{
	"id": "2bbeaaab-db33-4533-953e-f28b0cbc960d",
	"created_at": "2026-04-06T00:08:35.325809Z",
	"updated_at": "2026-04-10T13:11:57.082616Z",
	"deleted_at": null,
	"sha1_hash": "99273e5fd2a7046f0fa99d8931679cd7dac755d6",
	"title": "IT Disaster Recovery Plan",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 50949,
	"plain_text": "IT Disaster Recovery Plan\r\nArchived: 2026-04-05 18:34:56 UTC\r\nIT Recovery\r\nIT Disaster Recovery Plan\r\nData Backup\r\nData Backup Plan\r\nResources\r\nBusinesses large and small create and manage large volumes of electronic information or data. Much of that data\r\nis important. Some data is vital to the survival and continued operation of the business. The impact of data loss or\r\ncorruption from hardware failure, human error, hacking or malware could be significant. A plan for data backup\r\nand restoration of electronic information is essential.\r\nAn information technology disaster recovery plan (IT DRP) should be developed in conjunction with the business\r\ncontinuity plan. Priorities and recovery time objectives for information technology should be developed during the\r\nbusiness impact analysis. Technology recovery strategies should be developed to restore hardware, applications\r\nand data in time to meet the needs of the business recovery.\r\nIT Recovery\r\nPriorities for IT recovery should be consistent with the priorities for recovery of business functions and processes\r\nthat were developed during the business impact analysis. IT resources required to support time-sensitive business\r\nfunctions and processes should also be identified. The recovery time for an IT resource should match the recovery\r\ntime objective for the business function or process that depends on the IT resource.\r\nRecovery strategies should be developed to anticipate the loss of one or more of the following system\r\ncomponents:\r\nComputer room environment (secure computer room with climate control, conditioned and backup power\r\nsupply, etc.)\r\nHardware (networks, servers, desktop and laptop computers, wireless devices and peripherals)\r\nConnectivity to a service provider (fiber, cable, wireless, etc.)\r\nSoftware applications (electronic data interchange, electronic mail, enterprise resource management, office\r\nproductivity, etc.)\r\nData and restoration\r\nDeveloping an IT Disaster Recovery Plan\r\nhttps://www.ready.gov/business/implementation/IT\r\nPage 1 of 3\n\nBusinesses should develop an IT disaster recovery plan. It begins by compiling an inventory of hardware (e.g.\r\nservers, desktops, laptops and wireless devices), software applications and data. The plan should include a strategy\r\nto ensure that all critical information is backed up.\r\nIdentify critical software applications and data and the hardware required to run them. Using standardized\r\nhardware will help to replicate and reimage new hardware. Ensure that copies of program software are available to\r\nenable re-installation on replacement equipment. Prioritize hardware and software restoration.\r\nDocument the IT disaster recovery plan as part of the business continuity plan. Test the plan periodically to make\r\nsure that it works.\r\nData Backup\r\nBusinesses generate large amounts of data and data files are changing throughout the workday. Data can be lost,\r\ncorrupted, compromised or stolen through hardware failure, human error, hacking and malware. Loss or\r\ncorruption of data could result in significant business disruption.\r\nData backup and recovery should be an integral part of the business continuity plan and information technology\r\ndisaster recovery plan. Developing a data backup strategy begins with identifying what data to backup, selecting\r\nand implementing hardware and software backup procedures, scheduling and conducting backups and periodically\r\nvalidating that data has been accurately backed up.\r\nDeveloping the Data Backup Plan\r\nIdentify data on network servers, desktop computers, laptop computers and wireless devices that needs to be\r\nbacked up, along with other hard copy records and information. The backup plan should include regularly\r\nscheduled backups from wireless devices, laptop computers and desktop computers to a network server. Data on\r\nthe server then can be backed up. Backing up hard copy vital records can be accomplished by scanning paper\r\nrecords into digital formats and allowing them to be backed up along with other digital data.\r\nData should be backed up frequently. The business impact analysis should evaluate the potential for lost data and\r\ndefine the “recovery point objective.” Data restoration times should be confirmed and compared with the IT and\r\nbusiness function recovery time objectives.\r\nResources for Information Technology Disaster Recovery Planning\r\nComputer Security Resource Center - National Institute of Standards and Technology (NIST), Computer\r\nSecurity Division Special Publications\r\nContingency Planning Guide for Federal Information Systems - NIST Special Publication 800-34 Rev. 1\r\nGuide to Test, Training, and Exercise Programs for IT Plans and Capabilities – NIST Special Publication\r\n800-84\r\nBuilding An Information Technology Security Awareness and Training Program - NIST Special Publication\r\n800-50\r\nhttps://www.ready.gov/business/implementation/IT\r\nPage 2 of 3\n\nSource: https://www.ready.gov/business/implementation/IT\r\nhttps://www.ready.gov/business/implementation/IT\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.ready.gov/business/implementation/IT"
	],
	"report_names": [
		"IT"
	],
	"threat_actors": [],
	"ts_created_at": 1775434115,
	"ts_updated_at": 1775826717,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/99273e5fd2a7046f0fa99d8931679cd7dac755d6.pdf",
		"text": "https://archive.orkl.eu/99273e5fd2a7046f0fa99d8931679cd7dac755d6.txt",
		"img": "https://archive.orkl.eu/99273e5fd2a7046f0fa99d8931679cd7dac755d6.jpg"
	}
}