Home
        A Guide to Disaster Recovery - Long Beach Nonprofit Partnership
         Contents
1.               Cc  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 16                Q Backups and Documentation    In the last two years  has your organization  taken steps to identify its mission critical data  and describe that data  e g  how it s stored   who has access to it  how it s backed up      Does your organization  back up its electronic records  and other data on a regular basis           H Yes  E No    Although 86 percent of the organizations we surveyed back up their records  on a regular basis  only 69 percent have clear documentation of how and  where critical data is stored  Remember that regular backups and clean   clear documentation go hand in hand           Storing Your Documentation    We recommend a three tiered approach to storing your documentation  hard  copies  personal storage devices  and online  Its essential that you keep the hard  copies of your documentation somewhere sheltered from both natural disasters  and theft  such as a waterproof safe or a safe deposit box  For electronic  information  be sure to encrypt it  see Encrypting Your Master Key below   In  both cases  keep copies in two different places that are unlikely to be hit by a  single disaster  As one nonprofit told us after recovering from Hurricane Ike      Consider your entire city a potential point of failure        The Master Key    Your master key is a simple USB flash drive  also referred to as a thumb drive   where you keep all of the informa
2.         i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 41    Chapter 6  Picking up the Pieces          D Delicious tsdp recovery  http   delicious com tag tsdp recovery             Recovering from a disaster is difficult even in the best of circumstances  Yet while  technology is unlikely to be your top priority after an earthquake  fire  flood  or  other catastrophe  taking a few minutes to address some key issues will help your  organization recover  returning quickly from crisis management to normal day to   day operations     The fear and panic that often accompany a disaster  combined with a need to  make quick decisions  makes it difficult to go through a thorough  in depth  assessment and planning process  If you have a lot of time to think about your  priorities  there are some excellent resources available  which we ll point you to in  later chapters  however  in this chapter  we ll assume that yow   re deciding your  priorities in a hurry  We ll also assume that you don   t have a document that spells  out your recovery priorities  If you do have that document  look there first  The  following suggestions might make a good supplement  but the recovery priorities  that you and your colleagues decided upon in the calmer times that preceded the  disaster will probably give you better guidance than the generic suggestions here     Safety and communication are the highest priorities in any crisis or emergency  Are  you and your c
3.      Wireless Networks   Another option for creating an ad hoc network is to use wireless technologies  The  802 11b and 802 11g standards  often referred to as Wi Fi  are easy to use and  well supported  The older and slower 802 11b standard is less secure  but also  somewhat cheaper than the newer  faster  and more secure 802 11g standard  In  any event  either technology is acceptable for an ad hoc network     Wireless networks consist of access points  which are often built into cable and       c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 48    DSL routers  and wireless network cards  which allow computers to connect to  the access point  Access points  much like wired switches and hubs  have limited  capacity  For large installations  more than one access point may be required     Wireless networks  due to their    broadcast    nature  require the use of basic  security precautions  There are two common Wi Fi security technologies  Wired  Equivalent Privacy  WEP   which is associated with 802 11b networks  and Wi Fi  Protected Access Pre Shared Key  WPA PSK   which is associated with 802 11g  networks  WEP is no longer considered very secure  but is adequate for an ad hoc  network  WPA PSK is much more secure  and is appropriate for both ad hoc and  permanent networks     Devices Setup    Once the computers and devices are plugged in to the network  or set up on the  wireless network  they may need to be configured  Many TCP IP ne
4.      e Do not attempt to clean or dry waterlogged drives or other media by  yourself     e Do not use common software utility programs on broken or water damaged  devices    e Do not shake or disassemble any hard drive or server that has been  damaged  Improper handling can make recovery operations more difficult   potentially leading to permanent loss of valuable information    e Before storing or shipping wet media  it should be placed in a container that  will keep it damp and protect shipping material from getting wet  Wet boxes  can break apart during transit  causing further damage to the drive    e When shipping your media  package it in a box that has enough room for  both the media and some type of packing material to prevent movement   The box should also have sufficient room around the inside edges to absorb  impact during shipping  Ship multiple objects in separate boxes or make  sure they are separated with enough packing material so there will be no  contact     If you have backups of non critical and replaceable data  you can try to restore it   depending on the state of the backup media and device  Tapes and CDs can be  surprisingly resilient  so try them out even if they look bad  Make sure the media  and equipment is dry  if possible  try reading from the tape or CD drive that you  originally recorded from  If this doesn   t work  try several different CD or tape  drives  sometimes you just need a higher quality drive to recover information you  thought was 
5.     ccscscssssssssssessssessessessecsssrseeteesneetseesees 31  Alternatives to Regular Backups            cccccccccsssssseesesesseceseeecceseeseseeecseseeseseeeeseeeeaeaeses 32   Chapter 4  Privacy and Encryption          sesesesesesesesescscscscscsososososcsoscsseseseseseseseses 34  Are Web Based Collaboration Tools Secure               cccccececeeseeeseeeeeeeseeseeeseeeeseeeees 34  File Encryption in Microsoft Office             ccccccscsseseseeseseeceseseeecseeeeseseeecseeeseeteesees 35  Adjusting File Permissions in Operating Systems               c cccceccseeseseeeeseeeeeseeeees 36  Protecting Constituents    Personal Information         0    0cccececsceeeeeeseseeeeeeeeeenees 37   Chapter 5  Human Made Disasters and Accident                 sssccscsssssseseees 38  Protect Critical Organization Logins  acccccsccsesscesarscecievisdeestenieeervnesmsi West 38  End of Employment Policy siiccncseancensenaanroeaiegannedaniioncnesasenaaawe  38   Disaster Planning CheckliSt              osoeoesescsesesesescsesescscscsosososososososososssseseseseseseseses 40       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 4    Part II  Disaster Recovery          e sessesocscscscsesesescsescscsesososososososososososoeosseseseseseseseseses 41    Chapter 6  Picking up the Pieces             sesesesosesesesesescscsosososososososososseseseseseseseseses 42  Technology Triag   eirsiirnn sin ie a REEE E AE RRR Eh 43  Reestablishing Communication ys  siczsccdase
6.   Ifthe floor or any electrical wiring or computer equipment is wet   check to make sure the power is off before you enter the room or touch  any metal  wet surfaces  or equipment  If you   re positive the power is  off and it is safe to move the equipment  it should be moved to a safe   dry environment with reliable electric power     2  If you have to use temporary extension cords and cables to make  connections  they should either be placed where they won   t be walked       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 45       on or taped to the floor to provide protection in high traffic areas  Be  sure that the cables are rated for the device and appliance they are  connected to     3  Make sure tables are sturdy enough to handle the equipment placed on  them and that stacked equipment won   t fall  especially when it is  connected to cables or other peripherals  Take a little extra time at this  point to make sure everything is stable  neat  and orderly  Rushing and  cutting corners may lead to more losses later     4  Once you have a safe  dry environment  it   s important to make sure  that you have good  reliable electric power before connecting or turning  on any computer equipment  Plugging in an electric light to make sure  it isn   t flickering or a lot dimmer or brighter than normal is a good first  step  You can also try plugging in things you can afford to lose     for  example a radio or any other device that isn t p
7.   Windows Vista Ultimate and Enterprise include Bitlocker  a utility that lets you  encrypt an entire volume  For Mac users  you can also encrypt your entire home  directory using the FileVault application  included in Mac OS 10 3 and later           D How to Encrypt a File in Windows XP  http   support microsoft com kb 307877       Troubleshooting Permissions Issues in Mac OS X  http   support apple com kb HT2963       FileVault  Wikipedia   http   en wikipedia org wiki Filevault    Bitlocker Drive Encryption  Wikipedia   http   en wikipedia org wiki BitLocker_Drive Encryption             Note that if you   re using file permissions to protect sensitive data  you should not  stay logged in when youre away from the computer  Shut down  log off  or lock  the computer when you re going to step away from it     ma     i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 36       Protecting Constituents    Personal Information    Protecting the private information of your donors  constituents  and volunteers is  of the utmost importance  If you have not already  password protect your CRM  and donor database applications   Check the user   s manual or help  documentation if you   re not sure how to do this   Log out of these applications  every time you leave the computer     Many countries have individual laws and standards regarding encryption of  personal data  particularly health information  please consult materials  appropriate to your cou
8.   ig Safe Mode  http   support microsoft com kb 315222       Windows XP Recovery Tools and Features    Last Known Good Configuration  A startup option to use when the system  cannot start in normal or safe mode following a driver or application installation  that causes a problem  By using the Last Known Good Configuration  you can  recover by reversing the most recent driver and Registry changes made since you  last started Windows XP Professional        c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 60       Device Driver Roll Back  A Device Manager feature that allows you to replace  an individual device driver with the previously installed version if the driver was  updated after you installed Windows XP Professional  Device Driver Roll Back is  available in normal or safe mode     System Restore  A service that actively monitors your system and records  changes to the Registry  to system files  and to certain application files  System  Restore allows you to undo recent Registry and file changes by using information  previously saved in restore points  Use to restore the system to a previous state   System Restore is available in normal or safe mode     Add or Remove Programs  in Control Panel   A Control Panel feature you  can use to uninstall programs  Use to temporarily uninstall software that you  suspect is causing a problem  You can uninstall an application in normal or safe  mode   To reinstall software you will need the progr
9.  Microsoft DH SChannel Cryptographic Provider   RC4  Microsoft Enhanced Cryptographic Provider v1 0   RC4  Microsoft Enhanced DSS and Diffie Hellman Cryptographic Provider                File sharing options for this document    Password to modify  Preece                  u IV Read only recommended RC4  Microsoft Enhanced RSA and AES Cryptographic Provider  Prototype   fi Digital Signatures    Protect Document      RC4  Microsoft RSA SChannel Cryptographic Provider            Z RC4  Microsoft Strong Cryptographic Provider a     Privacy options Choose a key length  fizs a      J    Remove personal information From file properties on save IV Encrypt document properties  I Warn before printing  saving or sending a file that contains tracked Cancel     4 changes or comments  3 IV Store random number to improve merge accuracy  J IV Make hidden markup visible when opening or saving   1 P    Macro security         Adjust the security level for opening files that might Macro Security      5  7 contain macro viruses and specify the names of      y trusted macro developers  My Documents    3    My Computer       OK   Cancel      Adjusting File Permissions in Operating Systems    Most operating systems allow users to designate certain files  folders  or drives as  accessible only for specified users  Generally  you can find user access  information by right clicking on the file or folder and selecting Properties   Below are links to more specific information for each operating system   
10.  Somewhat complicated to set up    Equipment  Cost  Usage charges will vary depending on the type of access  If  you can   t use an existing  public connection  building your own connection  requires a Wi Fi ethernet bridge  Wi Fi cards for computers  cabling  and an  Internet router  approximately  400    Notes  With the right equipment  the signal can be brought onto a wire and  redistributed to one or more computers  This may require an antenna mast or the  temporary mounting of an antenna to the roof of the building     Dial Up  An individual computer dials in to an ISP over a telephone line   Pros  Works anywhere there is an available telephone line    Cons  Connection is slow  monthly cost to maintain account    Equipment  Cost  None for individual computers  about  400 for a dialup  LAN    Note  Several computers could be serviced via a wireless or wireless LAN by  means of a router with a built in modem or a computer with a modem and  Internet Connection Sharing turned on           D Sharing a Dial Up Internet Connection  http   www ezlan net DialUp html          Mobile Phone or Data Card        ae  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 50       Pro  Works anywhere there is mobile service  faster than dial up    Con  Depending on the data plan  per minute and data transfer charges can add  up  In a disaster  connection can be slowed or stopped by an overload of users in  a city    Equipment  Cost  Mobile Phone   Most modern mo
11.  and  some of the different ways you can send and receive information during an  emergency  As soon as possible after a disaster strikes  it   s crucial to inform  any stakeholders whose relationship with the organization might have been  impacted    2  Consider your constituents next  Focus on services  functions   programs  and audiences first  before you consider machines  networks   and applications  Who supports you and who do you support  Who relies  on you the most  Who might be suffering as a result of the disaster and in  need  Which programs must continue through the time of rebuilding  and  which ones can be postponed    3  Key data and information  Determine what data and information your  organization needs to operate effectively in the short  and medium term   Use this information to decide which equipment to bring back to life first   Restoring and repairing systems can take a significant amount of time  and  focusing your efforts where they will have the most impact is one of the keys  to a successful triage    4  Backup systems  If you   re lucky  you may have stored backup media in a  safe place that you can access  In the event that the backup media and  hardware are unusable  you ll need outside help recovering the data   Determining the state of your backup system may be a priority  If you have a  reliable network backup system  you may not need to worry about retrieving  the data on individual computers    5  Servers  Recovering the server     the core o
12.  are relatively robust and easy to set up  The hub or switch  which forms the  backbone of your network  manages network traffic between the different  computers and devices on your network  To create an ad hoc network  just about  any hub or switch will do  If you need to add capacity  most devices include a  crossover switch or port  which can be used to connect two devices together using  a basic network cable  Some newer devices include auto sensing ports that  automatically adjust to connect two switches or hubs     Once you have a working hub or switch in place  you can start connecting  computers to the network using standard Ethernet cables  Try to run the cables  along the base of walls and out of the way of foot traffic  Ethernet cables are easy  to trip over  and when yanked  can break connectors and jacks and pull  equipment to the floor  If you need to run a cable across a traffic path  try taping  the cables to the floor to keep them out of the way   Note  When pulling up taped   down cables  try pulling the tape off the cable while it is still on the floor  Pulling  up the tape and cable together is likely to result in tape wrapping around the  cable  which can be very difficult to remove      Most computers include Ethernet network interface cards with RJ 45 jacks   which look like large telephone connection jacks  that connect them to networks   If your computers do not have network cards  they are relatively inexpensive and  can be easily installed in any PC
13.  backup  For many  organizations  tape drives are a great choice  combining high reliability  and reasonably fast speeds with large storage capacities  Tape drives have  become the standard in backup media  and with the proper backup  procedures in place they are a reliable alternative  For larger organizations  with an IT infrastructure in place  tapes are a great choice     Consider your drive s speed and how it interfaces with your  computer  When you have a large amount of data to back up  a big  storage device isn t much good if you can t write data to it quickly     Internal Drives  IDE and SCSI are common internal drive  interfaces  All PCs have built in IDE connections  and devices using  these interfaces are usually less expensive  Keep in mind that there  are also different standards for IDE  Older IDE drives are now  called PATA  Parallel ATA  and the newer standard is called SATA   Serial ATA   Be sure to verify compatibility with existing hardware  when making a purchase     External Devices  Although ultra wide SCSI is the fastest  you  will also encounter devices that use USB and IEEE 1394  Apple  FireWire   Most PCs don t include built in SCSI adapters  so you  may need to add an SCSI card to use an SCSI device  Higher end  server class hardware comes with a built in SCSI or the newest  standard SAS  Serial Attached SCSI      Network Attached Storage  NAS  is a type of device that offers  disk based storage like a dedicated file or backup server  but in a  sma
