SlideShare a Scribd company logo
1 of 14
Chapter 18:
vital records recovery
Vital assets
Information stored on any media
Personal data
Important business data
Contracts
Customer lists
Personnel files
Vital records inventory
Records, Media, Originating department, location
Locate your Records
Where and how are they stored?
Prioritize your records
Ranking to determine which records need to be restored first
Records transportation
Just as important as storing, we need to think about how we
transport our vital records.
Security – security during and after transportation
Magnetic recordings – take care as many factors can effect this
medium
Records retention
Establish records retention requirements
Eliminate obsolete documents
Identify critical records
End of life plan – destruction of documents
Media storage
Each media storage type will require different storage
parameters:
Paper document storage
Microfilm storage
Magnetic media storage
Risk assessment
Storage risks include:
Water
Smoke
Structural problems
Fire
Humidity
High heat and deep cold
Wide temperature swings
Theft
Sabotage
Insects and rodents
Magnetic fields
Fire control systems mitigation
Fire control systems
smoke alarms and fire detection
sprinklers
gas fire suppression
fire extinguishers
fireproof containers
fire drills
good housekeeping
electrical equipment
Environmental issues mitigation
Environmental Issues:
moisture sensors and alarms
humidifier/dehumidifier
temperature control
magnetic check
Other issues mitigation
Other Issues:
secured access
off-site duplication of key records
pest extermination
proper storage
Security mitigation actions
Controlling access is important to prevent:
Reading your records
Stealing records
Damaging your records
Action steps for your plan
Materials needed for an emergency fall in several categories:
General items
Portable equipment
Individual equipment
Drying and cleaning materials
Containment materials
Maintenance activities
Plan as part of your normal routine:
Daily actions task
Every week task
Quarterly action task
Immediate action team
Damage containment team
Assessment team
Shuttle team
Triage team
Recovery techniques
Water damage to paper records
Air drying
Freeze drying
Determine what documents are unrecoverable
Fire damage of paper records
Microfilm
Optical and magnetic media
summary
Vital records protection is not difficult but necessary
Have a good retention policy in place
Monitor all storage media
.MsftOfcThm_Accent1_Fill {
fill:#4472C4;
}
.MsftOfcThm_Accent1_Stroke {
stroke:#4472C4;
}
1. Describe best practices to develop and prepare to lead risk
management mitigation exercises related to illegal border
activity.
2. Using IS-120.A: An Introduction to Exercises from
EMI/FEMA as a process guide, develop a border activity
desktop risk management mitigation exercise to be submitted to
your instructor for review.
Chapter 17: telecommunications and networking
Connections for today
Most business have two distant networks:
Voice communication that uses standard telephone system
Data communication that uses one or more computers that are
connected to the Internet
Two networks are fading due to Voice-over-Internet Protocol
(VOIP)
Public switched telephone network
PSTN Basics – each telephone has at least one pair of wires
from wall jack to the punch block
Private Branch exchange – larger companies would utilize this
(PBX)
PBX services:
Voice mail
Telephone conferencing
Call transferring
Music on hold
Other vital equipment in pbx room
Interactive Voice Response (IVR)
Intelligent Port Selector
Call Management System
Call accounting
Call Monitoring
Telephone company’s central office
Interexchange carrier point of presence
Various companies such as AT&T
What to look for:
System availability time, guarantee, consequences for
downtime, restoration policy,
How does the carrier practice its disaster recovery procedures
Digital telephone network
VoIP systems are taking over tradition telephone systems
VoIP network uses:
VoIP telephone instrument
Wiring
A Server
Benefits:
Eliminates expense of running the analog cable
Elimanates cost of second cable
Saves cost by not having a PBX
Eliminates long-distance calling charges
Computer network basics
Personal area network
Local area network
Wireless network
Wide area network
Internet service providers (ISP)
Risk assessment
Look for single points of failure that will adversely impact your
critical business processes
Risks:
Natural hazards
Human-Created hazards
Telecommunications and Network Equipment Room
Cabling
Developing a plan
Determine the telephone circuits restoration priority
Review network security
Telecommunications mitigation plan
Alternate communications methods
Action steps for your plan
Things to consider after a disaster:
Do not make any unnecessary calls – emergencies only
When calling, you may need to wait a few minutes to wait for
tone
When you do receive a tone – dial quickly
Services may not be there for long!!
summary
Today’s business depend upon their data and
telecommunications networks
Redundancy is your best defense
Thorough understanding of your organization’s requirements
needed

