MANAGEMENT OF BUSINESS RECORDS SUCCESSFULL DISASTER RECOVERY PLANNING IN RECORD D I S A S T E R R E C O V E R Y P L A N N I N G I N R E C O R D S MA N A G EME N T MADAM NOR KAMARIAH BT CHIK PREPARED FOR: THE ROLE OF TECHNOLOGY IN DISASTER RECOVERY PLANNING THE ROLE OF TECHNOLOGY IN DISASTER RECOVERY PLANNING WH A T I S D I S A S T E R R E C O V E R Y P L A N N I N G ?
TABLE OF CONTENTS Best Practices for Implementing and Maintaining Disaster Recovery Plan 16 Disaster Recovery Planning Process 13 Components of an Ef ective Disaster Recovery Plan 10 Understand Disaster and their Impacts 05 Editor' s Background 01 Successful Disaster Recovery in Record Management 20 The Role of technology in Disaster Recovery Planning 26 Future Trends and Challenges in Disaster Recovery Planningfor Records 30 Conclusion 32 References 33
Editor's Background 2023 NOOR SYAFIQAH SHAFIE 2021100385 NURUL AISYAH QISTINA HASAN 2021118059 NURULHUDA BINTI DARUS 2021185741 NUR SYAZWI ARISYA ANUAR 2021102911 PA G E O N E | I M R6 5 2
DISASTER RECOVERY PLANNING It also will act as a recover plan that will function as fast as it could to try and save anything that is left for the business. This disaster recovery team can be considered as an important asset to the organization. However, it is often find that it is not cheap to set up a disaster recovery plan as a complete operation. Nevertheless, businesses should invest to this planning since it will help to protect the organization's data. What is Disaster Recovery Planning and how important it is to the businesses? In today's world of modernization, it is very complex with a lot of uncertainties. Business management can be considered tricky and it need us to be prepared for all the possibilities that might befall onto the organization. Businesses are depending heavily on technologies in storing the data as well as private information of the organization. This is where this concept of disaster recovery will come into action. Disaster Management and Recovery planning is very focus in formulate a meticulously detailed plan that will expected various possible risks and disasters that might occur to the business. This planning will outline the actions to be taken in order to protect the systems and assets of the organization. PA G E TWO | I M R6 5 2
Records management jobs comprise of the creation, receipt, maintenance, use as well as the disposal of records. These records contain various documents involving business transaction and vital to the operation of the organizations. Records management also can be known as an established theory in ensuring the systematic management of all records and the information inside throughout their lifecycle. Records management is important In this section of the article, we will discuss more regarding records management. What is records management? Records management is the control and administration of digital or even paper records. RECORDS MANAGEMENT to ensure the disaster recovery planning from being used and implemented by the business. A well established records management is the key for the organization. Important documents such as electronic records that are susceptible to hazards must be kept in a secured place so that it can be easily retrieved when needed. These well designed disaster recovery plan will prevent the organization from being panic when any incidental accident occurs. PA G E T H RE E | I M R6 5 2
PA G E F O U R| I M R6 5 2
Understanding Disasters and Their Impact on Records. PA G E F IVE | I M R6 5 2
A disaster is an unexpected event which has destructive consequences for the large and small scale events and it is depends on the value of lost information (Oketsang, 2016). It can be categorized into two which are natural and manmade disasters. Natural disasters are earthquakes, floods, windstorms and bushfires. These natural disasters usually come without a warning and it happens in the blink of an eye. Man-made disasters on the other hand is caused by the people themselves. For instance, criminal incidents that happen such as thief, espionage and war would cause the records to be completely lost. It also can happen by the poor storage conditions that are not suitable that eventually lead to the records destruction. TYPES OF DISASTERS PA G E S IX | I M R6 5 2
POTENTIAL RISKS TO RECORDS DURING DISASTER The records might be stolen Accidental loss due to human error. Natural decay of the materials of records. There are many potential risks that could happen to the records during the occurence of disaster. The first potential risk is the records might be stolen by irresponsible parties. Secondly, the records might be loss due to human error. The records might have been misplaced by the one of the employees and cannot be find by another employees that needed the said records. Last but not least, natural decay that may happen to the records. The records may have been eaten by the pesticides. In the midst of chaos and disaster, anything can happen to the records of the organization. PA G E S EVE N | I M R6 5 2
