Disaster Recovery Policy Reciprocity
Disaster Recovery Policy Reciprocity
Disaster Recovery Policy Reciprocity
ORGANIZATION NAME
Revision Date: Month, Date, Year Effective Date: Month, Date, Year
Table of Contents
Purpose.................................................................................................................................................................................. 4
Scope...................................................................................................................................................................................... 4
Policy Statement................................................................................................................................................................... 4
Planning Activities......................................................................................................................................................... 6
Organization Personnel................................................................................................................................................ 7
Application Profile......................................................................................................................................................... 8
Assurance.............................................................................................................................................................................. 8
Violations............................................................................................................................................................................... 9
References............................................................................................................................................................................. 9
External References...................................................................................................................................................... 9
Internal References....................................................................................................................................................... 9
Document History.............................................................................................................................................................. 10
Purpose
The purpose of the Disaster Recovery Policy is to define the activities associated with the provision of disaster
recovery (DR) plans and programs that protect the organization’s information systems, networks, data,
databases and other information assets. IT disaster recovery plans provide step-by-step procedures for
recovering disrupted systems and networks, and help them resume normal operations. The goal of these
processes is to minimize any negative impacts to company operations. The IT disaster recovery process
identifies critical IT systems and networks; prioritizes their recovery time objective; and delineates the steps
needed to restart, reconfigure, and recover them. The disaster recovery plan also includes all the relevant
supplier contacts, sources of expertise for recovering disrupted systems and a logical sequence of action steps
Scope
The scope of the disaster recovery plan applies to all stakeholders (e.g., employees, contractors, consultants,
vendors, and others) who may have responsibilities of ensuring information systems and business operations
Policy Statement
The objective of having a Disaster Recovery Plan and associated controls is to ensure that the organization can
still accomplish its mission and that it would not lose the capability to process, retrieve and protect information
maintained in the event of an interruption or disaster leading to temporary or permanent loss of computer
facilities. The management intent is to ensure this policy provides guidance for departments and help them
take a risk-based approach to emergency preparedness. This policy provides guidance for the procedures
needed that will help the organization to quickly respond and determine the appropriate actions to take in the
Application Recovery software and data. This is done after restoring your hardware and
operating system.
Business Continuity business continuity plan. Business continuity looks at how you continue to
Business Impact Analysis those that provide technical security administration are responsible for the
This is the team of individuals who are responsible for bringing your
system back online. Every member should be listed in your DRP, together
with their contact details and each one should have a clearly defined role.
Disaster Recovery Team
The team may include both internal and external members, so besides
employees, you may have software developers, web host technical support
systems and networks to resume normal operations. The goal of the processes associated with the disaster
policy is to plan for the minimization of any negative impacts to company operations. The disaster recovery
process identifies:
Comprehensive disaster recovery activities also includes all the relevant supplier contacts, sources of expertise
for recovering disrupted systems and a logical sequence of action steps to take for a smooth recovery. The
Planning Activities
The organization will outline technology disaster recovery activities, along with business continuity
Identification of disaster recovery teams, defining their roles and responsibilities and
Planning and delivery of awareness and training activities for employees and disaster
to ensure that all plans are up to date and ready for use;
Organization Personnel
This section lists resources that have leadership responsibility for ensuring the disaster recovery plan is
effectively implemented.
Application Profile
The application profile lists business owners with the responsibilities of evaluating their designated
systems and establishing a criticality rating for each system in accordance with organizational
standards.
Application Profile
Comment legend:
1. Runs daily.
2. Runs weekly on ____________.
3. Runs monthly on ____________.
The organization will ensure that each business unit prepares comprehensive procedures, which is a
part of the business continuity plan, based on the results of their criticality rating. This will identify the
process and steps to restore normal business functions, and it will be tested and updated at least
annually. The Information Technology Department along with the business units will establish and
document and prioritize each enterprise level mission critical system or component.
Assurance
In order to ensure continued compliance with this policy, this organization will train all relevant workforce
members on their responsibilities that align with this policy. This training will consist of an initial education
upon affiliating with this organization as well as continued education events on a regular basis in accordance
exceptions to any information security policy must be reviewed and may be granted for Information Systems
with compensating controls in place to mitigate risk. Any requests must be submitted to the CISO (Chief
Information Security Officer) for review and approval pursuant to the exception procedures published by the
CISO.
Violations
Violations of this policy or any sub-policies and processes established pursuant to this policy may result in
disciplinary action, up to and possibly including termination of employment or legal action. All breaches of
information security, actual or suspected, shall be reported to and investigated by Information Security and/or
References
External References
Internal References
Privacy Policy
Document History
mm/dd/yyyy 0.0