IT Continuity, Backup and Recovery Policy
IT Continuity, Backup and Recovery Policy
RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY
Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and
Business Resumption Policy
Policy Holder Director, Information
Technology
1. Policy Statement
1.1. Grande Prairie Regional College (“GPRC” or “the Institution”) business operations rely on stable
and constantly available Information Technology (“IT”) systems. Effective recovery plans are in
place to ensure that IT services can be resumed within required recovery times in the event of a
system disruption or disaster.
2. Background
2.1. A disruption, loss, damage or compromise of IT systems and data may negatively impact GPRC
reputation and operations, resulting in significant costs to recover. Formal and comprehensive IT
continuity, backup and recovery controls are necessary to mitigate such risks.
3. Policy Objective
3.1. The objective of this policy is to define formal requirements for IT continuity, backup and
recovery, in order to prevent or mitigate the risk of IT system disruption or disaster, and allow for
an efficient recovery of IT services and data in a timely manner.
4. Scope
4.1. This policy applies to all IT systems or applications managed by GPRC that store, process or
transmit information, including network and computer hardware, software and applications.
4.2. This policy does not apply to information that is stored locally by users on desktops, laptops,
tablets and mobile phones. Device owners are responsible for appropriate backup of the data
stored locally on their mobile devices, with the exception of data synchronized with the device
and stored on GPRC servers (such as Outlook emails and contacts).
5. Definitions
5.1. A BCP “Business Continuity Plan” is a comprehensive plan describing the strategy and
necessary activities to recover from a significant disruption of business operations, including by
relocating part or all personnel and system resources, making urgent decisions, and conducting
business operations with diminished or altered capabilities.
5.2. A DRP “Disaster Recovery Plan” is a documented set of procedures describing the key activities
that are necessary to recover minimum IT services, applications and data to continue critical
business operations, and to fully recover such operations after a disaster affecting normal IT
services.
Page 1 of 8
IT CONTINUITY, BACKUP AND
RECOVERY POLICY
5.3. A RTO “Recovery Time Objective” refers to the maximum tolerable length of time that a
computer, system, network, or application can be down after a failure or disaster occurs.
6. Guiding Principles
6.1. IT systems that are critical to Institution activities must be clearly identified, as well as the
potential risks of disruption that apply to them.
6.3. Recovery Time Objectives (“RTOs”) of critical systems must be formally defined as per the
business needs.
6.4. Procedures and technology must be in place and tested regularly to ensure:
6.4.1. Prevention against IT system disruption.
6.4.2. Regular and comprehensive backup of critical systems, applications and data.
6.4.3. Timely recovery of critical systems, in line with the business expectation or RTO.
Stakeholder Responsibilities
Page 2 of 8
IT CONTINUITY, BACKUP AND
RECOVERY POLICY
8. Exceptions to the Policy
8.1 Exceptions to the guiding principles in this policy must be documented and formally approved by
the IT Director.
10.1 Amendments to this policy will be published from time to time and circulated to the Institution
community.
Page 3 of 8
IT CONTINUITY, BACKUP AND RECOVERY
APPENDIX 1
Page 4 of 8
IT CONTINUITY, BACKUP AND RECOVERY
APPENDIX 1
2. Preventative Requirements
2.1. Protection from power failures or other electrical anomalies must be in place, including
where possible:
2.1.1. Multiple power feeds or power supplies.
2.1.2. Uninterruptible Power Supplies (UPS) with sufficient running time for:
2.1.2.1. Switching to an alternative source of power
2.1.2.2. Backing-up IT systems or transferring data
2.1.2.3. Clean shut down of all IT systems. If equipment supporting critical business
operations is not capable of auto-shutdown, then the equipment shall be
powered down in accordance with an emergency shutdown procedure.
2.1.3. Back-up generators or other source of alternate/secondary power.
2.1.4. All power to critical IT infrastructure shall be filtered to provide a source of “clean”
power.
2.1.5. All power supply equipment must be maintained, regularly checked and tested in
accordance with the manufacturer’s recommended instructions or procedures.
2.1.6. Surge protection shall be installed, wherever possible, to all buildings housing critical
IT processing or infrastructure equipment.
2.2. Protection from environmental hazards must be in place, including where possible:
2.2.1. Hazardous or combustible materials shall not be stored within data-centres or data-
rooms.
2.2.2. Appropriate equipment must be installed in data-centres or data-rooms to monitor and
react to fire, flood, high temperature, vibration, air quality and dust hazards.
2.3. Systems redundancy and high-availability equipment must be in place where appropriate.
3. Backup Procedures
Page 5 of 8
IT CONTINUITY, BACKUP AND RECOVERY
APPENDIX 1
3.1.5. A Backup Manager must be designated with the responsibility of managing, operating,
and troubleshooting backup solutions, as well as answering any requests related to
backups and recoveries.
3.1.6. Quality and integrity of backups must be verified at the end of each backup operation.
3.1.7. Backup systems must be configured to automatically generate email alerts, warnings
and status updates to the Backup Manager where possible.
Page 6 of 8
IT CONTINUITY, BACKUP AND RECOVERY
APPENDIX 1
3.3.8. Every physical transfer of backup media off-site must be formally tracked with the
following criteria:
3.3.8.1. Date and time of transfer.
3.3.8.2. Origin and destination locations.
3.3.8.3. Name of the person and organization taking the responsibility of the
transfer.
3.3.8.4. Detailed inventory of the media being transferred.
3.3.9. Backup media stored off-site must be encrypted; where this is not possible,
mitigating controls should be considered.
3.3.10. Security controls must be implemented to prevent access to backup management
systems, backup files and backup media, including:
3.3.10.1. Physical and logical access restriction based on the user role and
responsibilities.
3.3.10.2. Changing all default login and passwords.
3.3.10.3. Logging of: system access; changes to system configuration, system files
and user access rights; and access to the log files.
4. Recovery
Page 7 of 8
IT CONTINUITY, BACKUP AND RECOVERY
APPENDIX 1
5. Roles and Responsibilities - Procedures
Stakeholder Responsibilities
Page 8 of 8