Documenting a Communications Recovery Plan Leo A. Wrobel
|
|
- Magnus Lyons
- 6 years ago
- Views:
Transcription
1 Documenting a Communications Recovery Plan Leo A. Wrobel Payoff The growing complexity of communications systems means that almost every organization today has a local area network (LAN) administrator whose possible absence during a disaster mandates the development of a well-documented communications recovery plan that can be executed by people unfamiliar with an organization's systems. This article reviews the basic components of such a plan, particularly the need for accurate and up-to-date hardware and software inventory forms. Problems Addressed Technical services personnel often respond tersely when asked by management to produce a disaster recovery plan for a communications system. They view such a request as a noconfidence vote and the plan as a test of their ability to perform a recovery in the event of a disaster. Competency, however, is almost never the issue. In most large organizations, the technical services and communications staffs are capable of recovering from a disaster under virtually any circumstances. Often, the very people controlling the recovery process are those who actually designed and built the communications system in the first place. They know where every wire in the organization runs and have memorized the telephone number of every major equipment vendor and service supplier. In the event of a disaster, these employees would undoubtedly pull together in an almost superhuman effort. Problems with disaster recovery occur when an organization's key personnel, such as the local area network (LAN) administrator, are unavailable for any reason during a disaster. Because of the growing complexity of LAN technology, one of the most effective tests of a disaster recovery plan is to assemble the disaster response team and remove the LAN administrator from the exercise. Loss of a LAN administrator who knows everything about a system can be devastating. The need for a communications recovery plan should therefore be presented to technical services staff from the perspective that someone unfamiliar with the system may have to execute the plan. The goal of every organization should be to document its communications recovery plan in a systematic format that can be followed by any reasonably trained technical services personnel, whether they be from a vendor, a rental company, a major supplier, or a carrier company. Developing an Inventory of Communications Hardware Disaster recovery personnel need to know several details about the organization's hardware, including: Type and model number. Software packages residing on the hardware. Software revision numbers.
2 Date of purchase and cost. Criticality to operations. Power requirements. Other helpful items include: The name, address, and telephone number of the manufacturer. The local distributor or depot for the equipment. The location of secondary-market hardware suppliers, who can be instrumental in providing equipment during a disaster. Exhibit 1 provides an example of a hardware inventory form that can aid recovery personnel in making quick command decisions. For example, if a four-year-old piece of equipment is depreciated over a five-year period, recovery personnel may decide to replace rather than to repair it. Such information is extremely useful when many decisions must be made rapidly and under tense circumstances. Hardware Inventory Form for Emergency Replacement and Restoration Component: Purpose: Manufacturer: - Serial Number: - Associated Software: Criticality Rating (1,2,3,4): -- Date of Purchase: Vendor Name and Telephone Number: -- Remarks: -- A separate inventory should also be kept of all hardware maintained by an organization at a disaster recovery center. The inventory should contain some fairly minute detail, such
3 as whether the hardware is on a movable rack or requires dollies, and the type of power plug the equipment requires. Maintaining Accurate Inventories The best method for keeping track of hardware necessary for restoring communications is through a process called data importing. Automated Data Importing Importing is essentially a means of finding data bases and repositories of information within the organization that are reasonably up to date. For example, when a piece of hardware is purchased, a document or file for the equipment is archived somewhere within the organization. Sometimes, the contract and the documentation for the equipment goes to the accounting department for amortization purposes. In other cases, the files become part of the personal file of the communications manager or analyst. The optimal situation is for them to be stored and accessible on a LAN. In any case, recovery planners should locate and identify these repositories of inventory data so they can be automatically imported into the recovery plan. There are good reasons for taking this approach. The price of some of today's hardware and the necessity for any mission-critical equipment to be protected by a disaster recovery plan means that the savvy technical services manager often includes disaster recovery in the selection criteria for major hardware purchases. Such equipment includes automated call distribution units; Private Branch exchange; major bridges, routers, and gateways; LAN networks; and mainframe computers. It is much more cost-effective to negotiate roll-in replacement guarantees when a vendor is vying for business than to try to add these services later. Yet, given today's levels of staff turnover, failure to import information on such guarantees and on maintenance contracts into the recovery plan could result in a future LAN manager needlessly paying for a disaster recovery plan for equipment already protected. Organizations that make heavy use of internetworked LANs have an advantage because they can automatically transfer files between interconnected departments in several ways without human intervention. For example, when object linking Microsoft Word files, a technical services manager can key in on a specific file name in the accounting department to ensure that updates to a hardware repository file are transferred to the appropriate file in the recovery plan. Manual Updating Importing can also be accomplished through a sneaker net assigning a key person or division to regularly go to the department containing files on equipment, make a floppy disk copy of the appropriate file, and update the recovery plan. But under the pressures of work, busy technologists can easily overlook this task, causing the recovery plan to be dangerously outdated. Updating this way therefore requires that staff realize the importance of the recovery planning process and that the process be enforced, to the point of withholding raises when the task is not performed.
