1 / 6

Disaster Recovery Strategies & criteria for evaluation of information management strategies

Disaster Recovery Strategies & criteria for evaluation of information management strategies. Disaster Recovery Strategies. A document with steps needed to restore company operations in event of a disaster Four key parts: Emergency Plan Names & contact details of people to notify

yachi
Télécharger la présentation

Disaster Recovery Strategies & criteria for evaluation of information management strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Disaster Recovery Strategies & criteria for evaluation of information management strategies

  2. Disaster Recovery Strategies • A document with steps needed to restore company operations in event of a disaster • Four key parts: • Emergency Plan • Names & contact details of people to notify • Procedures to follow with computer equipment • Evacuation procedures for employees • Return procedures

  3. Disaster Recovery Strategies • Backup Plan • Location of alternative sites & equipment • Location of backup data, supplies, eq/ment • Personnel responsible for gathering backup resources • Schedule indicating order & approximate time applications up and running

  4. Disaster Recovery Strategies • Recovery Plan • Covers hardware & software replacement • Identification of mission critical ICT services • Use of a backup site • Test Plan • Simulation of variety of disasters & recovery needs

  5. Evaluating the effectiveness of data security measures • Integrity of data • accuracy, reliability and timeliness in terms of storage, communication and disposal • Accuracy, eg. storage, it contains all data; communication, arrives accurately, no viruses; disposal, selected files deleted or copied • Security • Evaluate physical & software security, eg. audit trails

  6. Evaluating the effectiveness of data security measures • Ease of retrieval • Observance of folder & file-naming conventions • Backed up files need to be able to be restored • Currency of files • Regular backups • Use of sequential file-naming conventions

More Related