More Related Content

Similar to Chapter 18 vital records recoveryVital assetsIn.docx

Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Lodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, OlympiaLodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, Olympialodge-service
 
Lodge Service - Counter Terrorism
Lodge Service - Counter TerrorismLodge Service - Counter Terrorism
Lodge Service - Counter Terrorismolivermckeown
 
20110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 320110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 3UReasonChannel
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxcherishwinsland
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specificationsSsendiSamuel
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Turvallisuus2013
 
Safety for the industry - active gathering points
Safety for the industry - active gathering pointsSafety for the industry - active gathering points
Safety for the industry - active gathering pointsKrzysztof Piotrowski
 
Widgets Exercise Group 2
Widgets Exercise Group 2Widgets Exercise Group 2
Widgets Exercise Group 2debmalyakhan
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdfinfo382133
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSOAndy Bochman
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Automated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringAutomated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringLumaSense Technologies
 
Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013Turvallisuus2013
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 

Similar to Chapter 18 vital records recoveryVital assetsIn.docx (20)

Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Lodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, OlympiaLodge Service Presents at Counter Terror Expo, Olympia
Lodge Service Presents at Counter Terror Expo, Olympia
 
Lodge Service - Counter Terrorism
Lodge Service - Counter TerrorismLodge Service - Counter Terrorism
Lodge Service - Counter Terrorism
 
20110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 320110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 3
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
 
Safety for the industry - active gathering points
Safety for the industry - active gathering pointsSafety for the industry - active gathering points
Safety for the industry - active gathering points
 
Widgets Exercise Group 2
Widgets Exercise Group 2Widgets Exercise Group 2
Widgets Exercise Group 2
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Automated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringAutomated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation Monitoring
 
Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013Crisis Management Tekes Safety and Security programme 2013
Crisis Management Tekes Safety and Security programme 2013
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 

More from keturahhazelhurst

1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docxketurahhazelhurst
 
1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docxketurahhazelhurst
 
1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docxketurahhazelhurst
 
1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docxketurahhazelhurst
 
1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docxketurahhazelhurst
 
1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docxketurahhazelhurst
 
1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docxketurahhazelhurst
 
1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docxketurahhazelhurst
 
1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docxketurahhazelhurst
 
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docxketurahhazelhurst
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docxketurahhazelhurst
 
1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docxketurahhazelhurst
 
1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docxketurahhazelhurst
 
1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docxketurahhazelhurst
 
1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docxketurahhazelhurst
 
1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docxketurahhazelhurst
 
1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docxketurahhazelhurst
 
1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docxketurahhazelhurst
 
1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docxketurahhazelhurst
 
1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docxketurahhazelhurst
 

More from keturahhazelhurst (20)