4 Additional Components of an Up-to-Date Plan Importing Information on Personnel and Vendors Up-to-date telephone numbers for personnel and critical equipment vendors are essential to the successful implementation of a disaster recovery plan. Once again, this means importing data from reliable sources regularly and, preferably, without human intervention. Consider employees' home telephone numbers, which are found in several places, such as human resources and the company telephone directory. Care must be taken to ensure that the data contained in these sources is up to date. Here again, importing is best done by object linking files together, but it can also be accomplished through use of a sneaker net and floppy disk. Telephone numbers for key hardware vendors and suppliers can often be found in the network control center, help desk, or other operational environment whose personnel have day-to-day contact with vendors and are often the first to know about changed telephone numbers. Because operations staff are usually regularly involved in escalation procedures, their departments generally document information on second- and third-level management within the vendor community. Developing an Inventory of Software Communications recovery planners must also develop an inventory of all software required for operation of mission-critical communications equipment. This inventory should include: Acquisition date. Original cost. License number. Version number. Exhibit 2 provides an example of a software inventory form. Software Inventory Form for Emergency Replacement or Restoration
5 Software Package: Purpose: Supplier Name and Telephone Number: - License Number: Version Number: - Criticality Rating (1,2,3,4): - Location Where Software Can Be Purchased or Replaced: Remarks: Equipment Room Diagrams Equipment room diagrams should show all installed communications hardware and delineate any special environmental specifications such as air flow, temperature, and power needs. The diagrams should also outline equipment footprints, clearances, and any other information useful to a network installer. They form part of the appendices that should accompany a thorough recovery plan. See Exhibit 3 for a list of the information that should be contained in these appendices. Useful Appendices to a Disaster Recovery Plan - Emergency Phone Lists of Management and Recovery Teams - Vendor Callout and Escalation Lists - Inventory and Report forms - Carrier Callout and Escalation Lists - Maintenance Forms - Hardware Lists and Serial Numbers - Software Lists and License Numbers _ Team Member Responsibilities - Network Schematic Diagrams - Equipment Room Diagrams - Contract and Maintenance Agreements - Special Operating Instructions for Sensitive Equipment - Cellular Telephone Inventory and Agreements
6 Importing Components of the Corporatewide Plan Technical recovery planners should consider importing components of the corporatewide recovery plan dealing with global policy issues. It makes little sense for a technical recovery planner to write procedures for such companywide concerns as loss of a building, physical security, fire and bomb-threat procedures, purchasing, and media affairs. In these cases, the technical recovery planner should direct the reader of the communications recovery plan to the relevant section of the corporate plan. In most cases, the LAN or network recovery plan itself will probably end up being imported into a corporatewide recovery plan for execution by an emergency management team. The process is reciprocal. Assigning Technical Teams It is advisable to split a technical recovery plan into numerous subsections managed by technical teams. Such sections include LAN management, voice communications, data communications, and the emergency network control center. Each of these functions has assigned day-to-day responsibilities, and the team assigned to each will have specific responsibilities during a disaster. A network control center or help desk, for example, could take on a very different function in a disaster by helping to maintain command and control. The Real Reasons for Disaster Planning All companies use automated systems to conduct business and all suffer when these systems fail. Whether they are LANs or other communications systems, automated systems should not increase the risk to a company merely because they are convenient. A communications recovery plan should therefore accurately focus on restoring a business' core operations, or the items most crucial to its profitability, in the event of a disaster. Exhibit 4 presents the seven R's of a successful disaster recovery plan. The Seven R's of a Successful Disaster Recovery Plan
7 1. Recognition of Need for Planning -Protect Human Life. -Recover Critical Operations. -Protect Competitive Position. -Preserve Customer Confidence and Good Will. -Protect against Litigation. 2. Response -Reacting to Initial Report of a Disaster. -Notifying the Police, Fire, and Medical Personnel. -Notifying Management. -Establishing the Executive Management Team (EMT). -Filing Initial Damage Assessment Reports to the EMT. 3. Recovery -Assisting the EMT in Preparation of Statements. -Opening a Critical Events Log for Auditing Purposes. -Using Modified Signing Authority for Equipment Purchases. -Obtaining Necessary Cash. -Maintaining Physical Security. -Arranging Security at the Damaged Site, the Recovery Center, and Emergency Funds Disbursement Centers. 4. Restoration -Coordinating Restoration of the Original Site. -Restoring Hardware Systems. -Restoring Software Systems. -Restoring Power, the Uninterruptible Power Supply, and Common Building Systems. -Replacing Fire Suppression Systems. -Securing the Building. -Rewiring the Building. -Restoring the LAN. -Restoring the WAN. 5. Return to Normal Operations -Testing New Hardware. -Training Operations Personnel. -Training Employees. -Scheduling Migration Back to the Original Site. -Coordinating Return to the Original Site. 6. Rest and Relaxation -Scheduling Compensatory Timeoff. 7. Reevaluate and Reassess -Reviewing the Critical Events Log. -Evaluating Vendor Performance. -Recognizing Extraordinary Achievements. -Preparing Final Review and Activity Report. -Aiding in Liability Assessments. Recommended Course of Action A disaster recovery plan is a complex road map of how to rebuild an organization after a disaster. It should be written for execution by a reasonably well-educated technical person in the event key personnel are unavailable. A thorough recovery plan includes input from all major vendors, suppliers, and departments and must import data from accurate sources. It should delineate recovery tasks
8 systematically and clearly and strike a balance between cumbersome detail that discourages reading and a cursory explanation understandable only to people familiar with a system. It can take two years or more to complete a successful recovery plan, but the effort is well worth the protection the plan affords an organization. Author Biographies Leo A. Wrobel Leo A. Wrobel is president of Premier Network Services Inc., in Dallas.
Business Continuity Maturity Matrix
Business Continuity Maturity Matrix A maturity model is one of the most valuable tools available for planning and sustaining a new Business Continuity program. Like the Business Continuity Planning (BCP)
More informationHow to Choose a Managed Services Provider
How to Choose a Managed Services Provider Finding Peace of Mind If you re outsourcing your IT services, you need to find a Managed Services Provider you can trust. A technology partner with the experience,
More information10 Steps to Preparedness
10 Steps to Preparedness Prepare to Survive. Today s Key Take-Aways Review basics of disaster recovery and business continuity. Understand what you can do to prepare your organization for an unplanned
More informationFujitsu Philippines, Inc. Technology Infrastructure Services Catalog
Fujitsu Philippines, Inc. Technology Infrastructure Services Catalog FPI-ITSM-MN-002 Prepared by: Reviewed by: Approved by: [Signed] Stanley Payte [Signed] Jun Santos [Signed] Larry Galang Document No.:
More informationDisaster Recovery Planning Process
Page 1 of 8 Disaster Recovery Planning Process By Geoffrey H. Wold Part I of III This is the first of a three-part series that describes the planning process related to disaster recovery. Based on the
More informationIntroduction. This page should be removed prior to finalizing your Business Continuity Plan. Page 1 of 33
Introduction The following template is provided as a tool and is intended to cover as many disaster scenarios as possible. It is expected that as you go through the template, you will edit, modify or delete
More informationA Simplified and Sustainable Approach to NERC CIP Compliance with Cyberwiz-Pro. NERC CIP Compliance Solutions from WizNucleus
A Simplified and Sustainable Approach to NERC CIP Compliance with Cyberwiz-Pro NERC CIP Compliance Solutions from WizNucleus 1. EXECUTIVE SUMMARY 1.1 THE CHALLENGE Electric utilities that contribute to
More informationAbout Us. Under one roof. Why work with us? The A (to Z) team. Awards & associations
About Us Why work with us? Under one roof The A (to Z) team Awards & associations Silver Lining is a professional IT service provider based in Hampshire. We have been providing the very best in business
More informationADDITIONAL TERMS FOR INTEROUTE CLOUD HOSTED UNIFIED COMMUNICATIONS SCHEDULE 2U
ADDITIONAL TERMS FOR INTEROUTE CLOUD HOSTED UNIFIED COMMUNICATIONS SCHEDULE 2U CONTENTS 1 Service Description... 3 2 Definitions... 3 3 Service Terms... 3 3.1 Licensing and Service Provider License Agreements
More informationData Protection Management (DPM)
Industry Trends and Technology Perspective White Paper Data Protection Management (DPM) A look at the benefits of DPM for timely and effective data protection management By Greg Schulz Founder and Senior
More informationApplication Note 96 Dallas Buttons Ease Software Distribution Management
Application Note 96 Dallas Buttons Ease Software Distribution Management INTRODUCTION Software vendors are increasingly being asked by their customers to support a wider variety of distribution and license.
More informationStandardizing the Incident Command System for Businesses
Standardizing the Incident Command System for Businesses by Judy Bell, CEM From Jerry Molten s perspective, the fire at Acme Manufacturing was fairly routine. The first alarm had come in just after 7 a.m.
More informationCLICNET TELECOMMUNICATIONS INC. Business Continuity Plan
CLICNET TELECOMMUNICATIONS INC. Business Continuity Plan 1 Emergency notification contacts Name Address Home Mobile phone 2 Revisions control page Date Summary of changes made Changes made by (Name) 3
More informationIBM United States Software Announcement , dated August 21, 2018
IBM United States Software Announcement 218-410, dated August 21, 2018 IBM B2B Integrator V6.0, IBM File Gateway V6.0, and Global High Availability Mailbox add-on deliver the next generation of mission-critical
More informationGlossary 1. For a complete glossary of support center terminology, please visit HDI s Web site at HDI Course Glossary
Glossary 1 Term Abandon Before Answer (ABA) Rate The percentage of customers that terminate a call (i.e., hang up) before the call is answered. ABA is a leading indicator that is used to manage staffing
More informationINTELLECTUAL PROPERTY MANAGEMENT ENTERPRISE ESCROW BEST PRACTICES REPORT
INTELLECTUAL PROPERTY MANAGEMENT ENTERPRISE ESCROW BEST PRACTICES REPORT What is Mission Critical to You? Before you acquire mission-critical technology from a third-party software vendor, take a few minutes
More information1 P a g e. IT Tailored to Your Needs
1 P a g e IT Tailored to Your Needs Bluescope Technologies is a leading provider of IT services to businesses of all sizes in a wide range of industries. Bluescope s headquarters are situated in Limerick,
More informationBusiness Continuity Plan. Swedbank Securities US, LLC
Business Continuity Plan Swedbank Securities US, LLC March 2017 Business Continuity Plan [FINRA Rule 4370; FINRA Regulatory Notice 13-25; FINRA Notice to Members 06-74 and 04-37; NASDAQ Rule 3510; SIFMA
More informationBusiness Continuity Through Planning, Prevention and Preparedness. READINESS RESOURCES
READINESS RESOURCES Federal Emergency Management Agency -- www.fema.gov Emergency Management Guide for Business & Industry: http://www.fema.gov/pdf/business/guide/bizindst.pdf American Red Cross -- www.redcross.org
More informationBusiness Continuity Through Planning, Prevention and Preparedness. READINESS RESOURCES
READINESS RESOURCES Federal Emergency Management Agency Emergency Management Guide for Business & Industry: www.fema.gov/pdf/business/guide/bizindst.pdf PS-Prep - www.fema.gov/ps-preptm-voluntary-private-sector-preparedness
More informationCPOtracker Template Package
CPOtracker Template Package A set of companion planning documents complimenting your CPOtracker software system www.cpotracker.com The CPOtracker Template Package is an affordable and easy-to-use framework
More informationALTIRIS Implementing an Asset and Contract Management System
ALTIRIS Implementing an Asset and Contract Management System Document Version: 1.0 The information contained in the Altiris Knowledgebase is subject to the Terms of Use as outlined at http://www.altiris.com/legal/termsofuse.asp.
More informationFixed Asset/Equipment Physical Inventories for Educational Organizations
Fixed Asset/Equipment Physical Inventories for Educational Organizations WHITEPAPER FIXED ASSETS - INVENTORIES - AUDITS - VALUATIONS Contents 1. Purpose... 3 2. Definition of a Fixed Asset Inventory...
More informationInformation, Privacy and Archives Division. Government of Ontario Function-Based Common Records Series: Information Technology
Information, Privacy and Archives Division Government of Ontario Function-Based Common Records Series: Information Technology December 2014 December 2014 Page 2 of 22 INFORMATION TECHNOLOGY FUNCTION ACRONYM:
More informationFordham University BCP / DRP Lunch. Lunch
LearnIT @ Lunch LearnIT @ Lunch Why am I here and what is a TTE? LearnIT @ Lunch TTE While you were on the way over to the LearnIT @ Lunch all of the applications that support your business processes failed!
More informationPage 1 of 6 Position Code #P10292 DEPT/DIV: DATE UPDATED: HOURS OF WORK:
Page 1 of 6 Position Code #P10292 POSITION TITLE: Video and Telecommunications Technician DEPT/DIV: Information and Technology REPORTS TO: Infrastructure Manager BRANCH: Infrastructure ASSOCIATION: Civilian
More informationOperational Level Agreement: SQL Server Database Incidents and Requests
Operational Level Agreement: SQL Server Database Incidents and Requests Version 0.4 02/19/2015 Contents Document Approvals Operational Level Agreement Overview Description of Services Services Included
More informationDisaster Recovery Strategies for the BlackBerry Enterprise Solution
Disaster Recovery Strategies for the BlackBerry Enterprise Solution An Overview Contents Audience... 1 Purpose... 1 Introduction to disaster recovery planning... 1 Key considerations in disaster recovery
More informationCONTINUITY OF OPERATIONS (COOP) WORKSHEETS
CONTINUITY OF OPERATIONS (COOP) WORKSHEETS Martin O Malley, Governor Richard Muth, Director June 2009 Version 2.0 COOP WORKSHEETS These worksheets are tools to help you gather the raw data needed to develop
More informationBusiness Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Learning Objectives To understand the concept of Business Continuity Management; To understand the key phases and components of a Business
More informationServices. Dell ProSupport TM. Improve productivity and optimize resources with efficient, flexible, and reliable support
