Contingency Planning guide

advertisement
Central Administration
Contingency Planning Guide
d:\106738987.doc
1/21
Contingency Planning
Contingency Planning is the use of proactive management techniques for the development of
plans for business continuity which will prevent or minimise the effects of a range of hazards or
disasters on the operations of the University.
Faculties, Departments and Sections need to identify potential disasters within their areas of
responsibility and ensure the development of Contingency Plans for Business Continuity.
When potential disasters which could pose a threat to the University’s business continuity are
identified the four (4) recognised elements of contingency planning must be addressed in the
development of Contingency Plans for Business Continuity. They are:




Prevention;
Preparedness;
Response; and
Recovery.
The key components of Contingency Planning are the likelihood of an adverse event and the
consequences of that event on the achievement of optimum program outputs or outcomes.
The move to formal Contingency Planning will result in benefits to the University as indicated by:








ability to make better business decisions based on reliable and predictable information;
better protection of University assets;
minimal adverse publicity;
minimisation of security risks;
reduction in the overall potential for loss;
improved safety, performance, and efficiency;
proactive rather than reactive response to potential loss situations; and
the minimisation of disruption to client service delivery.
d:\106738987.doc
2/21
Executive Summary
Contingency Planning for Business Continuity
PURPOSE AND SCOPE
To outline the University’s Central Administration Contingency Planning Policy for officers who
have responsibility for managing activities or controlling or directing staff and, in particular, to
officers with budgetary responsibilities for dealing with potential hazards or disasters which
threaten the University’s Business Continuity.
POLICY
To optimize the net costs of all risks and exposures to business continuity (i.e risks to its fixed and
intangible assets, information technology, budgetary allocations and other income, personnel, and
reputation).
ABBREVIATIONS/DEFINITIONS
Contingency Planning is the use of proactive management techniques in the development of
plans for business continuity that will prevent or minimise the effects of a range of hazards or
disasters on the operations of the Department.
Business Continuity is the ability of the University to perform its normal business activity on a
day-to-day basis.
A Contingency Plan for Business Continuity (CPBC) is the formal record of arrangements and
agreements developed to control, prevent or minimise a potential adverse event, hazard or
disaster.
Disaster can be defined as a sudden or great misfortune or calamity or an event which causes
great damage.
DELEGATIONS / RESPONSIBILITIES
Executive Managers / Directors are responsible for including contingency planning for business
continuity within their overall risk management policies and procedures.
All officers have an obligation to:
 advise their supervising officers if they identify areas where contingency planning
methodologies should be adopted;
 suggest amendments and/or updates to established CPBC in the light of changing
circumstances; and
 participate in training and test exercises.
The Administration Computing Policy Committee (ACPC) is responsible for Contingency Planning
Policy Development.
Departmental systems managers are responsible for coordinating risk management and
contingency planning activities within their business group. Risk Management is coordinated by
the Central Administration / ITS Client Liaison Group.
d:\106738987.doc
3/21
BACKGROUND
All members of the University need to be aware of the possible occurrence of certain potential
disasters which might affect its operating capability and to be ready to take action to:
 prevent or reduce the severity of the effects;
 prepare for, respond to and recover from those effects.
There are a number of Risk Management activities which require formalised corporate
assessment and determination. Broad risk areas include property, personnel and liability. The
University’s reputation, service standards and image also need to be considered as well as direct
and immediate risks to budgetary allocations and other income.
The following agencies might be called upon to contribute to and/or provide support for actions
listed in any CPBC and, where appropriate, should be consulted during preparation of the plan:
 State Emergency Services
 Queensland Police Service
 Queensland Ambulance Service
 Queensland Fire Service
 Local Government/Council
 local service clubs
 local functional committees
 Government, industry and community organisations
 local Defence Force authorities
To be effective, a CPBC must be:
 in writing;
 simple;
 properly disseminated; and
 regularly tested and revised.