14.  be appropriate for your nonprofit  One thing to keep  in mind is that if you live in an area that   s susceptible to natural disasters  then it  may not be a good idea to trust local backup alone  It   s possible that a disaster  could claim both your primary and back up drives  even if you keep the back up  drive at a different location in the same city     Regular backups are vital insurance against a data loss catastrophe  Developing a  solid back up plan requires an investment of time and money  but the cost is far  less than the burdensome task of recreating data for which no backup exists     What to Back Up    Before jumping into a backup solution  you should first put together a list of what  assets need to be backed up  Of course you should back up the data on all of the  desktops  laptops  and servers in your office  but that might not cover all of the  data that your organization may need to recover        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 21             9 Save Time by Spending Time   Susan at the Eagle   s Nest Foundation is no stranger to IT disasters  ENF   s  remote campsite frequently deals with power and Internet failures  Susan  had this to say about regular backups     It s better to    waste    the time  backing up than to dread the effects of a disaster that could happen any  time  Redundancy in communication options is very important  as is having  off site resources for communication when your system
15.  doesn   t work right  off the bat  put it aside to check later  Once you   ve got some idea of  what is working  and what is not  you may be able to build a few     Frankenstein    computers using functioning parts from otherwise  broken computers  Use your triage list to focus your efforts where they  will make the most impact     For devices that won   t start  check out our troubleshooting tips in  Appendix B     Once you get a computer running  back it up if possible  For backup  instructions  see Chapter 3  Remote and Local Backup on Page 21     Network Recovery          ra        Tip    As in hardware recovery  safety is essential in the network recovery process   Educate your staff and volunteers in safety precautions before beginning  recovery           A  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 47          Local Area Networks    In the case of a flood or other inundation  a local area network  LAN  can be  badly damaged  Network cabling can become waterlogged and cease to function   Patch panels and jacks may also be damaged  while switches  hubs  routers  and  other electronic devices on your network may be shorted out by the water  Fully  restoring a complicated network can take time and effort  but it   s possible to build  an ad hoc LAN quickly     Wired Networks    To build a simple network  start with an Ethernet hub or switch  Ethernet and  TCP IP networking technologies are the most common networking technologies   and
16.  flood damages your computers  It   s a way of thinking  about your nonprofit   s day to day operations just as much in times of health as in  times of crisis  An organization that   s ready for a disaster is an organization  unbounded by technological limitations  an organization whose office is  everywhere           Q Disasters Happen Everywhere   Many of the organizations we surveyed  had had their work disrupted by  wildfires  earthquakes  and hurricanes  but those weren   t the only disasters  reported  There were a few stories of sabotage from former employees  one  organization whose office was destroyed by an angry mob  and even one  organization that had a vandal walk in during office hours and smash a  computer  Nearly all of the disasters reported resulted in damaged  computers  lost data  or both     The point is that disasters happen everywhere  and there   s no way to  prevent every possibility  instead  focus on operating your organization in  such a way that it can resume operations swiftly           Unified Communications          YR Delicious  tsdp unifiedcommunications  http   delicious com tag tsdp unifiedcommunications       Unified Communications Options for Nonprofits    http    www techsoup org learningcenter networks page11697 cfm          Unified Communications  UC  refers to a large family of technologies and  organizational practices that simplify and integrate multiple forms of  communications like phone conversations  email  video and web confere
17.  in the development of OL  Workspace but we live in an era where major banks  corporations  the White  House  and even the FBI have had their security breached by hackers  Decisions  on security     have to be taken by users at a personal level        Note that encryption of individual files is not possible in either Google Docs or  Office Live Workspace  your files are protected by a single login password  similar  to how most webmail services work  Like Gmail  Google Docs allows Transport  Layer Security access  simply point your browser to https   docs google com   and change your bookmark to include the https protocol  These services are fine  for planning events or collaborating on fundraising letters  questionable for  keeping track of donor data and other sensitive information  and unacceptable  for health records or any other information protected by law              ig Transport Layer Security  Wikipedia   http   en wikipedia org wiki Transport_ Layer Security    Google Docs  Secure Version   https   docs google com        Discussion on security of Office Live Workspace    http   ask officelive com workspace qna t 3941 aspx           i  A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 34          File Encry ption in Microsoft Office    There are a few different ways to encrypt individual files with sensitive  information  For documents created in Microsoft Office  the easiest way to  encrypt is from within Office itself  When you
18.  move your website to a host in a more stable area  While  this is normally relatively straightforward  it becomes difficult if the details about  your site are locked in the mind of someone who is unavailable to you  If you   re in  that situation  this chapter will help     There are typically three  plus one  components to a website  all or any of which  may have been affected     Domain Registrar  Your website s domain name  www mywebsite org  for  example  is different from your site s content  which is stored by a Web hosting  provider  Although your domain name can be registered separately  it is often  registered with a hosting provider  which is why many people associate the two     Web Hosting Provider  A web hosting provider supplies the disk space and  network for your website  Your organization may even be your own site s hosting  provider  if this is the case  you may want to move this hosting to another provider  in the aftermath of a disaster  when your hands may be full     Web Content  While you may have backups of your website  if you do not  you  may want to get a simple page up quickly with contact information and status  updates for your supporters  If you can   t do that  you may want to temporarily post  a blog separate from your usual hosting provider  a service like Blogger com will  host a blog for free      Email Hosting  Your email may also be hosted by an outside provider     either  the same service as your web hosting provider  an Internet Serv
19.  need the borrowed equipment     e Back up all of your data from the borrowed equipment    e Move your backups to your new equipment    e Check to ensure that everything is working well  Ideally  arrange for an  overlap period of a month when you use your new equipment  but still  have access to the old if you find that something isn   t working well    e Once youre sure everything has been successfully moved to your new  equipment  delete all of your data and the accounts you were using from  old machines  If possible  reformat the borrowed machines         lt c  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 64                Tip  4 t    Reformatting a borrowed computer will destroy all of the owner   s data as  well as your own           Free Technology    As you re rebuilding your technology infrastructure  you may need to keep your  costs down by seeking out free alternatives to commercial software     Open Source Software    Open source software is governed by a more flexible license than traditional   commercial software  Users can download and install open source software free  of charge and create and distribute plugins to customize it  In some cases  open   source software is maintained by a community of volunteers  in other cases  it   s  maintained by a for profit company that relies on sources of income besides  software sales     In the past few years  several open source tools have grown a fair amount of  popularity in the NGO c
20.  out of the  application when you leave your desk  These policies aren   t only about protecting  your systems from vandalism  they also protect your systems from simple human  error     End of Employ ment Policy    Have a policy in place for when your organization   s relationship with an  employee ends  and make this policy available to any employees who would like  to see it  Here are some examples of the sorts of things this policy should include     e Archive the former employee   s email  don   t delete it   Forward the email  address to the former employee   s manager    e Change any passwords that the employee had access to  including  passwords for the organization   s presence on any social networking sites   If applicable  have the employee make a list of any accounts and passwords  he set up on behalf of the organization    e Back up the former employee   s computer  Reformat it before giving it to  another employee    e Keep a list of up to date email addresses for former employees  This is  useful for two reasons  First  it allows you to forward any personal  messages an employee might receive at his old email address  Second  you       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 38       might discover in a disaster that the employee forgot to document a crucial  piece of information     These measures do not denote mistrust of the former employee  An end of     employment policy provides for the smooth  professional t
21.  save a document  open the Tools    menu and select Security Options     7 in  E servers    3 A X Gy E  Toos    LE      IR 12 IR IO          li       in  o   lt   o        My Recent  Documents    My Network  Places          wo  rverfieldguide 4  doc  W  serverfieldquide 3 doc  W  serverfieldquide 4 doc  wh   serverfieldquide encrypted doc    File name   serverfieldguide encrypted doc My    Save as type   word Document    doc           P i Delete    Rename    Map Network Drive     Properties   Save Options      Web Options     Compress Pictures       Save Version          Save    Cancel    A    A    The Security dialog box opens  This is where you enter a password for opening    the file and  optionally  a second password for modifying it     Microsoft Office 2003 and later allows file encryption comparable to that used by  banks  but not by default  The default encryption method is    97 2000  compatible     which an experienced thief can crack with relative ease  For  professional file encryption  use RC4 encryption with a 128 bit key length              gt   The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0    35    fsecurty manea o        a       4 Security    2 1 i                 m she A basal    File encryption options For this document Encryption Type 3 x              Password to open   errea Choose an encryption type     RC4  Microsoft Base Cryptographic Provider v1 0  RC4  Microsoft Base DSS and Diffie Hellman Cryptographic Provider   RC4 
22.  sicscscsccicsesseacsecnsonenescis toeenvseeestxateovisersone soeagedesinusataseeedenes 58  Real Life Data Recovery Tips             cccosssscessssesesessesscssserescensasscessacsseesecteatssessscesees 58  Microsoft XP Disaster Recovery Tools             cc cccsscssssesseseseeseseeeseseeeeseseeseeeeeseeetaes 59  Windows XP Recovery Tools and Features            ccccccessesesseseeeeseeseecseeeeseteeseseeeeees 60   Chapter 8  Borrowed  Donated  and Free TechnologyV                 sssssscsssees 62  Donated and Discounted Technology                csccscssssssssscesserssessecsssrseetesesneerseesees 62   TechSoup Software and Hardware Programs                cceeccsseseteeeeseseeeeseeeees 62  Discounted Software Alternatives            ccccccccesesescesesseccseeeeseseeecseeeseeeeeeseeeeaes 63  Borrowed Techn0loey sucacicicsscecenicarcdunsncioe heen wees 63  Setting Expectations with the Lender                  cccccssssssssscssseeseetsersseensecsescsees 63  USET ACCOUNTS oot aizsctivanetta Sessa ian snivsnniinteatundade isnaesewiduibien sabisboasatiashtaaednButivinentatie 64  Firewall and Virus Protection              cccccccsssscssssesscsssessscsseescscsssescsssssescsesseesees 64  Transitioning to New Equipment              ccccceceecesseseescseeseeeceeeseeeeeeeseeeceeeeeeeeees 64  Free Technolgy 2  o5crss esc eeewion eine een ee ea ee 65  Open Source SOL wal Css sicctaidirescentsetasiiddcaastadanssodr bie ened ooaedaueaan 65  Web PDC 5s sis ens ncestacaacde ta nce onctisncd se 
23.  the chapter on documentation  we suggested  storing documentation on your device  consider storing your most essential  documents there as well  for example  what information or files would be key as  you wait to regain Internet connectivity so that you can restore from a hosted  backup        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 31    Of course  if you   re storing sensitive data on your mobile device  those files must  be encrypted  For instructions on how to encrypt your files  see the device   s  manual     Alternatives to Regular Backups    TechSoup strongly advises that every organization should regularly back up its  critical data  Using the options outlined in this chapter  you should be able to find  a backup solution that meets your needs and doesn   t break the bank   Recognizing  though  that organizations    needs vary widely and that some  organizations may be unable to heed our advice  we cautiously offer some  suggestions for nonprofits that can   t make regular backups     If it   s impossible to commit to a backup strategy  keep your organization   s  documents on systems with backups built into them  For example  Google offers  a special bundle of its Google Apps services free to 501 c  3  nonprofits  The  bundle includes an email and chat client as well as a word processor  spreadsheet   and presentation software  all accessible through any standard web browser   Similarly  Microsoft now offers a web based
24.  this sequence     safety  communication  priorities  recovery     is an ideal    one  Circumstances might prevent you from fully assessing your situation and  prioritizing among competing options  For example  you might find yourself waiting       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 42       in your office for an all clear signal  unable to reach your IT personnel  In these  situations  you can still take steps to diagnose and repair damaged systems     Technology Triage    Once your organization has identified what needs to be done and in what order   you can focus on obtaining the resources  funds  advice  and technology you need to  begin the recovery process  Under ideal circumstances  your organization  documented its recovery priorities before disaster struck  However  when this  isn   t the case  it   s still worth taking time to consider carefully the order in which  you ll repair damaged equipment and systems     Every organization is going to have different technology priorities following a  disaster  so a one size fits all prescription is not appropriate  however  there are  some general guidelines for developing a good technology triage list     1  Communication is king  In most disasters  reestablishing  communication with the outside world is the first priority during and  immediately after a disaster  In the section below on communication  we ll  discuss the reasons that communication channels are so important
25.  version of Office called Office Live  Workspace  A free Office Live Workspace account includes 5 GB for storing your  files  In both cases  since your information is stored on Google   s and Microsoft   s  servers  loss of data is unlikely  though possible     Alternatively  you can set up your own self hosted web applications on your web  hosting provider   s servers  assuming your provider backs up website data  regularly  OpenGoo is a free  open source suite that includes an email client as  well as a word processor  presentation software  a shared calendar  shared  bookmarks  and more  You can install OpenGoo on your web server and provide  your staff with accounts to access it     Are these tools as secure as running Microsoft Office and Outlook on your own  computer  No  and they   re not appropriate for storing highly sensitive  information  But for many of your nonprofit   s day to day operations  they   re a  better alternative than risking a major data loss  For more information  see Are  Web Based Collaboration Tools Secure  on Page 34     Of course  should you lose Internet connectivity  online services will be    unavailable  Keep that in mind as you determine which files are crucial to store  locally        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 32          YB Google Apps for Nonprofits    http   www google com a help intl en npo index html    OpenGoo  http   www opengoo org        Google Apps  OpenGoo  and the Fu
26. 2 0 24       necessary  The only exception is if your organization has a dedicated file server   in this case  it s a good practice to conduct a full backup of your server before  every major update so that you have a way to restore its entire hard drive  A  proper file server should also be running a server class operating system  with  software or hardware RAID  redundant array of inexpensive disks               D RAID  Wikipedia   http   en wikipedia org wiki RAID          Test your backups before you need them  Make sure your backup software  has full read back verification  Design a recovery plan  and try restoring a few  files to a different computer at a different location so you can test your plan  before you actually need it     Local Backup    If you use local backups  remember that storing data off site is crucial  Natural or  manmade  any disaster that impacts your computers is likely to impact an  external backup drive in the same office     We recommend rotating a set of backups off site once a week  Ideally  you should  store your backups in a safe deposit box  Another method is to follow is the 2x2x2  rule  two sets of backups held by two people at two different locations  Although  it may sound overly cautious  you will be glad to have a system like this in place  should disaster strike           9 Keep Your Friends Close and Your Backups Distant   In the wake of Hurricane Ike  one organization we spoke with had displaced  staff working remotely in four diffe
27. 2 0 46                T    A       Warning   If a machine is visibly damaged and its data deemed mission critical  stop  right now and skip to Chapter 7  Tips for Reviving Broken Computers   Page 58   Do not power on machines or try out disks that you intend to  have professionally recovered        1     Clean and dry hardware you intend to revive yourself  Don   t attempt to  plug in or operate a computer until it   s completely dry and free of mud   dirt  or other debris  Your computer may be just fine  but turning it on  prematurely can destroy an otherwise healthy machine  Take the time  to open up the chassis of your computers to make sure they are clean  and dry inside and out  If there   s any debris  remove it carefully so that  the computer won   t overheat from reduced air flow     Wear an electrostatic discharge  ESD  wrist strap or work on an  antistatic mat if you need to touch or put your hand or tools near any  part inside the computer  If you don   t have a wrist strap or mat  touch a  grounded object  such as metal water pipes  before you touch the  computer  Before you open the computer s case  be sure all power  sources are turned off  the computer is unplugged  and laptop batteries  are removed     Make sure devices such as routers  switches  and printers are dry  before powering them up  If possible  do not attach peripherals and  cables to computers unless you are sure the equipment is working  properly     Check your components twice  Even if a computer
28. You may be required to  pay for this extra service  or it may be included  up to a certain number of email  addresses   Nevertheless  you will need to update what is called your mail exchange   MX  record  which is similar to updating your website s domain address   Typically  your email host will give you information about what your MX record  should be  usually it s an address like mail mydomain com or an IP address   You  have to either enter this information on your domain registration control panel  or  ask your domain registrar to update that information for you  again  by proving  who you are      Scenario 3  No Access to Records    If you can access your website  but do not have any of your access records or  passwords  you are going to need to contact the domain registrar  or web host   and  after verifying your identity  ask them to change your login and password  information     Thankfully  most of the basic footwork you ll need to do to find domain registration  information is provided by the WHOIS lookup on DNSstuff com  which lists it as  the  Sponsoring Registrar      You can also see who registered your domain for you in order to determine if it was       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 56    done by an individual at your organization  in which case that person may have the  login and password information   or if it was done by your web hosting company  If  the latter is the case  your domain registration 
29. ach provider s storage  facilities  The following are some other important questions to ask     e Has the provider built its own data center  or do they co locate with a  third party provider    e What redundancy have they built into their system to ensure that your  data will always be available  For instance  do they make backups of your  backup    e Will your information be kept on hard disk or moved to tape  How do they  secure physical access to the equipment where data is stored    e Will your data be stored in a secure facility    e Who has network access to the machines that store your data    e Does the backup provider automatically encrypt your data   Some services  recommend that you encrypt your own data before backup     e Does the provider offer a guarantee or insurance of a successful recovery     You should also discuss pricing  Are there additional charges to the base price   Will the company notify you if you are nearing your allotted storage capacity  and  how much do they charge if you exceed that capacity     These questions will help you avoid unpleasant surprises and ensure that copies  of your critical information are secure and available     Backing up Data on Mobile Devices    Your mobile device probably doesn   t have enough memory to store all of your  organization   s data  nor would it be the most convenient place to do so   but it is  worth considering what data it would be most essential to have at your fingertips  in an unexpected scenario  In
30. ally on users    computers  and not on the mail server  the mail folder on each computer must be backed up     If you only use a popular webmail service like Hotmail or Google Apps for  Nonprofits  these services are generally considered safe from hardware failure  If  you use a webmail service that was offered through your Internet service  provider  find out whether the ISP backs up your email           Tip  M Microsoft offers a backup utility for Outlook 2003 as a free download              D Outlook Add in  Personal Folders Backup  http   www techsoup org learningcenter downloads techstructure page8  259 cfm                A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 23       Bookmarks    If you have an extensive bookmark collection in your browser  be sure to back  that up as well  You may choose to periodically export your bookmark file from  within the program  or point to the bookmark file itself in your backup software   Check the application s Help tool or consult the web for details     Social bookmarking sites like Delicious have gained a great deal of popularity in  recent years  thanks in part to their immunity to hardware failure  For more  information  see the TechSoup article Thirteen Tips for Effective Tagging           D Thirteen Tips for Effective Tagging  http   www techsoup org learningcenter webbuilding page5508 cfm             Best Practices for Backup    All backup routines must balance expense and effort agai
31. am   s installation CD or files      Recovery Console  A command line environment that you can use to perform  advanced troubleshooting operations  In addition to Last Known Good  Configuration and safe mode  advanced users can use Recovery Console to attempt  manual recovery operations     Backup  A tool for saving data  such as the system state  before you troubleshoot  problems  attempt workarounds  or apply updates  Backup  Ntbackup exe  enables  you to restore system settings and data if troubleshooting attempts worsen the  problem  Use in conjunction with a parallel installation to restore a system that  cannot start in normal or safe modes  Backup is available in safe or normal mode     Automated System Recovery  ASR   A Backup  Ntbackup exe  option to use  when boot and system files become corrupt  preventing your system from starting  in normal or safe modes  or using the Recovery Console  This option is more  desirable than formatting disks and reinstalling Windows because ASR restores  system settings and critical files on the system and boot partitions     ASR Backup   s user interface is the ASR wizard in Backup  which steps you through  the process of creating an ASR backup set and an ASR floppy  Windows XP  Professional Setup provides the user interface to ASR restore     Because the ASR process formats disks  which means you ll lose all of your data      consider this a last resort when using Last Known Good Configuration  Device  Driver Roll Back  System Rest
32. an easily use VoIP  routers or phones with their own Internet connections  Generally  VoIP providers  let businesses set up their group phones at multiple locations and even move  them from place to place for travel or field work           D List of Commercial VoIP Services  http   www dmoz org Business Telecommunications Services VoIP        Betterworld Telecom    http    www betterworldtelecom com     Vonage Features  http   www vonage com features php       8x8 Business VoIP features    http   www 8x8 com business_services           Voicemail to Email Online Services    Depending on your workflow and the size of your organization  a voicemail to   email service could greatly help you in a time of disaster  Such a service would let  you receive voicemail messages quickly from anywhere with an Internet  connection  If phone communication becomes unavailable  you ll still be able to  receive and respond to urgent communications     In the past few years  numerous free or inexpensive voicemail to email services  have gained popularity  These services serve as virtual voicemail boxes for one or  more phone lines  generally allowing the user to access messages either by phone   online  or by email attachment  If you need to give a message to a colleague  you  can forward it as an email from the online user interface or simply forward the  email message  Popular services include Google Voice  formerly Grand Central    YouMail  and RingCentral  Many of these services also let you 
33. an encrypt the data directly from Word itself  see  File Encryption in Microsoft Office  Page 35      There are numerous secure flash drives on the market that automatically encrypt  and password protect any data that   s saved on the drive  Some of these drives       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 18       include additional features such as fingerprint scanners or automatic deletion of  files after a certain number of incorrect password attempts     A less expensive alternative is to use a standard Flash drive with a special  encryption application  FreeOTFE and TrueCrypt are two free applications you  can use to secure the drive  Both applications give you the option either to  encrypt an entire disk or create an encrypted  virtual disk that can be stored on  either an internal or external drive  You can also copy either application onto  your flash drive and execute it directly from there  making it easy to access your  encrypted files from any computer without downloading new software              YB Free OTFE  http   www freeotfe org     TrueCrypt  http   www truecrypt org              Who Should Have a Master Key     How many people at your organization should have a master key  That depends  on a number of factors  How many people in your organization have the authority  to make time sensitive decisions about your tech infrastructure  At the very least   the executive director and one other person should have a k
34. arch of HIPAA Compliant Software              D In Search of HIPAA Compliant Software  http   www techsoup org learningcenter software page11924 cfm          How to Use This Guide    This guide is divided into two sections  Preparing for Any Predicament  Page 10   and Disaster Recovery  Page 41   It goes without saying that for nonprofits who  are recovering from a disaster  the second section will carry more immediate  relevance than the first  and vice versa   regardless of your current situation   however  reading the entire guide can give you a deeper understanding of the  issues surrounding disaster planning and response  If yowre improving your  nonprofit   s preparedness  reading about the recovery process will inform many of  your decisions  If you   re rebuilding after a disaster  this is the perfect time to  think about ways in which you can make your new tech infrastructure nimbler     If you re focusing on disaster preparedness  we ve provided a checklist on Page  40 to guide you through the process  The checklist summarizes most of the  recommendations in the book  it   s an easy way to keep track of tasks and track  your progress     As you document the technologies and strategies you implement in the disaster  preparedness section  you ll simultaneously be creating your own instructions  for a future recovery  Should a tech crisis arise in the future  your own  documentation will be your primary aid in the recovery process  with this guide  and other resources 
35. as supplements     If you re already in recovery mode  Chapter 9  Post Disaster Operations Analysis   Page 67  is intended to help you through the triage process and development of  your recovery plan  The worksheets in Chapter 9 parallel Part II of the guide so  you can complete them as you work through the recovery process        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 7       Printing This Guide    You might find it worthwhile to print the guide so that you can continue to refer  to it during the disaster planning or recovery process  Please consider saving  paper by duplexing  printing on both sides of the page  or using a print  management tool  For more information on using paper responsibly  see  TechSoup   s Reduce Your Paper Use campaign                 YB Duplexing  How to Print or Copy on Both Sides  http   blog techsoup org node 579       Choosing Print Management Software    http   blog techsoup org node 575    Reduce Your Paper Use  http   www techsoup org greentech paper              Symbols in This Guide    The following symbols appear throughout the book     v Additional Resources  To make the book easy to use in both electronic    and printed forms  we   ve provided both URLs and clickable links for additional  online resources     ra  Tips and Warnings  This symbol denotes information that can save you  time or help you avoid a dangerous situation     Q Your Stories  We surveyed over 300 NGOs around the world i
36. ation when necessary  but  that information is vulnerable to loss  whether through theft  someone breaking  in and stealing computer equipment  or damage  such as a leaky water pipe or a  natural disaster   Online remote backup moves the data out of your office and to  a third party facility  usually a large  shared datacenter  This means you don t  incur the capital expense of purchasing backup equipment  and in the event of a  disaster you can still recover critical data  assuming you choose a remote facility  outside the radius of earthquakes  floods  hurricanes  or other potential  disasters      Automation is another key benefit to remote backup  A software program won t  forget to make an extra copy of a critical folder  a harried employee at the end of a       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 30       busy week might  By taking the backup task out of your users  hands you avoid  the problem of     I forgot        Choosing a Remote Online Backup Provider    A downside to online remote backup is that you have to entrust critical data to a  third party  Thus  due diligence is required on your part to ensure that the  provider you choose is reliable and financially secure  Otherwise  you might end  up with a company that has sloppy data protection habits or goes out of business     When shopping for a provider  ask to speak with one or two customers who have  used that provider  You should also ask for specifics about e
37. bile phones can transmit  data natively  Some can be used as a modem as well    Data Card  A one time price of  150 to  250 per laptop    Note  Individual computers can access the Internet using either PC cards or  mobile phones attached by a cable  This connection could then be shared on a  network using Internet Connection Sharing     Satellite Internet  Dish captures a broadcast signal    Pro  Works almost anywhere  somewhat faster than dial up   Con  Expensive  not particularly easy to set up    Equipment  Cost  About  400 for satellite and possibly LAN equipment   Note  Can be shared with clients over a wired or wireless LAN     Sharing a Network    Depending on the scope of the disaster and resources available  sharing a  network or Internet connection with multiple organizations may be the most  feasible solution available  Sharing a network is relatively simple  but requires  some planning so that each organization can get the resources that it needs  Start  by setting up the core network where the Internet connection  if any  enters the  office  Most consumer and small business networking equipment can  theoretically support around 250 separate computers or network devices  though  the more heavily used the network  the fewer devices a router will be able to  handle     Organizations with privacy or confidentiality concerns may want to use a second  router to subnetwork parts of the network  It   s possible to use multiple routers to  create a number of different sub
38. by delegating tasks appropriate to their skills and the situation   s needs    e Do not assume that first responders     public services that deal with    emergencies and other aspects of public safety  such as public utility  crews  community emergency response teams  firefighters  and so on            c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 67          will keep you informed  and never assume that the danger has passed   Contact them to ensure that you are receiving accurate and current  updates on the status of the situation  likewise  these agencies and  personnel may require information from you     Make sure you re relying on a dependable news source for information  in  other words  don t believe everything you see on the news or read in the  press  which may be sensationalized   If need be  appoint someone to  handle public relations to ensure that the information you re receiving is  consistent     Contact staff via a phone tree that follows your normal chain of  management  with top level managers contacting their direct reports and  so on  so that everyone is covered  To do this  you will need up to date   readily accessible home and cell phone numbers     Establish a help desk or two     one for customers and one for staff     to  avoid overwhelming the switchboards     Once the above process is set in place  you can begin to evaluate and address the  disaster   s likely impact on the organization     1  Will you requi