Services Dell ProSupport TM Improve productivity and optimize resources with efficient, flexible, and reliable support Shift your resources from maintenance to momentum. Dell s award-winning support can
More informationIncident Management Process
Incident Management Process TABLE OF CONTENTS Incident Management Process... 1 Chapter 1. Incident Process... 1 1.1. Primary goal... 1 1.2. Process Definition:... 1 1.3. Objectives - Provide a consistent
More informationREQUIREMENTS QUESTIONNAIRE & CHECKLIST
REQUIREMENTS QUESTIONNAIRE & CHECKLIST June 2016 REQUIREMENTS QUESTIONNAIRE & CHECKLIST Your Preferred Source for IT Acquisition Across the DoD 1 Table of Contents 1. Requiring Organization - 2. Requiring
More informationHonorable Mayor and Members of the City Council. Audit of the Design of the City of Dallas Pandemic Influenza Continuity of Operations Basic Plan 1
Memorandum CITY OF DALLAS (Report No. A13-009) DATE: September 13, 2013 TO: SUBJECT: Honorable Mayor and Members of the City Council Audit of the of the City of Dallas Pandemic Influenza Continuity of
More informationPublished by FasTrak, SoftWorks, Inc. Reasons to Use a CMMS over Maintenance Spreadsheets
10 Published by FasTrak, SoftWorks, Inc. Reasons to Use a CMMS over Maintenance Spreadsheets THE PROBLEM WITH USING SPREADSHEETS FOR MAINTENANCE MANAGEMENT It s no surprise that spreadsheets have long
More informationInformation Services and Technology FY Performance Plan
I. MISSION STATEMENT The Information Systems and Technology Department assists county departments in achieving their stated business goals by effectively deploying information management services and providing
More informationDisaster Preparedness & Your Supply Chain
Disaster Preparedness & Your Supply Chain Mark Norton Agility Recovery To download a copy of the slides, please visit: http://agil.me/agilitysupplychain Agenda 1. What is Your Supply Chain? 2. Effect of
More informationVoice Services. Your voice disaster recovery plan
Voice Services Your voice disaster recovery plan Your voice disaster recovery plan Build a disaster recovery plan for your voice services to ensure that your customers can always reach you. Failing to
More informationDISASTER PREPAREDNESS Guide & Template
Go Beyond The Cloud STEP-BY-STEP DISASTER PREPAREDNESS Guide & Template WHITEPAPER BY XVAND TECHNOLOGY CORPORATION Xvand Technology Corporation 832.204.4909 questions@xvand.com www.isutility.com Disaster
More informationDispatch centers/control rooms for human guard force operations
Acting as the voice of the security industry Confederation of European Security Services Dispatch centers/control rooms for human guard force operations WHITE PAPER October 2017 Table of Contents Introduction
More informationCorporate Governance. Basic Approach to Corporate Governance. 1. Outline of corporate governance structure
Corporate Governance Basic Approach to Corporate Governance The Bank s management policy is to improve management efficiency and transparency to receive high evaluation from and build unshakable bonds
More informationBusiness Continuity - A compelling story. BT Commsure
Business Continuity - A compelling story BT Commsure What is Business Continuity? Business Continuity is a proactive process which identifies the key functions of an organisation and the likely threats
More informationUnderstanding the relationship between Asset Management and the CMDB
Understanding the relationship between Asset Management and the CMDB Remedy v 703 Janie Sprenger janiesprenger@gmail.com November 2009 Introduction This paper introduces you to Asset Management and the
More informationAttachment J (Continuity of Operations) to [Region Name] Regional Response Plan
I. GENERAL A. The purpose of this attachment is to provide guidance and outline procedures for identifying emergency power requirements and efficiently obtaining, deploying, managing, allocating, and monitoring
More informationBuilding and Maintaining a Business Continuity Program
Building and Maintaining a Business Continuity Program Successful strategies for financial institutions for effective preparation and recovery 1 Building and Maintaining a Business Continuity Program Table
More informationViewTrade Securities, Inc. Business Continuity Plan (BCP) 2018
ViewTrade Securities, Inc. Business Continuity Plan (BCP) 2018 I. Emergency Contact Persons Our Firm s two emergency contact persons are: James St.Clair, President, (561) 703-6699, james@viewtrade.com;
More informationENTERPRISE VALET - PRODUCT SPECIFICATION
ENTERPRISE VALET - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Enterprise Valet service. If you require more detailed technical information, please contact your Account
More informationYale University Business Continuity Planning Quick Start Guide
Yale University Business Continuity Planning Quick Start Guide Introduction A Business Continuity Plan (BCP) (previously referred to as Continuity of Operations Plan or COOP) is a collection of resources,
More informationMAXIMIZE PERFORMANCE AND REDUCE RISK
PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK FOR ASTRO 25 AND DIMETRA SYSTEMS LATIN AMERICA REGION COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications
More informationCisco Smart Business Communications System Lead-Generation Play
Cisco Smart Business Communications System Lead-Generation Play Call Guide Introduction This call guide provides triggers for initiating a discussion with a business decision maker (BDM) of a small business.
