified by their signed codes. These signed codes were based on the codes used in the previous shorter calendars. The combination codes were designed in such a way that they repeated themselves after every 52 years. From this calendar, we can learn that the Aztecs had planning and schedule for 52 years, similar to the planning based on 100-year periods used in western societies (i.e., the century). The Aztecs believed that unless they celebrated the passing of the 52 with great ceremony and pomp, creation would be placed in jeopardy. The Running Head: THE BRILLIANT, BARBAROUS AZTECS 7
  • 110. Aztecs had a complex system of religious beliefs that combined celestial calculations with belief in omens (Van Tuerenhout, 2005, p 229; Bernal, 1963, 25-26). Though not scientific in their approach to it, the Aztecs were fascinated with astrology and celestial phenomena. They had a complex understanding of events in the night sky. They went to great lengths to interpret celestial phenomena and weave their understanding of it into significant events affecting Aztec society. According Mexican scholar Leon Miguel-Portilla, in the years leading up to the conquest of Mexico by Spaniards, “there were eight bad omens as described in the original text of Nahuatl of Sahagún’s native informants.” Bernardino de Sahagún was a Spanish priest who trained Aztec scribes to write in Spanish after the conquest. Many of these scribes also wrote in Nahuatl. According to the Nahuatl texts, “the first bad omen appeared in the sky ten years before the Spaniards first came to the valley.” The text mentions that there was “flaming ears of corn” or fiery signals in the sky which seemed to bleed fire. In the fourth omen fire streamed through the sky while the sun was
  • 111. still shining, flashing along the horizon after sunset to where the sun rises. Though they did not understand these celestial events the Aztecs linked inexplicable phenomena to important, historical events affecting their society. This demonstrated the Aztecs’ interest in linking the various complicated components of the everyday world they inhabited, before and after the Spanish conquest in the early sixteenth century (Leon Portilla, 1992, pp 1-4; Bernal, 1963, pp125-126). Considering the Aztecs traditional rule of human sacrifice, we can conclude that their civilization had violent and “barbarous” aspects, according to our present standards. This conclusion is supported by archaeologist Carla M. Sinopoli’s article, in which Sinopoli states that the Aztec empire had a “vast number of human sacrifice in their culture.” Whenever we hear the term “Aztec” many people usually imagine a culture that was extremely violent and Running Head: THE BRILLIANT, BARBAROUS AZTECS 8
  • 112. militaristic, a culture full of human sacrifice and cannibalism. Instead of a strict “civilized/uncivilized” dichotomy, however, we can appreciate their history and culture which led to intellectual accomplishments in mathematics, techniques for measuring time and surveying land use, and their interest in astrology. These areas demonstrate that the Aztecs were more than barbarians or savages. Who today would argue that nations, such as the United States, China, England, France, and Russia, are not sophisticated, simply because they have enormous military potential? Together these countries have enough nuclear weapons to destroy all life on earth, yet few people would argue that as a result they are uncivilized nations. On the contrary most people would argue these nations lead the world in technological and scientific accomplishments. Similarly, it’s possible to argue that the Aztecs were not only barbarous and violent, according to our standards. They also had many sophisticated intellectual accomplishments, even by our standards (Sinopoli, 1994, pp 159-80).
  • 113. T Running Head: THE BRILLIANT, BARBAROUS AZTECS 9 Bibliography Primary Source: Leon Portilla, Miguel (Ed.). (1992). The broken spears: the Aztec account of the conquest of Mexico. Translated by Lysander Kemp. Boston, MA: Beacon Press. Scholarly Book: Bernal, Igancio. (1963). Mexico before Cortez: art, history, and legend. Garden City, New York: Doubleday. Knight, Alan. (2002). Mexico: from the beginning to the Spanish conquest. Cambridge: Cambridge University Press. Van Tuerenhout, Dirk R. The Aztecs: new perspectives. Santa Barbara, CA: ABC-CLIO.
  • 114. Scholarly Journal Article: Sinpoli, Carla M. (1994). The archaeology of empires. Annual review of anthropology, 23 (1), 159-180. Encyclopedia Article: Cartwright, Mark. (2014). Aztec civilization. Retrieved from the Ancient History Encyclopedia website: http://www.ancient.eu/Aztec_Civilization/ http://www.ancient.eu/Aztec_Civilization/ FINAL RESEARCH PAPER RUBRIC Dr. Moralez 2019 The purpose of the Rubric is to provide students with clear guidelines about how your instructor will evaluate your final research paper. 1. Thesis and APA Format: ______/35 Does the final draft have a clear, unambiguous thesis? Does it follow APA format
  • 115. for citations? Are page numbers from citations included? Are there transitions between sections? Is there a conclusion? Is the grammar and spelling correct? 2. Primary Source: ______/10 Source must be integrated into overall argument; merely mentioning it once is not sufficient. 3. Scholarly book: ______/10 Source must be integrated into overall argument; merely mentioning it once is not sufficient. 4. Scholarly Journal Article: ______/10 Source must be integrated into overall argument; merely mentioning it once is not sufficient. 5. Encyclopedia Entry with Author: ______/10 Source must be integrated into overall argument; merely mentioning it once is not
  • 116. sufficient. 6. Word Count: ______/10 The paper must be 1400-1650 words, with word count on title page. 7. References Page: ______/10 Must follow APA template provided by instructor. 8. Title Page: ______/5 Must follow APA template provided by instructor. Must list total word count. 9. Final Total: ______/100 Final Grade: