Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.
DQ requirement: Note that the requirement is to post your initial response no later than Friday and you must post one additional post during the week (end of Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference
Chapter 18: vital records recovery
Vital assets
Information stored on any media
Personal data
Important business data
Contracts
Customer lists
Personnel files
Vital records inventory
Records, Media, Originating department, location
Locate your Records
Where and how are they stored?
Prioritize your records
Ranking to determine which records need to be restored first
Records transportation
Just as important as storing, we need to think about how we transport our vital records.
Security – security during and after transportation
Magnetic recordings – take care as many factors can effect this medium
Records retention
Establish records retention requirements
Eliminate obsolete documents
Identify critical records
End of life plan – destruction of documents
Media storage
Each media storage type will require different storage parameters:
Paper document storage
Microfilm storage
Magnetic media storage
Risk assessment
Storage risks include:
Water
Smoke
Structural problems
Fire
Humidity
High heat and deep cold
Wide temperature swings
Theft
Sabotage
Insects and rodents
Magnetic fields
Fire control systems mitigation
Fire control systems
smoke alarms and fire detection
sprinklers
gas fire suppression
fire extinguishers
fireproof containers
fire drills
good housekeeping
electrical equipment
Environmental issues mitigation
Environmental Issues:
moisture sensors and alarms
humidifier/dehumidifier
temperature control
magnetic check
Other issues mitigation
Other Issues:
secured access
off-site duplication of key records
pest extermination
proper storage
Security mitigation actions
Controlling access is important to prevent:
Reading your records
Stealing records
Damaging your records
Action steps for your plan
Materials needed for an emergency fall in several categories:
General items
Portable equipment
Individual equipment
Drying and cleaning materials
Containment materials
Maintenance activities
Plan as part of your normal routine:
Daily actions task
Every week task
Quarterly action task
Immediate action team
Damage containment team
Assessment team
Shuttle team
Triage team
Recovery techniques
Water damage to paper records
Air drying
Freeze drying
Determine what documents are unrecoverable
Fire damage of paper records
Microfilm
Optical and magnetic media
summary
Vital records protection is not difficult but necessary
Have a good retention policy in place
Monitor all storage media
.MsftOfcThm_Accent1_Fill { fill:#4472C4; } .MsftOfcThm_Accent1_Stroke { stroke:#4472C4; }
Chapter 17: telecommunications and networking
Connections for today
Most business have two distant networks:
Voice communication that uses standard telephone system
Data communication that uses one or more computers that are connected to the Internet
Two networks are fading due to Voice-over-Internet Protocol (VOIP)
Public switched telephone network
PSTN Basics – each telephone has at least one pair of wires from wall jack to the punch block
Private Branch exchange – larger companies would utilize this (PBX)
PBX services:
Voice mail
Telephone conferencing
Call transferring
Music on hold
Other vital equipment in pbx room
Interactive Voice Response (IVR)
Intelligent Port Selector
Call Management System
Call accounting
Call Monitoring
Telephone company’s central office
Interexchange carrier point of presence
Various companies such as AT&T
What to look for:
System availability time, guarantee, consequences for downtime, restoration policy,
How does the carrier practice its disaster recovery procedures
Digital telephone network
VoIP systems are taking over tradition telephone systems
VoIP network uses:
VoIP telephone instrument
Wiring
A Server
Benefits:
Eliminates expense of running the analog cable
Elimanates cost of second cable
Saves cost by not having a PBX
Eliminates long-distance calling charges
Computer network basics
Personal area network
Local area network
Wireless network
Wide area network
Internet service providers (ISP)
Risk assessment
Look for single points of failure that will adversely impact your critical business processes
Risks:
Natural hazards
Human-Created hazards
Telecommunications and Network Equipment Room
Cabling
Developing a plan
Determine the telephone circuits restoration priority
Review network security
Telecommunications mitigation plan
Alternate communications methods
Action steps for your plan
Things to consider after a disaster:
Do not make any unnecessary calls – emergencies only
When calling, you may need to wait a few minutes to wait for tone
When you do receive a tone – dial quickly
Services may not be there for long!!
summary
Today’s business depend upon their data and telecommunications networks
Redundancy is your best defense
Thorough understanding of your organization’s requirements needed