39. ccaeteudeonwdeasleintanaacpedesstatedesdecntbesctadve 65   Chapter 9  Post Disaster Operations AnallySis               ccsssccesssssssessescscessees 67  People and Deliverables ssscesccecaceescestczcaiastgvasterseascesneraqeonsdeds taneauatbpaseosenieniaaconsdesabate 67  Operation tae ee en ee oe eh ener A R 69   COMMUNICA ONG osere i eree ar E E E E E E ER 70  Business Impact Assessment QuestioOnMalre           cccccccsesecsseesesseeeceseeseeseeseeeenees 71  Workflow Relationships tis siacs carts 2h cece shew csceanes apzese cu acen ks deseeheshecnatalieuecvatubecnicaiueeuiae 75  Vital RECTAS serseri eserse ees anea E EEEE EE EAER IE TERESE O ESS 76       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 5    Introduction    TechSoup created the first version of this guide     originally titled Restoring IT  Infrastructure  A Manual for Disaster Recovery     shortly after Hurricane  Katrina struck the southern United States and left numerous nonprofits and  public libraries scrambling for solutions  Although many organizations told us  that the information and recommendations in the first guide helped them get  back on the ground more quickly  many of you pointed out that the guide was  only half written  where were the instructions for disaster planning  We hope  that this version is the answer to that question     Don   t think of the suggestions in this book as mere precaution against a natural  or man made disaster  think of them as t
40. ch each product and verify it as a safe and useful tool for some  though not  necessarily all  NGOs before listing it on our site     Some of TechSoup   s products are donated by the vendor  while others are offered  at a discount  For donated products  the admin fees cover only TechSoup  program costs  for discounted products  the vendor receives a portion of the  admin fee  In both cases  we   ve researched the options available on the market to  make sure we   re giving fellow nonprofits the best possible value     For U S  nonprofits and libraries  we also facilitate the Refurbished Computer  Initiative  RCI   RCI lets qualifying nonprofits request refurbished computers at  competitive prices        If yow   re in the United States  visit TechSoup Stock to see our product listing  For  organizations in other countries  visit our list of countries to find our partner in  your country or region        i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 62       From time to time  TechSoup Global   s international partners offer special  donations and services for NGOs impacted by nationwide disasters  Check with  your country   s TechSoup partner for more information           D TechSoup Stock  United States   http   www techsoup org stock        Refurbished Computer Initiative  United States   http   www techsoup org stock rci     List of Countries  TechSoup Global   http   www techsoupglobal org countries             Discounted Softwar
41. e  don   t recommend storing your documentation on web applications like Microsoft  Office Live and Google Docs     Encrypt your data  see Chapter 4  Privacy and Encryption  Page 34  and upload it  to your backup service  see Remote Backup  Page 29   Alternatively  you could  send the encrypted files to a webmail account like Yahoo or Gmail  do not send  them unencrypted               Disaster Planning Is for Employees Too      Employees and volunteers need to have their own personal disaster plans  in place as well so they can spend the effort needed at the organization  when a disaster strikes         Karen Roberts  Senior Resource Association  Vero Beach  FL             i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 20       Chapter 3  Remote and Local Backup          D Delicious  tsdp backup  http   delicious com tag tsdp backup    Backing Up Your Data  http   www techsoup org learningcenter software page6089 cfm       The No Excuses Guide to Automated Online Backup  http   www techsoup org learningcenter internet page5813 cfm          The best way to prepare for any disaster is to keep your data backed up  There are  two broadly defined approaches to backup     e Remote backup  Your computer automatically sends your data to a remote  center at specified internals    e Local backup  Your computer copies your data to a second hard drive or  other media source  either manually or at specified intervals     Either route  or both  may
42. e  in a separate Microsoft Excel file available in our Disaster Planning and Recovery  Toolkit              D Disaster Planning and Recovery Toolkit  http   www techsoup org toolkits disasterplan index cfm          People and Deliverables    To recover from a disaster  it   s important to respond quickly and effectively   identifying needs  prioritizing resources  and communicating clearly  The  checklist below can help you organize people and communication during a crisis  so that you are able to accurately analyze the impact on of the disaster on your  organization and prioritize recovery efforts     Staffing and Communication Guidelines    e Ifyou have a plan  then follow it as you  hopefully  did in your practice  drills  While some things won   t go as planned  most things should     e Ifyou don   t have a plan  then you need to determine how you will proceed   decide who will do what  and when     e Once you have determined who in your organization is responsible for  making which decisions  ensure that there is also a process in place to  cross check these decisions           Tip   g Try to keep communication simple  In the absence of a formal risk or issues  register  an old fashioned message pad and to do list will suffice           e Beware of heroic    Rambo    types making drastic decisions  especially if  these decisions could risk lives or limbs  In addition  some people feel they  must be in the thick of the action to be helpful     try to harness this energy  
43. e Alternatives    Some technology companies offer product donations and discounts to nonprofits  directly  Similarly  many software resellers list special prices only for nonprofits   For an up to date listing of both  see A Quick Guide to Discounted Software    Programs        If you need software from a certain company  check their website to see if the  company makes any special accommodations for nonprofits  Even if you don   t  find information on a vendor   s website  it never hurts to call and ask           D A Quick Guide to Discounted Software Programs  http   www techsoup org learningcenter software page5055 cfm          Borrowed Technology    If yov   re using another organization or individual   s computer  you probably can   t  wipe the machine and set up a fresh account  But you still need to safeguard your  organization   s data from loss and corruption  as well as accidental disclosure  once you return to a more stable environment     all while respecting the  constraints imposed by the equipment   s owners     Setting Expectations with the Lender    Make sure you and the lender understand what counts as acceptable use and who  is responsible should something go wrong  If the equipment comes with  preexisting conditions  you need to know about them before deciding whether it  is suitable for your organization  A written agreement will help make sure you  know where you stand if things don   t work out  If the equipment is particularly  valuable  you may want t
44. e tasked with repairing  restoring  or changing your  organization   s tech infrastructure     e Warranties and receipts for computers and peripherals   e Information about where  how  and how frequently your data is stored and  backed up   e Instructions for how to restore your data   e Passwords for encrypted data   e Contact information for any employees  volunteers  or consultants who  maintain your organization   s tech infrastructure   e A phone tree that includes home and cell phone numbers for all staff  The  phone tree should follow your normal chain of management  with each  manager contacting her direct reports in case of an emergency    e Login information for administrative accounts on all computers   e Login information for web hosting and backup services   e Contact information for web hosting and backup services  if there   s an  account representative devoted to your account  include his or her name  and contact info    e Software registration information  including keys    Although you may have pieces of this information scattered in various binders  and email accounts  you ll thank yourself later for compiling it safely and  accessibly in one place  Losing your web hosting information or communication  with the one volunteer who knows all of your passwords can exacerbate a  disaster         lt i  Mac users   See Apple   s instructions for exporting your Keychain data              D Exporting your Keychain data  Mac   http   support apple com kb HT2980 key  
45. eed to re register your domain name  see below   but you will  need to pay for a new web hosting service  Being able to pick the right platform is  important if you have backups of your site  which may have been built on a specific  platform  or if you are hoping that your original web host will return and you want  to maintain the same platform in case you switch back  If your website included a  database on the web host   s servers  the availability of the correct database platform   for instance MySQL  or MS SQL Server  is also important     2  Update Your Domain Registration     Once you have paid for a web hosting service  you have to update the information  at your domain registrar to  point  the address of your domain to the new web host   as opposed to the old one   This is usually as easy as logging in to your domain  registrar s control panel and updating the information yourself  Depending on the  registrar  however  you may need to contact your web host directly and ask them to  do it  if this is the case  be prepared to prove who you are  otherwise anyone could     hijack    your website   The same goes if your domain was previously registered by  a company that is no longer online and you need to transfer your domain name to a  registrar that is still operational     In the best scenario  the person  or entity  listed as the admin contact in the  WHOIS information you looked up on DNSstuff com will match the current       A        The Resilient Organization  A G
46. emory devices  and external hard  drives are useless  Absolutely not  Here are some ways to use them     e Use CDs and DVDs to archive old data  Old information     such as audit  records or historical data     may still be of value to your organization  CDs  and DVDs are also appropriate for storing data that you won t need to  modify  such as photos and finished printed materials  Both generally  involve large files that you may need to refer to but aren t likely to go back  and change  Archiving old data files to discs is also a great way to  supplement your tape based backup strategy  because it lets you save  resources by backing up big chunks of files that won t change  Plus  disks  make your archives portable     and it s easy to store a copy off site        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 28       e Use flash memory devices for transferring files  or as a secondary backup   Flash memory devices are great for making quick  easy  redundant  backups of super critical files such as databases and accounting files           Q Standardizing Practices Across Multiple Branches   Cincinnati   s Freestore Foodbank serves over 7000 individuals a month in  the greater Cincinnati area  and those numbers double in November and  December  Before undergoing a major overhaul of their tech infrastructure   the Foodbank   s multiple branches had a lot of trouble communicating and  working together  both internally and externally  Joh
47. ey     When thinking about who should have a master key  consider the problems that  could befall your nonprofit  for example  if you live in a flood prone area  be sure  that it least one is in an area that   s not susceptible to flooding  If the executive  director does not live in the same city as the main office or is on vacation for part  of the year  the decision maker who works in the ED   s absence should have a key        Pa  A Note on Passwords   There are various philosophies surrounding how frequently you should  update your passwords  In this guide  we   ve made the decision to  emphasize storing your passwords safely over changing them frequently   One thing to note  though  is that it   s advisable not to use the same  passwords for highly sensitive accounts  like your web hosting and backup  services  as for day to day nuisance logins  like online newspaper access  and other low security online services   For more information  see the  TechSoup article Password Tips for Privacy           D Password Tips for Privacy  http   www techsoup org learningcenter internet page6912 cfm          Storing Your Documentation Online       Cc  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 19          There are various approaches to storing your documentation online  What   s most  important is that it   s easily accessible for you and your fellow decision makers   but impervious to accidental or malicious security breaches  For this reason  w
48. f many networks     may be a  high priority for your organization  as it is probably the key to recovering  your data and getting the rest of your network up        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 43    To recover mission critical data from a machine that is physically damaged  and  for which you do not have a backup   we strongly recommend hiring a data   recovery professional   See Data Recovery  below  for additional information on  retrieving lost data            Q Quick Disaster Checklist   Guangdong Peizheng College   s three campuses in China have occasionally  been impacted by power surges and equipment failures  Ruishen Sunding  shared with us these disaster preparation and recovery checklists     How to prepare   1  List all aspects of disasters so that the IT department can think of  appropriate solutions to address any possible disaster    2  Train employees and volunteers on your disaster plan before a disaster  strikes  not after  A disaster rehearsal may be useful    3  Save instructions for a disaster on every desktop    4  Necessary toolkits for a disaster should be handy for each employee too     How to respond   1  Announce the emergency to staff  volunteers  and stakeholders  immediately    2  Ask employees to follow the disaster instructions    3  Deliver the materials and toolkits for aid    4  Repair or replace damaged computers and their accessories as soon as  possible           Reestablishing Com
49. ff attention and which ones you can slow or pause during the  rebuilding process  This guide is intended to help you simultaneously continue  key operations and rebuild your infrastructure     Although some of our recommendations may still be applicable  this guide is not  intended for NGOs whose continued efforts in a time of disaster may be putting  their staff in danger  If your NGO is trying to recover during a civil war or other  period of political upheaval or if your work requires your staff to stay in an area in       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 6    which a disaster is taking place  you might find more appropriate information  from your local Red Cross or Red Crescent     This guide necessarily focuses on your technology infrastructure in disaster  preparation and recovery  Of course  disaster preparation and recovery have  other components     including financial and human resources issues     which we  unfortunately can   t cover in depth     Laws and standards about encryption and security vary a lot from country to  country  Please consult materials appropriate to your country for specific security  recommendations  especially if you manage health records or any other data  protected by law  In the United States  health data is protected by the Health  Insurance Portability and Accountability Act  HIPAA   For information on  making sure your database meets HIPAA standards  see the Idealware article In  Se
50. g an emergency   you could add essential information to the top portion of the page  including  contact info and any changes to your organization   s programs and services  Since  the page displays your Twitter updates automatically  it   s easy for your  volunteers  donors  and constituents to stay in the know     If the main way you communicate with your constituents online is through a blog  or Facebook page  you can use the RSS feeds from those sources to display  updates on your emergency homepage as well        What   s most important is that your emergency website display up to date news  and contact information  especially if your organization provides support to  people impacted by disasters           D Sample Emergency Website  http   backup idiolexicon com     How to Add a Twitter Feed to Your Website    http   remysharp com 2007 05 18 add twitter to your blog step by   step     Displaying RSS Feeds on Your Website  http   www techsoup org rss rsswebsite cfm                Cc  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 15          Chapter 2  Documentation and Your Master Key          D Delicious  tsdp documentation  http   delicious com tag tsdp documentation          Documentation is your first and most important defense against a disaster   natural or otherwise  No matter the state of your technical infrastructure  you  should have the following information available in a form that   s easily accessible  for anyone who might b
51. g between sites which  was a huge time savings for the 1 5 members of the IT staff  It allowed us to  take advantage of Active Directory for the first time and control access to  files  form policy groups  enforce policies  and helped us to secure some of  the holes that were causing problems  From there  the standardization of  the desktops began with the purchase of XP licenses and office licenses to  bring us up to a level where we could share documents and not worry about  what version or what program the document was created in  Productivity  rose and fewer client files were delayed in reaching necessary desks as most  of the paperwork is now available electronically  This is especially  important now because we are seeing more than 200 clients daily        One of the most critical purchases that we made was the Data Protection  Manager  DPM  software for doing shadow copy replica backups of our  files  It allowed us to take our data and save it off site by having each site                   i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 29          have its own DPM server located at the opposite site  It also allowed our  user base to recover different versions of documents if they were  accidentally overwritten or deleted  This advantage became especially  important during the September 2008 windstorms when our Liberty Street  location was without power for four days  We were still able to be partially  operational because the 
52. g this function during the recovery process     Potential Impact  Estimate the potential impact to your constituents if this  function is paused        Additional Costs  Estimate what additional costs  fines  claims  cancelled  contracts  lost discounts  interest payments  etc   the organization would incur if  operations were not restored following a disaster        Ti  D  2P  M When filling out the Excel sheet  use formulas to facilitate calculations           D About Formulas  http    office microsoft com en us excel HP052255841033 aspx          gee    I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 74       Health and Safety  Use the chart below to outline how health and safety might  be compromised if certain processes were not performed following a disaster   Rank them in their importance to business continuity     Workflow Relationships    Use this section to describe the workflow relationships that are relevant for your  organization       Business Interfaces  List any internal or external business interfaces   including companies  banks  and customers           Staff Relocation Requirements  Use this chart to indicate how mane  desks are required to restore continuity  and what each workstation will need     pa       The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 75       Vital Records    Data and File Recovery    The following charts serve as a way to organize and see what data is missing       Report Re
53. gy from  it may be able to provide you with  copies of your receipts  which would normally include hardware and software  specifications  Larger vendors and vendors in unaffected areas are most likely to  have access to this kind of information  but try other vendors as well     If your technology was paid for by a funder  you may have provided them with  receipts or other purchase details  Ask for copies of your grant reports  which may  detail the information you need for insurance claims     If all this fails  do not panic  Your insurer is likely to be flexible  Talk to your agent  about the insurance provider needs from you in the absence of a full inventory  In  the meantime  put together the information you can remember on a form like the  one we ve included in Chapter 9  Post Disaster Operations Analysis  Page 67         c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 57    Chapter 7  Tips for Reviving Broken Computers    If you have access to your backups  and have practiced for a disaster recovery  your  restore procedure should have been in place  However  if you cannot access your  backup  or don   t have one  it is still worth trying a couple of these tips before  declaring a computer dead  Computers are more resilient than most people realize   and though a computer may not be in a usable condition  you may be able to  recover critical data from it     Some of the tips below have been gleaned from real life experiences publis
54. have a single  telephone number that will forward to multiple numbers at once        c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 13             YR Google Voice  https   www google com voice     YouMail  http   www youmail com        RingCentral  http   www ringcentral com           Electronic Fax Services    If your nonprofit uses fax messages  you might want to consider an electronic fax  service like MyFax  In a time of disaster  you might be away from the office or no  longer be able to use a landline fax line  with an electronic fax service  you d still  be able to send and receive messages  These services are discussed at length in  the TechSoup article Electronic Fax Alternatives for Your Nonprofit              D Electronic Fax Alternatives for Your Nonprofit  http   www techsoup org learningcenter techplan page10992 cfm       MyFax Offering at TechSoup Stock    http   www techsoup org stock Category asp catalog name TechSoupM  ain amp category name Protus          Your Backup Web Presence          D Delicious  tsdp website  http   delicious com tag tsdp website          In many ways  your nonprofits website is the most visible part of your  organization   s operations  Its natural that in a time of disaster  people who care  about your nonprofit will turn to your website for updates  Unfortunately   maintaining your website during a disaster     let alone adding needed updates      may be too difficult  especially if your compu
55. hed on  TechRepublic com  a resources site dedicated to IT professionals  Some are last   resort actions not recommended by manufacturers  Though we offer them here to  provide ideas  we cannot guarantee their effectiveness  We have also provided  information from Microsoft com on Windows XP recovery  for those who do not  have access to the Internet     Because TechSoup cannot guarantee the accuracy or effectiveness of these tips  do  not attempt any of them if     e You don   t have a backup of mission critical data   e You think it may make your problems worse   e You do not feel technically qualified to follow the advice     General Data Recovery Tips    The following information can help in your data recovery efforts     e Look for the name  type  and  model number of your computer anywhere on  the case    e Try to find the recovery discs for the operating system  or at least remember  which version you were running     e Don   t forget warranties and manufacturer support  Call the manufacturer to  see if they can help fix your computer     Real Life Data Recovery Tips    These data recovery tips were posted to Techrepublic com by members            lt i  Warning      Wait until your computer is completely dry before attempting any of these  steps           The following tips assume you can see some sort of electrical connection when you       c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 58       plug in your computer  As soon as 
56. ice Provider  ISP    or elsewhere     or you may have hosted in house     Below  you ll find guidance on what to if your website is down  if you need to move  your email to another host  or if your website is OK  but all of your access records  and passwords are gone     For each of these situations  you will need to get as much information as you can    about your current host and domain registration  If you do not have your own  record  tools on the website DNSstuff can help you find this information        c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 54             YA DNSstuff  http    www dnsstuff com        To retrieve your site s information on DNSstuff com  enter your domain name in  the site s WHOIS Lookup box  located in the home page s left column  three boxes  down  The resulting WHOIS information page will tell you    e The registrar     Sponsoring Registrar       e The contact person for the domain  under    Admin contact       e The name server     which will inform you of the current web host       Tip        lt   If the domain registrar is Network Solutions  then you must use Network  Solutions    WHOIS search to look up this information              D Network Solutions WHOIS Search  http   www networksolutions com whois           Scenario 1  Website Is Down    If your web hosting company is down and you need to get some sort of presence on  the web as soon as you can     1  Choose a New Web Host     You likely do not n
57. ips for keeping your organization limber  and ready for any new opportunity or challenge  Using our suggestions for  documentation  backup  and unified communications  you can build a tech  infrastructure that will be reparable after a disaster  Perhaps more importantly   though  you can use those same strategies to serve your constituents in new ways  when an unexpected opportunity arises  The provisions that ease rebuilding your  tech infrastructure also let you build an ad hoc office to carry out your mission in  a new place or circumstance  For this reason  we hope that this guide will not  only prepare you for a crisis  but deepen your nonprofit   s impact in times of  health too     Who Should Use This Guide    Part I of this guide  Disaster Preparation  offers guidelines and strategies that  would be useful for any nonprofit  NGO  or public library in the world  though  some are more applicable for smaller organizations  For large organizations  we  encourage you to discuss our recommendations with an IT manager or consultant  to develop an appropriate plan for your organization  We   ve also supplemented  this guide with links to additional information from around the Internet covering  numerous perspectives     One unfortunate irony is that for many nonprofits  disasters are the times when  your constituents are most in need of your services  Part of a recovery plan   therefore  is a triage phase in which you evaluate which programs must continue  to receive full sta
58. ll and efficient chassis  While specific features such as  scheduled backup or FTP access depend on the model  all NAS  implement some form of hardware RAID which makes them a  reliable form of backup hardware           D       RAID  Wikipedia   http   en wikipedia org wiki RAID          i A  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 26       Choosing Backup Software    Having cost effective and reliable backup hardware is only half of the equation   Many backup devices come with backup software that works for most data   storage needs  The Professional Editions of Windows XP and Vista  but not  Home Edition  come with their own backup software under Start  gt  All Programs   gt  Accessories  gt  System Tools  gt  Backup  which are adequate for individual users   For an organization wide backup strategy  however  a dedicated program such as  Symantec s Backup Exec or EMC s Retrospect is preferable  Consult the software  documentation for details to determine specific needs  Microsoft offers an in   depth description of the most common types of backup     full  incremental  and  differential     Locating Files for Backup    Once you have the hardware and software in place  you need to know the location  of the data you wish to back up  While most Windows users store data in their  documents folder  there is also a tendency to keep files and folders on the  Desktop  which you ll need to back up as well  Special database  or financial   soft
59. lly if your provider doesn   t perform backups  but even if it does   there are  many reasons to keep a copy of your website on an office computer  If you start  the habit of editing your site on your computer rather than directly through an  FTP connection  then you can test the site before uploading it and you ll always  have the up to date site ready to upload in case of computer failure or human  error  what   s more  you won   t need an internet connection to make edits to your  site or find information on it        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 22          Documentation    Remember all that documentation you did in Chapter 1  Page 16   Don   t forget to  back it up too  Keep it on your USB master key  but be sure it   s also stored  securely in a backed up folder on your computer  for more about security  see  Page 33      Internal Data    Does your office have a lot of internal data stored only in hard copies  For  example     Government forms  such as 501 c  3  paperwork  Financial information   HR information   Contracts   Leases    This type of information should be stored in a waterproof safe or file cabinet as  well as backed up electronically  either scanned or computer generated      Email    If your organization uses an in house email server  it must be a part of your  backup plan  Many email servers include their own backup utilities  check the  user   s manual for more information  If mail is stored loc
60. lost  However  if there is even a remote chance that you would  permanently damage the media  do not attempt a restore     Lastly  look for other places you may have inadvertently stored your data  Perhaps  you emailed your database to a consultant and it   s sitting in his inbox  Perhaps  printouts of the data exist that you can re enter  data entry is often less expensive  than calling on technology experts   If you do find a copy of your data  back it up  and make a copy before you do anything else  Use only this copy  saving the  original in case something goes wrong with the duplicate        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 52    Dealing with Lost Passwords    Even though a system is functional or revived  you still may have lost the  passwords to access it  Here are some ways to regain dominion     Administrative Rights on Computers  Windows Computers  If you have Internet access and are feeling brave  check    out the following link for fairly technical details on how to reset the admin rights  on most Windows computers           YB Forgot the Administrator   s Password   http   www petri co il forgot_administrator_password htm          Macintosh Computers  You can use a Mac OS installation CD to reset the  passwords on a computer     e Start up from a Mac OS X Install CD  one whose version is closest the  version of Mac OS X installed   Hold the C key as the computer starts    e Reset Password from the Installer me
61. m tsdp  along with any other  pertinent tags  in Delicious  This is the first time we   ve tried to facilitate  collaboration in this way  and we re excited to see what resources readers will  bring to the community        i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 9          Part I  Preparing for Any Predicament    Disaster preparedness isn   t just about being ready for a fire or earthquake  it   s a  nimble  flexible approach to your organization   s day to day programs and  operations  A natural disaster may never hit your office  but by adopting certain  technologies and strategies  you can deepen your nonprofit   s impact and make  your work faster and more efficient     In this section  we ll discuss simple strategies to prepare your nonprofit or public  library for new challenges and opportunities  First  we ll talk about  communications strategies that work just as well outside your office as inside   Next  we ll help you document essential processes to reduce downtime during an  emergency  Later  we ll discuss backup strategies to protect your data from  computer damage  Finally  we ll talk about ways to protect your systems from  man made disasters  malicious and otherwise        i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 10    Chapter 1  Your Office Is Everywhere    As we said in the introduction to this book  disaster planning isn   t just about  being ready when a fire or
62. may still be current  but you will not  have direct access to the domain control panel  and will need to request the IP  address and MX record updates  as opposed to doing them yourself     The key to proving who you are     the admin contact listed in the WHOIS record      is usually listed after the  registrant  information  Sometimes the email address is  masked  making it harder for you to find out what email address to use to contact  the registrar  Hopefully  the street address is correct  and matches your  letterhead   making it easier to send written requests     If you have no idea who your current web host is  you can try to look at the bottom  of the WHOIS page for a  Name Server   Sometimes  this is obvious   dns webhostcompany com   while other times this is just an IP address  You can  also use DNSstuff com to do a  reverse lookup  of an IP address to find the site  name for your organization  Note that this will not always reveal who the web host   however     If your organization was hosting its website in house  the WHOIS results can be  very confusing  so try to resolve any internal network or server issues before  getting lost in recursive searches     Filing Insurance Claims    Often insurers want detailed information on the systems you had before theyll pay  out  But what if you didn t keep good equipment records or lost what you had     If this is the case  others may have kept this information for you  If you know the  vendor you purchased your technolo
63. mputer  Windows 2000 and above  Linux  kernel 2 2 x and above  Mac OS X  with a DVD or CD drive or functioning  USB port  This means you can  restore  your data  even without  specialized backup hardware  Moreover  in the event of a disaster  you can  often recover data more quickly from a CD  DVD  flash memory device  or  external hard drive than from a specialized tape format or device     Cons    e External hard drives  though convenient and cost effective  may not  always be conducive to best backup practices  such as making routine off   site copies or conducting incremental backups     e Since it is easily readable  from a data security point of view  direct copies  of data stored on CDs  DVDs  flash memory devices  and external drives  pose more of a problem in the event of loss or theft  Even with password  encryption  this data is less secure than it would be in a harder to read  backup archive     Although discs have fewer compatibility issues overall  the data stored on them  may not be readable on every workstation  especially if your nonprofit has older  hardware or donated machines with varying specifications  With writable DVDs   for example  there are a plethora of standards  DVD R  DVD R  DVD RW  DVD   RW  to name a few   For a guide to formats  read Webopedia s DVD Formats  Explained              Ye DVD Formats Explained    http    www webopedia com DidYouKnow Hardware_Software 2007 DV  DFormatsExplained asp          Does that mean that CD  DVDs  and flash m
64. munication    As we said above  reestablishing communication should be a top priority  This  means establishing communication among the staff and volunteers  as well as  communication with donors  beneficiaries  and friends of the organization   Reliable communication     both external and internal     will be essential both to  rebuilding your infrastructure and to continuing your essential programs     Telephone Communication    Are your telephones intact  If not  its probably a good idea to reestablish  telephone communication  If your staff will be working at home and or using  mobile phones  you can contact the telephone provider and have your office  numbers temporarily forwarded to the appropriate landline or mobile numbers   Most hosted VoIP services allow you to redirect lines to outside numbers  see  Unified Communications  Page 11   If you have Internet access  consider using  Skype or a similar softphone service        c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 44       Change all of your outgoing voicemail messages to include basic information  about your nonprofit   s rebuilding efforts  The message should briefly outline any  changes in your organization   s services and instructions for how to stay informed        Tip  M If the staff will be using personal mobile phones for work during the  recovery effort  find out whether their mobile plans include enough  minutes per month to cover the increased usage  If not  temp