The plan should be available for scrutiny and open to criticism, however, some parts of the plan
will be of a confidential nature and access to these parts should be limited.
Faculties, Departments and Centres need to identify potential disasters within their areas of
responsibility, and to ensure the development of a CPBC taking into account the four recognised
elements of contingency planning:




Prevention;
Preparedness;
Response; and
Recovery.
d:\106738987.doc
4/21
Typical measures under the four elements of contingency planning include:
PREVENTION









Risk Assessment
Building codes
Building use regulations
Legislation
Computer systems
Fire protection
Public education
Security and quarantine
Zoning and land use management
PREPAREDNESS










Contingency plans for business continuity
Emergency communications
Evacuation plans
Mutual aid agreements
Warning systems
Education and information
Resource inventories
Training and test exercises
Provision of special resources
Data back-up and offsite storage
RESPONSE









Implement plans
Implement emergency declarations
Issue warnings
Activate Emergency Operation Centres
Loss minimisation
Mobilise resources
Notify public authorities
Provide medical assistance
Provide immediate relief
RECOVERY
 Restoration of essential services
 Counseling programs
 Temporary housing
 Financial support or assistance
 Business systems
 Health and safety information
 Long-term medical care
 Physical restoration and reconstruction
 Client information
 Economic impact studies
Not all of the above measures are likely to be relevant in every case. The hazard, the community
and the nature of their interaction will determine appropriate action. The need to cater for
prevention, preparedness, response and recovery will, however, remain constant.
d:\106738987.doc
5/21
THE CONTINGENCY PLANNING PROCESS
The key components of contingency planning are the likelihood of an adverse event and the
consequences of that event on the achievement of optimum program outputs or outcomes.
These two factors of likelihood and consequences can be assessed as high, medium or low. The
process is made up of the following activities:





identification of possible causes and likely effect of an adverse event;
assessment of exposure taking into account the level of risk;
investigation of methods to reduce or avoid losses;
control by selection of appropriate strategies such as avoidance, prevention and reduction;
establishment and review of on-going procedures and management accountability.
POTENTIAL BENEFITS FROM EFFECTIVE CONTINGENCY PLANNING
The move to formal contingency planning will result in benefits to the University as indicated by:








ability to make better business decisions based on reliable and predictable information;
better protection of University assets;
minimal adverse publicity;
minimisation of security risks;
reduction in the overall potential for loss;
improved safety performance and efficiency;
proactive rather than reactive response to potential loss situations; and
the minimisation of disruption to client service delivery.
IMPLEMENTATION
Executive Directors, managers of operating units and supervisors are responsible for contingency
planning functions i.e. complete the writing of the contingency plan and the regular testing and
revision of the plan.
The role of ACPC is to develop appropriate policies and procedures to ensure that contingency
planning is implemented within Central Administration.
The adoption of contingency planning will contribute to the success of University in the
management of people, property and funds. This will occur through the management of potential
adverse events by:
 addressing potential adverse events as identified;
 monitoring changes in University operating environment; and
 continual review of policies, procedures and practices.
d:\106738987.doc
6/21
GUIDE FOR CONTINGENCY PLANNING FOR BUSINESS CONTINUITY
INDEX
1.
Document Control Information
9
2.
Modification History
9
3.
Plan Distribution and Security
9
4.
Document Sign Off
10
5.
Table of Contents
10
6.
Statement of Confidentiality
10
7.
Introduction
10
8.
Scope of Plan
10
9.
Disaster Scenarios
9.1 Flood
9.2 Fire
9.3 Earthquake
9.4 Cyclone / Wind Damage
9.5 Bombing / Bomb Threat
9.6 Hostage Situation
9.7 Unauthorised Access
9.8 Power Interruption
9.9 Chemical Spill
9.10 Computer Systems Failure
11
11
11
11
11
12
12
12
12
12
12
10.
Worst Case Assumption
12
11.
Order of Succession
13
12.
Prevention / Security
12.1 Physical
12.1.1 Layouts
12.1.2 Locks
12.1.3 Intrusion Alarms
12.2 First Aid
12.3 Fire Protection
12.3.1 Fire Alarms
12.3.2 Fire Extinguishers / Hoses
12.3.3 Fire Drills
12.3.4 General Fire Safety
12.4 Power
12.5 Document Security
12.6 Computer Systems
12.7 Emergency Action Plan
13
13
13
13
13
14
14
14
14
14
14
14
15
15
16
d:\106738987.doc
7/21
13.
Preparedness
13.1 Emergency Telephone Numbers
13.2 Employee Details
13.3 Vendor Information
13.4 Analyse Weaknesses
13.5 Offsite Strategy
13.6 Backup Site Strategy
13.7 Logical Considerations
13.7.1 Control Centre
13.7.2 Office Space
13.7.3 Credit Cards
13.7.4 Employee Notification
13.7.5 Transport
13.7.6 Housing
13.8 Disaster Recovery Teams
16
16
16
17
17
17
18
18
18
18
18
18
19
19
19
14.
Response
14.1 Declaration of Disaster
14.2 Security
14.3 Damage Assessment
14.4 Determine Downtime
14.5 Assemble Teams
14.6 News Release
14.7 Approve Expenditure / Budgets
19
19
20
20
20
20
20
20
15.
Recovery
20
16.
Validation and Testing
21
d:\106738987.doc
8/21
1
DOCUMENT CONTROL INFORMATION
This section should contain the following document details:
 Document Name
 Resident Machine
 Directory
 Editing Tool
2
MODIFICATION HISTORY
All businesses are constantly changing. New employees are added, whilst others leave or are
transferred to new locations. Staff change their home address, work and personal telephone
numbers. Computer equipment and software also change. For these reasons it is imperative
that the disaster plan is updated regularly with a major review annually. To ensure that your
disaster plans are in place, information is current and useable, and plans are available when
needed, a responsible person should be placed in charge of reviewing the plan.
This section should contain:
 Document Version Number
 Date of Modification
 Author
 Description / Reason
3
PLAN DISTRIBUTION AND SECURITY
A copy of the disaster recovery plan should be given to all staff who have disaster recovery
responsibilities and to selected senior management. Other recipients should include ITS; UQ
Security; Property & Facilities. Marketing & Communications should also be made aware of
the plan's existence and contents. (see 14.6 News Release)
These up-to-date copies of the plan should be kept at the work-place, at home and at the
Control Centre. (see 13.7.1)
Parts of the plan will of necessity be confidential and will not be given to all members. For
example details of the security system, or the home addresses and telephone numbers of
other disaster recovery teams will not be given to every team member.
It is imperative that each copy of the plan have a serial number and a record kept of who is
given each numbered copy. It should be clearly stated on the front cover that the document or
parts of the document are not to be copied. If a staff member ceases employment or is
transferred to another location then his / her copy must be returned to the disaster recovery
coordinator.
The section should contain a table of recipients detailing name, department or section,
responsibility, number of copies and serial number(s).
d:\106738987.doc
9/21
4
DOCUMENT SIGN OFF
This section is provided for the inclusion of stakeholder acceptance signatures.
5
TABLE OF CONTENTS
This is self explanatory, however ensure that all sections are properly covered. If for some
reason it is felt that a particular section is not relevant then an explanation should be given in
the body of the plan.
6
STATEMENT OF CONFIDENTIALITY
As the disaster recovery plan contains confidential information ensure that the words
‘Statement of Confidentiality’ are displayed prominently at the beginning of the plan. It should
be made clear that if the plan is lost or ends up in the wrong hands the material is not to be
used or copied and should be returned to the University. It should also be stated that all
questions about the plan or disasters, including questions from the media, are to be directed
to and will only be answered by authorised personnel. (These authorised personnel should be
listed)
7
INTRODUCTION
Describe here the purpose of the plan and detail the plan’s background. Why was it written?