IMPACT OF DISASTERS TO RECORDS OF NATIONAL ARCHIVES OF SOUTH EAST, NIGERIA All archival records have often been threatened by disasters which are caused by nature and human. In the study that I have read the most frequent disaster happening in the archives is power failure. This come out as not surprising seeing that power failure has always been a major issue in Nigeria in general. The findings of this study is that some of the records need heat from the light despite in not getting any. This lead to the destruction of records in said archived. The respondents in this research also recognized the human made disasters that happening in the archive such as; stealing, vandalism, fire as well as water leakages. The poor maintenance in the organization of the archive has lead to the loss of the records. Other than that, there is also a natural disaster that occur such as lightning strike. This disaster can be considered huge since more the 50% respondents that can vouch for it. The impacts on those disasters to the archives' records were found to be gigantic. The disasters destroy important records and delay access to those records. The most exceptional impact is seen to be the destruction of the physical structures, collections and equipment. The findings also shows that there are safety measures put in place at the archives to prevent disaster. These prevent measures include; assessment of suitability of storage methods, assessment of collection location and display as well as regular checks of fire equipment. In order to prevent records from gone missing or loss the national archives must be proactive in ensuring the safety of those records. PA G E E I G H T | I M R6 5 2
PA G E N I N E | I M R6 5 2
Components of an Effective Disaster Recovery Plan Disaster Recovery (DR) is frequently concerned with business considerations rather than IT ones. As a result, it is critical to include all business units and stakeholders in the discussion about business objectives so that we know where to priorities our efforts throughout recovery. Begin by outlining the whole architecture to ensure that all systems are included. Once we have determined what we hare safeguarding, we may create priorities to guarantee the most critical systems and applications are operational first. Secure Backups Documented Business Goals Disaster Recovery (DR) attempts will succeed or fail based on the standard and frequency of backups. Take into account these best practices to keep backups safe and accessible in case we require them in an emergency. Complete Inventory of Hardware/Software/Other Equipment We must consider what resources would need to be recovered while drafting a disaster recovery strategy. Every piece of hardware, software, and peripheral that interacts with networks or is utilized by staff, subcontractors, and suppliers must be thoroughly accounted for. Due to the necessity to take into consideration every onpremise, cloud-based, mobile/BYOD product and technology your organization utilizes, this will be a quite significant undertaking. PA G E T E N | I M R6 5 2
Components of an Effective Disaster Recovery Plan In times of crisis, a skilled DR team is crucial. There is no doubt about who is in charge of which aspect of the recovery operation because each team member has been given a defined responsibility. As a point of contact for stakeholders, this team will also be in charge of communications throughout the crisis. Training employees on emergency response rules and procedures is the responsibility of the disaster response team. Remote Access Disaster Recovery Teams Accessing business data and apps remotely can be a security issue, regardless of whether we're using VPN, RDP, SSH, or another access-control solution. When abrupt COVID-19 worries caused millions of people to work from home, this was made very clear. The worst moment to discover infrastructure can't support secure remote access is in the midst of a crisis. For data to be safely accessed from outside the firewall, security technologies must be updated right away. Set Limits for Downtime and Data Loss We may establish recovery time objectives (RTO) and recovery point objectives (RPO) with a list of the business objectives that have been recorded. These measurements will be used to assess our tolerance for downtime and data loss. In other words, these metrics enable measurement of the period of time an application may be down without significantly harming the company (RTO) and the quantity of data that can be lost before such harm happens (RPO). PA G E E L EVE N | I M R6 5 2
PA G E TWE LVE | I M R6 5 2
