Disaster Recovery Article

This disaster recovery article covers key aspects to consider when creating a contingency plan.

A disaster event causes an unplanned or extended interruption in service that has the potential to affect the operations or finances of the business or its customer. A disaster goes beyond the scope of daily operations or emergency response procedures.

A contingency plan responds to a disaster to ensure that support for critical business functions resume as quickly as possible. It minimizes lost dollars, transactions, and information.

This disaster recovery article wants you to ensure repair or replacement of the stricken facility as quickly as possible. When a disaster occurs, your company executes its contingency plan, which provides for recovering information processing services within agreed upon service-level requirements.

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes an additional 22 policies and benefits templates.

Employee Handbook Policies & Benefits

Minimize Impact

Planning for the recovery and continuation of critical business functions after a service disruption is an increasingly important function.

Businesses use computers extensively and depend on them for daily business operations, thus, any service interruption is very undesirable.

To minimize the impact and risk of a service interruption, a company needs to

  • identify business functions that are critical to the business,
  • to define goals for contingency management
  • implement quality prevention and recovery plans.
  • A contingency plan plan should be documented for each company site.

The plan should describe the

  • contingency plans
  • required resources
  • recovery procedures
  • team responsibilities to recover services.

Recovery planning involves developing strategies, procedures, and plans to recover services following a service interruption or loss. It also involves translating service level requirements into technical solutions.

Recovery planning involves...

  • the development of logically and physically related software
  • hardware
  • facilities
  • network data,
  • people
  • processes

    into a predefined set of solutions that facilitate service restoration over time.

Businesses should also ensure that the contingency / recovery plans integrate for their organizations, service providers, and customers, in order to result in effective recovery of information processing and services within customer defined requirements.

8D Manager Software with 8D, 9D, 5Y and 4M report generator. Your corrective action software for managing, measuring, and reporting issues.

8D Manager

Test the Plan

To improve the effectiveness and integration of recovery plans, businesses should test their recovery capabilities periodically. Specific objectives should be defined and the results of the recovery tests documented. Businesses should then review test results, suggest needed improvements, and submit business proposals which enhance the recovery process.

No solution is foolproof. As a prudent planner, you need to make allowances for the unexpected. Because business continuity is essential in virtually every e-business environment, you need to identify critical business processes and assets, and know what should trigger recovery procedures. It's also very important to identify which recovery roles and responsibilities belong to IT, and which are best assigned to other parts of the organization.

Mitigation - Reducing Risk

Identifying and reducing risks should concern us all. It is impossible to stop most natural disasters and many man-made disasters from occurring, but by identifying and documenting potential threats, evaluating the likelihood of them being realized, and determining our vulnerability to them, we can take steps to reduce risks significantly or eliminate them completely.

Common type disasters such as natural, technological, and human or civil threats are among the most common types that can cause serious service interruptions.

TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.

TrainingKeeper Software

Natural Threats

In some cases such as a hurricane, meteorologists will give advanced warning that the threat of a natural disaster, but what about the unannounced natural disaster? What is the likelihood of each type of natural disaster happening in your area? Where do the vulnerabilities lie?

For example, for this disaster recovery article, In San Diego, California, a winter storm would be a low risk compared to the high risk of earthquakes. If an earthquake happens, what are the vulnerabilities of people, property, and service? Have you prepared for a possible evacuation, rescue of personnel, building damage, or communication loss?

Technological Threats

These events come from a technological failure, usually caused by human omission or error, such as, water pipe break, telecommunications failure, or software malfunction. Another example would be the risk of an explosion caused by leaving combustible material next to a welding area.

Can you take precautions to reduce the potential of these types of threats from occurring, or to reduce their impact if they do occur?

Human or Civil Threats

Humans cause these types of events, either accidentally or deliberately. Examples for this disaster recovery article, include improper handling of sensitive information, computer crime, and vandalism. Has any thought been directed toward the probability of these types of threats being realized? What steps can be taken to reduce the risks?

The old saying "an ounce of prevention is worth a pound of cure" was never more true than in the  identification, evaluation, and mitigation / elimination of risk. Would you take your family in a small boat with no life preservers, not have your car checked before taking a long trip, or not pay your car or homeowners insurance? Have you ever discussed with your family what you would do in case of a fire or tornado? We consider these responsibilities a normal part of daily life. The same should go for your job and business as well.

Widget is loading comments...

More Info

  • Prevent Computer Virus Download

    This article discusses how to prevent computer virus download. It covers methods of virus attacks, how to prevent company damage, and much more.

  • Building Security Checklist

    Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

  • Biometric Verification

    The future of computer security is biometric verification

  • Backup Computer Data

    Learn how to backup computer data for company PCs. This article lists questions your company should ask when setting up a backup system.

  • Prevent Scary Emails

    This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

  • Network Security Information

    This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

  • Data Protection Tips

    Data protection tips for your company. This article covers important issues for business data protection and data recovery

  • Corporate Email Policy

    This article covers a detailed corporate email policy. You can also freely download this policy.

  • IT Audit Program

    This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

  • Strike Preparation Guidelines

    Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

  • Information Security Notes and Policy

    This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

  • Corporate Internet Policy

    This corporate internet policy covers criteria, personal use, violations, best practices and more. Download it for free and use it for your business!

  • Computer Protection Security Guidelines

    This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security

  • IT Audit Tool and Guide

    Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

Quality Assurance Solutions
Robert Broughton
(805) 419-3344
Unique QA Products

All Products

Software, Videos, Manuals, On-Line Certifications

8D Manager

Corrective Action Software

Snap Sampling Plans!

AQL Inspection Software

TrainingKeeper Software

Plan and Track Training

StreamLiner Software

Lean and Continuous Improvement

Statistical Process Control

Training Video

ISO 9001:2015 QA Manual

Editable Template

ISO Calibration Manual

Editable Template

ISO 9001:2015 QMS Kit

Templates, Guides, QA Manual, Audit Checklists

ISO 14001:2015 EMS Kit

EMS Manual, Procedures, Forms, Examples, Audits, Videos

On-Line Accredited Certifications

Six Sigma, Risk Management, SCRUM

All Products

Software, Videos, Manuals, Training Material

Please Recommend Us!