What is it intended to achieve? Who was involved in its formulation? Who is the intended
audience?
This section should also note references as applicable.
8
SCOPE OF THE PLAN
Describe here what assets are to be protected and what disaster scenarios are covered by
the plan, and which scenarios are specifically excluded. What business group / region /
district does it cover? For example, the plan could cover only one campus and one business
group or several buildings and multiple groups at one location. Details of the business group /
department’s core business should be stated and how that core business is delivered to
customers.
d:\106738987.doc
10/21
9
DISASTER SCENARIOS
The types of disasters that should be considered include:










Flood
Fire
Earthquake
Cyclone / Wind Damage
Bombing / bomb threat
Hostage Situation
Unauthorised Access
Power Interruption
Chemical Spill
Computer Systems failure
There may of course be other disasters peculiar to a particular location and these should also
be considered.
9.1
FLOOD
Special consideration will have to be given to offices located near rivers or in flood prone
areas. Of concern is computers or other valuable equipment in basement or ground floor
areas. Remember also that it does not necessarily take a major flood to cause prolonged
interruption to operations.
Localised heavy rain can also cause problems if for example staff and clients are unable to
gain access to the office.
9.2
FIRE
Fires can be started internally through an electrical fault or from an outside source. Consider
what you would do if all the computers and vital records are destroyed. The building, while not
burnt to the ground, could be considered unsafe and access denied for a number of days.
9.3
EARTHQUAKE
Consider the possibility of an earthquake even if the office is not in an earthquake zone.
Again it must be stressed that it does not require a major earthquake to cause significant
disruption. Older buildings are easily damaged and may be declared unsafe limiting access
for a number of days. Whilst your office may not be directly affected earthquakes also cause
power and communications failure. (see 12 below)
9.4
CYCLONE / WIND DAMAGE
Cyclones are a major problem in the northern part of the state whist in the south east corner
storms in the summer months are, and special precautions are needed here. Power lines can
be brought down and buildings unroofed. Again vital computer equipment and records could
be lost or destroyed.
d:\106738987.doc
11/21
9.5
BOMBING / BOMB THREAT
Bombings or the threat of bombing can be caused by disgruntled ex employees, students or
clients. The building could be wholly or partially destroyed or the building evacuated and
rendered unusable for a considerable time.
9.6
HOSTAGE SITUATION
An aggrieved person could hold someone hostage causing the evacuation of the building and
the closure of communication links.
9.7
UNAUTHORISED ACCESS
A large group of protesters (e.g. students) could occupy the main office and refuse to leave,
or after the protesters are removed the police could lock all doors to the complex thus limiting
entry and exit of staff. Also consider the possibility of an overnight break-in where computers
are stolen and vital research data lost.
9.8
POWER INTERRUPTION
Consider power to the building being cut when an electrical sub station is destroyed or
communications interrupted when telephone lines are brought down in a storm. Computers
can be made unusable and personal computers in use at the time can be affected.
9.9
CHEMICAL SPILL
Consider the possibility of a spill either inside or outside the building causing its closure for an
extended period while the spill is cleaned up.
9.10 COMPUTER SYSTEMS
Consider the following:






Failure of critical business process
'A'
'B'
etc
Loss of individual PCs (fault, damage, theft)
Loss of NT server(s)
Loss of main server(s)
Loss of network(s)
Loss of telephone system
10. WORST CASE ASSUMPTION
It should be stated that the plan has been developed to cover a worst case scenario. In
developing the plan re-enforce an ‘after the disaster’ mentality. Select a disaster that may
befall you and consider the total loss of the on-site property. Of course if a less serious
situation occurs then only part of the plan will need to be invoked e.g. temporary loss of
power.
d:\106738987.doc
12/21
11. ORDER OF SUCCESSION
It is important when a disaster strikes to know who is in charge. Staff members can be away
from the office or home and cannot be contacted. Or worse still they could be injured or killed
in the disaster itself.