65. n research    for this guide  see footnote on page 11   This symbol denotes results from the  survey and follow up interviews as well as stories from other contacts in the  nonprofit sector       Excel Charts  Chapter 9  Post Disaster Operations Analysis includes    several example charts to aid your operations analysis  The charts are available  for your use in an Excel file  which you can download from our Disaster Planning  and Recovery Toolkit  see below         i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0       Additional Resources    More resources are available in TechSoup   s Disaster Planning and Recovery  Toolkit  Throughout this book  you ll see links to additional resources at  TechSoup org and elsewhere on the Internet  formatted like this           D Disaster Planning and Recovery Toolkit  http   www techsoup org toolkits disasterplan index cfm          We encourage reader collaboration using the tsdp  TechSoup Disaster Planning   tag in social bookmarking site Delicious  In each chapter of this book  we provide  a link to a set of tsdp tagged bookmarks  For example  in the chapter on backup  you ll find the following link           D Delicious tsdp backup  http   delicious com tag tsdp backup             For easy reference  all of the additional resources we reference in this book are  also tagged in Delicious  If you find additional resources that you think would be  useful for others  you can add them by tagging the
66. ncing   instant messaging  IM   voicemail  fax  and SMS messages     The central idea behind UC is that if an employee can access and reply to a  message using whatever device is convenient at the moment  regardless of what  sort of device the message was generated on   there will be less lag time between  replies and the organization will be able to communicate more effectively  internally and externally  In a disaster scenario  it   s essential that fast  communication not require employees    physical presence in the office     1 In research for this book  we surveyed a total of 346 NGOs and public libraries in 12 countries   The survey was open both to organizations that had had disasters damage part of their IT  infrastructure and ones that hadn   t  We also had follow up discussions with a several  organizations  Some of the respondents we cite chose to remain anonymous        c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 11          Evaluating Your Organization   s Needs    Remember that UC refers not only to certain technologies  but also to business  practices that encourage a smooth flow of communications among several media   thus  before selecting a UC strategy  it s a good idea to take an inventory of how  your organization currently communicates both internally and externally  Do  employees communicate with each other more by phone or by email  Do  employees use personal phones and email addresses for work  Do volunteers a
67. nd  other people outside of the staff use office telephones and email  After you  implement a UC solution  whose job will it be to maintain it  In a disaster  situation  what steps would be necessary to reestablish communication     Most importantly  remember that staff adoption of UC is just as important as  choosing the best technical approach  Train your staff to use new  communications solutions and make sure they have time to learn and ask  questions     Selecting and Implementing a Unified Communications Strategy    Hosted VoIP Services    Adopting a hosted Voice over IP service can deepen your organization   s ability to  communicate during a disaster  A hosted VoIP service in the office is functionally  similar to POTS  plain old telephone service  lines  but it doesn   t require that all  employees work in a single  physical office  During a disaster  an employee can  bring VoIP equipment home and use it with her home Internet connections  or  have the VoIP service forward her calls to a mobile phone     There are numerous VoIP services on the market  Two services with a strong  focus on unified communications are Vonage and 8x8  Inc  An organization can  sign up with either service for a monthly fee of approximately 40 to 50 dollars a  month for each phone line           8x8 uses a special  Internet connected phone  while Vonage provides an Internet  router with a standard telephone jack  Both services can deliver voicemail  messages by email  Both also allow users 
68. nd Accidents    O Enact a policy for critical logins  O Develop an end of employment policy and make it available to employees       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 40    Part II  Disaster Recovery    Part II is intended for organizations trying to recover their IT systems after or  during a disaster  We ll start by discussing triage  the process of choosing  priorities and determining which programs you must continue through the  recovery process and which ones can be slowed or paused  Next we ll discuss how  to recover or replace hardware  your network  Internet access  and your website     In Chapter 7  we ll offer some tips for repairing a broken computer  In Chapter 8   we ll recommend options for donated  discounted  borrowed  and shared  technology  Chapter 9 consists of worksheets and instructions to guide you  through post disaster impact analysis and triage     There   s no way that one book could include instructions for responding to every  disaster or accident that could befall an NGO or public library  In developing this  guide  we   ve chosen to favor information and techniques that can apply to a wide  range of organizations  which in some cases has meant a sacrifice of depth in  particular topics or recommendations for organizations in particularly unusual  circumstances  We   ve included links to several outside resources  and we also  encourage you to add your own resources via the tsdp tag in Delicious
69. networks that all tie into the core network     For organizations that have less stringent security requirements  sharing a single  network should not present many difficulties  The key to sharing a network  smoothly is to set up each organization s computers with a different workgroup  name and provide each computer with a descriptive name  In Windows  you can  set up computer and workgroup names using the Computer Name tab in the  Control Panel  For Macintosh OS 8 x to 9 x computers  you can set the computer  name in File Sharing control panel  For Macintosh OS X computers  you can set  the computer name in the Sharing System Preference pane  Macintosh computers  do not natively use workgroup names     Data Recovery       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 51    If you have lost data during a disaster and your backup plan didn   t account for  this sort of catastrophe  there is still hope     In the Technology Triage section of this chapter  Page 43   we talked about  establishing what is critical to your organization to operate following a disaster   You also need to decide how much yow   re prepared to spend on this recovery     If lost information is mission critical  such as your donor list  for example  you  may want to pay for data recovery  There are a lot of companies that do this   Costs can range from just a few hundred dollars to tens of thousands of dollars   One data recovery vendor offers the following advice
70. ng     Once a week or so  can vary depending on your level of activity   check the  documents on your master key to see if there   s anything that needs to be updated           Q Essential Contact Information  Are You Ready    We spoke with the director of development and operations at a human  services organization in California  She said that her organization was ready  for a hardware failure  with a combination of local and remote backups   with the most critical data being backed up multiple times every day  She  admitted  though  that the organization   s communications were  considerably less prepared     With a staff of eleven     Everyone has everyone else   s phone numbers  programmed into their personal mobile phones  But we also have a youth  program for about 25 students and there is only one staff member who  knows how to contact their parents  If that staff member were unavailable  during a disaster  it could take the rest of us a few hours to find everyone   s  contact information        After our interview  she set a meeting with her staff to identify critical  information and make sure everyone has appropriate access to it in case of  an emergency           Encrypting Your Master Key    It   s easy to store the documentation listed above and any other essential data on a  flash drive  but you should be sure to encrypt any sensitive information so that it  doesn   t get into the wrong hands by accident  If your documentation is in  Microsoft Word format  you c
71. nna Higgins writes        Our growth was previously hampered by our inability to communicate and  share information over multiple sites on a reliable network using  standardized software  The servers were old  the software was ancient  and  no one had the same version of word processing or spreadsheet software  It  was difficult to share files between sites let alone between computers  as  well as send things out to donors  board members  or anyone asking for  information  Our mail was hosted externally for the upper staff and through  POP mail from our internet provider for the remaining the staff  Without a  common desktop platform  working together was difficult and  cumbersome  There were no backups because the DAT tape drive that was  being used had quit working  and there were no monies to replace it   Through the Microsoft donation program at TechSoup  we have been able  to purchase software that we would not have been able to afford otherwise   make a multi year plan for network and desktop standardization  formulate  a reliable backup plan  and find a way to protect ourselves from potential  disasters  bring e mail in house  and work towards bringing stability and  security to our organization        We began with the implementation of updated server technology  A server  was purchased for each site and new server operating software and licenses  were purchased and loaded onto them  Having a common operating system  helped to end some of the issues that were happenin
72. nst risk  Few backup  methods are 100 percent airtight     and those that are may be more trouble to  implement than they re worth  That said  here are some rules of thumb to guide  you in developing a solid backup strategy     Plan your backup strategy  Develop a written backup plan that tells you     What s being backed up   Where it s being backed up   How often backups will occur   Who s in charge of performing backups   Who s in charge of monitoring the success of these backups    All of this information should be included in the documentation     Give highest priority to crucial data  Your database and accounting files are  your most critical data assets  They should be backed up before and after any  significant use  For most organizations  this means backing up these files daily   Nonprofits that do a lot of data entry should consider backing up their databases  after each major data entry session     Core files  Back up your core documents  such as your Documents folders  and  email files at least once a week  or even once a day  Each organization needs to  decide how much work it is willing to risk losing and set its backup schedule  accordingly     Some data is easy to recreate  It is not usually necessary to back up the    complete contents of each hard drive     most of that space is taken up by the  operating system and program files  which you can easily reload from a CD if       c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 
73. ntry for specific security recommendations  The Health  Insurance Portability and Accountability Act  HIPAA  protects health data in the  United States  For information on making sure your database meets HIPAA  standards  see the Idealware article In Search of HIPAA Compliant Software           YB In Search of HIPAA Compliant Software  http   www techsoup org learningcenter software page11924 cfm                i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 37       Chapter 5  Human Made Disasters and Accidents          Ye Delicious tsdp humanmade  http   delicious com tag tsdp humanmade          The measures we ve discussed thus far will prepare you for most natural  disasters  but what about smaller disasters and accidents  There   s no way to  prevent every accident  but some minor preparations can minimize the impact of  any eventuality     Protect Critical Organization Logins    Here at TechSoup Global  we employ a simple policy for staff passwords  For any  service or application that directly impacts outside users  we don   t select the     Remember my Password    or    Keep me Logged in    options  For example   although we may let our FTP clients store the passwords for our internal FTP site   we always manually log in to the FTP site where we house our website  This  simple rule keeps staff from accidentally deleting important files from the  website     Similarly  when yow   re working in your donor database or website  log
74. nu  or Utilities menu in Mac OS X  10 4 or later   Tip  If you don t see this menu or menu choice  you probably  haven t booted from the CD    e Select your Mac OS X hard disk volume    e Set the user name of your original administrator account    e Important  Do not select  System Administrator  root    which is actually a  reference to the root user and not to be confused with a normal  administrator account     Online Services    For online services where you have simply forgotten the password  use the  website s password retrieval tool     If you no longer have access to the user or account name and password  try  sending an email message to the staff person who set up the account and ask for  your password    Routers  Firewalls  and Other Network Equipment   Check the instruction manual that came with the equipment  Most network  equipment comes with well known default passwords  Common passwords    include  sometimes capitalized  sometimes not      e Admin       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 53       e Password  e Administrator    Most equipment can be hard reset to the factory settings  usually by pushing down  the reset button during startup or in a set pattern  Check the manuals or  documentation that come with the device  or check the website of the  manufacturer of the device     Moving Your Website    If your normal web host was in an area that was badly affected  or if you hosted  yourself   you may need to
75. nw org            A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 3    In This Guide    TRO BCHON giieisniaiiieanouciecomuienmiiianddinmnantolnn uaa 6  Who Should Use This Guide oss cssisccicsssceesssstesccesiosestasnierseaoteneesvedaccseseecsystbdeatiesseateaveed 6  How to Use This Gide scarccdcecasecateececatnneaanntaeenneeemawncs 7   Printing This G0 csstscacatsdasecnstvactensteeantonecdnuatadicnumenivedianvdcerdencisamiodesisenneeantanneee 8  Symbols in This NG oe tach bec ven ia i eee 8  Additional RESOUTCSS  p esscweucsstasiuasseatvdeneaanentanssiaussiargieatsorinddsanteusiaritastananianteniuanvaninns 9   Part I  Preparing for Any Predicame nQ                 scscssssssscesssssscessessessssesseceacees 10   Chapter 1  Your Office Is Everywhere             esesesesoscosososososososososseseseseseseseseseseses 11  Unified Communications ise dpicesictiescacovtvndetastsberienadicnssiasaninateeh 11   Evaluating Your Organization   s Needs                 cssesssssssecsseerscsssersseensecseeceees 12  Selecting and Implementing a Unified Communications Strategy              12  Your Backup Web Presence             cccccsssssssssssescssescescsssssescsessessesessesseseesecaesaseecassaeers 14   Chapter 2  Documentation and Your Master Key    0           cssssssssseesssessees 16   Storing Your Documentation               cccccccsscsssessessesscsesssessesecsecsesseesseseeseesseseeenseseseses 17  The Master TC ccs sacar eco sce scene oh cineca ce
76. o seek a lawyer   s advice drafting an agreement        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 63          User Accounts    A separate account helps differentiate your information from that of the  machine   s owner  It keeps you from deleting the owner   s data and allows you to  customize your environment as needed without affecting hers  This measure will  also make it much easier to remove your data from the owner   s computer and  port it to a new one before returning it           Tip  M All modern versions of Windows  Mac OS  and Linux allow for multiple  user accounts  For Windows  look under    User Accounts    or    Users and  Passwords    in the Control Panel  In Mac OS  select Accounts in the System  Preferences pane           Firewall and Virus Protection    As it is borrowed equipment  take measures to protect the equipment from  viruses and other malicious activity  Ideally  the owner will have already  implemented malware protection  but take extra precautions to make sure that  these tools are up to date  especially if there   s existing data on the computer           YB Removing Spyware  Viruses  and Other Forms of Malware  http   www techsoup org learningcenter software page4769 cfm       TechSoup org Security Corner    http   www techsoup org security     TechSoup org Virus Protection Toolkit  http    www techsoup org toolkits antivirus index cfm             Transitioning to New Equipment    Once you no longer
77. olleagues  friends  and family members all in a safe  secure location   Do you have the food  water  clothing  and medical care that you need     Communicating with friends  family  colleagues  and emergency responders comes  next  If you need help  is your message getting to emergency responders  disaster  relief agencies  and others  If you   re safe  you need to broadcast that message as well  so that loved ones and emergency responders don   t worry unnecessarily and devote  resources to you that should be going elsewhere  Furthermore  most disasters and  emergencies are fast moving  evolving situations where updates about weather  food  supplies  disaster response  and other factors can make the difference between life  and death  In an emergency situation  communication has to be two way     Third  consider your program and service priorities  Who are your constituents and  what services do they rely on  Which key financial systems  like accounting  payroll   grant management  and reporting  does your organization need for day to day  operations  Is your donation processing system functioning  Donors may be  rushing to help you in an emergency  so it might be vital that you recover this system  quickly  Also  it   s always much easier to discuss and document your priorities before a  disaster occurs  It   s still necessary and valuable to consider priorities after a disaster   but the pressure of an emergency situation makes it hard to see the big picture     Of course 