DISASTER RECOVERY PLANNING PROCESS 1) Obtain Top Management Support Top management must support and participate in the disaster recovery planning process. Management should be in charge of organizing and overseeing the efficacy of the disaster recovery strategy throughout the organization. A sufficient amount of time and resources must be dedicated to the formulation of an effective strategy. Financial concerns as well as the efforts of all employees engaged might be considered resources. 2) Create a planning group To oversee the creation and execution of the plan, a committee for planning should be established. Participants from each organisational functional area should be represented on the planning committee. Managers of operations and data processing should be important committee members. Also must be determined by the committee is the plan's scope. 3) Conduct a risk analysis A risk analysis and business effect study should be created by the planning committee that covers a variety of potential catastrophes, including natural, technological, and human risks. It is important to conduct an analysis of each organizational functional area to evaluate the probable effect and consequences of various catastrophe scenarios. The security of important papers and records should be assessed as part of the risk assessment process. Fire has often been the biggest hazard to an organization. However, deliberate human devastation should also be taken into account. The "worst case" scenario, which calls for the main building to be destroyed, should be covered by the plan. 4) Set processing and operational priorities. The greatest period of time the department and organization can function without each important system should be calculated by analyzing processing and activities. When a department, computer hub, primary facility, or a combination of these is destroyed or rendered inaccessible, critical needs are the processes and tools required to keep things running. Documenting all the tasks carried out by each department is one way to figure out what resources it truly requires. Following the identification of the key functions, the activities and procedures should be prioritized from vital to important to non-essential. PA G E T H IRT E E N | I M R6 5 2
DISASTER RECOVERY PLANNING PROCESS 5) Figure out Recovery Strategies It is important to investigate and assess the processing options that are most realistic in the event of a catastrophe. All organizational facets should be taken into account, including, facilities, hardware,software,communication, data files, customer services, user operations,management information systems, end-user systems, and other processing processes 6) Collect Information The following resources and documents are recommended for data collection: • A list of backup positions • Important phone numbers • Communications inventory • Distribution register • Documentation inventory • Equipment inventory • Forms inventory • Insurance Policy inventory •Main computer hardware inventory It is incredibly beneficial to create preformatted forms to aid in the data collection process. 7) Create a written plan and document it To assist the creation of the detailed procedures, an outline of the plan's contents should be created. The suggested strategy should be reviewed and approved by upper management. After final review, the outline may be utilized to create the table of contents. Other advantages of this method include, aids in the organization of comprehensive procedures, identifies all important phases before writing begins and identifies redundant procedures that only need to be written once. 8) Create test guidelines and a testing process.. The strategy must be meticulously tested and assessed frequently (at least once a year). There should be documentation of the testing procedures. The testing will provide the company reassurance that the strategy includes all critical measures. Additional justifications for testing include finding areas in the plan that need modification, determining the viability and compatibility of backup facilities and procedures, training team managers and team members, demonstrating the organization's capacity to recover, and motivating the upkeep and updating of the disaster recovery plan are all part of the disaster recovery process. PA G E F O U RT E E N | I M R6 5 2
DISASTER RECOVERY PLANNING PROCESS 9) Test the plan After testing processes are finished, the plan should be tested initially by doing a structured walk-through test. extra details on any extra actions that could be required, modifications to practices that are ineffective, and other suitable adjustments will be revealed by the exam. Any issues found during the test should be fixed in the plan. To limit interference with the organization's general activities, the strategy should initially be tested in segments and after regular business hours. There are several different kinds of testing, including checklist tests, simulation tests, parallel tests, and full interruption tests. PA G E F I F T E E N | I M R6 5 2 10) Approve the plan The disaster recovery plan should have senior management approval once it has been created and tested. The organization's written and tried-and-true plan must be upheld as senior management's ultimate obligation. The following are management's obligations for thorough contingency planning: • Setting up rules, processes, and roles for thorough contingency planning. • Examining and approving the contingency plan yearly and recording such assessments in writing.
