Business Impact Analysis - Carteret Community College

advertisement
Carteret Community College
“Education for Life”
Business Continuity Plan
Background Information
Carteret Community College is a leader in improving the quality of life for all citizens of Carteret County, and
Eastern North Carolina by offering high-quality education, training, enrichment, and support to all who need
and value these services. Carteret Community College, located at 3505 Arendell Street, Morehead City, NC,
was founded in 1962. Carteret Community College received accreditation from the Southern Association of
Colleges and Schools to award associates degrees, diplomas, and certificates. The College was recently reaccredited by the Southern Association of Colleges and Schools in December 1999. Carteret Community
College offers up-to-date vocational technological training and features programs that prepare students for the
skills they need in the fast-paced information age, where computers and the Internet are changing the way
business is conducted.
At Carteret Community College, the Information Technology (IT) department provides a total source, single
point resource for computer support in accordance with the mission of Carteret Community College. The IT
department is organizationally structured in the Administrative Services Division of the College. The IT
department consists of 3 Directors and 3 support staff employees. The Director of Administrative Computing
Services is also the UNIX Systems Administrator and he has an Assistant UNIX Systems Administrator that
reports to him. The Director of Software Solutions and Web Development is the College Webmaster and is
responsible for software, database, and web design and development. The Director of Network Technologies
has a Senior Information Technology Specialist and an Information Technology Specialist who report to him.
All of the Directors report to the Vice President of Administrative Services who reports to the President of the
College (see Appendix A IT Organization Chart). The IT department is designed to provide administrative and
instructional support for the College to allow for the most effective, efficient, and economical utilization of
computer systems while at the same time providing protection of equipment and data.
Page 1 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Introduction
A comprehensive Business Continuity Plan focuses on sustaining an organization’s operations during and after
a disruption of technology resources. This plan focuses on operations at Carteret Community College (CCC)
that involve Information Technology (IT) Resources and telecommunications. IT resources at CCC are
supported by the staff of the IT department, a component unit of the Administrative Services Division.
This plan consists of :
 A Business Impact Analysis that describes the critical functions of the IT at the College and identifies
the impact on the business of the College if the critical function is unavailable.
 A Contingency Plan that discusses how any interruption in service, including minor disruptions, will be
dealt with.
 A Disaster Recovery Plan that focuses on catastrophic emergencies that disrupt services and that may
require complete relocation of rebuilding of facilities.
Page 2 of 44
Carteret Community College
Business Continuity Plan
Table of Contents
Business Impact Analysis
Description of Process and Narrative of Critical Systems
Contingency Plan
Disaster Risks and Prevention
Risk Prevention and Information Technology Security Policies and Procedures
Administrative Computing System Access and User Rights
System Access Security Procedures
Administrative Computing Access Security
Campus Network and Email Systems Security
Backup Procedures
Administrative Computing Systems
Campus Network Servers
Anti-Virus Procedures
Desktop Workstations
College Network Servers
Anti-Spam Procedures
Critical Systems and Applications
Risk Assessment
Applications Risk Assessment
Administrative Systems Risk Assessment
Procedural Risk Assessment
Personnel Risk Assessment
Information Technology Notification List
Assessment of Disruption Procedures
Recovery Operations
Recovery Procedures
Return to Normal Operations
Disaster Recovery Plan
Introduction
Assumptions
Disaster Preparation
Disaster Notification List
Damage Assessment
Notification and Activation Phase
Recovery Operations
Disaster Recovery Preparations
Recovery Operations
Recovery Procedures
Return to Normal Operations (Reconstitution Phase)
Appendices
Appendix A:
IT Organization Chart
Appendix B:
Maintenance Contract Vendor List
Appendix C:
Technology Acceptable Use Policy
Appendix D:
Campus Network Diagrams
Appendix E:
Datatel/UNIX Access Rights Request Form
Appendix F:
Student Data Access Agreement and Security Procedures
Page 3 of 44
“Education for Life”
Carteret Community College
“Education for Life”
Business Continuity Plan
Business Impact Analysis
Description of Process and Narrative of Critical Systems
The IT Staff has broken down the critical functions as they relate to the different services provided by the IT
Department. Based upon current administrative/instructional operations and workflows and the anticipated
impact of loss of IT resources on these workflows a contingency plan has been developed for all identified
critical systems. Campus network stakeholders have been identified as follows:
 Administrative Staff, full and part-time
 Faculty, full and part-time
 Students
Carteret Community College has broken down critical functions of the IT Department and then further broken
down these global groups into more specific services provided. The following five functions have been
determined to be critical IT global concerns:
 Local Area Networks (LAN)
 Wide Area Networks (WAN)
 Telephone Systems
 Servers
 Workstations
Critical IT Resources Identified in Relation to the Global Concerns
Switches
Local Area Networks
Network Cabling
Access Points
Network Cabling to end nodes
NCSU Router
Wide Area Networks
Router Cables
Cisco Call Manager
Telephone Systems
Nortel System
Call Pilot Voice Mail
Staff Email
Servers
Student Email
Staff Authentication and File Storage
Student Authentication and File Storage
DNS/DHCP
BlackBoard
Call Manager
Student FTP
Eprocurement/BookLog
Fire/Paralegal Software
Web Server
IP Camera Server
Terminal Services
IIPS
Datatel
Desktops
WorkStations
Laptops
Page 4 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
The following is a list of other critical needs that are not provided by the IT Department:
 Heat, Ventilation, and Air Conditioning
 Electric Power
 Facilities
 Physical Security
The five critical functions of IT need to be evaluated independently due to the diverse and unique qualities each
one possesses. The evaluation below focuses on each of the 5 critical IT functions.
I.
Local Area Network (LAN)
Definition: Fiber Optic cable linking each building, network cabling to each end node, the Michael J.
Smith Building, wireless or wired devices such as switches and access points the allow network
connectivity.
A. The maximum time the department could operate with this function is four hours.
B. The maximum amount of this operation that could be lost without a significant impact on this
department is unknown due to the large number of scenarios that could happen. If the core switch
located in the MICHAEL J. SMITH Building was lost then almost all communications would fail. If
there was a fiber optic cut then that one building could lose connectivity or depending on the
building’s location multiple buildings that communicate through that one failed connection could
lose communication. If a connectivity device failed we could restore communication fairly quickly.
The chart below shows the estimate down time for each device:
Device
Minimum Down Time
Core Switch
1 day
Switch
4 hours
Access Point
1 day
Fiber Cut
1 day
Local network cable cut
1 day
C. The estimated financial loss would be significant.
D. The non-financial loss would be loss of reputation, loss of goodwill, and a loss of confidence.
E. An even when the resource is more critical would be during registration.
F. The electronic and non-electronic media required for this function is fiber optic cabling, category 5e
or 6 copper cabling, servers, desktops, phones, IT Staff, switches, and access points.
Page 5 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
G. Work Around Section
Device
4 Hours
1 Day
1 Week
1 Month
Core Switch
No fix
Replacement
should arrive in
one day
Warranty states the
switch will be
replaced in one
day
Students will need
to be moved to
local high schools
Endpoint Switch
IT will replace
within 4 hours
Same as 4 hour fix
Same as 4 hour fix
Same as 4 hour fix
Access Point
IT will replace if
budget allows as
these have no
warranty
Same as 4 hour fix
Same as 4 hour fix
Same as 4 hour fix
Fiber Cut
No fix, it will take
a minimum of 1
day to fix
depending on
severity
Should be resolved
in a day
See one day fix
See one day fix
Local Network
Cable Cut
Should be resolved
in 4 hours
Same as 4 hour fix
Same as 4 hour fix
Same as 4 hour fix
Additional Notes and Recommended Strategies:

If the core switch fails, the Cisco 4006 located on the first floor MICHAEL J. SMITH Building, all
building communications will fail as to data and those buildings using VoIP for a phone system will fail
as well. As this is the end point for building communications VoIP will fail as well as printers and
other network devices. To combat this issue the college must maintain a warranty for the 4006 that
allows for replacement in one day due to failure.

The end point switches can be replaced within four hours. The access points will be replaced depending
on budgets.

A fiber cut will take a minimum of one day to repair.

A local network cable cut can be repaired within four hours.

All warranties for core switching devices need to be maintained with a maximum replacement period of
one day.

A supply of network cable and other necessary tools and connectors should be maintained for any
internal wiring failures.
Page 6 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
II.
Wide Area Network (WAN)
Definition: The definition of the WAN is the cable connecting the 4006 to the router and the router.
Router support is provided by NCSU and they would have it replaced within two days. The WAN is
what connects the local area network to the internet.
A.
The maximum time the department could operate with this function is four hours.
B.
The maximum amount of this operation that could be lost without a significant impact on this
department is about four hours.
C.
The estimated financial loss would be significant.
D.
The non-financial loss would be loss of reputation, loss of goodwill, and a loss of confidence.
E.
An even when the resource is more critical would be during registration.
F.
The electronic and non-electronic media required for this function is the router and any network
cables attached to it.
G.
Work Around Section
There is no workaround. We do not have the financial capability to maintain a spare router.
NCSU will have a replacement here within two days. If the router remained down for an
extended period servers could be located at other community colleges so access could be
regained.
Additional Notes and Recommended Strategies:
III.

Contact with NCSU has been made questioning their ability to replace the switch and the time frame to
perform this service.

Devices need to be monitored and attached to an Uninterruptible Power Supply (UPS) at all times. If
the outage was expected for an extended period there are a few work arounds.

We could partner with another community college and move critical servers to their location and then
change our DNS settings to reflect this change.

For seat classes that needed internet access we could partner with an area high school to hold classes in
the evening.

A redundant network connection from another provider such as Time-Warner would allow for the
quickest recovery of external connectivity if the failure is isolated to the WAN connection only.
Telephone Systems
Definition: The definition of the Phones is the Nortel phone system, the Cisco Call Manager, and any
cabling needed to connect these devices. The Nortel system included Call Pilot which the campus uses
for voice mail.
A. The maximum time the department could operate with this function is four hours.
B. The maximum amount of this operation that could be lost without a significant impact on this
department is about four hours.
C. The estimated financial loss would be significant.
Page 7 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
D. The non-financial loss would be loss of reputation, loss of goodwill, and a loss of confidence.
E. An even when the resource is more critical would be during registration.
F. The electronic and non-electronic media required for this function is the phone switches, the Call
Manager server, the Nortel servers, and any network cables attached to it.
G. Work Around Section
The work around is to use individual cell phones during the outage.
Additional Notes and Recommended Strategies:
IV.

Centurion Maintenance from Sprint is used to warranty both the Cisco Call Manager and the Nortel
System. Unless a catastrophic disaster to the area occurs a reasonable restoration of service time
period should be one day.

The backup of the Call Manager needs to be maintained and a redundant Call Manager should be
purchased in case of failure to the primary unit.
Servers
Definition: The definition of Servers is all servers that users need to carry out their educational goals.
There are twenty servers which all varying degrees of importance. A table will be included to define
their importance further.
A. The maximum time the department could operate with this function is one day.
B. The maximum amount of this operation that could be lost without a significant impact on this
department is about one day.
C. The estimated financial loss would be significant.
D. The non-financial loss would be loss of reputation, loss of goodwill, and a loss of confidence.
E. An even when the resource is more critical would be during class time.
F. The electronic and non-electronic media required for this function is the server hardware, software
and any network cables attached to it.
G. Work Around Section
If a hardware failure occurs, we would go through the IT procedure of calling Dell and determining
which defective part needs returning. Depending on which server we are analyzing then each one
will have a different recovery period. We maintain a hardware maintenance contract through Dell
for Servers that are less than 5 years old. Anything older than 5 years is out of warranty.
H. Server Recovery Priority
Recovery priorities have been assigned for the identified system resources. High priorities are based
on the need to restore critical resources within their allowable outage times; medium and low
priorities reflect the requirement to restore full operational capabilities over a longer recovery period.
Page 8 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Server Recovery Priorities
Server
Resource
Priority
Outage Impact
Max. Outage Time
Datatel
High
Users could not access
administrative applications,
including Payroll, HR, CF, and
ST modules.
8 hours
Unix (IIPS)
High
Users could not access
administrative applications OF
legacy applications not running
on Colleague.
8 hours
GroupWise
High
Staff/Faculty could not
send/receive email
8 hours
Student Email
High
Students could not send/receive
email
8 hours
Staff Data Server
High
Staff/Faculty could not access
stored data or authenticate to the
network
8 hours
Student Data Server
High
Students could not access stored
data or authenticate to the
network
8 hours
DNS/DHCP Server
High
Users could not receive a
dynamic IP address or internal
DNS
8 hours
BlackBoard
High
Users could not DL classes
8 hours
Cisco Call Manager
High
User could not send or receive
phone calls with the IP phones
8 hours
Student FTP
Medium
Students data files could not be
accessed
1 day
Eprocurement
High
Fire and Paralegal
Medium
Course specific software would
be inaccessible
1 day
IP Camera Server
Medium
IP camera storage and new
recordings would be unavailable
1 day
Terminal Server
Medium
Software on terminal server
would be inaccessible for
students
1 day
Web Server
High
Users could not access Carteret
Web Services
8 hours
Web Advisor Server
High
Users could not access Web
Advisor Services
8 hours
8 hours
Page 9 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Additional Notes and Recommended Strategies:
 There are three external storage devices used to backup the servers. The tape backup units use DLT,
SDLT, and LTO 2 tapes. Currently the tape back up units do not back up open files very well so
recovery may be limited. If there are open files they may not get backed up and if there are system files
that don’t get backed up the operating system may not be recoverable.
 The servers all are in a RAID 5 configuration so a single hard drive failure would allow us to recover.
 Being that most servers need 24 x 7 access we need some way to either backup open files efficiently or
have a built in down time to perform a full, complete backup. We have moved 2 servers, Groupwise and
Blackboard, to a Storage Area Network (SAN) to allow redundancy and better bckups.
 Server imaging is another technology which would allow the IT Department to get a full and complete
backup with the down side being that the server must be brought down so to backup all files.
V.
Workstations
A. The maximum time the department could operate without this function is one day.
B. The maximum amount of this operation that could be lost without a significant impact on this
department is about one day.
C. The estimated financial loss would be significant.
D. The non-financial loss would be loss of reputation, loss of goodwill, and a loss of confidence.
E. An even when the resource is more critical would be during class time.
F. The electronic and non-electronic media required for this function is the workstation hardware and
software.
G. Work Around Section
If a hardware failure occurs we would follow the IT procedure of calling Dell and determining which
devices need replacement. Depending on which workstation has failed they will have different
recovery periods. All workstations are purchased with a three year warranty so if we are within that
timeframe the faulty part will arrive the next day. If the workstation is past its warranty period then
the IT Department may have the faulty part available through the use of another system. The IT
Department does have older computers available for use if the user’s workstation is incapacitated
beyond a short period. If a situation arose where multiple workstations were unavailable due to a
building outage it is possible those staff or student users could be moved to a classroom after it was
setup with the software they need.
Additional Notes and Recommended Strategies:
 The workstations that are less than three years old are kept under a hardware maintenance contract
on through Dell. Anything older than that is out of warranty.
 There have been situations due to budgetary constraints where items such as laptops have only
included one year warranties. The recommended strategy is to continue with a three year initial
warranty on all new workstation purchases.
Page 10 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
VI.
Additional Needs
There are several other critical needs that are not provided by the IT Department including:

Heat, Ventilation, and Air Conditioning (HVAC)

Electric Power

Facilities

Physical Security
Additional Notes and Recommended Strategies:
 The server room needs to remain well ventilated and the temperature controlled. Physical security
should remain tight as the area should be never left unattended. All doors need to be checked that
they are secure as the last person leaves for the evening. IT Staff only should be allowed to enter the
server room.
 All servers and critical workstations should be attached to a UPS.
 A generator should be purchased for the IT area as all communications go through the MICHAEL J.
SMITH Building. As the endpoint for multiple outside entities that use our router for their network
needs the purchase of a generator is imperative. Outside users are: CMAST, NCSU, Duke Marine
Lab, local K-12 schools, NOAA, and UNC-Chapel Hill Marine Sciences. (Note: The Carteret
County Commissioners appropriated money for the purchase of a generator for Fiscal 2008.)
Page 11 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Contingency Plan
Disaster Risks and Prevention
As important as having a disaster recovery plan is, taking measures to prevent a disaster or to mitigate its effects
beforehand is even more important. This portion of the plan reviews the various threats that can lead to a
disaster, where our vulnerabilities are, and steps we should take to minimize our risk.
Classification
Physical Security
Risk
Fire
Lightning
Environment
Water
Electricity
Intruder
Technical Security
Accessibility
Infrastructure
Equipment Failure
Viral infections
Preventive Measure(s)
Smoke Detectors
Fire Alarm
Fire Extinquishers
No smoking policy
Fireproof media containers
Proper grounding
Power conditioning/protection
Temp Control (AC)
Separate AC for computer room
Temperature monitoring
Computer room safe from water
Clean electricity supply
UPS
Emergency Lighting
Computer Room locked/secure
Windows locked
Network connections secure
Campus Security
Password authentication
Password length requirements
VPN Access to critical servers only
Firewall
Router ports blocked
Encryption/Secure Server Apps.
Cable protection/conduit
Systems Maintenance Plans
Redundancy
Periodic testing
Virus protection software
Anti-spam software
Backup systems/procedures
Activity Logs
Risk Prevention and Information Technology Security Policies and Procedures
A fire extinguisher rated for electrical fires shall be maintained in the computer room. Un-interruptible Power
Supplies (UPS) are connected to network and administrative servers. In the event of power loss, the IT staff
will attempt to shutdown suspended user processes in an orderly fashion that will prevent damage to the logical
data structure.
Page 12 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
The UPS’s will be tested regularly. The test will consist of reviewing the display status of the UPS systems and
ensuring that loads are within tolerance to allow acceptable backup time and to ensure batteries are charging
properly.
A maintenance contract will be maintained for the Administrative Computer System and all critical systems. A
maintenance contract will be maintained for peripheral equipment and the Director of Network Technologies
and the Director of Administrative Computing Services/SA will be responsible for determining what peripheral
equipment is included under the maintenance contract.
User departments are responsible for maintaining adequate training in the use of the application software. The
Information Technology department will assist as needed to maintain as low a risk as possible for operational
error. User access rights will be maintained at a minimum level.
The Information Technology department shall include any appropriate features to enhance the ability of locally
developed software to withstand operator error. Appropriate software development practices shall be used to
minimize software failure.
Appropriate system security shall be maintained. Practices commons to the data processes industry and as
recommended by the North Carolina Community College System, (NCCCS), the NCCCS IIPS organization,
and audit teams shall be adopted whenever possible.
It is the practice of Carteret Community College not to modify standard administrative software as delivered by
Datatel or by NCCCS, without specific guidance from the System Office or the State Auditor. Non-financial
related software may be enhanced under exceptional circumstances and vendor provided security patches are
applied as directed by NCCCS.
Page 13 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Administrative Computing System Access and User Rights
Requests for access to applications or data on the administrative computing systems are submitted using an
access request form. This form details the access being requested and security permissions required. The user’s
supervisor must approve the access request form and then the completed access request form is submitted for
approval to the application area supervisor as listed below in the Applicaton Area Approval Supervisors table.
The approved request is submitted to the IT department and serves as the documented basis for granting access
to administrative system(s). The applicable approval supervisor is also responsible for authorizing access to the
colon prompt or to Shel.
Application Area Approval Supervisors
Application Area
Financial Applications
All CF Module applications
Curriculum Student Records
All ST Module applications
Financial Aid
Financial Aid applications within ST Module
Human Resources
All HR Module applications
Continuing Education
All Continuing Education applications within the ST module
Approval Supervisor
Janet N. Spriggs, Vice President of Administrative Services
Susan L. Smith, Registrar
Susan L. Smith, Registrar
Janet N. Spriggs, Vice President of Administrative Services
Perry L. Harker, Vice President of Corporate and Community
Education
Administrative Computing System Access Processes
 The Director of Administrative Computing Systems/Systems Administrator (SA) or the Assistant
Systems Administrator will set the access rights at the lowest level that will allow the user to
perform the prescribed job functions.
 All additions and changes of users and user rights must be authorized in writing by the application
area supervisor. Each year the IT staff will review the access rights for all users and require new
approved access rights forms.
 An Employee Termination Checklist is generated by the Human Resources Office when an
employee is terminated for any reason. Termination of computer access rights is included on the
checklist and the Director of Network Technologies and Director of Administrative Computing
Services/SA must sign the checklist indicating that the employee’s access rights have been
terminated. The checklist must be completed and returned to Human Resources before the employee
receives their final paycheck.
 If a situation arises where an employee is terminated under unfavorable conditions, the Director of
Network Technologies and the Director of Administrative Computing Services/SA are immediately
notified by the Director of Human Resources or the Vice President of Administrative Services. All
system access for the employee are immediately removed.
Page 14 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
System Access Security Procedures
Administrative Computing Access Security
 Each user shall have a unique user id and password.
 Users should not share user ids. In the event of an emergency, user ids may be shared if a job
function is required during the emergency.
 Passwords should not be written down.
 Users should protect the password from unauthorized persons.
 The system shall require users to change their passwords every 30 days.
 Passwords should not consist of information that may be easily associated with the user.
 The password shall be a minimum of six characters long.
 Active sessions on the Datatel system are logged out after 30 minutes of inactivity.
 A console log of logins shall be maintained and periodically reviewed to determine if unauthorized
login attempts occur.
 A banner is displayed upon connection to the Administrative Computing Systems, both the IIPS
Legacy system and the Datatel system that warns against unauthorized use of the system.
Campus Network and Email Systems Security
 Each user shall have a unique user id and password.
 Users should not share user ids. In the event of an emergency, user ids may be shared if a job
function is required during the emergency.
 Passwords should not be written down.
 Users should protect the password from unauthorized persons.
 The password should be changed every 30 days.
 The password shall be a minimum of six characters long.
 A console log of logins shall be maintained and periodically reviewed to determine if unauthorized
login attempts occur.
 After a set number of invalid login attempts, the account is frozen for a specific period of time
before it is released automatically.
 A banner is displayed upon connection to the Virtual Private Network (VPN) that warns against
unauthorized use of the system.
Page 15 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Backup Procedures
Administrative Computing Systems
All administrative, student, and operational records are fully backed up each working day at 11:00 PM on 8 mm
data cartridges. The backup tapes for backups executed on Mondays, Tuesdays, Thursdays, and Fridays are reused every 3 months. The backup tapes for backups executed on Wednesdays are labeled and will be kept for 3
months. In addition, an End-Of-Month (EOM) backup for each month will be kept for 1 year and an End-OfFiscal (EOF) year backup which is executed in July after the General Ledger fiscal year end processes are run,
will be kept for 5 years.
The daily backups executed on Monday, Tuesday, Thursday, and Friday are stored in the IT Computer Center.
The Wednesday backup tapes, the EOM backup tapes, and the EOF backup tapes are stored in the safe located
in the Corporate and Community Education Building.
College Network Servers
All College Email servers and File servers are backed up twice a week by doing full backups using
BackUpExec from Veritas. We use DLT, SDLT, LTO2, and LTO3 tapes. The tapes are stored in the IT