78. ommodations you need during your recovery by both type and  duration  Don   t forget to include additional items like food and other supplies     Maps and Directions  List maps and directions that you may need during recovery  For example  you    could Use an online mapping service to save maps and directions to the nearest  hospital  fire station  or community center     Communications    Use the forms below to keep track of contacts you ll need during your recovery       Technology Recovery Contacts                    ae  I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 70    P Internal Escalation Contact List    Communications Plan    A diagrammatic communications plan will help your organization visualize the  channels of communication during an emergency  While every organization s  structure  personnel  and culture facilitate a different set of processes  the  following is an example of a communications plan for an organization with two  sites and one designated Business Recovery Manager     q    Escalation  i    j Business  Secondary Resavery    Site    Manager    Contract  lesu es       Business Impact Assessment Questionnaire    Create an organization chart for your business unit  and then rate each  department or division in terms of its unavailability following a disaster  Use the  following scale     Mission critical  Significant damage  Serious damage  Major impact  Minor impact    gip ae    go      C        The Resilient Organizati
79. ommunity  The Nonprofit Open Source Initiative   s   rimer for nonprofits is an excellent place to start learning what open source can  do for your organization              ig Choosing and Using Free and Open Source Software  A Primer for  Nonprofits  http    www nosi net projects primer    Six Steps to Adopting Open Source Software at Your Organization  http    www techsoup org learningcenter software page5683 cfm       Microsoft Office vs  OpenOffice org  http   www techsoup org learningcenter software page4765 cfm       The Myth of Open Source   http   blog techsoup org node 430          Web Applications    Web applications like Google Docs and Microsoft Office Live might serve you as a  replacement for traditional office software  either temporarily or permanently        c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 65          For more information  see Alternatives to Regular Backups on Page 32 and Are  Web Based Collaboration Tools Secure  on Page 34       lt     i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0    66    Chapter 9  Post Disaster Operations Analysis    This chapter is designed to help you identify  assess  and recover vital personnel   services  and equipment following a disaster  Use the checklists and charts below  to ensure that the recovery process goes as smoothly as possible  and to manage  your personnel and assets throughout the process  Certain charts are customizabl
80. on  A Guide for Disaster Planning and Recovery  v 2 0 71    The sample organization chart below represents the ratings of a community  health clinic     Executive    Director    3   Operations    Programs Finance  3 5     Fund    raising   4           Health  Workers          Business Unit Information   This chart can be used to record the functions of each business unit in your  organization  It can be kept in a known repository at the recovery site for  reference     Business Unit    Organizational Focus    Constituency  if internal  state  internal      Departmental Function  Recovery Objectives  Number of Employees       sp    a   I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 72      Business Process  What are the business processes performed by each of    your departments  Include the name and a brief description of the business  process       Analysis of Key Processes  Use the following chart to identify key  processes in your organization  use a separate copy of the chart for each process         P Legal and Regulatory Requirements    Are there any legal or regulatory requirements for loss or delay of the service  provided     Would a delay or loss of service result in any penalties            The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 73    If yes          Consequences of Not Performing Functions    Under the following headings  please indicate your assessment of the business  impact of not performin
81. on over the next 24 hours  the  next three days  and the next week          Technology Refresh  Key Recovery Staff  Assuming all staff are    available  the table below allows you to identify the key personnel required to  recover your systems and where these systems will be recovered     2 The charts in this chapter are intended as examples  Each chart marked with the pencil icon is  available for download at TechSoup   s Disaster Planning and Recovery Toolkit   http   www techsoup org toolkits disasterplan index cfm   Download the spreadsheet and  customize each chart to meet your organization   s needs        a       I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 69    Project Planning and Rollout   Plan your recovery using your Business Impact Assessment before you attempts  to acquire or replace services or equipment  Consider conducting a try run rather  than just jumping into recovery  A day   s worth of planning can save you time   energy  and pain     Transport Requirements  List the transportation you will need  cars  taxis  public transit  during the  recovery phase  Don   t forget to detail parking and any special requirements     Expense Codes   Keep track of expenses so that you can inform funders about the impact of  recovery on your finances  Consider tracking all time spent on recovery with a  special disaster recovery expense code when your accounting systems are  functioning again  for example     Accommodation  List all acc
82. orarily  upgrading them to unlimited minutes can be much less expensive than  reimbursing hundreds of minutes overage              YR Softphone  Wikipedia   http   en wikipedia org wiki Softphone          Internet Communication    Even if you don   t have consistent access to the Internet  your web presence is a  central way to keep the public informed about your NGO   s recovery efforts and  any changes to the services you provide     Make sure your website has clear instructions for where to find the latest updates   be it on a social networking site  blog  microblog  or other venue  If you have  temporary internet access  or a contact or volunteer has internet access   it   s a  great idea to adjust your homepage so that the most recent updates are clearly  displayed  One option would be to have Twitter updates appear at the top of your  homepage automatically  see Your Backup Web Presence  Page 14      As a last resort  you could even call your web hosting provider and have them  redirect your website to your microblog or other page where you can easily post  updates  Of course this tactic temporarily sacrifices the look and feel of your own  website  but if there   s essential information to communicate to your stakeholders   this is a quick way to do it without Internet access     Safety   For Yourself and Your Damaged Equipment    Ensure that you have a safe environment before you begin the recovery process   For your own safety  observe the following precautions     1
83. ore  or Recovery Console        A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 61    Chapter 8  Borrowed  Donated  and Free Technology          D Delicious tsdp discount  http   delicious com tag tsdp discount             Depending on your situation  you may need to rely on borrowed  donated  free  or  shared equipment and services  Where should you start  In this chapter  we ll list  the most important things to think about as you rush to resume your  organization   s services using donated  borrowed  or free technology     Working on your business impact analysis  see Technology Triage  Page 43  as  soon as you feasibly can is still a priority  as you   ll need it to move out of crisis  mode  In the meantime  you may have found generous donors who can lend or  give you equipment to help you get through the immediate future  If you are  fortunate enough to have been offered help  accept it  While you   re doing so  be  aware of some of the common pitfalls of using technology tools that haven   t been  prepared specifically for you     Donated and Discounted Technology    TechSoup Software and Hardware Programs    Since youre reading this guide  it   s likely that you   re already familiar with  TechSoup Global   s donation and discount programs around the world  Through  relationships with dozens of respected hardware and software companies  we   ve  developed an impressive catalog of hardware  software  and hosted services  We  resear
84. ower intensive     and  testing them out     5  To avoid power surges and brownouts  turn off     and  if possible   unplug     computers when they will not be used for an extended  period  If a lightning storm is expected or the power goes out  turn off  and disconnect computers and other sensitive equipment until the  power is back on and stable     power surges often occur when the  power returns  Computers you don   t want to lose should have a short   term power backup system or uninterruptible power supply  UPS    which also provide isolation  Laptops are isolated by their power  supplies and batteries  but reliable power is still important to avoid  damage to the power supply     6  Ventilation is also very important  Take care not to block the vents on  any equipment  Computers can run in a warm environment as long as  they have adequate ventilation  Don   t put computers right next to each  other or with the vents next to desks or cabinets  Use a fan to keep the  air moving in the room and around the computers if you think they  might get too hot  In general  if you are hot and uncomfortable  it is too  warm for your computers to be running  Turn them off if you leave the  room and let them cool down before they are turned on again  Consider  working during the cooler part of the day and turning off computer  equipment when it is too hot to work comfortably     Hardware Recovery       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 
85. pick up     4  Ifthis drive isn t spinning up  putting it in the freezer  sealed in a plastic  bag to protect it from moisture  for about an hour will usually get the  drive spinning again so you can copy needed files before the drive warms  up again     5  Sometimes  a hard drive that has been running forever won t spin after  being shut down for a while  The cause of this can be the heads sticking to  the platter  As a LAST resort  try dropping the drive onto a firm surface  from approximately eight inches     Microsoft XP Disaster Recovery Tools    Software and hardware issues can affect the way that your system functions  Severe  problems might prevent you from starting Windows XP Professional normally  For  example     e Installing incompatible software  incorrectly changing system configuration  settings  or installing faulty device drivers can cause system instability or a  Stop error      Sp    A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 59    e Hardware that is defective  malfunctioning  incorrectly installed  or  incorrectly configured can also cause instability or a Stop error     e Deleted or corrupted system files caused by problems such as user error or  virus activity can cause data loss or prevent you from starting the operating  system     Any of these issues can prevent you from starting Windows XP Professional  normally  causing certain applications or data to become inaccessible  Windows XP  Professional provides 
86. quirements  Use this chart to keep track of all of the reports    that you have and need  Note if a report is of a central or critical nature and its  special requirements          Hardware and Software Resources  Use this chart to track how many    items are used  what is required during the recovery  and when it will be  required        re     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 76         Voice Recovery  Use this chart to identify your phone requirements  following a disaster        Internal Contingency Plans    Are there any manual procedures that can be activated if data   processing facilities are lost for an extended period of time     Are these procedures documented  If so  when were they lasted  updated     Do contingency plans exist that provide step by step instructions for the  recovery and performance of this business function          Supplier Contact Details  Use this chart to keep track of your suppliers  and any information that could be relevant to restoring continuity               The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 77     
87. ransition that all  workers deserve           I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 39    Disaster Planning Checklist    Here   s a quick checklist to keep track of your progress in implementing the  strategies covered in this guide  Not every item on the checklist applies to every  organization  As you work through the disaster planning process  be sure to  document new technologies and strategies that you implement  and keep staff  informed of new procedures and policies     Chapter 1  Your Office Is Everywhere   O Implement unified communications systems or adopt a backup communications  plan   O Create a backup web presence    Chapter 2  Documentation and Your Master Key   O Document all critical systems and processes   O Store physical hard copies of documentation safely and securely  O Store documentation on an encrypted flash drive   O Back up documentation online    Chapter 3  Remote and Local Backup   O Choose and implement a backup strategy   O Document your backup strategy and train staff members in backup and retrieval  O Back up data not included in backup strategy  e g  website  paper records  etc    O Routinely check backups    Chapter 4  Privacy and Encryption   O Assess security needs for all of your organization   s data   O Encrypt all critical or sensitive data   O Use secure logins for donor and constituent databases   O Check compliance with HIPAA or other applicable standards    Chapter 5  Human Made Disasters a
88. re third party contingency suppliers  such as salvage  companies or mobile computer room suppliers   Even if you re not yet  certain  it may be worth contacting them to notify them of potential need    2  Set up project teams and get key decision makers to meet regularly    3  Discourage all but key staff from turning up to help  as tasks are delegated  to those staff  establish a communication protocol for status updates    4  Keep the situation and environment controlled and professional at all  times    Deliverables Checklist    O Plan of action    O Staff call tree    O Recovery document that identifies where important data are kept  such as     Key allies  Main donors  Funders  Contractors    O Supplier contact list    O Supplies of your new work environment       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 68    Desk   Telephone   Diary   Paper   Writing instruments    O Existing floor plan  This will help out when you need to make new  arrangements if you plan to need more space       Tasks and Deliverables Tracking Chart2  Use this chart in  conjunction with the Deliverables Checklist to ensure that required tasks are  completed following a disaster        Operations    Use the charts and guidelines below to identify the technology and personnel  required to keep your operations going after a disaster       Technology Priorities Assessment  Use this chart to identify the key    applications required to operate your organizati
89. rent cities  One staff person reminded us  that if you   re storing your backups in the same city as your office  computers  there   s a danger that one catastrophe will destroy both      Consider your entire city a potential point of failure     This advice can also  apply to remote backup and web hosting services           Choosing Backup Hardware    Choosing appropriate backup hardware is key to an effective local backup  strategy  As with any technology  there are probably several  right  solutions for  your organization  Here are some guidelines for choosing backup hardware that  will work for you     e Determine how much data you need to back up  Take a look at the    machines on your network     or at least a representative sample  How  large is each user s Documents folder  How large is the email file  How       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 25          much data is in your organization s primary shared folder  Add up the  totals for all your machines  or multiply the average by the number of  machines in your organization  Be sure to leave room to add a few new  staffers  and to plan for growth     it s not impossible to add 1 GB of data  per person per year     Choose a backup device that uses media with a storage capacity  of at least twice the total amount of data you need to back up   This will give you room for growth  and will also allow you to perform   incremental  backups on the same tape with a  full 
90. s are down  We  have two offices in different parts of the state  this gives us an excellent  natural backup strategy              Home Computers and Handheld Devices    Do one or more of your employees  contractors  or volunteers work from home   Are they saving their work on a personal computer  If so  this data should be part  of a regular backup strategy     Many remote backup services allow you to install a client on a home computer  and designate specific folders on that computer to be backed up  As a simpler  alternative  require that homework be saved to a work computer every day   Employees can do this simply by transferring data on a flash drive or by accessing  the office network through VPN  see TechSoup   s Introduction to Virtual Private  Networking   For handheld devices  refer to the device s manual for backup  instructions     You should also think about keeping an additional backup of essential files on  your mobile device  For more information  see Backing up Data on Mobile  Devices on Page 31           YB Introduction to Virtual Private Networking  http    www techsoup org learningcenter networks page4775 cfm             Website    Is your organization   s website regularly backed up  If you don   t know  ask your  web hosting provider  Find out how regularly the provider backs up your website  data and how recovery is handled if an accident occurs  Be sure to check with  your provider  even if they offer a backup service  it may be opt in only     Especia