In a disaster the Divisional Disaster Recovery Management Group (DDRMG) should succeed,
for the purpose of disaster recovery operations, the normal management hierarchy. Their
authority will last until normal operations are restored and the disaster is declared over.
Whatever Disaster Recovery Group is selected it must be ranked in order of succession from
the highest to the lowest. It is recommended that a copy of the organisation chart for the
location / business group be displayed here with the order of succession shown underneath.
12. PREVENTION / SECURITY
Steps must be taken to ensure that mechanisms are in place to try to stop disasters from
happening and if that is not possible, to reduce their effect. For example the installation of
sprinklers can stop a small fire becoming an out of control blaze; moving computer equipment
away from windows or boarding windows following a cyclone alert could considerably reduce
damage.
12.1 PHYSICAL SECURITY
Consider what assets in terms of people, tangible and intangible assets, computers, and
confidential information need to be kept safe. Consider both working hours and after hours
security. During working hours what steps are taken to screen visitors? Are visitors (including
contractors) required to wear identification badges? Have staff been instructed to query
strangers on their presence? Are steps taken to segregate information centres from offices?
12.1.1 LAYOUTS
Layouts of each building showing points of entry / exit, key installations like computer rooms,
and communication centres, should be shown. A separate plan showing the layout of the
computer room and the location of the building in relation to other buildings in the area should
also be drafted.
12.1.2 LOCKS
Ensure all external windows and doors are fitted with locks (preferably key operated dead
locks for doors) and that consideration be given to keeping external doors that are not used
by the public locked during the day. Sometimes doors are left unlocked when only a few staff
use the entrance and they could be issued with a key or key card. Ensure that procedures are
put in place whereby a staff member or their delegate is designated to close the office at
night. Ensure that access to the computer room is strictly controlled and only authorised staff
have access. A procedure should be put in place to ensure that keys are recovered from staff
when they cease employment and safe combinations changed.
12.1.3 INTRUSION ALARMS
If the office is vulnerable to intrusion or vandalism has consideration been given to the
installation of security alarms to control against overnight break-ins. Burglars often set fire to
premises to cover up their crime so not only is valuable equipment stolen but the whole
building could be lost. If intrusion alarms are fitted then details should be given here as to the
type of alarm, the maker, positioning of the detectors and the control panel, the security
monitoring company, and which employee is responsible if the alarm is activated.
d:\106738987.doc
13/21
12.2 FIRST AID
Adequate first aid kits must be supplied to all offices in accordance with the Workplace Health
and Safety Act 1995. Trained first aid officers must also be available, and details should be
given here of the emergency response procedures and training. For example, what should be
done if a staff member suffers a heart attack.
12.3 FIRE PROTECTION
Adequate fire protection is critical as it involves the protection of the lives of employees,
students and visitors. Whilst adequate fire protection might have been initially installed, are
steps taken to ensure the protection is maintained? For example, are fire exit doors clearly
marked and free of obstruction? Are extinguishers marked to show the type of fire they are to
be used on? Are extinguishers clearly visible and properly mounted on walls? Are staff trained
in the use of extinguishers?
12.3.1 FIRE ALARMS
State here what fire alarms if any have been installed and how they are activated and how
they work.
12.3.2 FIRE EXTINGUISHERS / HOSES
State how many extinguishers / hoses are located in each building and display in a prominent
place a layout plan for extinguishers. Ensure that service agreements are in place for the
regular maintenance of extinguishers and hoses and that the service is carried out.