Computer Center.
Page 16 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Anti-Virus Procedures
Desktop Workstations
In an effort to prevent viral infections of College computing resources, all desktop computers are pre-loaded
with Trend Micro Anti-Virus. The client workstations are configured to receive their antivirus updates through
a decentralized server. As users log in to their computers their workstations check with the anti-virus server to
see if there are any updates available. If there are updates available, the workstation performs an unattended
install while the user continues to work.
Workstations that are out of date due to old definition files are checked through the Trend Micro Anti-Virus
server. When one is found to have out-of-date definitions, the user is requested to reboot their computer and if
that doesn’t resolve the problem an IT Specialist is dispatched to the employee’s workstation to update the
definitions.
College Network Servers
In an effort to prevent viral infections from damaging campus server systems, all servers are maintained to run
the most current virus definition files using Trend Micro or Kaspersky Anti-Virus software.
The servers receive their updates automatically. The anti-virus logs are monitored to make sure they remain
current with updates.
Page 17 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Anti-Spam Procedures
Carteret Community College uses two systems to monitor spam. As Email enters the campus, it goes through a
Barracuda Anti-Virus/Anti-Spam server. We use Real Time Black Hole Lists to eliminate known spam sources
and we use Bayesian scoring for the remainder of spam. The Barracuda device provides quarantine for users to
review, remove, and release spam intended from them. We also use a product called Guinevere which further
checks Email for viruses and spam. We have set up shared folders for willing participants to add spam as well
to allow for further identification of spam.
Page 18 of 44
Carteret Community College
Business Continuity Plan
Critical Systems and Applications
Critical Systems
I. Administrative Computing Servers
 UNIX Administrative Datatel Server
 UNIX Administrative IIPS Legacy Server
II. Novell Network Operating Systems
 2 GroupWise 7.0 Novell 6.5 Server
Available for all full-time and part time faculty/staff
 Novell NetMail 3.52 Novell 6.5 server
Available for all curriculum students, staff, faculty
 Novell NetWare 6.5 Staff/Faculty authentication server and storage
Available for all full-time and part time faculty/staff
 Novell NetWare 6.5 Student authentication server and storage
Available for all full-time and part time faculty/staff
 Novell Netware 5.1 DNS/DHCP Server
Available for all VLANS
III. Stand Alone Windows Servers
 BlackBoard – Windows 2003
 CISCO Call Manager 4.0 – Windows 2000
 Student FTP Access Server – Windows 2000
 Eprocurement and Booklog Server – Windows 2000
 Fire Program and Paralegal Software Server – Windows 2000
 IIS and Backup Software Host – Windows 2003
 IP Camera Software – Windows 2003
 Terminal Services Test Server – Windows 2003
IV. Stand Alone Critical Windows Desktops
 Guinevere Antivirus for GroupWise – Windows XP Workstation
Page 19 of 44
“Education for Life”
Carteret Community College
“Education for Life”
Business Continuity Plan
V. Cisco Network Equipment
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
CISCO
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
EDC
CivicCenter
110EastA
110EastB
110EastC
236WestA
334WestA
344WestB
344WestC
344WestD
344WestE
312EastA
312EastB
312EastC
312EastD
312EastE
MarTec1
VPN
1stFloorWestAccessPoint
1stFloorEastAccessPoint
2ndFloorWestAccessPoint
2ndFloorEastAccessPoint
3rdFloorWestAccessPoint
3rdFloorEastAccessPoint
MarTec1
MarTec2
MISTEST
IT
Tech Bench
EDC
CivicCenter
WW
WW
WW
WW
WW
WW
WW
WW
WW
WW
WW
WW
WW
WW
MarTec
VPN
WW
WW
WW
WW
WW
WW
Martec
MarTec
MISDepartment
IT
MIS Department
VI. Telephone Systems:
 Nortel Option 11
 Cisco Call Manager VoIP system
 Nortel Call Pilot Voice Mail
Page 20 of 44
Cisco WS-C2950G-24-EI (EDC)
Cisco WS-C3524-XL
Cisco WS-C3750-24P
Cisco WS-C2950G-48-EI
Cisco WS-C2950G-48-EI
Cisco WS-C3750-24P
Cisco WS-C3750-24P
Cisco WS-C2950G-48-EI
Cisco WS-C2950G-48-EI
Cisco WS-C2950G-48-EI
Cisco WS-C2950G-48-EI
Cisco WS-C3750-24P
Cisco WS-C2950G-48-EI
Cisco WS-C2950G-48-EI
Cisco WS-C2950G-48-EI
Cisco WS-C2950G-48-EI
Cisco WS-C3750-24P
Cisco VPN Concentrator 3000
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1200 Access Point
Cisco 1100 Access Point
Enterasys VH-2402S
Carteret Community College
“Education for Life”
Business Continuity Plan
Risk Assessment
Applications Risk Assessment
Application Probability of
Interruption
Email
Medium
Impact on
Risk
College
Operations
Medium
Service Interruption
Time Before Loss
Potential Accelerates
Email
Medium
Medium
Loss of stored Email
2 days
Internet
Medium
Low
Service Interruption
1-2 days
Use of Internet Services
will be prohibited.
College
Financials
Low
High
Service Interruption
Major impact to
operations
College
Financials
Low
High
Loss of Data
Payroll - HR
Low
High
Service Interruption
1 normal business day; 1
hour during registratino
periods
1 normal business day; 1
hour during registratino
periods
1-2 days during payroll
processing period
Payroll - HR
Low
High
Corrupt file
transmissions
1-2 days during payroll
processing period
Student
Applications
Low
High
Service Interruption
or Loss of Data
Blackboard
Medium
High
Service Interruption
1 normal business day; 1
hour during registratino
periods
1 day during semester
classes
Blackboard
Medium
High
Loss of Data
2 days
1 day during semester
classes
Page 21 of 44
Impact
Medium impact, delay
of Email delivery.
Medium impact, loss of
stored Email
communications; Data
can be restored from
backups and/or
messages can be resent.
Major impact to
operations
Major impact to
operations during the
15th through the 30th of
each month.
Control Totals validated
by Bank; Data can be
resent.
Major impact to
operations
Impacts classes and
forces instructors to use
alternate instructional
methods.
Impacts classes and
forces instructors to use
alternate instructional
methods.
Carteret Community College
“Education for Life”
Business Continuity Plan
Administrative Systems Risk Assessment
Classification
Administrative
Systems
Resource
All servers
Risk
Intrusion
Impact
Preventative Measures
Unauthorized disclosure,
modification, or destruction
of information and
databases; compromised
passwords and /or user
accounts; server outages and
unauthorized access;
services or daemons.
Secure location of servers;
periodic change of
passwords; periodic audit
of users accounts and
passwords; system
monitoring of logs;
security classes; periodic
patching of operating
system; ensure only
critical daemons are
running.
280R Sunfire
System failure Major impact on college
Support contract with
Datatel System
operations.
NCR.
L9 and
Backup failure Inability to create or restore Periodic testing of backup;
Powervault
a backup.
review of backup
128T Autoloader
logs/alerts; periodic
Backup System
replacement of backup
tapes; periodic cleaning of
backup drive; support
contract with NCR;
Backup using 8mm tape
drive as an alternativie
backup each night..
Sparc 20
System failure Users could not access data
Administrative
and apply for new programs.
servers (Legacydolphin)
Sun v240 Web
Advisor Server
System failure Students are not able to see
grades, financial aid
information, and register for
classes.
Periodic preventative
maintenance;
daily/monthly backups;
periodic patching on
operating system; support
contract with NCR.
Periodic preventative
maintenance; periodic
backups; periodic patching
on operating system;
support contract with
NCR.
Dell Poweredge System failure FA-Link-bookstore financial Periodic preventative
2650 FA-Link;
aid transactions will not
maintenance; daily
Ncmentor;
post;Ncmentor-new
backups; periodic patching
Eprocurement
prospect students will not be on operating system; .
downloaded to
datatel;Eprocurementpurchase orders will not be
processed.
Page 22 of 44
Tier
Recommended Actions
1
Perform annual
vulnerability audits
(summer); evaluate
security templates;
1
Miroring server
1
Iimplement an network
backup system using
either Fulcrum or other
system which would take
a snapshot of changed
data each hour.
N/A
1
Implement a miroring
server to reduce down
time and support
contracts.
2
Support contract and
server mimoring.
Carteret Community College
“Education for Life”
Business Continuity Plan
Procedural Risk Assessment
Classification
Procedural
Resource
Backup
procedures
User access
Risk
Impact
Tier
Recommended Actions
Inaccessibility Longer system downtime; Place in Contiuing
N/A Network backup system
to tapes
users unable to perform
Education Vault
on a remote server.
daily tasks.
Continued
Possible unauthorized
College has adopted check- N/A
access after
access to college servers and out procedures for fullemployee
data; possible unauthorized time employees; accounts
termination
disclosure, modification, or are deleted or locked after
destruction of information. notification of termination;
require Information
Technology signatures on
exit form; annual
recertification of user
forms and accounts.
Patches (Unix
Possible malfunction
Usersofunable
operating
to perform
system
Operating
daily tasks.
System)
Patches (Datatel Possible
Users unable to perform
applications)
malfunction of daily tasks.
administrative
applications.
Daily System
Monitoring
Preventative Measures
Unauthorized
access.
Follow System Office
procedures for patch
installs.
Patches are loaded in test
environment and tested
prior to loading live
account.
Possible unauthorized
Daily review of
access to college servers and /var/adm/sulog,
data; possible unauthorized /var/adm/messages, and
disclosure, modification, or /var/cron/log.
destruction of information.
Page 23 of 44
N/A
N/A Extensive time to do more
testing on the patches
which are loaded in the
test environment.
1
Carteret Community College
“Education for Life”
Business Continuity Plan
Personnel Risk Assessment
Classification
Personnel
Resource
Risk
Impact
Preventative Measures
Users
Failure to
secure
passwords and
data
IS Staff
Inability to
Delays in technical support Support contracts on
cover all areas of users; extended
critical systems and
of
downtime.
equipment.
responsibilities
due to
unexpected
absences
Tier
Recommended Actions
Possible unauthorized
Mandatory periodic
N/A Promote password
access to college servers and password change
awareness.
data; possible unauthorized procedures for servers and
disclosure, modification, or domains; supervisors are
destruction of information. notified when noncompliance is found.
Page 24 of 44
N/A Cross-training of IT
department personnel;
create plan and
implementation schedule;
document daily
procedures in IT
department.
Carteret Community College
“Education for Life”
Business Continuity Plan
Information Technology Notification List
The emergency notification list for Information Technology is shown in the table below. College employees
are asked to call the Helpdesk at 222-6196 to notify IT of problems and outages. All of the IT employees have
access to the Helpdesk number on their campus phones. The emergency notification list is to be utilized when
outages occur during hours that the College is closed.
Name
Ken Martin
David Looney
John Green
Debbie Favorite
Chris Capoccia
Title
Director of Network
Technologies
Director of
Administrative
Computing
Services/SA
Senior IT Specialist
IT Specialist
Assistant Systems
Administrator
Campus Extension
Cellular
Home
(252) 222-6243
(252) 342-9012
(252) 726-9012
(252) 222-6180
(252) 222-6273
(252) 222-6192
(252) 723-0087
(252) 342-6993
(252) 725-9642
(252) 223-2319
(252) 222-0670
(252) 223-3029
(252) 222-6390
(252) 241-7550
(252) 726-8982
Page 25 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Assessment of Disruption Procedures
Upon notification of disruption of service, the Director of Network Technologies or the Director of
Administrative Computing Services/SA will immediately arrange to assess the extent of the damage or
disruption.
A typical assessment will include activities to determine:
 The cause of the disruption.
 Potential for additional disruption or damage.
 Affected physical area and status of physical infrastructure.
 Status of IT equipment functionality and inventory, including items that will need to be replaced.
 The estimated time to repair services to normal operations.
Once the assessment has been made, the Director of Network Technologies or the Director of Administrative
Computing Services/SA will take the following steps:
1. Make arrangements with necessary IT staff to initiate recovery activities.
2. Notify the Vice President of Administrative Services.
3. If additional expenditures are required for recovery activities, seek approval from the Vice President of
Administrative Services to proceed with activities.
4. Notify College employees and/or students as appropriate.
5. Proceed with recovery activities accordingly.
The Vice President of Administrative Services, the Director of Network Technologies, or the Director of
Administrative Computing Services/SA, individually or in consultation, will determine if the interruption of
computing services is having or will have serious consequences for the College. If it is determined that serious
consequences may occur, the key contact persons in the table below will be notified immediately and
appropriate notification will be sent to College employees and students. Notification may be sent via Email,
Network Messaging, or Voicemail.
Office
President’s Office
Instruction and Student Support
Corporate and Community Education
Public Information Office
Bookstore
Security
Student Enrollment Resources
Plant Operations
Finance Office
College Reception
Contact Person
Dr. Joseph Barwick
Dr. Fran Emory
Perry Harker
Morgan Smith
Ronetta Gaskill
Glendon Flecther
Rick Hill
Renee Donald
Christine Trigleth
Receptionist
Page 26 of 44
Campus Extension
222-6140
222-6144
222-6205
222-6240
222-6254
222-6188 (Forwards to cell)
222-6151
222-6159
222-6158
222-6000
Carteret Community College
“Education for Life”
Business Continuity Plan
Recovery Operations
Recovery operations can vary depending upon the nature of the disruption. Generally, interruptions of service
on campus will fall into one of the following categories:
1.
Electrical service interruption
2.
Telephone service interruption originating off-site
3.
Telephone system hardware failure
4.
Voice mail system hardware failure
5.
Core network component equipment failure
6.
Server component failure
7.
Telecommunications cable or fiber-optic line cut
8.
Data loss or corruption due to extraneous event
9.
Network logical failure
10.
Applications failure
11.
Virus attack
Recovery Procedures
The college has taken preventive measures as outlined above in routine contingency operations to reduce the
likelihood of failures interrupting systems. Systems are backed up, infrastructure is protected to a reasonable
extent, and hardware has a reasonable level of redundancy built in. In spite of these measures, systems do fail
from time to time.
Upon notice of systems failure, the IT department staff will undertake immediate activities to assess the
problem and implement the most expedient correction. The goal is to restore services as expeditiously as
possible, using data backups and exercising equipment maintenance contracts and service level agreements as
necessary to return the network, telecommunications systems, or campus central computing facilities to service.
In the event of loss of data, the IT department will restore to the latest data backup level available at the time.
Using the processes outlined in this plan, the IT department will take steps to keep the campus community
informed when service interruptions occur and when service is restored.
Page 27 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Return to Normal Operations
In the reconstitution phase, recovery activities are terminated and normal operations are restored. Once the
systems are restored to the level that they can support the IT system and its normal processes, the system may
be transitioned back into normal operation. Activities in this phase will be performed by College IT staff under
the direction of the Director of Network Technologies or the Director of Administrative Computing
Services/SA. The following major activities will occur in this phase:
 Ensuring adequate infrastructure support, such as electric power, water, telecommunications, security,
environmental controls, office equipment, and supplies are in normal operation
 Restoring system hardware, software, and/or firmware as may be the case.
 Re-establishing connectivity and interfaces with network components and external systems
 Testing system operations to ensure full functionality
 Backing up operational data on the contingency system and uploading to the restored system
 Terminating contingency operations.
 Official notification will be made by the Director of Network Technologies or the Director of
Administrative Computing Services/SA will be made to the Vice President of Administrative Services.
 Official notification will be made to the College employees and students as appropriate by the Vice
President of Administrative Services, the Director of Network Technologies, or the Director of
Administrative Computing Services/SA.
Page 28 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Disaster Recovery Plan
Introduction
The purpose of the Disaster Recovery Plan is to guide the College management and technical staff in the
recovery of network and administrative computing services and facilities in the event of a catastrophic disaster
that destroys all or part of the IT facilities located at Carteret Community College, 3505 Arendell Street,
Morehead City, NC. The primary focus of this part of the plan is to provide an orderly way to respond to a
major disaster that destroys or severely impacts the central administrative computing systems and/or the campus
network operated by the College IT Department. The intent is to provide a plan that will restore operations as
quickly as possible with the latest and most up-to-date data available.
The following objectives have been established for the disaster recovery plan:
 Maximize the effectiveness of contingency operations through an established plan that consists of the
following phases:
o Notification/Activation phase to detect and assess damage and to activate the plan
o Recovery phase to restore temporary IT operations and recover damage done to the original
system
o Reconstitution phase to restore IT system processing capabilities to normal operations.
 Identify the activities, resources, and procedures needed to carry out processing requirements during
prolonged interruptions to normal operations.
 Assign responsibilities to designated personnel and provide guidance for recovering and continuing
operations during prolonged periods of interruption to normal operations.
 Ensure coordination with other College staff who will participate in the contingency planning strategies.
 Ensure coordination with external points of contact and vendors who will participate in the contingency
planning strategies.
Assumptions
The following assumptions were used when developing the Disaster Recovery Plan:
 Catastrophic long-term disasters in which the College ceases to function for 30 days cannot be planned
for. Computer services recovery from such an event will be part of a general recovery process.
 Some risks are acceptable. The College does not possess the necessary resources (financial and
personnel) to protect itself against every conceivable risk.
 The campus network or critical server is inoperable at the College campus and cannot likely be
recovered within 72 hours.
 Critical Systems/Applications are affected.
 Key personnel have been identified and trained in their emergency response and recovery roles; they are
available to activate the Disaster Recovery Plan.
 Preventive controls (e.g., generators, environmental controls, fire extinguishers, and fire department
assistance) are fully operational at the time of the disaster.
 Computer center equipment, including components supporting the campus network or critical server are
connected to an uninterruptible power supply (UPS) that provides 30 minutes to 1 hour of electricity
during a power failure.
Page 29 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan




The campus network or critical server hardware and software at the College campus are expected to be
unavailable for at least 72 hours.
Current backups of the application software and data are intact and available at the offsite storage
facility.
The equipment, connections, and capabilities required to operate are available at the alternate site(s) in
New Bern, Craven County, NC, or in Raleigh, NC.
Service agreements are maintained with hardware, software, and communications providers that service
the College to support the emergency system recovery.
Disaster Preparation
When a hurricane or other potential disaster is expected, the Director of Network Technology and the Director
of Administrative Computing Systems/SA will make two backups of the Administrative Computer Systems and
the other critical systems prior to leaving the College. One set of backups will be placed in the safe in the
Corporate and Community Education Building and/or the safe in the Finance Office at the McGee Building and
the Directors will take personal control of the second set of backups. The Directors will also maintain personal
control of a copy of this Business Continuity Plan including the Disaster Recovery Plan.
All of the computer systems in the IT Computer Center will be covered with plastic and moved if possible up as
high as possible off of the ground. All network printers and other hardware peripherals will be covered with
plastic by the IT staff. All workstation users should also protect terminals, microcomputers, printers, and other
technology equipment in their offices and work areas by covering them with plastic. The Facilities Department
will be responsible for providing necessary plastic for these tasks. All electronic equipment must be unplugged
before employees leave the campus.
The Facilities Department will be responsible for sandbagging entrances to all buildings on Campus.
Additionally, the Facilities Department will board windows as applicable.
Page 30 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Disaster Notification List
The Disaster Notification List for an IT disaster is shown below. These people are to be notified as soon as
possible when a disaster threatens or occurs.
Name
Dr. Joseph Barwick
Janet N. Spriggs
Ken Martin
David Looney
John Green
Debbie Favorite
Chris Capoccia
Glendon Fletcher
Terry Murphy
Tommy Rhue
Title
President
Vice President of
Administrative
Services
Director of Network
Technologies
Director of
Administrative
Computing
Services/SA
Senior IT Specialist
IT Specialist
Assistant Systems
Administrator
Head Security
Officer
Facilities Manager
Director of
Construction and
Renovations
Campus Extension
(252) 222-6140
Cellular
(252) 725-0928
Home
(252) 728-0787
(252) 222-6224
(252) 723-0050
(252) 504-4740
(252) 222-6243
(252) 342-9012
(252) 726-9012
(252) 222-6180
(252) 222-6273
(252) 222-6192
(252) 723-0087
(252) 342-6993
(252) 725-9642
(252) 223-2319
(252) 222-0670
(252) 223-3029
(252) 222-6390
(252) 241-7550
(252) 726-8982
(252) 222-6188
(252) 222-6153
(252) 222-6188
(252) 723-0071
(252) 223-5979
(252) 240-0707
(252) 222-6198
(252) 241-6480
(252) 728-3780
Page 31 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Damage Assessment
Upon notification of disruption of service, the Director or Associate-Director, IST will immediately arrange to
assess the extent of the damage or disruption.
A typical assessment will include activities to determine:
 The cause of the disruption.
 Potential for additional disruption or damage.
 Affected physical area and status of physical infrastructure.
 The status of IT equipment functionality and inventory, including items that will need to be replaced.
 The estimated time to repair services to normal operations.
Once the assessment has been made, the Director of Network Technologies or the Director of Administrative
Computing Services/SA will take the following steps:
1. Make arrangements with necessary IT staff to initiate recovery activities.
2. Notify the Vice President of Administrative Services.
3. If additional expenditures are required for recovery activities, seek approval from the Vice President of
Administrative Services to proceed with activities.
4. Notify College employees and/or students as appropriate (include an estimate of time to repair, if
possible).
5. Proceed with recovery activities accordingly.
Page 32 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Notification and Activation Phase
The Vice President of Administrative Services, the Director of Network Technologies, or the Director of
Administrative Computing Services/SA, individually or in consultation, will determine if the interruption of
computing services is having or will have serious consequences for the College. If it is determined that serious
consequences may occur, the key contact persons in the table below will be notified immediately and
appropriate notification will be sent to College employees and students. Notification may be sent via Email,
Network Messaging, or Voicemail.
Office
President’s Office
Instruction and Student Support
Corporate and Community Education
Public Information Office
Bookstore
Security
Student Enrollment Resources
Plant Operations
Finance Office
College Reception
Contact Person
Dr. Joseph Barwick
Dr. Fran Emory
Perry Harker
Morgan Smith
Ronetta Gaskill
Glendon Flecther
Rick Hill
Renee Donald
Christine Trigleth
Receptionist
Page 33 of 44
Campus Extension
222-6140
222-6144
222-6205
222-6240
222-6254
222-6188 (Forwards to cell)
222-6151
222-6159
222-6158
222-6000
Carteret Community College
“Education for Life”
Business Continuity Plan
Recovery Operations
Disaster Recovery Preparations
The Director of Network Technologies and the Director of Administrative Computing Services/SA will
maintain backup copies of all software and data. The backups will be maintained to ensure availability in the
event of an emergency or disaster. Specific backup procedures are documented in this plan. The College will
maintain agreements with one or more compatible sites at which essential operations can be performed. The
Director of Network Technologies and the Director of Administrative Computing Services/SA shall coordinate
with the system management personnel of the mutual aid sites for implementing the use of the site.
An individual plan for each department responsible for critical applications shall be maintained. The plan shall
address actions to be taken if an emergency or disaster interrupted computer availability. The plan should
consider the maximum time that the department could operate without computer support and periodic peak
processing requirements. Each department should consider developing manual alternative processes to the
automated computer processes and the entry of the data generated by the alternative process into the computer
database. The plan should address individual items of equipment used by the department for data processing.
A minimum level of capability shall be defined for each department. If the department is to continue limited
operation at the mutual aid site, then the department plan should address how this is to be accomplished.
The College will maintain adequate insurance coverage to replace or repair the computer system in the event
damages are caused to the computer systems that are not covered by a service agreement. Sources of
replacement equipment will be maintained. This plan contains a list of primary equipment and replacement
sources.
Recovery Operations
Recovery operations can vary depending upon the nature of the damage. Generally, disasters relating to IT
services on the College Campus would fall into one of the following categories:
1. IT central computer room facilities located in Michael J. Smith Building are destroyed all or in part.
2. IT core network facilities and telephone/voice mail facilities located in Michael J. Smith Building and
the adjoining Civic Center Building are destroyed all or in part.