Disaster Recovery Plan PA G E S IXT E E N | I M R6 5 2
Before implementing a disaster recovery plan, it is essential to conduct a thorough business impact analysis. This analysis helps identify critical business functions, dependencies, and potential risks. By understanding the impact of various disasters on the organization, businesses can prioritize their recovery efforts and allocate appropriate resources. Implementing redundancy and regular backups is crucial for disaster recovery. Redundancy involves replicating critical systems and data across multiple locations or servers, reducing single points of failure. Regular backups ensure that data can be restored in case of corruption or loss. Employing both redundancy and backups enhances system availability and data integrity. Effective communication and collaboration channels are essential during a disaster. Establish a network that enables rapid information sharing among employees, stakeholders, and external parties. This network could include various communication technologies, such as mobile devices, email, instant messaging, and collaboration platforms, ensuring seamless coordination and decisionmaking. Conduct a Business Impact Analysis (BIA) Clearly define recovery objectives based on the criticality of business functions and the recovery time objectives (RTOs) and recovery point objectives (RPOs) required for each. RTO refers to the maximum acceptable downtime, while RPO indicates the maximum tolerable data loss. Establishing these objectives enables the development of appropriate recovery strategies tailored to specific systems and processes. Define Recovery Objectives and Strategies Implement Redundancy and Backups Establish Communication and Collaboration Channels PA G E S EVE N T E E N | I M R6 5 2
Document the disaster recovery plan comprehensively and make it easily accessible to relevant personnel. Provide adequate training to employees on their roles and responsibilities during a disaster. Conduct drills and training exercises to enhance their preparedness and familiarity with the recovery procedures. Wellinformed and trained staff are crucial for successful plan implementation. Regular testing is vital to ensure the effectiveness of the disaster recovery plan. Conduct simulated disaster scenarios to identify weaknesses, gaps, and areas for improvement. Test the recovery procedures and assess the time required to restore systems and processes. Additionally, the plan should be updated periodically to reflect changes in technology, business processes, and potential risks. Collaborate with external partners and service providers to enhance disaster recovery capabilities. This may involve establishing relationships with cloud service providers, offsite data centers, and specialized recovery service vendors. Engaging these partners can provide additional resources, expertise, and alternate infrastructure options to support recovery efforts. Test and Update the Disaster Recovery Plan Document and Train Employees Engage External Partners and Service Providers PA G E E I G H T E E N | I M R6 5 2
SALFORD T R E N D & C A R M A G A Z I N E UP TO DATE CAR & LIFESTYLE 123 Anywhere St., Any City Automotive-related publication for the charming and the tasteful. MODERN CULTURE PA G E N I N E T E E N | I M R6 5 2
Disaster Recovery Plan PA G E TWE N T Y | I M R6 5 2
PROTECTING CUSTOMER DATABASES TO SHIELD BUSINESS DATA AGAINST RANSOMWARE ATTACKS AND EFFECTIVE DISASTER RECOVERY IN A HYBRID PRODUCTION ENVIRONMENT The article highlights the importance of safeguarding customer databases and business data from ransomware attacks, which have become a significant concern in recent years. Ransomware attacks involve malicious actors encrypting sensitive data and demanding a ransom in exchange for its release. These attacks can cause severe disruptions to business operations and lead to financial losses if organizations are unprepared. To counter this threat, the article emphasizes the need for effective disaster recovery measures. It suggests that a hybrid production environment, which combines on-premises infrastructure with cloud-based solutions, can offer enhanced resilience and data protection. This hybrid approach leverages the advantages of both environments to ensure business continuity in the event of a disaster or cyberattack. PA G E TWE N T Y O N E | I M R6 5 2
IMPLEMENTATION OF DATA BACKUP AND REPLICATION Organizations should implement regular data backup procedures for their customer databases. This involves creating copies of critical data at specified intervals and storing them securely. Backups can be performed both onpremises and in the cloud to ensure redundancy and availability of data in case of a disaster. Implementing data replication ensures that multiple copies of the data are maintained in different locations. By replicating the customer databases across different storage systems or geographical regions, organizations can ensure high availability and quick recovery in the event of data loss or a ransomware attack. UTILIZATION OF HYBRID INFRASTRUCTURE Leveraging a hybrid production environment, which combines onpremises infrastructure with cloudbased solutions, can enhance disaster recovery capabilities. This setup allows organizations to store backups in both local systems and cloud platforms. In case of a ransomware attack or data loss, organizations can recover data from either the on-premises backups or the cloud-based backups, providing greater flexibility and resiliency. PA G E TWE N T Y TWO | I M R6 5 2
