Monday, May 18, 2020
Sample Business Continuity Plan Essay - 3103 Words
MD Health Business Continuity Plan Table of Contents MD Health Business Continuity Plan The purpose of the Business Continuity Plan is to provide a series of defined procedures and protocols to protect MD-Health; to minimize or contain the extent of damage to University facilities and property; to allow communication systems to function in spite of suspension of normal operating conditions; and by and large, to enable the institution to respond in an efficient, well-organized, and safe manner (ââ¬Å"Business Continuityâ⬠, 2013). The most important thing in the event of mayor incident is to make sure that employees, students and staff are educated about theâ⬠¦show more contentâ⬠¦The probability of a hurricane which impacts the Houston area is high because of its proximity to the Gulf of Mexico and previous history. Fire: Fire can result in partial or total loss of data for an extended period. Recovery could be slow because of the extensive damage fires can leave. The probability of fire within a data center can be quite high, based on the high power consumption requirements of modern computing equipment, heat generation and solvents present within the computing environment. Paper supplies within close proximity to the data center provide a ready source of fuel in the event of a fire (ââ¬Å"Hurricane Winds at Landfall,â⬠2013). Smoke: Smoke particles on magnetic media can render it useless. The damage from smoke occurs much faster than damage from the actual fire or water. A relatively small amount of smoke can cause a huge degree of loss in terms of data. It is imperative that smoke be contained to the smallest possible area (ââ¬Å"Fire, ââ¬Å" 2013). Floods: In the event of flooding, the sediments and contaminants carried by flood waters can be damaging to paper records, computers and magnetic media. Most of the paper records are stored on the upper floors; however a malfunction or discharge of the sprinkler system on an upper floor could put this data at risk. Leakage from the roof could also cause considerable amounts of water to reach such areas. Terrorist Activity or Sabotage: Physical damage to the data center or other facilities byShow MoreRelatedBusiness Statistics and Learning Outcomes1367 Words à |à 5 PagesBusiness Statistics and Learning Outcomes The largest problem with the survey conducted by the Business Continuity Institute (Business, n.d.) is the low rate of response for the survey itself. Only 13% of the people who were sent the survey sent it back to the requester. Immediately, that makes the statistics provided in the report suspect. If only 13% of a group provides information on their experiences, is that a large enough sample to draw from? Some might say yes, but others would argue thatRead MoreCategorization Of The Global Terrorism Database ( 2015 )1683 Words à |à 7 PagesPerpetrator Names, Mode for Claim of Responsibility Notes, Kidnapped/ Hostage Age Outcome Notes, 1st Source, 2nd Source, 3rd Source, Database Source To assess the minimum required sample size in our multiple regression analysis, we used Soperââ¬â¢s online calculator (Soper, 2010). We created a scatter plot of the minimum sample size at a range of anticipated effect sizes given the probability level of 0.05, the five predictor variables in our conceptual model, and the generally accepted statistical powerRead MoreBusiness Continuity Research921 Words à |à 4 PagesBusiness Continuity Research Research methods should contain research questions and hypothesis, present a research design, discuss participants, instruments used, the procedure, a data analysis plan, and the sample size justification (Anon., n.d.). The research design methods should be discussed, such as whether it was quantitative, qualitative, or mixed. The quantitative method assesses the participant responses on a measure. The qualitative method is a semi-structured interview that gets transcribedRead MoreIs4550 Week 5 Lab1611 Words à |à 7 Pagesframework definition * Recommend other IT security policies that can help mitigate all known risks, threats, and vulnerabilities throughout the 7 domains of a typical IT infrastructure Week 5 Lab Part 1: Assessment Worksheet (PART A) Sample IT Security Policy Framework Definition Overview Given the following IT security policy framework definition, specify which policy probably can cover the identified risk, threat, or vulnerability. If there is none, then identify that as a gapRead MoreThe Economic Loss Of Terrorism1666 Words à |à 7 PagesPerpetrator Names, Mode for Claim of Responsibility Notes, Kidnapped/ Hostage Age Outcome Notes, 1st Source, 2nd Source, 3rd Source, Database Source To assess the minimum required sample size in our multiple regression analysis, we used Soperââ¬â¢s online calculator (Soper, 2010). We created a scatter plot of the minimum sample size at a range of anticipated effect sizes given the probability level of 0.05, the five predictor variables in our conceptual model, and the generally accepted statistical powerRead MoreEssay On Strategic Planning Methodology For Technology1148 Words à |à 5 Pagesand add values to the departments or citywide; additionally, resolving competing project needs and priorities among departments. This committee will recommend projects and obtain approvals from the City Manager and or Councils in accordance with business needs, budget and procurement processes. Adopting a project management approach enables the IT Division to deliver projects more effectively and promote project successes. Additionally, it will ready the IT Division to meet the Federal Program ManagementRead MoreTakeaways From The Ocie Cybersecurity Initiative Risk Alert And Sweep Exams1391 Words à |à 6 PagesRegulatory and Examination Priorities Letter since 2007. FINRA also conducted a survey of 224 firms in 2011 to better understand information technology and cybersecurity practices. In 2010 and 2011 FINRA conducted on-site reviews of varying sizes and business types of broker-dealers to increase their understanding and awareness of how firms manage cybersecurity risks. Many credit President Barack Obama for prompting the recent SEC actions because of his 2013 Executive Order on Improving Critical InfrastructureRead MoreMy Dream Job1472 Words à |à 6 Pagespreparation of contingency plans, hazards, and other operations that endanger the lives and properties of empl oyees and community that they are in. Reporting; primarily to the Board of Directors and CEO of the corporation. The responsibility includes: Planning and ensuring safe and secured infrastructure, disaster and safety development, planning and coordinating of all emergency management activities: Oversees development, maintenance, and implementation of emergency management plans and procedures inRead MoreHealthcare Information Technology For A Medium Sized Organization1552 Words à |à 7 Pagesfollowing cases breaches of confidentiality were reported, a violation of the law, and enforcement was set in place. Herein, the cases will be summarized and the principal threats will be highlighted. A sample security plan with for a medium sized organization will be included along with a critique of the plan. In May of 2014 two health care organizations settled with the Office of Civil Rights for damages regarding a joint breach report. The settlement resulted in $4,800,000 in damages for failing to secureRead MoreCardinal Health, A Leader s Healthcare Industry On Many Fronts Essay1259 Words à |à 6 PagesCardinal Health is a leader in healthcare industry on many fronts. Split into many segments, Cardinal brings to the table a wide array of business offerings to the healthcare industry to include distribution of branded and generic pharmaceuticals, over-the-counter (OTC) healthcare products and pharmaceuticals, consumer healthcare products, manufacturing and preparation of radiopharmaceuticals, distribution of medical supplies across the globe and even specialty solutions for pharmaceutical manufacturers
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.