3. Campus network or telecommunications facilities are lost to any other particular building on campus,
but are confined to locations not affecting the core network equipment or central campus server farm.
4. All facilities are destroyed, resulting in a general campus shutdown.
Page 34 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Recovery Procedures
1. IT central computer room facilities located in Michael J. Smith Building are destroyed all or in part.
If the college’s central computer room is destroyed, all administrative computing applications and primary
server applications would be lost. In this case, alternate servers would have to be purchased under
expedited delivery, set up in the Wayne West Building and the latest applications reloaded from backup
tapes stored in the off-site location.
Once services are restored to temporary status, continue with permanent facilities replacement.
2.
IT core network facilities and telephone/voice mail facilities located in Michael J. Smith Building and
the adjoining Civic Center Building are destroyed all or in part.
In this case, telecommunications facilities serving the entire campus would be destroyed including, the
switchboard, the entire extension cross-connect facility, all central office trunks, and voice mail. This type
of disaster would not be easily recovered from. Recovery would involve the following procedures:
 Relocating central office facilities to the Wayne West Building temporarily. This would have to be
accomplished by the dial-tone provider.
 Using the services of Embarq, the college would have to contract to install replacement PBX
components in the PBX cabinetry located in Civic Center Building. Once the Call Manager is
operational again, we would have 50% of the campus phones available.
 Performing emergency communications by routing through the Cisco call manager to other buildings
using the campus network once it is restored.
Upon the loss of Simpson building, the campus computing network core would be lost. This includes the
fiber optic feeds that route to each building. The following procedure would restore the campus network in
the shortest time possible.
 Using the Wayne West Building 4506 switch, establish a new, temporary core, in the Wayne West
Building.
 Obtaining replacement blades from Cisco using overnight delivery. This would restore the campus
network within 1 day to the majority of campus buildings.
 Restoring the core switch configurations from backups.
 Contracting with a cable installer to evaluate if any buildings are without communications and to
restore communications to the buildings using existing fiber lines or other means as necessary.
Once services are restored to temporary status, continue with permanent facilities replacement.
3.
Campus network or telecommunications facilities are lost to any other particular building on campus,
but are confined to locations not affecting the core network equipment or central campus server farm.
This situation would not affect the overall campus network or telecommunications facilities. In this case the
following procedures would be in effect:
 Installing a temporary building connection switch at the location where staff would be relocated.
 Providing service at alternate sites as necessary since all buildings on campus are wired.
Once services are restored to temporary status, continue with permanent facilities replacement.
Page 35 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
4. All facilities are destroyed, resulting in a general campus shutdown.
Catastrophic long-term disasters in which the College ceases to function for an extended period cannot be
planned for. Computer services recovery from such an event will be part of a general recovery process. In
this event, select applications such as payroll could be performed by use of an alternate site at the discretion
of the President.
Page 36 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Return to Normal Operations (Reconstitution Phase)
In the reconstitution phase, recovery activities are terminated and normal operations are transferred back to the
College computer operations facility. If the original facility is unrecoverable, the activities in this phase can also
be applied to preparing a new facility to support system processing requirements. Once the original or new site
is restored to the level that it can support the IT system and its normal processes, the system may be transitioned
back to the original or to the new site. Until the primary system is restored and tested, the contingency system
should continue to be operated. Activities in this phase will be performed by College IT staff under the direction
of the Director of Network Technologies and the Director of Administrative Computing Services/SA. The
following major activities will occur in this phase:
 Ensuring adequate infrastructure support, such as electric power, water, telecommunications, security,
environmental controls, office equipment, and supplies.
 Installing system hardware, software, and firmware. This activity includes detailed restoration
procedures similar to those followed in the Recovery Phase.
 Establishing connectivity and interfaces with network components and external systems.
 Testing system operations to ensure full functionality.
 Backing up operational data on the contingency system and uploading to the restored system.
 Shutting down the contingency system.
 Terminating contingency operations. Official notification to be made by the Director of Network
Technologies and the Director of Administrative Computing Services/SA.
 Notifying the Vice President of Administrative Services that operations have been restored to normal
and systems use may resume.
 Notifying campus personnel that operations have been restored to normal and systems use may resume.
 Securing, removing, and/or relocating all sensitive materials at the contingency site.
 Arranging for recovery personnel to return to the original facility.
President’s Signature for Disaster Recovery Plan
Signature:____Joseph T. Barwick_______________
Joseph T. Barwick
President
Carteret Community College
Page 37 of 44
Date: 7/10/07
Carteret Community College
Business Continuity Plan
Appendices
A. IT Organization Chart
B. Maintenance Contract Vendor List
C. Technology Acceptable Use Policy
D. Campus Network Diagrams
E. Datatel/UNIX Access Rights Request Form
F. Student Data Access Agreement and Security Procedures
Page 38 of 44
“Education for Life”
Carteret Community College
“Education for Life”
Business Continuity Plan
Appendix A
IT Organization Chart
Joseph Barwick
President
Janet N. Spriggs
Vice President
Ken Martin
Director of Network
Technologies
John Green
Sr. IT Specialist
Terence Smith
Director Software
Solutions and Web
Development
Debbie Favorite
IT Specialist
David Looney
Director of
Administrative
Computing Svcs./SA
Chris Capoccia
Assistant SA
Page 39 of 44
Carteret Community College
Business Continuity Plan
Appendix B
Maintenance Contract Vendor List
Administrative Computer Servers:
NCR
800-876-7378
Workstations and Servers:
Dell
800-234-1490
Telecommunications and CISCO Equipment:
Embarq
800-786-6272
Page 40 of 44
“Education for Life”
Carteret Community College
“Education for Life”
Business Continuity Plan
Appendix C
Carteret Community College
Technology Acceptable Use Policy (TAUP)
The purpose of Carteret Community College’s technological resources is to enhance and support the educational mission of the
college. All students, faculty, staff and public patrons are responsible for using CCC’s technological resources in an effective, ethical
and lawful manner. These resources include but are not limited to: computers, computer networks and telecommunications,
multimedia and hyper media, camcorders and VCRs, instructional television and video microscopes, telephones and voice mail.
Acceptable Use