DISASTER RECOVERY TESTING AND VALIDATION Organizations should regularly test and validate their disaster recovery plans to ensure their effectiveness. This involves simulating various disaster scenarios, such as ransomware attacks, and verifying the recovery process. By conducting these tests, organizations can identify any gaps or weaknesses in their recovery plans and make necessary improvements. EMPLOYEE TRAINING AND AWARENESS Training employees on cybersecurity awareness and best practices is crucial. Employees should be educated about recognizing and reporting potential threats, such as phishing emails or suspicious activities. By fostering a culture of cybersecurity awareness, organizations can minimize the risk of ransomware attacks and enhance the overall security of their customer databases. PROACTIVE SECURITY MEASURES To protect customer databases, organizations should implement proactive security measures. This includes implementing strong access controls, employing encryption techniques for sensitive data, regularly updating security patches, and educating employees on cybersecurity best practices. These measures help prevent ransomware attacks and reduce the likelihood of data breaches. PA G E TWE N T Y T H RE E | I M R6 5 2
PA G E TWE N T Y F O U R| I M R6 5 2
PA G E TWE N T Y F IVE | I M R6 5 2
The Role of Technology in Disaster Recovery Planning Disaster Recovery Plan PA G E TWE N T Y S IX | I M R6 5 2
Disaster recovery planning holds immense importance within an organization's risk management strategy. As the occurrence and intensity of natural disasters, cyberattacks, and other disastrous incidents continue to rise, both businesses and governments are actively exploring creative approaches to mitigate the impact of these events on their operations and swiftly restore normal functioning. Storing backup data across multiple geographical locations eliminates the risk of a single point of failure. Even if one cloud data center experiences issues, a backup copy is always available. A state-of-the-art network infrastructure ensures prompt identification and resolution of any problems by the cloud provider. The cloud provider also will ensure full support and maintenance, including hardware and software upgrades, for the cloud storage. Disaster recovery in cloud computing offers the ability to fail over critical workloads to a Disaster Recovery site during a disaster, enabling business operations to continue. Once the production data center is restored, failing back from the cloud and restoring the infrastructure to its original state becomes possible. Failing back means the process of return the production to its original position after disaster occur. This minimizes business downtime and service disruption. Disaster recovery in cloud computing has emerged as an appealing option for small and medium-sized businesses (SMBs) due to its cost-effectiveness, scalability, and reliability. SMBs often lack the budget and resources required for building and maintaining their own Disaster Recovery sites. Cloud providers offer access to cloud storage, which serves as a cost-effective and durable solution for data protection and disaster recovery. CLOUD BASEDSTORAGE Cloud disaster recovery is a cloud-based service that enables the storage and retrieval of system data on a remote cloud platform. By utilizing cloud computing for disaster recovery, organizations can utilize cloud storage as a secondary Disaster Recovery site. The flexibility of cloud computing allows for easy scalability, adjusting resources as per business requirements. PA G E TWE N T Y S EVE N | I M R6 5 2
DATA BACK UP Database backups are relied upon by businesses to safeguard their structured data stored in relational databases that support critical applications such as Enterprise Resource Planning (ERP), Supply Chain Management (SCM), and Customer Relationship Management (CRM). These backups are vital for swift recovery, protecting against ransomware attacks, and facilitating disaster recovery, legal audits, and test and development environments. In today's always-on world, traditional methods that necessitate shutting down the database engine are impractical, so contemporary database backup solutions must perform backups while the database remains operational. This approach entails more intricate procedures to ensure data integrity while actively writing to the database workload. Regularly scheduled database backups are imperative to safeguard constantly evolving structured data. To ensure swift data restoration and uninterrupted operations, database backup solutions need to be designed for expeditious data recovery. Various backup types are commonly employed, including full backups, incremental backups, differential incremental backups, and transaction log backups. Full Back up: It entails creating a comprehensive copy of all data assets, necessitating the backup of all files into a single version. While this approach offers extensive protection, it incurs storage and network costs and is timeconsuming. Incremental Back up: This method is more efficient in terms of storage and time since it solely copies the changes made since the previous backup. It requires at least one full back up before executing incremental backups. Restoring data may be more intricate as it involves combining the latest backup with previous dependent backups. Differential Incremental Back up: It solely backs up altered files since the last full backup. Transaction Log Back up: This back up technique involves backing up all transaction logs, enabling the recovery of the database to any specific point in time by replaying the transaction logs. It necessitates performing a full or incremental backup prior to executing a transaction log backup. PA G E TWE N T Y E I G H T | I M R6 5 2