1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
 
1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx
 
1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx
 
1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx
 
1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx
 
1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx
 
1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx
 
1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx
 
1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx
 
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx
 
1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx
 
1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx
 
1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx
 
1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx
 
1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx
 
1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx
 
1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx
 
1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 

Chapter 18 vital records recoveryVital assetsIn.docx

  • 1. Chapter 18: vital records recovery Vital assets Information stored on any media Personal data Important business data Contracts Customer lists Personnel files Vital records inventory Records, Media, Originating department, location
  • 2. Locate your Records Where and how are they stored? Prioritize your records Ranking to determine which records need to be restored first Records transportation Just as important as storing, we need to think about how we transport our vital records. Security – security during and after transportation Magnetic recordings – take care as many factors can effect this medium Records retention
  • 3. Establish records retention requirements Eliminate obsolete documents Identify critical records End of life plan – destruction of documents Media storage Each media storage type will require different storage parameters: Paper document storage Microfilm storage Magnetic media storage Risk assessment Storage risks include: Water Smoke Structural problems Fire Humidity High heat and deep cold Wide temperature swings
  • 4. Theft Sabotage Insects and rodents Magnetic fields Fire control systems mitigation Fire control systems smoke alarms and fire detection sprinklers gas fire suppression fire extinguishers fireproof containers fire drills good housekeeping electrical equipment Environmental issues mitigation Environmental Issues: moisture sensors and alarms humidifier/dehumidifier temperature control magnetic check Other issues mitigation
  • 5. Other Issues: secured access off-site duplication of key records pest extermination proper storage Security mitigation actions Controlling access is important to prevent: Reading your records Stealing records Damaging your records Action steps for your plan Materials needed for an emergency fall in several categories: General items Portable equipment Individual equipment Drying and cleaning materials Containment materials Maintenance activities Plan as part of your normal routine: Daily actions task Every week task
  • 6. Quarterly action task Immediate action team Damage containment team Assessment team Shuttle team Triage team Recovery techniques Water damage to paper records Air drying Freeze drying
  • 7. Determine what documents are unrecoverable Fire damage of paper records Microfilm Optical and magnetic media summary Vital records protection is not difficult but necessary Have a good retention policy in place Monitor all storage media .MsftOfcThm_Accent1_Fill { fill:#4472C4; } .MsftOfcThm_Accent1_Stroke { stroke:#4472C4; } 1. Describe best practices to develop and prepare to lead risk
  • 8. management mitigation exercises related to illegal border activity. 2. Using IS-120.A: An Introduction to Exercises from EMI/FEMA as a process guide, develop a border activity desktop risk management mitigation exercise to be submitted to your instructor for review. Chapter 17: telecommunications and networking Connections for today Most business have two distant networks: Voice communication that uses standard telephone system Data communication that uses one or more computers that are connected to the Internet Two networks are fading due to Voice-over-Internet Protocol (VOIP) Public switched telephone network
  • 9. PSTN Basics – each telephone has at least one pair of wires from wall jack to the punch block Private Branch exchange – larger companies would utilize this (PBX) PBX services: Voice mail Telephone conferencing Call transferring Music on hold Other vital equipment in pbx room Interactive Voice Response (IVR) Intelligent Port Selector
  • 10. Call Management System Call accounting Call Monitoring Telephone company’s central office Interexchange carrier point of presence Various companies such as AT&T What to look for: System availability time, guarantee, consequences for downtime, restoration policy, How does the carrier practice its disaster recovery procedures Digital telephone network
  • 11. VoIP systems are taking over tradition telephone systems VoIP network uses: VoIP telephone instrument Wiring A Server Benefits: Eliminates expense of running the analog cable Elimanates cost of second cable Saves cost by not having a PBX Eliminates long-distance calling charges Computer network basics
  • 12. Personal area network Local area network Wireless network Wide area network Internet service providers (ISP) Risk assessment Look for single points of failure that will adversely impact your critical business processes Risks: Natural hazards Human-Created hazards Telecommunications and Network Equipment Room
  • 13. Cabling Developing a plan Determine the telephone circuits restoration priority Review network security Telecommunications mitigation plan Alternate communications methods Action steps for your plan Things to consider after a disaster: Do not make any unnecessary calls – emergencies only When calling, you may need to wait a few minutes to wait for
  • 14. tone When you do receive a tone – dial quickly Services may not be there for long!! summary Today’s business depend upon their data and telecommunications networks Redundancy is your best defense Thorough understanding of your organization’s requirements needed