Use related to administrative and other support activities considered consistent with the mission of Carteret Community
College.
Use for purposes of, or in support of, education and research.
Use consistent with the Acceptable Use Policies (AUP) for the North Carolina Research and Information Network (NCREN),
the North Carolina Integrated Information Network (NCIN), and the National Science Foundation Network (NSFN). Copies
of the AUPs for these organizations are available on each organization’s Internet Web Site.
Unacceptable Use








Use of CCC technological resources that violates federal, state or local laws or statutes.
Use of CCC technological resources which provides or assists in gaining unauthorized or inappropriate access to systems,
software or data at CCC and or other sites.
Use for activities that interfere with the ability of others to use CCC’s technological resources effectively.
Use for activities that result in the loss of another person’s work or unauthorized access to another person’s work.
Use for distribution of obscene, abusive or threatening messages via electronic mail or other means.
Use for distribution of chain letters or broadcasting to lists of individuals in such a manner that might cause congestion on the
network.
Use of CCC technological resources for commercial use or for profit-making enterprises except as specifically approved by
the President.
Use inconsistent with the Acceptable Use Policies of NCREN, NCIN and NSFN.
Conditions
Violations of this policy may be met with a reduction of access to CCC technological resources or with complete denial of access to
CCC technological resources. Violators may be brought to the attention of CCC officials who may take legal action. Action taken by
CCC does not preclude the possibility of legal action taken by others.
Modifications
CCC reserves the right to modify this policy at any time.
Page 41 of 44
Carteret Community College
Business Continuity Plan
Appendix D
Campus Network Diagrams
Page 42 of 44
“Education for Life”
Carteret Community College
“Education for Life”
Business Continuity Plan
Appendix E
CARTERET COMMUNITY COLLEGE
DATATEL/UNIX ACCESS RIGHTS REQUEST FORM
Name: ________________________________
Login ID: _____________________
Department: ___________________________
Date: _________________________
Request to: ADD
CHANGE
DELETE
Security Classes (place an X next to the security class to be added or removed from user)
APPROVALS
All access rights must be approved by the employee's direct supervisor. Security rights must also be approved by the
authorized official for each specific application: CF, HR, or ST (CU & CE)
Supervisor's Signature & Title______________________________________________________________
College Financials Approval: ____________________________________Approved for QB ____Shel____
VP, Administrative Services
Human Resources Approval: ____________________________________Approved for QB ____Shel ____
VP, Administrative Services
Student Con-Ed Approval: ______________________________________Approved for QB ____Shel____
VP, Corporate & Community Education
Student Curriculum Approval: ___________________________________Approved for QB ____Shel____
Registrar
MIS USE ONLY
Date Access Rights Assigned: _____________________________
Rights Assigned By: ____________________________________
Annual User Review
2006_______
2010_______
2007_______
2011_______
Comments: ____________________________________________
2008_______
2012_______
______________________________________________________
2009_______
2013_______
Page 43 of 44
Carteret Community College
“Education for Life”
Business Continuity Plan
Appendix F
Student Data Access Agreement & Security Procedures
This is to certify that I have read YOUR RESPONSIBILITIES UNDER THE FAMILY EDUCATIONAL
RIGHTS AND PRIVACY ACT OF 1974 and fully understand the legal requirements that accompany any
access to student information. I am aware that allowing another individual to have access to my security code is
in violation of the rights assigned to me with regard to student data. Furthermore, I will not allow my student to
have access to the computer terminal(s) assigned to my area of responsibility without approval from the
Director of Institutional Computing.
Security refers to the protection of all computer resources from damage of any kind and to the protection of data
from (1) disclosure to any unauthorized persons, (2) unauthorized modification, or (3) unauthorized destruction.
While disclosure or damage may occur accidentally or intentionally, the results are the same. The security
systems implemented in the following procedures will, if used properly, facilitate the protection and integrity of
the institutional computing system’s data, software and hardware.
A. Each user is responsible for his/her User ID and the user must not share their ID with anyone under any circumstances.
B. Users must not leave their terminals unattended after logging in to the UNIX/Datatel system. If the user must be away from
their station, the user is responsible for logging out of the system. Printed reports should be picked up from printer
immediately after printing is completed.
C. Employees requesting access to the UNIX/Datatel system must submit a Carteret Community College Administrative
Computer Access Rights Request Form to their supervisor.
D. In addition, users who require access to the ‘ST’ mnemonic must have the Director of Student Services sign their Access
Rights Request Form. These users must also sign a Student Data Access Agreement which certifies that they have read and
understand The Family Educational Rights and Privacy Act of 1974, and that they accept the responsibility of securing all
student data available to them.
E.
If a user has reason to believe that security may have been violated; he/she must report the incident to their supervisor of to
the Director of Institutional Computing immediately. The Director of Institutional Computing will investigate and reconstruct
security as required.
By signing below I certify that I have read the above and fully understand the importance of a secure system. I accept the
responsibility to secure all student data available to me and realize that inappropriate access may result in complete loss of access
rights.
Name (printed): __________________________________
Signed: ________________________________
Date: ___________________
Page 44 of 44
Download