More informationBrian Stoner Services Business Continuity Manager Cisco Systems 3530 Hyland Avenue Costa Mesa, CA (714)
Brian Stoner Services Business Continuity Manager Cisco Systems 3530 Hyland Avenue Costa Mesa, CA 92626 (714) 434-2273 brstoner@cisco.com Brian spent the early part of his career in manufacturing and quality
More informationINFORMATION TECHNOLOGY PROGRAM DESCRIPTIONS OPERATIONAL INVESTMENTS
EB-00-0 Exhibit D Tab Schedule - Page of INFORMATION TECHNOLOGY PROGRAM DESCRIPTIONS OPERATIONAL INVESTMENTS 0 INFRASTRUCTURE PRODUCTIVITY PROGRAM Program Overview Productivity projects enhance or enable
More informationOklahoma State University Policy and Procedures
Oklahoma State University Policy and Procedures TELECOMMUNICATIONS SERVICES--ORDER/CHANGE 3-0881 BUSINESS & FINANCE JULY 1990 POLICY 1.01 In August, 1988, the University formed its own telephone company.
More informationInformation Technology Division Service Level Agreement (SLA) Description and Process
Information Technology Division Service Level Agreement (SLA) Description and Process Purpose It is the goal of the Information Technology Division to provide quality services that are timely, effective,
More information18 Questions You Should Ask Your Computer Consultant Before Hiring Them To Support Your Network
18 Questions You Should Ask Your Computer Consultant Before Hiring Them To Support Your Network Choosing a computer support company isn t easy. There is no shortage of horror stories about incompetent
More informationRefurbishing Legacy Systems: An Effective Approach to Maintenance William F. Lenihan
4-05-20 Refurbishing Legacy Systems: An Effective Approach to Maintenance William F. Lenihan Payoff If IS is to play an active role in the effort to better control cost, then system refurbishment should
More informationGENERAL SERVICES ADMINISTRATION 8(a) STARS II Government Wide Acquisition Contract (GWAC) Contract Year: August 31, 2012 through August 30, 2013
GENERAL SERVICES ADMINISTRATION 8(a) STARS II Wide Acquisition Contract (GWAC) Contract Year: August 31, 2012 through August 30, 2013 1050 Connecticut Ave., N.W., Suite 1000 Washington, D.C. 20036 Contact:
More informationRequest for Proposals (RFP) Shared Information Technology (IT) Services for Rural Communities of Scott County, Iowa
Request for Proposals (RFP) Shared Information Technology (IT) Services for Rural Communities of Scott County, Iowa Response Submission Requirements Submission Deadline: Submission Contact: Submission
More informationInternal Control Monitoring Tool
Internal Control Monitoring Tool Section 1: Asset Management Section 2: Budgeting, Accounting, and Financial Reporting Section 3: Control Environment Section 4: Collections, Deposits, and Cash Funds Section
More informationHow to Ignite More Value
Going Beyond Just Managing Telecom How to Ignite More Value Sponsored By: v20161128.2 Page 1 of 11 CLM OVERVIEW Communications Lifecycle Management is the practice of managing the entire communications
More informationNASCIO 2004 Recognition Awards Missouri Project Oversight Program. Executive Summary
NASCIO 2004 Recognition Awards Missouri Project Oversight Program Executive Summary Statistics regarding national failure rates of information technology related projects are staggering. At the turn of
More informationForward. My Plan Today. Continuity / Disaster Recovery Planning. bank s current Business Continuity / Disaster Plan
My Plan Today Forward 1. Discuss the responsibilities of Business Continuity / Disaster Recovery Planning 2. Provide a Framework for Accessing your bank s current Business Continuity / Disaster Plan 3.
More informationIBM Lotus Workflow Version delivers improved performance and LDAP enhancements
Software Announcement March 30, 2004 IBM Lotus Workflow Version 6.5.1 delivers improved performance and LDAP enhancements Overview IBM Lotus Workflow is a stand-alone application development tool that
More informationWhite Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
More informationCONTINUITY OF OPERATIONS PLAN
CONTINUITY OF OPERATIONS PLAN (TEMPLATE) NAME OF ORGANIZATION/BUSINESS ADDRESS PHONE NUMBER Organization Logo Continuity of Operations Plan Version 1.5 Table of Contents I. Introduction... 1 II. Purpose...
More informationOur vision is: New Zealand values the wellbeing of tamariki above all else.
