you need to create a Disaster Recovery Plan for any company . Make sure to select the name of the company. The plan will follow the template/example attached.
**Even though this is a technical document, for academic purposes, all sources should be cited and reference
INFORMATION TECHNOLOGY DISASTER RECOVERY PLAN
| Revision | Change | Date |
Official copies of the document are available at the following locations: 1
5.0.2 Incident Command Team.. 3
5.1 Datacenter Recovery Team.. 3
5.2 Desktop, Lab, and Classroom Recovery Team.. 4
5.3 Enterprise Systems Recovery Team.. 4
5.4 Infrastructure and Web Recovery Team.. 4
5.5 Telecommunications, Network, and Internet Services Recovery Team.. 4
Section 6: Recovery Preparations. 5
6.1 Data Recovery Information: 5
6.2 Central Datacenter and Server Recovery Information: 5
6.3 Network and Telecommunication Recovery Information: 5
6.4 Application Recovery Information: 5
6.5 Desktop Equipment Recovery Information: 5
Section 7: Disaster Recovery Processes and Procedures. 5
7.3 Disaster Recovery Teams: 5
7.4 General System/Application Recovery Procedures/Outline: 5
8.0 Network & Telecommunication Recovery Guidelines: 7
Appendix B. Crisis Management Team Contact List 7
Appendix C: IT Recovery Priority List 7
C.1 IT Infrastructure Priorities: 7
C.3 Consortium, Outsourced, and Cloud-based IT System Priorities: 8
Appendix D: Vendor Information. 9
Appendix E: Disaster Recovery Signoff Sheet 10
Provide an introduction to the company/situation…
A copy of this plan is stored in the following areas:
Determine/explain the scope of this plan.
| Chief Information Officer | |
| Home Phone: | |
| Cell Phone: |
| Chief Information Officer | |
| Manager, User Support | |
| Manager, Infrastructure Services | |
| Manager, Information Systems | |
| Manager, Classroom and Media Services |
All Contact Information is located in Appendix A
| Team Lead: | Manager, Infrastructure Services |
| Team Members: | System Administrators (2) |
| Desktop Systems Administrator | |
| Network Communications Technicians (2) |
All Contact Information is located in Appendix A
Commander.
| Team Lead: | Manager, User Services |
| Team Members: | Manager, Classroom and Media Services |
| Desktop Systems Administrator | |
| Computing Coordinators (7) | |
| Lab and Student Computing Coordinator | |
| Equipment Systems Specialist |
All Contact Information is located in Appendix A
| Team Lead: | Manager, Information Systems |
| Team Members: | Manager, Infrastructure Services |
| Programmer/Analysts (4) | |
| Web Programmer/Analyst | |
| System Administrator | |
| Computing Coordinators supporting affected areas (business services, payroll, enrollment
services, etc.) |
|
| Key Business Unit Personnel as needed by type of incident (payroll clerk, accountant,
registrar, etc.) |
All Contact Information is located in Appendix A
Commander.
| Team Lead: | Manager, Infrastructure Services |
| Team Members: | System Administrators (2) |
| Desktop Systems Administrator | |
| Web Programmer/Analyst |
All Contact Information is located in Appendix A
Commander.
| Team Lead: | Manager, Infrastructure Services |
| Team Members: | Communications Technicians (2) |
| System Administrator |
The following priorities have been established by the department of Information Technology with consultation from the campus community.
| Application/System Name | Priority | RTO | RPO |
Note: RTO is recovery time objective, RPO is recovery point objective
| Building Name | Priority |
Note: building list continues on next page.
I have been briefed and given an overview of the Disaster Recovery Plan and I am familiar with my responsibilities.
| Name | Signature | Date |
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more
Recent Comments