When it comes to record management, AI can play a significant role in disaster recovery planning. By incorporating AI technologies into record management systems, organizations can enhance their ability to respond effectively to emergencies, improve prediction accuracy, identify potential threats, and develop appropriate response strategies. ARTIFICIAL INTELLIGENCE Artificial Intelligence (AI) enable organisations to respond more effectively to emergencies Artificial Intelligence-powered record management systems can analyse diverse data sources, including historical records, social media feeds, sensor data, and surveillance footage. This analysis provides organizations with valuable insights and enables them to make informed decisions during emergency situations, leading to more effective and timely responses. Improve accuracy of prediction AI algorithms can enhance prediction accuracy by analysing complex patterns and correlations in large datasets. By applying AI techniques to historical and real-time data, organizations can improve their ability to predict emergencies, such as natural disasters or cyber-attacks. This allows them to proactively allocate resources, issue timely warnings, and take preventive measures to minimize the impact of emergencies on their record management systems. Develop appropriate response strategies to emergencies AI-powered analytics can assist in developing appropriate response strategies. By analysing historical data and real-time information, AI systems provide valuable insights to emergency responders. This aids in making data-driven decisions regarding resource allocation, evacuation plans, emergency routes, and other crucial aspects of record management during an emergency. The use of AI ensures that organizations develop well-informed and effective response strategies tailored to the specific emergency situation they face. Help organisation to identify potential threat AI systems can continuously monitor and analyse various data sources, helping organizations identify potential threats or anomalies. By using machine learning algorithms, AI can detect patterns indicative of unusual activities, security breaches, or emerging risks. This early detection enables organizations to swiftly investigate and respond to potential threats, reducing the likelihood of emergencies and safeguarding their record management systems. PA G E TWE N T Y N I N E | I M R6 5 2
Future Trends and Challenges in Disaster Recovery Planning for Records PA G E T H IRT Y | I M R6 5 2 Resilient communications infrastructure The availability of fast and reliable internet access is crucial for utilizing emerging technologies in disaster recovery planning. However, in some areas, particularly those with underdeveloped broadband and cellular networks, access to these technologies may be limited. This constraint can impact the effectiveness of communication and data transfer during the recovery process, highlighting the importance of addressing infrastructure gaps. Technical skills Implementing big data analytical techniques requires specialized expertise. However, the availability of skilled professionals may be limited, not only in high-income economies but also across APEC economies. This shortage of technical skills can pose challenges in leveraging the full potential of emerging technologies for data analysis and decision-making during the disaster recovery process. Furthermore, the success of these techniques relies on quality data inputs, which may not be uniformly accessible in all APEC economies.
PA G E T H IRT Y O N E | I M R6 5 2 Access to data and analytical technologies Obtaining comprehensive data coverage, particularly through technologies like earth observation, connected cameras, and sensors, can be costly in economies with vast landmasses or dispersed populations. The expense of deploying and maintaining these technologies may limit their widespread adoption, affecting the availability of critical data for disaster recovery planning. Additionally, regulatory impediments, such as restrictions on drone usage and privacy protection regulations, may hinder the collection and processing of necessary data for risk assessments and other recovery activities. User awareness, acceptance, and trust The successful utilization of emerging technologies in disaster recovery planning depends on user awareness of the benefits they bring. It is essential to foster a broad understanding of how these technologies can improve recovery outcomes. Additionally, user acceptance and trust in the outcomes generated through the use of these technologies are vital for their effective implementation. Building confidence in the reliability and value of emerging technologies is necessary to encourage their widespread adoption in the field of disaster recovery. Insurance regulatory constraints The application of emerging technologies and innovation in insurance-related aspects of disaster recovery, such as underwriting, exposure management, distribution, and claims settlement, may be limited by insurance regulatory requirements. These regulations can pose challenges to the development and implementation of parametric insurance solutions, which leverage advanced technologies to provide efficient and tailored coverage in the aftermath of disasters.