POSITION DESCRIPTION Oranga Tamariki Ministry for Children Title: Group: Reports to: Location: Direct Reports: Budget: System Support Analyst - Technical Services for Children and Families Manager Customer
More informationRESEARCH NOTE NETSUITE S IMPACT ON WHOLESALE AND DISTRIBUTION COMPANIES
Document L11 RESEARCH NOTE NETSUITE S IMPACT ON WHOLESALE AND DISTRIBUTION COMPANIES THE BOTTOM LINE When Nucleus examined wholesale and distribution customers using NetSuite, analysts found it enabled
More informationSECTION 18. INFORMATION TECHNOLOGY AND COMMUNICATION SYSTEMS RECORDS
SECTION 18. INFORMATION TECHNOLOGY AND COMMUNICATION SYSTEMS RECORDS s relating to the County s information technology and communications systems operations. General Instructions The minimum retention
More informationAdministrative Services About Administrative Services
About The Department oversees and directs the operations of Finance, Human Resources, Sales Tax, Purchasing, Information Technology, Risk Management, Budget, the Public Information Office, Front Desk Reception,
More informationAPPENDIX III SAMPLE - SAVE OPERATING GUIDELINES
APPENDIX III SAMPLE - SAVE OPERATING GUIDELINES OBJECTIVE As part of their mission to provide victim assistance, the California Fire Foundation (www.cafirefoundation.org) has launched the Supplying Aid
More informationThe Disaster Experience: Putting Business Continuity to the Test
The Disaster Experience: Putting Business Continuity to the Test Presented by Bob Mellinger, CBCV OM33 5/5/2018 1:15 PM The handout(s) and presentation(s) attached are copyright and trademark protected
More informationZynstra Software for the Retail Edge Datasheet
Powering the Retail Edge Zynstra Software for the Retail Edge Datasheet Zynstra enables the virtualization of retail back office and front office IT resources, and offers specific virtualization solutions
More informationHOW PREPARED ARE YOUR COMMUNICATIONS? Disaster Recovery with Jive Cloud
HOW PREPARED ARE YOUR COMMUNICATIONS? Disaster Recovery with Jive Cloud 0 MAKE BUSINESS CONTINUITY YOUR PRIORITY 43% of businesses never reopen after a disaster. 29% of businesses that do recover close
More informationUnderstanding Internal Controls Office of Internal Audit
Understanding Internal Controls Office of Internal Audit July 2015 Objectives for this manual Provide guidance to help management understand their responsibility to ensure that internal controls are established,
More informationDKSystems DKHelpDesk Software
John Inverso Product Report 27 October 2003 DKSystems DKHelpDesk Software Summary DKHelpDesk combines help-desk capabilities with asset-tracking features for the small-to-midsize internal help desk. Modules
More informationRecordkeeping for Good Governance Toolkit. GUIDELINE 13: Digital Recordkeeping Readiness Self-assessment Checklist for Organisations
Recordkeeping for Good Governance Toolkit GUIDELINE 1: Digital Recordkeeping Readiness Self-assessment Checklist for Organisations i The original version of this guideline was prepared by the Pacific Regional
More informationFrequently Asked Questions About Government Payment Authorities Provincial Comptroller s Office
Purpose of this document Where are copies of this document available? This publication is intended to act as a summary reference for issues that frequently arise concerning Government payment processes.
More informationThe North Suburban Emergency Communications Center (NSECC) Managed Information Technology Services. Request For Proposal
The North Suburban Emergency Communications Center (NSECC) Managed Information Technology Services Request For Proposal Date Due: September 10, 2012 by 5:00 p.m. NSECC 1420 Miner Street Des Plaines, IL
More informationIncident Management Process
OSF Service Support Incident Management Process [Version 1.1] [From https://www.ok.gov/cio/documents/incidentmanagementprocess.doc] Incident Management Process Table of Contents About this document...
More informationreasons to invest in a CMMS
11 reasons to invest in a CMMS 11 reasons to invest in a CMMS 1. Effectively plan preventive maintenance The purpose of preventive maintenance (PM) is to plan scheduled inspections so that defects are
More informationROI GUIDEBOOK MICROSOFT DYNAMICS SL
ROI GUIDEBOOK MICROSOFT DYNAMICS SL Corporate Headquarters Nucleus Research Inc. 100 State Street Boston, MA 02109 Phone: +1 617.720.2000 Nucleus Research Inc. TOPICS Enterprise Applications THE BOTTOM
More informationAsset Management. Visit us at: or call SCAN
Asset Management Why BarScan? The modern workplace is a complex combination of computer equipment, furniture, and other equipment with compliance, accounting and location tracking issues. To better manage
More informationGUILFORD COUNTY SCHOOLS JOB DESCRIPTION JOB TITLE: SENIOR NETWORK ANALYST TECHNOLOGY SERVICES DEPARTMENT AUXILIARY SERVICES DIVISION
GUILFORD COUNTY SCHOOLS JOB DESCRIPTION JOB TITLE: SENIOR NETWORK ANALYST TECHNOLOGY SERVICES DEPARTMENT AUXILIARY SERVICES DIVISION GENERAL STATEMENT OF JOB Under occasional supervision, performs specialized
More informationCreating a Business Continuity Plan for your Health Center
Creating a Business Continuity Plan for your Health Center 1 Page Left Intentionally Blank 2 About This Manual This tool is the result of collaboration between the Primary Care Development Corporation
More informationRONALD E. HENRY, II AREAS OF EXPERTISE EDUCATION
March 2017 Finance and Administration 9447 Information Technology Services Director, Information Tech Services Assists the VP for Finance and Administration and the Leadership Team in establishing and
More informationTechnology Services RFP Town of Hooksett. Administration Department Dr. Dean Shankle May 2, 2019
Town of Hooksett Administration Department Dr. Dean Shankle May 2, 2019 REQUEST FOR PROPOSAL Proposal for TECHNOLOGY SERVICES Bid #18-05 Invitation to Bid Acceptance Date: 10:00 am, June 4th, 2018 Sealed
More informationMost major software vendors are touting some version of SaaS, leading to confusion about the solution model and its advantages.
