IT SERVICE CONTINUITY PLAN

Slides:



Advertisements
Similar presentations
*significant capabilities highlighted.
Advertisements

*significant capabilities highlighted.
Kuwait Financial Centre ‘Markaz’ Sukuk Presentation - Update June 2009
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
11 th Annual Sucker Rod Pumping Workshop Renaissance Hotel Oklahoma City, Oklahoma September , 2015 Title Author Author’s Company Author’s Logo.
1 Copyright © 2012 Mahindra & Mahindra Ltd. All rights reserved. 1 Defect Management - Process and Roles.
TIJARA Provincial Economic Growth Program Business Continuity / Disaster Recovery Planning Introduction and Workshop Outline Prepared by Larry SanBoeuf.
References to ‘Control’ can either refer to superiors in a control room or any decision making authority.
IBM eServer iSeries © 2003 IBM Corporation ™™ iSeries Solutions for Business Continuity IBM eServerJ iSeriesJ © 2003 IBM Corporation.
May 18 – 22, Gas-Lift Workshop1 Presentation Title Presenter(s) name(s) and job title(s), if needed Company identification(s) and logo(s), if.
Ideally only staff that have been media trained should manage media releases. If you’re not media trained limit your focus on the facts.
가상화 기반의 Workload 관리솔루션 : FORGE PlateSpin Virtualization and Workload Management 나영관 한국노벨 /
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
The secure site rendering issue (all navigation crushed together as a list at the top of the page) is a compatibility issue with Internet Explorer only.
Plan Write Review Publish Define scope, stakeholders & process Select techniques & tools Review Doc. Plan with stakeholders Schedule project Check for.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Pre-Execution Process Review Presentation
Description and/or Definition
Berry College Disaster Recovery Soft Exit
SIMPLE SWOT MATRIX TEMPLATE
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
AGILE PRODUCT ROADMAP AGILE PRODUCT ROADMAP
Presentation Title Sector First Last, Senior Analyst
IT STRATEGY ROADMAP TEMPLATE
MULTIPLE PRODUCT ROADMAP
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
Description and/or Definition
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
Feb , Artificial Lift Strategies for Unconventional Wells Workshop Oklahoma City, OK.
S W T O SWOT ANALYSIS TEMPLATE STRENGTHS (+) WEAKNESSES (–) • •
Presentation Title Presenter(s) name(s) and job title(s), if needed
<Organization Name> <Date>
IT STRATEGY ROADMAP TEMPLATE
Feb , Artificial Lift Strategies for Unconventional Wells Workshop Oklahoma City, OK.
TEXT TEXT TEXT TEXT BUSINESS OBJECTIVES.
ANNUAL BUSINESS REVIEW
QUARTERLY BUSINESS REVIEW
QUARTERLY BUSINESS REVIEW
BUSINESS CONTINUITY PLAN
Presentation Title Presenter(s) name(s) and job title(s), if needed
TITLE Business Case YOUR LOGO BUSINESS CASE PRESENTATION 00/00/0000
TASK LIST YOUR LOGO PROJECT: [ TITLE ] COMPLETED BY: [ NAME ]
Description and/or Definition
Presentation Title Presenter(s) name(s) and job title(s), if needed
STRATEGIC PLANNING YOUR LOGO COMPLETED BY: [ NAME ]
BUSINESS CONTINUITY PROGRAM
BUSINESS CONTINUITY FRAMEWORK BUSINESS IMPACT ANALYSIS
BUSINESS CONTINUITY PROCEDURE
M&A INTEGRATION SCORECARD
YOUR COMPANY NAME Tag Line YOUR LOGO 00/00/0000 PRESS KIT.
NONPROFIT NAME Tag Line YOUR LOGO 00/00/0000 PRESS KIT.
BLOG NAME Mission Statement / Tag Line YOUR LOGO 00/00/0000 PRESS KIT.
HEADLINE / NAME OF EVENT
LAW FIRM DISASTER RECOVERY PLAN
DISASTER MANAGEMENT PLAN
MANUFACTURING DISASTER RECOVERY PLAN
PAYROLL DISASTER RECOVERY PLAN
SCHOOL DISASTER MANAGEMENT PLAN
PROJECT NAME YOUR LOGO PROJECT CODE: PROJECT MANAGER: DATE OF REPORT:
DISASTER CALL TREE YOUR LOGO COMPANY NAME Street Address
DISASTER RECOVERY PLAN
DISASTER RECOVERY RUNBOOK
DISASTER RECOVERY PLAN
DATA DISASTER RECOVERY PLAN
SaaS DISASTER RECOVERY PLAN
APPLICATION DISASTER RECOVERY RESPONSE
PROJECT NAME YOUR LOGO [ NAME ] [ DATE ] BUSINESS CASE PRESENTATION
STRATEGIC PLANNING YOUR LOGO COMPLETED BY: [ NAME ]
IT DISASTER RECOVERY PLAN
BUSINESS CONTINUITY PLAN
Presentation transcript:

IT SERVICE CONTINUITY PLAN YOUR LOGO COMPANY NAME Street Address City, State and Zip webaddress.com VERSION 0.0.0 00/00/0000 IT SERVICE CONTINUITY PLAN

B. OVERALL RECOVERY STRATEGY A. RECOVERY TIME OBJECTIVE (RTO) TABLE OF CONTENTS 1. SCOPE 4. RECOVERY STRATEGY 2. RECOVERY OBJECTIVES A. INITIAL RECOVERY B. OVERALL RECOVERY STRATEGY A. RECOVERY TIME OBJECTIVE (RTO) i. RECOVERY SCENARIOS B. RECOVERY POINT OBJECTIVE (RPO) 5. RETURN TO OPERATIONS 3. RECOVERY TEAM 6. DOCUMENT CHANGE LOG A. SERVICE / ROLE / FUNCTION B. RESPONSIBILITY C. DEPENDENCIES D. EXPECTED RESPONSE TIME WHAT’S INSIDE

Service Area, Service Offerings, Service Areas that depend on the service at risk 1. SCOPE

RECOVERY TIME OBJECTIVE (RTO) The maximum length of time during which IT processes can be down before the disruption impacts the business B. RECOVERY POINT OBJECTIVE (RPO) The maximum interval of data loss since the last IT service backup that the business can tolerate while still proceeding with normal business processes 2. RECOVERY OBJECTIVES

3. RECOVERY TEAM A. SERVICE / ROLE / FUNCTION B. RESPONSIBILITY C. DEPENDENCIES D. EXPECTED RESPONSE TIME 3. RECOVERY TEAM

INITIAL RECOVERY B. OVERALL RECOVERY STRATEGY 4. RECOVERY STRATEGY

4B. i. RECOVERY SCENARIOS Data Failure, Critical Recovery Team is unavailable, Business is inaccessible 4. RECOVERY STRATEGY

5. RETURN TO OPERATIONS

6. DOCUMENT CHANGE LOG VERSION HISTORY VERSION APPROVED BY REVISION DATE DESCRIPTION OF CHANGE AUTHOR PREPARED BY TITLE DATE APPROVED BY 6. DOCUMENT CHANGE LOG

DISCLAIMER   Any articles, templates, or information provided by Smartsheet on the website are for reference only. While we strive to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to the website or the information, articles, templates, or related graphics contained on the website. Any reliance you place on such information is therefore strictly at your own risk.