Alternate Data Center Location To Operate From
Alternate Data Center Location To Operate From
Students tend to do poorly on this assignment and the main reason I’ve noticed for this is the
content does not address the requirements. I am not looking for you to explain/define a plan or
tell me options of what you could do in a disaster for each item. A plan should detail exactly what
you will do in a disaster. Consider that management is not looking to get information to make a
decision, the decision is made in advance and put into the plan. That was, there’s no debate as to
what to do when disaster strikes. I am looking for where and how you will have an alternate site
ready, where and how you will get replacement equipment quickly and with special applications,
how you plan to backup so you can safely recovery quickly and the methods you will use to let
the staff what do to through all phases from where to show up to work to when they can return to
the original clinic and everything in between such as daily status of the situation.
You need to specifically address how to quickly accomplish the following to enable operations
within 24-48 hours:
An alternate data center location to operate from
Replacement of damaged/lost servers, workstations and laptops and business
applications installed on them.
Backup, Security and Restoration of office and patient information
Methods of communicating with staff during the disaster
In the event of a disaster, all systems will connect to the alternate data center that hosts a redundant
backup of the four primary servers located within the clinic. This will allow all unaffected systems and
devices to access the same data that the primary servers host. The alternate data center is configured
as a mirrored version of the primary servers located on-site. While data access may be slower due to
bandwidth restrictions and remote connection, it will allow the unaffected systems and devices to
access the necessary data for basic business operations while the affected servers and/or
workstations are being replaced/restored.
How are damaged/lost servers, workstations, laptops, and business applications going to be replaced:
The hardware impacted by the disaster will be replaced immediately through the contract with the
system manufacturer. All servers, workstations, and laptops will be replaced by the manufacturer on a
critical-need basis, designated in the contract as a 4-8 hour replacement. All business applications,
including the medical client applications and the full disk encryption software, will be restored using
the data backups from the off-site data center servers. This restoration will be completed after all
damaged/lost systems are replaced.
All systems and servers are encrypted with full disk encryption and have an incremental backup plan
scheduled on a daily basis. These backups will be stored locally on the data servers, as well as at an
off-site location that provides top-of-the-line security and is accessible remotely only by authorized
accounts in the event of a disaster. This off-site location will be accessed remotely and utilized to
restore all systems in the clinic once the damaged systems are replaced.
Methods of communicating with staff during the disaster:
The methods of communicating with the staff will include calling each staff member and informing
them of the disaster, as well as providing them with information regarding the Disaster Recovery Plan
(DRP). Text messages will be sent out with basic information, as well as necessary contact
information, to the staff members that had previously agreed upon receiving SMS communication.
Emails will also be sent out to all staff members with basic information regarding where they are
working from, how they will be able to operate during the disaster, and any other necessary steps to
ensure business continuity while the Disaster Recovery Plan is being followed. These communications
will also relay daily status updates regarding the disaster and the progress of the DRP. Each of these
communication types will be sent out, in the event that one of the communication methods fails or is
not accessible by staff members. There will not be any sensitive information contained within these
communications, for additional security reasons.