A SaaS Primer Plex Online White Paper At a Glance Software as a Service (SaaS) solutions can be a strategic advantage to businesses, letting companies avoid costly hardware, software licenses and complex
More informationInformation is important to the operation of a company. A system. Records Management. C h a p t e r Introduction to Records Management
C h a p t e r 11 Records Management 11-1 Introduction to Records Management 11-2 Managing Physical Records 11-3 Managing Electronic Records Wire_man/Shutterstock.com Heath Korvola/Digital Vision/Jupiter
More informationAudit of Business Continuity Planning (BCP) Audit and Evaluation Branch
Final Audit Report Audit and Evaluation Branch June 2006 Tabled and approved by DAEC on January 9, 2007 TABLE OF CONTENTS 1.0 EXECUTIVE SUMMARY... 2 1.1 INTRODUCTION... 2 1.2 OVERALL ASSESSMENT... 2 1.3
More information3. Efficiently remove the affected product from the marketplace.
Enterprise Paper Product Recall Policy Enterprise Paper Co. Ltd. is dedicated to supplying the highest quality products possible. In the event that a product does get shipped out which is of questionable
More information1. (a) What factors have contributed to the 10
MANAGEMENT PROGRAMME Term-End Examination 00 December, 2009 (Y) CD : PRODUCTION/OPERATIONS MANAGEMENT Time : 3 hours Maximum Marks : 100 (Weightage 70%) Note : Section A has five questions carrying 20
More informationMASTER SERVICE LEVEL AGREEMENT (MSLA)
MASTER SERVICE LEVEL AGREEMENT (MSLA) Charles Darwin University Document Owner Service Level Manager Zubair NAQVI Zubair NAQVI Version Date Revision/Description Author 1.00 16 February 2010 Creation Zubair
More informationBUILDING CREDIBLE BUSINESS CASES FOR CONTACT CENTER PROJECTS: HOW TO USE PROCESS-DRIVEN ANALYSIS TO PRODUCE ROI PROJECTIONS THAT GET PROJECTS FUNDED
BUILDING CREDIBLE BUSINESS CASES FOR CONTACT CENTER PROJECTS: HOW TO USE PROCESS-DRIVEN ANALYSIS TO PRODUCE ROI PROJECTIONS THAT GET PROJECTS FUNDED By Brian Hinton Senior Consultant Strategic Contact,
More informationThe Case to Modernize Storage in Media and Entertainment
The Case to Modernize Storage in Media and Entertainment Contents Introduction... 3 Traditional Storage in Media and Entertainment... 3 A Modern Approach to Storage... 4 Modern Storage for Media and Entertainment...
More informationEnsemble Business Software ClientFirst Product Support. November 4, 2008
November 4, 2008 The ClientFirst Product Support Program includes Telephone Support Services covering the day-to-day issues associated with the use of Ensemble and MAS 90 modules. A one-year subscription
More informationROAD MAP. Road Map Avoiding 11 Pitfalls of System Conversions
ROAD MAP Road Map Avoiding 11 Pitfalls of System Conversions Avoiding 11 Pitfalls of System Conversions There are many reasons healthcare organizations look to convert to a different system: their current
More informationProduct Overview. KIVA Respect 7 unified Teller (ut) Four Key Product Components
Tellers have more personal contact with your customers than any other job function in the organization. Doesn t it make sense for them to play a key role in your customer relationship management (CRM)
More informationAIRPORT BEDBOX PROJECT
WIT AIRPORT BEDBOX PROJECT Technology Assessment and Acquisition Temp 2011 Company Profile Logan Airport is located in Boston, Massachusetts. It is an international airport that facilitates flight arrivals
More informationSureService Program. Benefits. Introduction. Service Data Sheet November Best-in-class system reliability. Preventive maintenance package
Service Data Sheet SureService Program Best-in-class system reliability Preventive maintenance package Confidence in your control system Time to focus on your core business SureService provides you with
More informationComputerized global management of maintenance
Computerized global management of maintenance Linx 7.0 is a program that makes easy and automates the management of the Maintenance department, allows an exhaustive control of all the tasks (Preventive,
More information