A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

Museum Presentation Intermuseum Conservation Association.
Disaster Recovery The People Dimension. Today’s Agenda Why bother with any Disaster Recovery/Business Continuity Planning? Importance of the People Factor.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Revision from last week  Assumptions are potential failure points in a project. They need to be monitored and managed. At the start of the project they.
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
Business Continuity Planning and Disaster Recovery Planning
INTRODUCTION AS (3.3) Apply business knowledge to address a complex problem in a given global business context.
The Australian/New Zealand Standard on Risk Management
Business Services Emergency Preparedness. Agenda Emergencies Emergencies Business Continuation Business Continuation University Plan University Plan Building.
Factors to be taken into account when designing ICT Security Policies
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
| Establishing a Contingency Plan.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Business Crisis and Continuity Management (BCCM) Class Session
Introduction to Business Organisations
Care Home Forum 19 th May 2015 Sarah Chittock – Merton Civil Contingencies Officer Taryn Milton – Emergency Planning Manager – Epsom St. Helier.
Crisis Management How would you ‘cope’?. What disasters could your house face?
Business Continuity for Facilities Managers Peter Carr FastTrack Solutions Ltd
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Facilities Management
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Human Resources Crisis Management and Contingency Management HL ONLY.
MITIGATION PREPAREDNESS RESPONSE RECOVERY FOUR PHASES OF EMERGENCY MANAGEMENT Pre-event Post event Pre-event.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
HBCU National Workshop June 24, 2011 Disaster Recovery Reggie Brinson Assoc. VP/Chief Information Officer Clark Atlanta University.
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
Risk Management Guidelines. Not If, But When Injuries and medical emergencies can and WILL occur Injuries and medical emergencies can and WILL occur It.
Business Continuity & Disaster recovery
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
1 Crisis Management / Emergency Management Overview.
Perspectives on Business Continuity Management Bill Wheeler, EPO.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
A Level ICT Unit Implementing CBIS’s. Support Installing a new system is disruptive and the support program will need to be planned well in advance.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
SECURITY CONSULTING /DISASTER RECOVERY SERVICE The “Must Have Plans” for a Business in the World of Tomorrow.
Crisis Management Crisis: any situation that has the potential to affect long-term confidence in an organisation or product and may interfere with its.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
2.8 Crisis Management and Contigency Planning Chapter 17.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
EXPECT THE UNEXPECTED Prepare Your Business for Disaster.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Risk Assessment and Risk Management James Taylor COSC 316 Spring 2008.
Information Security Crisis Management Daryl Goodwin.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Welcome to the ICT Department Unit 3_5 Security Policies.
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
Information Systems Security
CompTIA Security+ Study Guide (SY0-401)
CONTINUITY OF OPERATIONS PLANNING WORKSHOP #2
2.8 Crisis Management and Contigency Planning
Unit 7 – Organisational Systems Security
Relate to Clients on a business level
Unit 3 Information Systems
Business Continuity Planning
Stage 2 - review recovery options
Selecting a Health Care
Presentation transcript:

A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY

Effects of Negligence Risks range from spilling a cup of coffee on a single computer to a bomb 90% of companies that suffered significant data loss went out of business in two years 43% of companies went out of business immediately

Effects of Negligence (Cont) Directors of a company can be prosecuted and / or sued if Health and Safety threat due to data loss Loss affects individuals (e.g. banking & insurance) Business Data Loss v. Operating Ability

Contents A list of the most critical business functions A list of facilities, hardware, software, data, personnel and other equipment necessary to support these functions A method for securing access to all necessary resources A method for getting in touch with all key personnel A step by step course of action to implement the plan Education & training for all staff involved in implementing the plan Regular drills to test the effectiveness of the plan

Last Resort Plans Must contain provision for backup facilities which can be used in the event of disaster. Three alternatives are: A company-owned backup facility, geographically distant from the main site, known as a ‘ cold-standby ’ site. A reciprocal agreement with another company that runs a compatible computer system. A subscription to a disaster recovery service

Criteria used to select a Contingency Plan The scale of the organisation and its I.T. systems The nature of the operation an on-line system may need to be restored within hours, whereas a customer billing operation may not be harmed by a few day ’ s delay, if no data is lost The relative costs of different options a company with several linked sites may be able to move operations to an alternative site The perceived likelihood of disaster occurring companies in earthquake zones are likely to invest more in disaster recovery than average

Discussion What are the most critical ICT functions at our school? What would be the consequences of a disaster such as fire or theft? What sort of contingency plan would be appropriate?

Question  A small company runs a network of 4 PC ’ s on which it keeps records of stock, customer accounts, a mailing list and a multitude of word-processed documents.  Draw up a security plan for this company to ensure that it will be able to continue operating normally within a day or so of a disaster such as a fire.  (20 Marks)