12.3.3 FIRE DRILLS
State here the procedures in relation to fire drills i.e. the person responsible, frequency, staff
induction procedures. (see also 12.7)
12.3.4 GENERAL FIRE SAFETY
Ensure that all exits are properly marked and properly illuminated; state who is responsible for
ensuring all emergency exits are checked to ensure there are no obstructions; ensure that all
work areas have emergency back up lighting and alarms fitted, and ensure all electronically
operated doors return the lock to the neutral position if the power fails. (see also 12.7)
12.4 POWER
What procedures are in place to ensure the facility is provided with continuous power supply
where necessary. Consideration must be given to the computer room and refrigeration
equipment including freezers.
Conduct regular electrical safety checks.
d:\106738987.doc
14/21
12.5 DOCUMENT SECURITY
What procedures are in place to protect the University’s sensitive documents. Issues to
consider include:
 Classification of documents
 Document security
 Fire-proof safe for vital documents and records
 Shredding confidential documents
 Forwarding documents
12.6 COMPUTER SYSTEMS
Ensure documentation for the following are kept up-to-date at the work-place and off-site:










Procedures
Systems
Network Diagram(s)
include all PCs, servers, switches
include all IP addresses
Detailed Equipment / Asset List
PCs
(incl. specifications, operating system versions, software versions, data held locally)
Servers
(incl. specifications, configuration, operating system versions, patches, domain names,
database versions, software versions, disk layouts, disk contents)
Backups
Printers
Fax machines
Copiers etc.
Avoid having procedures or systems knowledge vested in a single individual.
Ensure virus control procedures are in place and that the latest version of detection software
is maintained.
Ensure that operating systems and application software as well as data are backed-up.
Ensure latest backup software is stored off-site.
Use change control procedures.
Ensure correct access levels are set and maintained at database and application levels for
users, including support staff.
Issue instructions to staff regarding the protection of information. Staff should be instructed as
a minimum:
 Not to write down passwords
 Not to disclose passwords
 To log off when not at their terminals
 Not to disclose confidential information
 To use password protected screen savers
d:\106738987.doc
15/21
12.7 EMERGENCY ACTION PLAN
Determine whether your location is covered by an emergency action plan. If a plan has been
completed details should be given here including the name of the emergency response
coordinator. If a plan has not been completed urgent action should be taken to complete one.
13. PREPAREDNESS
13.1 EMERGENCY TELEPHONE NUMBERS
A list should be compiled of all emergency telephone numbers and staff instructed on the
steps to take in an emergency situation. Some locations have protective security officers on
duty and these officers or floor wardens are generally the first point of contact for staff in the
case of an emergency. The numbers you should consider include:
 Police
 Doctors
 Fire Brigade
 Ambulance
 Hospital
 Utility suppliers - electricity, gas, water, telephone
 Department of Environment
 State Emergency Services
A support contact details list should also be maintained at the work-place and off-site. The list
should denote who to contact for what service; details of maintenance or service level
agreements; out-of-hours support arrangements. This list could include:
 Hardware suppliers
 Software suppliers
 UQ Information Technology Services (ITS)
 UQ Security
 UQ Property & Facilities
 Suppliers, banks, insurers,
 QTAC, DETYA
13.2 EMPLOYEE DETAILS
An organisation chart of the Faculty / Department / Section covered by the plan should be
included.
For each member of the organisation covered by the plan, the following should be maintained:
 Direct work telephone number
 Work facsimile number
 Work e-mail address
 Mobile phone number
 Pager number
 Home address
 Home telephone number
 Home e-mail address
d:\106738987.doc
16/21
13.3 VENDOR INFORMATION
Provide here information on suppliers / vendors. Examples of the types of vendors that should
be considered include:
 Real estate agents(for office space)
 Equipment hire companies
 Car and truck rental companies
 Taxi companies
 Suppliers of emergency equipment (including SES)
 Transport companies / removalists
 Computer supply companies
 State Government security
 Electrician and plumber
 Office stationary suppliers
 Office equipment hire and retail
13.4 ANALYSE WEAKNESSES
List services; determine needs; identify resources.
