The Trust Network is divided among the data centers with the separation of responsibilities.
- Data Center 1
- Data Center 2
The Trust Information Technology department is presently operates on Monday to Friday, excluding the Bank Holidays. In addition to that, the backups are only being executed at the end days of services. All Trust organized document servers are right now subject to full reinforcements to attractive tapes. Those tapes are held in flame safes that are situated, as a base, in partitioned fire zones from their related server rooms. Every server room has a nearby arrangement of reinforcement methods and these are liable to occasional survey.
The policy is covering server rooms as well as the server regarding networked files within those:
- Data Center 1
- Data Center 2
Purpose of Policy:
The purposes of the policy are as following.
- To guarantee that the information hung on the arranged document servers has its respectability and accessibility held in supporting business operations
- To help the Trust's measurable preparation position in ensuring the Trust, its staff and clients of Trust administrations through the accessibility of dependable computerized confirm accumulated from the organized record servers that are inside the extent of this Policy.
Trust Policies That Are Linked:
The following trust policies are supported by the Data Backup and Restoration Policy.
- Management Policy Storing
- Security Policy Regarding Security
Regulatory and Legal Obligations:
The Trust will obey with the below legislations as adequate.
- Freedom of Information Act 2000
- The Data Protection Act (1998)
- The Data Protection (Processing of Sensitive Personal Data) Order 2000.
- The Copyright, Designs and Patents Act (1988)
- The Health and Safety at Work Act (1974)
- The Computer Misuse Act (1990)
- Access to Health Records Act (1990)
- Regulation of Investigatory Powers Act 2000
- Human Rights Act (1998)
- Health & Social Care Act 2001
The IT Technical Team Leaders are to routinely answer to the Associate Director of IT on operational administration and checking procedures, concerns and issues. The IT Technical Team Leaders will report any data administration or security worries to the Information Security Manager. Where there are breaks of classification or information misfortune then the Trust Incident Management Policy is to be taken after.
The Associate Director of IT will answer to the Chief Finance Officer on the sufficiency and viability of the operational administration and checking and any worries and issues. Any important data administration or security issues are to be accounted for to the Information Governance Steering Group (IGSG) and through that channel to the Senior Information Risk Owner (SIRO).
The Data Backup and Restoration Policy will be a topic to periodic audit through External and Internal Audit as a segment of the Trust audit assurance structure.
The Data Backup and Restoration Policy will be a topic to periodic review and prior to any important IT architecture or adequate regulatory alterations
Roles and Responsibilities:
- To utilize those servers and related shared system drives as the essential stockpiling archive for every single electronic report utilized as a part of supporting Trust business operations;
- To not routinely hold electronic records utilized as a part of supporting Trust business operations on the nearby hard drives of desktop PCs. Where such documentation is held it is to be on an impermanent premise, to be duplicated to the arranged record servers at the most readily accessible open door, and the nearby hard drive duplicate erased in the wake of watching that the organized record server duplicate is available and is finished and precise;
- To guarantee that any compact media stockpiling gadgets used to hold electronic reports supporting Trust business operations are synchronized to the system record servers all the time to hold information uprightness. Information hung on these gadgets ought to be on a transitory premise, be duplicated to the arranged record servers at the most readily accessible open door, and the gadget duplicate erased subsequent to watching that the organized document server duplicate is available and is finished and precise. Versatile media stockpiling gadgets incorporate portable workstations, tablets, cell phones, DVD's and USB memory sticks.
Administrators of information Assets:
- Where frameworks are being hung on the arranged document servers, to liaise with the IT Technical Team Leaders to concur a reinforcement/reestablish methodology for that framework and its survey;
- Where the framework is classed as a huge framework to liaise with the Information Asset Owner to guarantee the reinforcement/reestablish procedure is satisfactory.
Dynamic insurance gatherings, Servers concealed and Data upheld for each server in the Trust nearby IT server homesteads are recorded in the SABP Systems Documentation and Serial Numbers spreadsheet situated in the IT shared drive subfolder: Technical SupportAdminAD Master System Information. This spreadsheet is secret key ensured and available just to Technical Team Leaders and Senior IT Support Engineers. This spreadsheet is refreshed each time another server is actualized, old server decommissioned or any progressions made to the reinforcement technique for any server.
DPM naturally messages the chose clients in the IT Technical group instructing with respect to issues and mistakes when they happen. A Tape Management Report is consequently messaged to chose Technical colleagues. This report exhorts what tapes are required to be moved offsite and which tapes can be come back to the DPM server
Thompson, N., Ravindran, R. and Nicosia, S., 2015. Government data does not mean data governance: Lessons learned from a public sector application audit. Government information quarterly, 32(3), pp.316-322.
Sittig, D.F., Gonzalez, D. and Singh, H., 2014. Contingency planning for electronic health record-based care continuity: a survey of recommended practices. International journal of medical informatics, 83(11), pp.797-804.
Hollister, A. and Ferrier, P., 2015. EA-ISP-007-Information Handling Policy. policy, 17, p.02.
Bartock, M., Cichonski, J., Souppaya, M., Smith, M., Witte, G. and Scarfone, K., 2016. Cybersecurity Event Recovery. NIST Special Publication, 800, p.184.
Rao, U.H. and Nayak, U., 2014. Data Backups and Cloud Computing. In The InfoSec Handbook (pp. 263-288). Apress.
Amvrosiadis, G. and Bhadkamkar, M., 2015, July. Identifying Trends in Enterprise Data Protection Systems. In USENIX Annual Technical Conference (pp. 151-164).