Conclusion Disaster prevention and response should be a matter of routine to be adhered as well as implemented. For example, simulation exercises can be done by the staffs as a guidance and preparations in the process to prevent and respond to the disasters that might occur. There are a few ways that organizations can do to ensure the successfulness of the disaster recovery planning. Firstly, the organizations must invest in risk assessment policy development, training, management strategies and other activities. This is so that the organizations can forecast the type of risk and disasters that might happen to them. Other than that, the records keeping system must meet the legal requirement and standards accordingly. Last but not least, the records should only be permitted to be changed or acquired by authorized personnel. This is to minimize the number of people that could have access to the documents. Hence, it is important to ensure the records management of the organization is doing a top tier job in protecting the documents from any natural or man made disasters. In conclusion, it is safe to say that every organizations have to be ready for any disasters that may occur in the future. Records management is very crucial in keeping those vital documents and information regarding the organizations are safe and secured. The lack in disaster recovery planning will eventually lead to the loss of important documents, theft as well as will open the opportunity for fraud and scams to be happening. In preventing those events from happening, it is very important that the planning involve all areas that are likely to be affected by the disasters. PA G E T H IRT Y TWO | I M R6 5 2
References PA G E T H IRT Y T H RE E | I M R6 5 2 4 Fatin,Z. (2021, April 1). Disaster Preparedness for Records Management: A conceptual Review https://ijikm.uitm.edu.my/pdf/1111.pdf 3 Failover and failback operations. (2014, April 22). www.ibm.com. https://www.ibm.com/docs/en/ds8870/7.2? topic=copy-failover-failback-operations 5 Frąckiewicz, M. (2023, June 25). The Use of Artificial Intelligence in Disaster Recovery Planning. TS2 SPACE. https://ts2.space/en/the-use-of-artificial-intelligence-indisaster-recovery-planning/ 1 Cajetan.O. (2017, April). Impact of Disaster on Access to Records of National Archives of South East, Nigeria.https://www.researchgate.net/publication/31563115 4_Impact_of_disaster_on_access_to_records_of_National_Arc hives_of_South_East_Nigeria Disaster Recovery Planning Process | Disaster Recovery Process. (2012, August 7). Disaster Recovery Plan Template. https://www.disasterrecoveryplantemplate.org/disasterresilience/disaster-recovery-planning-process/ 2
Manoj Kumar Singhal. 2023. Protecting customer databases to shield business data against ransomware attacks and effective disaster recovery in a hybrid production environment. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (ICIMMI '22). Association for Computing Machinery, New York, NY, USA, Article 90, 1–5. https://doi.org/10.1145/3590837.3590927 8 Jimmy Vuong. 2015. Disaster recovery planning. In Proceedings of the 2015 Information Security Curriculum Development Conference (InfoSec '15). Association for Computing Machinery, New York, NY, USA, Article 16, 1–3. https://doiorg.ezaccess.library.uitm.edu.my/10.1145/2885990.2886006 6 PA G E T H IRT Y F O U R | I M R6 5 2 Leveraging technology and innovation for disaster risk management and financing. (pp. 39–40). (2020). Asian Development Bank. https://www.adb.org/sites/default/files/publication/664501 /tech-innovation-disaster-risk-mgt-financing.pdf 7 MKS&H. (2015, June 8). MKS&H. MKSH. https://mksh.com/5- elements-of-a-disaster-recovery-plan-is-your-businessprepared/ 9
PA G E T H IRT Y F IVE | I M R6 5 2 Zulkipli, F. (2021). Disaster Preparedness for Records Management: A conceptual Review. Journal of Information and Knowledge Management (JIKM), 11(1). Reed, J. (2019, June 26). Disaster Recovery In Cloud Computing: What, How, And Why. Official NAKIVO Blog. https://www.nakivo.com/blog/disaster-recovery-in-cloudcomputing/ 11 Reed, J. (2019, June 26). Disaster Recovery In Cloud Computing: What, How, And Why. Official NAKIVO Blog. https://www.nakivo.com/blog/disaster-recovery-in-cloudcomputing/ 10