Analyse weaknesses by comparing resources needed with resources available. Any
resources that are not available represents a weakness that will have to be addressed. List all
the services provided to your customers and rank services in order of priority. After compiling
your list of services determine what facilities, equipment, staff and other resources you will
need to provide within
24 hours / 3 days / 1 week / 2 weeks / longer.
Once you have determined the resource requirements compile a list of resources available.
For example the Faculty / Department / Centre may be able to use office space belonging to
another Faculty / Department / Centre. If office space cannot be found at another University
department, approaches will have to be made to local real estate agents or local clubs or
service organisations to determine if suitable space is available.
13.5 OFFSITE STRATEGY
There is no point developing detailed disaster plans and keeping data back-ups if all the
information is kept at one location which is lost in a fire. Give details here of the offsite
storage of records and information. What information is stored, where is it stored, what
security is provided, how do you gain access. Records that should be stored in a secure
offsite location include:
 up-to-date disaster recovery plan;
 backup tapes / disks (incl. backup software, operating system(s), database and
application software);
 business procedures documentation;
 computer system documentation;
 operational manuals;
 special and everyday stationery;
 phone books - UQ and general;
 first aid kit.
d:\106738987.doc
17/21
13.6 BACKUP SITE STRATEGY
Consideration must be given here to the establishment of an offsite facility. Some large
organisations set up hot / cold sites. A hot site is one that is fully equipped and ready to use. It
would involve having a separate computer room with raised floor and air conditioning and
computers standing idle.
Few organisations can afford such an arrangement so consideration is given to the
establishment of a cold site that provides only the basics - an empty room with air conditioning
and power but without computers. Ensure that cabling is in place to enable computers to be
plugged in and connected to the network. (see also 13.7.2)
A number of service organisations also provide computer services on a shared basis, whilst
consideration could also be given to entering a cooperative agreement with another University
department to share the use of a computer. Caution must be exercised to ensure the facilities
are not being shared with too many users rendering them useless in a major disaster affecting
a large area.
13.7 LOGISTICAL CONSIDERATIONS
Thought must be given here as to what resources will be required after the disaster.
13.7.1 CONTROL CENTRE
A control centre or ‘command post’ must be available so the disaster recovery team can meet
after the disaster has occurred. The control centre should be safe, accessible and as close to
the office as reasonably practical to ensure it would not be affected by the disaster.
Select a number of locations but state clearly in the plan the number one site and if it cannot
be used the next desirable site. Enquires should be made of other University offices to see if
space is available but if this is not practicable, consideration will have to be given to rented
office space.
13.7.2 OFFICE SPACE
Consideration must be given to office space requirements. Again check with University offices
but enquiries could also be made of municipal councils, clubs, schools and local real estate
agencies. For a small fee some agencies will ensure that office space is available for a limited
time and notification given if the space is to be let. (see also 13.6)
13.7.3 CREDIT CARDS
Key members of the Disaster Recovery Team and those who are responsible for purchasing
emergency supplies should be issued with corporate credit cards.
13.7.4 EMPLOYEE NOTIFICATION
Thought must be given as to how employees are to be notified about the disaster and whether
or not they will be required to report for work. Arrangements should be made with the local
radio, television stations, and newspapers and details worked out in advance as to who will
contact the media and what will be said.
d:\106738987.doc
18/21
13.7.5 TRANSPORT
If it is envisaged that the temporary office facilities will be some distance from the existing
office then consideration should be given to having arrangements in place to transport staff to
the new location if public transport facilities are poor.
13.7.6 HOUSING
If it is envisaged that staff will be moved to temporary sites at other University locations then
consideration must be given to providing temporary housing for staff.
13.8 DISASTER RECOVERY TEAMS
Consideration will need to be given here as to what disaster teams are required. Typical
teams may include the following:
 Management Group
 Management Support
 Computer Operations
 Communications
 Records Management
 Accounting
 Public Relations
 Transportation
 Emergency Response
 Security
 Damage Assessment / Salvage Supply
Specific personnel must be recruited for these tasks and someone selected to lead the team.
