SlideShare a Scribd company logo
27.0 Disaster Recovery Policy
Scope
Any System that XXXXX deems essential for business operations.

Audience
Any approved User, employees, management and contractors or consultants onsite or
external.

Reason For Policy
Customers (internal and external) rely on XXXXX’s systems being stable and secure :
 XXXXX (and the IT Departments’) reputation is linked to this.
 Ultimately, XXXXX’s business is at stake.
 And with security, various individual’s reputation is at risk.

Policy Guidelines
General Guidelines

The relevant Manager shall review the situation and decide on the course of action.
IT Systems
When IT Systems are installed a Disaster Recovery (DR) Plan shall be produced and
signed-off by the Managing Director. The following steps are then carried out:
 The IT Manager will then arrange the setting up and installation of the Hot-standby
onsite and the offsite DR System.
 The DR System outsourced to a specialist supplier.
 Insure Tests are then carried out and every 12 months thereafter.
 Test Results shall be recorded and produced in an Audit Report for both internal and
external Audit.
Other Systems
That are not Business critical will depend on how they affect operations and will probably be
done out of hours in the morning or evening or at the weekend and arranged by the Facilities
Manager. These might include:
 Rest Rooms.
 Drink or Food Machines.
 Air-conditioning Systems.
 Fire exits.
 Alarms and sensor lighting.
External Conditions
These may cover the following:
 Bad weather affecting travel to and from any XXXXX site and therefore cause
Management to close the site early.
 The loss of any Local Bus or Train Service or the Company arranged transport.
 Some form of Vandalism or Terrorist attack.
Enforcement
This policy will be enforced by the IT Manager and/or executive team. Violations may
result in disciplinary action, which may include suspension, restriction of access, or
more severe penalties up to and including termination of employment. Where illegal
activities are suspected, the company may report such activities to the applicable
authorities.

Revision History
Revision X.X, 16th XXXX 2011

More Related Content

Similar to Disaster recovery policy

Chapter 15-Accounting Information System
Chapter 15-Accounting Information SystemChapter 15-Accounting Information System
Chapter 15-Accounting Information System
RejiePantinople
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope opt
Arya Wirabhuana
 
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
FMMUG
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remai
alehosickg3
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Major K. Subramaniam Kmaravehlu
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
HSE RISK ASSESSMENT
HSE RISK ASSESSMENT HSE RISK ASSESSMENT
HSE RISK ASSESSMENT
Ayanda Demilade
 
An Abridged to Permit to Work Systems
An Abridged to Permit to Work SystemsAn Abridged to Permit to Work Systems
An Abridged to Permit to Work Systems
Harry George
 
An Abridged to Permit to Work Systems
An Abridged to Permit to Work SystemsAn Abridged to Permit to Work Systems
An Abridged to Permit to Work Systems
Harry George
 
An Abridged to Permit to Work Systems.pdf
An Abridged to Permit to Work Systems.pdfAn Abridged to Permit to Work Systems.pdf
An Abridged to Permit to Work Systems.pdf
Olivia Wilson
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and control
Shruti Pendharkar
 
Privacy & Security Controls In Vendor Management Al Raymond
Privacy & Security Controls In Vendor Management   Al RaymondPrivacy & Security Controls In Vendor Management   Al Raymond
Privacy & Security Controls In Vendor Management Al Raymond
spencerharry
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docx
randymartin91030
 
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTECase Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
Asim Ranjha
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
Lumension
 
Capstone Finished Presentation.doc
Capstone Finished Presentation.docCapstone Finished Presentation.doc
Capstone Finished Presentation.doc
Kapricia Morris
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
Maher Manan
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
14 Tips for Process Safety Management
14 Tips for Process Safety Management14 Tips for Process Safety Management
14 Tips for Process Safety Management
Verde Ventures Pvt. Ltd.
 

Similar to Disaster recovery policy (20)

Chapter 15-Accounting Information System
Chapter 15-Accounting Information SystemChapter 15-Accounting Information System
Chapter 15-Accounting Information System
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope opt
 
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remai
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
HSE RISK ASSESSMENT
HSE RISK ASSESSMENT HSE RISK ASSESSMENT
HSE RISK ASSESSMENT
 
An Abridged to Permit to Work Systems
An Abridged to Permit to Work SystemsAn Abridged to Permit to Work Systems
An Abridged to Permit to Work Systems
 
An Abridged to Permit to Work Systems
An Abridged to Permit to Work SystemsAn Abridged to Permit to Work Systems
An Abridged to Permit to Work Systems
 
An Abridged to Permit to Work Systems.pdf
An Abridged to Permit to Work Systems.pdfAn Abridged to Permit to Work Systems.pdf
An Abridged to Permit to Work Systems.pdf
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and control
 
Privacy & Security Controls In Vendor Management Al Raymond
Privacy & Security Controls In Vendor Management   Al RaymondPrivacy & Security Controls In Vendor Management   Al Raymond
Privacy & Security Controls In Vendor Management Al Raymond
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docx
 
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTECase Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
 
Capstone Finished Presentation.doc
Capstone Finished Presentation.docCapstone Finished Presentation.doc
Capstone Finished Presentation.doc
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
14 Tips for Process Safety Management
14 Tips for Process Safety Management14 Tips for Process Safety Management
14 Tips for Process Safety Management
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Disaster recovery policy

  • 1. 27.0 Disaster Recovery Policy Scope Any System that XXXXX deems essential for business operations. Audience Any approved User, employees, management and contractors or consultants onsite or external. Reason For Policy Customers (internal and external) rely on XXXXX’s systems being stable and secure :  XXXXX (and the IT Departments’) reputation is linked to this.  Ultimately, XXXXX’s business is at stake.  And with security, various individual’s reputation is at risk. Policy Guidelines General Guidelines The relevant Manager shall review the situation and decide on the course of action. IT Systems When IT Systems are installed a Disaster Recovery (DR) Plan shall be produced and signed-off by the Managing Director. The following steps are then carried out:  The IT Manager will then arrange the setting up and installation of the Hot-standby onsite and the offsite DR System.  The DR System outsourced to a specialist supplier.  Insure Tests are then carried out and every 12 months thereafter.  Test Results shall be recorded and produced in an Audit Report for both internal and external Audit. Other Systems That are not Business critical will depend on how they affect operations and will probably be done out of hours in the morning or evening or at the weekend and arranged by the Facilities Manager. These might include:  Rest Rooms.  Drink or Food Machines.  Air-conditioning Systems.  Fire exits.  Alarms and sensor lighting. External Conditions These may cover the following:  Bad weather affecting travel to and from any XXXXX site and therefore cause Management to close the site early.  The loss of any Local Bus or Train Service or the Company arranged transport.  Some form of Vandalism or Terrorist attack.
  • 2. Enforcement This policy will be enforced by the IT Manager and/or executive team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities are suspected, the company may report such activities to the applicable authorities. Revision History Revision X.X, 16th XXXX 2011