+1-415-670-9189
info@expertsmind.com
Policy for business continuity for white house securitystaff
Course:- Management Information Sys
Length: 1500 Words
Reference No.:- EM13751625




Assignment Help
Assignment Help >> Management Information Sys

Business Continuity Plan

Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for action. Address each item in the policy headings below:

The information to use as a resource for your policy is provided below (taken from SunGard Availability Services at www.sungardas.com, limited use for educational purposes) and also in your reading for the week (See Appendix 1 for policy information).

Plan purpose: for example, to allow company personnel to quickly and effectively restore critical business operations after a disruption.

Plan objective: for example, to identify the processes or steps involved in resuming normal business operations.

Plan scope: for example, the work locations or departments addressed.

Plan scenarios addressed: for example, loss of a primary work area, loss of IT services for a prolonged period of time, loss of workforce, etc.

Plan assumptions: for example, you may want to call out the number of work locations impacted at any given time that key personnel are available for any recovery efforts, or any assumptions you may have made about vendor or utility service availability.

Answered:-

Verified Expert


Preview Container content

Introduction, Plans, Roles and Responsibilities of Manager and Staff, Incidents and Scenarios, BCP Coordination and Approval, Critical Equipments and resources, Additional Component, Dissemination



Contents
Introduction 3
Management of Business Continuity Plan 4
Business Impact Analysis 4
Disaster Recovery 4
Business Continuity Planning 4
Culture 4
Testing 5
Role and Responsibilities 5
Business Continuity Manager 5
White House Staff Members 6
Incidents and Scenarios 6
Timeline and Phases 7
BCP Coordination and approval 8
Critical Equipments and Resource Requirements 8
Additional Components 8
Dissemination 9
Conclusion 9
References 9


Introduction
Business Continuity Policy means the plan which is made in order to continue business operation when the business site is adversely affected by some natural calamities like flood, storm, earthquake, fire, communication failure or by some terrorist attacks and crimes. This plan explains the measures taken by the organization to recover its business operation or operation transferred to another business site. Business continuity plans are made to recover from both short term and long term disasters.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Management Information Sys) Materials
Identify a case study in which a response team was organized to handle a security breach within information systems. The case you select must include the postmortem about th
Fundamentals of Analytics and Business Intelligence - Provide the answer to any one (1) of the questions from the Questions for Discussion OR Exercises section of chapter 13
Does the information media have social responsibility? If yes, in what ways? If not, why not? What is the role of the information and news media in the shaping of political op
Define, describe and identify the elements of (a) good Data Backup Planning, (b) good Disaster Recovery Planning, and (c) good Business Continuity Planning. Be sure to ident
Despite increases in computing power and network bandwidth, many user interfaces are still largely text oriented, with a few icons and illustrations. Discuss at least three
Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have disc
Using what you learned from Part I, create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats f
What are the privacy laws related to Information Technology use and how do they impact you personally? Why and how it is used, the legal issues surrounding its use, and impac