Normally another member of the team will be selected as the alternate leader. Once the
teams have been selected they will have to give consideration as to what specific tasks they
will be required to carry out in the case of an emergency.
For example, the records management team would need to consider such things as retrieving
manuals from off-site storage; notifying Australia Post, courier, and delivery services to hold
all incoming mail and other goods; arrange collection of mail and goods; identify new address
and location of staff for mail and correspondence; notify Australia Post and couriers of new
address.
Communications team would need to ensure that telephones are diverted, that new fax and
phone services are installed and that advice on new telephone and fax numbers is
disseminated to clients.
14. RESPONSE
14.1 DECLARATION OF A DISASTER
An estimate must be made of the expected downtime following an emergency situation. Prior
to this a decision must be made as to what downtime would constitute a disaster and the
need to invoke the full disaster plan.
Whenever it is expected that the interruption to University services will exceed the
predetermined maximum allowable downtime established by the DRMG then the DRMG
administrator or next in the order of succession can declare a disaster.
d:\106738987.doc
19/21
If it is estimated that downtime will be less than that which would constitute a ‘disaster’ then
only part of the plan would need to be invoked and only the action team coordinator of the
area affected will need to be involved.
14.2 SECURITY
If applicable, immediate steps must be taken to secure the premises to control unauthorised
entry to the building and to prevent further damage or loss of assets from pilfering. If approval
is given by emergency personnel on duty to enter the building, staff should ensure that vital
records and valuable equipment are locked away where practicable. Stress however that life
and personal safety are of utmost consideration here.
14.3 ASSESS DAMAGE
An assessment must be made of what is damaged and to what degree, but again spell out
that life and personal safety are of paramount importance. An assessment will also have to be
made of the cost of providing services on site and at the alternative sites.
14.4 DETERMINE DOWNTIME
Assessments will need to be made of the length of time before on-site facilities will be back in
operation, how long it will take to establish operations at the alternative sites, and to gain full
recovery. The expected downtime must be compared to the maximum allowed in order to
determine if a disaster is to be declared and the full disaster plan is to be put into operation.
14.5 ASSEMBLE TEAMS
Once a disaster is declared the various disaster teams will need to be assembled using the
plans established and set out in a 'communication calling tree'. The teams will assemble at
the designated control centre (command post) or back-up site depending on the
circumstances. The various teams will now implement their individual plans.
14.6 NEWS RELEASE
Information to employees, clients, and the general community is vital and should be
disseminated as quickly as possible.
14.7 APPROVE EXPENDITURE AND BUDGETS
Once damage and downtime estimates have been completed, emergency expenditure and
forward budgets will have to be approved by the Management Group. Ideally a separate cost
code should be established to clearly identify the cost of the disaster.
15 RECOVERY
Plan, Schedule and Implement Recovery
Using the various recovery teams commence recovery strategies. After a predetermined time
has elapsed a decision will need to be taken as to whether it is feasible to return to the
original site, stay in the back-up site for an extended period or move to a new site.
d:\106738987.doc
20/21
The decision regarding the feasibility of returning to the old site should be made having
regard to expert advice. The building may have been so badly damaged that it will have to be
demolished and rebuilt or whilst not completely destroyed may have outgrown its use and it
may be desirable to move to a new location. Once this decision is taken the disaster recovery
mode is cancelled and the normal management structure is reinstated.
16 VALIDATION AND TESTING
The disaster recovery plan should be tested at least annually. The purpose of the test is to
familiarise all staff with the plan, to enable each member of the disaster recovery teams to
practice their role in recovery, enable any weaknesses to be revealed before the actual
disaster hits, and to document preparedness.
Have each team simulate what they would do in the test and have someone from the senior
management team take notes. After the test is completed, review the notes to determine if the
teams had the correct approach to the disaster, or if the plans need review.
d:\106738987.doc
21/21
Download