91. several tools that enable you to troubleshoot startup and  stability problems and restore system and data files     The table below lists some of these tools according to the preferred order of use   from those that present little or no risk to data  to those that might cause data loss   With the exception of Windows  Automated System Recovery  ASR  restore phase   Last Known Good Configuration  and Recovery Console  the features in the table  are available in safe and normal startup modes  If the following tools and features  do not resolve the problem  and you upgraded your system from an earlier version  of Windows  you might have the option to uninstall Windows XP Professional     With many of these tools  you may need to start Windows in safe mode  Safe mode  helps you diagnose problems  It starts the computer with only essential files and  services loaded  which cuts out a lot of the issues that can cause a complicated   modern computer to break  If a symptom does not reappear when you start in safe  mode  you can eliminate the default settings and minimum device drivers as  possible causes  If a newly added device or a changed driver is causing problems   you can use safe mode to remove the device or reverse the change     To start in safe mode     Restart the computer    As it boots  press F8    Use the arrow keys to highlight    Safe mode       You can also use the same steps to go back to the Last Known Good  Configuration  see the list below      PORA              
92. site   s data was protected at another location and  was restorable to another server        Read the rest of Johnna   s story at TechSoup   s Show Your Impact           YA Raising the Bar  Serving Hunger and Poverty in Cincinnati  http   www showyourimpact org raising bar       TechSoup Stock  Data Protection Manager    http   www techsoup org stock product asp catalog name TechSoupMai    n amp category name Servers MS amp product_id LVS   40539 amp Cat1 Microsoft amp Cat2 Servers MS amp CatCount 2             Remote Backup    Automated online backup programs require only an Internet connection  a small  software program  and a few minutes of your time  To perform a backup  you  simply install the software on every computer containing data you want to back  up  set up a backup schedule  and identify the files and folders to be copied  The  software then sends copies of the files to a remote repository via the Internet     Note that online backup is not equivalent to online file storage  a service that lets  you upload individual files and folders for future retrieval     Automated online backup is ideal for small nonprofits  say  two to ten people   that need to store critical information such as donor lists  fundraising campaign  documents  and financial data  but lack the equipment or inclination to set up  dedicated on site storage     With local storage  all the data is within your reach     and therein lies both its  value and its risk  You can always access your inform
93. sspzaswvecsezandosncesbvnesteceenasteravennthinthesnanvcesedions 44   Telephone Communication             ccsccsscessesssssescessssscersocssseesseneocsssseseeseasseeseses 44  Internet Communication           sssssseeseseeeeeeeestetrteertststststststststststststststststsesesesese 45  Safety     For Yourself and Your Damaged Equipment                    ccceseseteteeeetees 45  Hardware COW GI sssierssisssienniirir siei antia AEn E E NEEE RENTES 46  Network RECOveTy sssivisosinssneiuoiegisia erinin aeaio Ee EEES ECEE EEREN i 47  Local Area Networks         s sesnsesesesesesesesrsreserereresesesesesenenisesesesenentsenenesenenenesonesnso 48  Internet ACCESS ast ccescatracezecenteascet repie E ERE E EES RA a 49  Sharing a WOOT seiceticreienettneacaseiiesiensoiieeneirtietinns 51  Data RECOVEI V eee E E E E Me RPaa EORr ET eee 51  Dealing with Lost Passwords xiccesccecsunsazenpncsty syceanecdovenndesevncstenvvessponeuneseientetoee 53  Mo  vmg Your Website eee nee ene nee cette rr e E E ER 54  Scenario 1  Website Is DOWN             2cccsecscecsscsssecssescesssseccseacsnsersecseacseasssesseassees 55  Scenario 2  Email Hosting Is DOWD    cececceccesseseseeeeseeeseeeeeceeeeseeeeeseeeeas 56  Scenario 3  No Access to Records         cccccccccsesseescescssecsecsssessesscesscssecssesseeeees 56  Filing TS aS ATS sec cciarsievansesteisisa dunes tenwenasee ane aaa a iaa 57   Chapter 7  Tips for Reviving Broken Computers            esssosssososssseseseseseseseses 58  General Data Recovery Tips
94. t ceo tte TAEA earn eee 17  Storing Your Documentation Online               cccccssecsessssescessesscessecsseerseeseecsses 19  Chapter 3  Remote and Local Backul                   cscssscscssscssssccscseccsscsecssceeceecees 21  Whatto B  ck 0  Sem eee nee nES eee a aa E eee RAST mn Rr ce ERTE ee ere 21  Home Computers and Handheld Devices              cccccsesessesseseeeesseseeeeseeseesens 22  WY SUSUR nete sishacas E ae nena E 22  BV CUENTA ON  sss sseseriarcpegsdinari easi inea aaianconsauceeheansuecensueatenccacdoprcedaceesd 23  Internal Dat  i scusano a E E 23  Email cass cisansdnsiescsdi miin aaa eiee Ea Ea i eeraa 23  OS IS rmai EE AR R 24  Best Practices for Bae KAI pssscssccescssssecsossideactlatvacestasssaoctaseeatasateamiaeuas tone ad seas 24  Local BCID coer ececeedencans cvdaceaneuel canectclacduyaicvsd euwsasety deal cdessvtaderaetueedenastccceaeniaeenseeaceeus 25  Choosing Backup Hardware acs cpciscejeeciescscpccde ia teanereiapclaeschditediackacioecectieeieceaed 25  Choosing Backup Software sixcssiesscacsunsacebdacieesadesnacmvid ddeasysendaeehddistindacanansskomeasse 27  Locating Files for Backup          s sssssessesssesesesesesesisesesesisesesesesnntsestnnsrsesnsesennnsso 27  Additional Backup Tools     s scccssasscessssensnsasseeesozesicesocasdessssassecodeaseveessassveseanseees 27  Remote DaCh p ccna eee eon eee es 30  Choosing a Remote Online Backup Provider               cccccececeeeeseseeeeteeeeeeeeeeees 31  Backing up Data on Mobile Devices            
95. ters are damaged  That   s why it   s a  good idea to construct a backup web presence that you can use during a crisis to  keep your constituents informed     It   s good to think about how you re using technology to reach out to your  community long before a disaster strikes  for many reasons  We don   t have time  to go the nuances of your nonprofit   s social media strategy here  but here are  some resources to get you started        c     I The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 14                   YB Eight Secrets of Effective Online Networking  http   www techsoup org learningcenter internet page8075 cfm    New Media  Old Media  and Your Nonprofit  http   blog techsoup org node 690       Expand Your Reach with Flickr and Twitter  Webinar  requires name and  email address     https   cc readytalk com play id 04jpzxrp    We Are Media  http    www wearemedia org              Depending on the needs of your organization  it might be a good idea to set up an  emergency website that can keep followers aware of developments surrounding a  disaster more quickly than your regular site  For example  you can send updates  to your Twitter feed from mobile phones and other devices  so you can  communicate with friends of your organization through Twitter even without a  computer or regular internet access     We ve created an example of a simple ad hoc website that displays an  organization   s Twitter feed automatically using Javascript  Durin
96. ther organizations in a somewhat secure  fashion  Ideally  we recommend using a router to segment off the different parts  of a network     Internet Access       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 49    Many organizations have become increasingly reliant on the Internet to  communicate  conduct research  and interact with other organizations  There are  many options for restoring Internet connectivity  which one is appropriate for  your situation depends on what services are available to you and the equipment  you have access to  The following section lays out a list of scenarios for obtaining  Internet connectivity for temporary offices providing services in an area affected  by a disaster     Options for Restoring Internet Connectivity    The list below compares the benefits and downsides of several networking  solutions following a disaster     High speed On Site Connection   Pro  Fast  may be free    Con  Shelters or service center sites may not have high speed Internet access   Equipment Cost  About  150 for SOHO router and cabling    Notes  If your organization   s host location has Internet access via T1  DSL  or  cable  the connection could be borrowed via a wireless access point or a long  Ethernet cable  even if you are not in a room with Internet access     Wi Fi Bridge  Depending on your location  there may be a Wi Fi access point  near the service site     Pro  Can be fast  possibly no per minute charges    Con 
97. tion you ll need to restore your technology  infrastructure after a disaster or respond to any other unforeseen incidents  It is a  place where you can compile all of your important documentation and other  crucial information safely and conveniently  Flash drives are available for as little  as  15 or as much as  300 USD  but in most cases  you should be able to find a  quality drive that meets your needs for less than  50  Flash drives from respected       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 17       brands like SanDisk  Lexar  and Kingston are sturdier than generic drives and  generally include better warranties  Think of your master key as the nexus of your  nonprofit   s operations and keep it with you at all times     One of the nonprofit professionals we surveyed suggested that in addition to the  recovery and maintenance information outlined above  your master key should  also include essential information about your nonprofit  for example  it might  include PDF versions of up to date marketing collateral and PowerPoint slides  for your rehearsed introduction to your nonprofit   s mission and message  This  way  youll always be ready to introduce potential donors  volunteers  or  beneficiaries to your nonprofit   s work  Although this type of information doesn   t  necessarily fall under    emergency preparation     having it on hand at a moment   s  notice is an earmark of an organization that   s prepared for anythi
98. to receive calls out of the office by  ringing one or more phone numbers at the same time as the office phone  8x8  also allows users to place calls from a mobile phone  which is especially useful for  organizations that need to place a lot of international calls  For an additional fee   Vonage offers a voice recognition service that can transcribe voicemail messages  and send them to users by email or SMS        BetterWorld Telecom provides VoIP and other telecommunications services  exclusively to nonprofits and sustainability focused businesses  BetterWorld  offers a free audit  in which a representative can examine your current       i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 12    telecommunications setup and recommend a suite of services to improve your UC  capabilities and reduce your cost and environmental footprint     Unlike 8x8 and Vonage  BetterWorld offers a private branch exchange  PBX   service independently of its VoIP service  in other words  BetterWorld can  enhance the UC capacity of your current public switched telephone network   PSTN  system even if you don t want to switch to VoIP  Look at BetterWorld s  Solutions page for an overview of the telecommunications services they offer   BetterWorld holds a strong commitment to environmental and social justice  issues     An obvious advantage of hosted VoIP services is their simple  fast installation  If  a disaster requires staff members to work from home  they c
99. ture of Office Software  http   blog techsoup org node 594             i A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0    33       Chapter 4  Privacy and Encryption          D Delicious tsdp security  http   delicious com tag tsdp security             What level of protection is necessary for your organization   s data  This  complicated question will have a variety of answers for different organizations  and types of data  In some instances  state and federal laws may dictate a certain  level of encryption for sensitive data  In all instances  protecting the people who  trust you with their personal information should be your first priority     Are Web Based Collaboration Tools Secure     The most well known web based collaboration tools are Google Docs and  Microsoft Office Live Workspace  others include Zoho  OpenGoo  and  Writeboard  In the past few years  these tools have grown beyond a niche market  into a feasible alternative to traditional office software  But how secure are they     In short  it depends  Since Google Docs launched  there have been a handful of  high profile reports of security breaches  Some incidents resulted from user error   for instance  a user accidentally sharing a sensitive Google document with all of  his contacts  while others have demonstrated legitimate security holes  One tech  support representative for Office Live Workspace summed up the situation  succinctly     Security has been taken seriously
100. tworks use  Dynamic Host Configuration Protocol  DHCP  to automatically assign addresses  and other information to network devices  Most routers and servers include  DHCP servers  You may find that your computers automatically configure  themselves properly when plugged into the network  If your device has status  lights that blink  stay green  or otherwise light up  these clues may indicate that  the device works as well  There might also be tips printed on the device itself     If your network does not have an active DHCP server  you may need to manually  configure the network settings on your computers and devices  For Windows  this  is done through the Networking or Network Connections control panel  For  Macintosh 8 x to 9 x  this is done through the TCP IP control panel  For  Macintosh OS X  this is done through the Network system preferences pane     For an ad hoc network  you want to set all the computers up on the same  subnetwork  or subnet   This means providing each computer or device with its  own unique address  We recommend using a non routable address range  such as  192 168 100 X  with X being any number between 1 and 254  Every computer or  device should share the first three sets of numbers and have a different set of final  numbers  Each computer should share the same subnet mask  which should be  255 255 255 0  If there is a functioning Internet router on the network  add its IP  address as the default gateway     It   s possible to share a network with o
101. uide for Disaster Planning and Recovery  v 2 0 55          contact information  If the contact listed is an individual  you can usually make  requests via the email address listed as the admin email contact in the WHOIS  lookup  However  if that information is wrong  old  or    masked     you can  sometimes prove who you are by faxing a copy of an ID  or by answering a secret  question that was established when you registered the domain  However  if the  admin contact listed is an organization s name  proving who you are usually  requires a written letter on your organization s letterhead     which may not be an  easy thing to find following a disaster     While some registrars  given the circumstances  may be flexible around these  issues  times of disaster are often ripe for fraud  so it is likely you will still be  required to convincingly prove who you are before transferring domains  A  registrar s website will usually provide contact information in case you have lost  your password or your admin contact information is out of date     3  Upload Your Website     Once you have the web host and domain registrar pointing to the right address   you can begin uploading your web pages  whether that means simple contact pages   if you have no backups  or the original website  if you do have backups      Scenario 2  Email Hosting Is Down    If your web hosting company was also hosting your email  you will want to use your  new web host to also provide your email hosting as well  
102. ware packages may store files in their program directories  so be sure to make  copies of these  too  Finally  be sure to understand how your email is set up and  where your messages  sent and received   calendar  if your email application has  one   and contact information are stored     Check with your email service provider     which may offer backup services     on  its backup and restore policies  Email messages may also contain copies of sent  attachments  Locally  mail data files should be backed up  and their locations  vary by program  In Microsoft Outlook  mail data files are commonly located in     C  Documents and Settings  lt username gt  Local Settings Application  Data Microsoft Outlook   pst    Additional Backup Tools    What about CDs  DVDs  flash drives  and external hard drives     As organizations    content and data needs grow exponentially  data storage costs  are also decreasing  CDs  DVDs  USB flash memory devices  and external hard  drives are becoming increasingly affordable  With that in mind  should you use  these devices as your primary means of backing up  Here are a few  considerations     Pros       A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 27    e Low cost aside  the main advantage to using these devices is their ubiquity  and accessibility  If you made a direct copy of your files to a disc or flash  memory device  for example  they can be easily be read by any modern  operating system on another co
103. we Techsoup    The Resilient Organization   A Guide for Disaster Planning    and Recovery  Version 2 0  August 18  2009    Copyright    2009 TechSoup Global    This work is licensed under the Creative Commons Attribution Share  Alike 3 0 Unported License     You are free     to Share     to copy  distribute  and transmit the work     to Remix     to adapt the work        Under the following conditions     Attribution     You must attribute the work to TechSoup  Global  but not in any way that suggests that we endorse you  or your use of the work      Share Alike     If you alter  transform  or build upon this  work  you may distribute the resulting work only under the  same  similar  or a compatible license     Oe    To view the full license  visit http    creativecommons org licenses by sa 3 0  or  send a letter to Creative Commons  171 Second Street  Suite 300  San Francisco   CA  94105  USA     If you adapt all or part of this guide for a particular organization type  country  or  disaster  we   d love to see it and  if applicable  publish it through our various  channels  Send us an email at btc techsoup org        go    u A        The Resilient Organization  A Guide for Disaster Planning and Recovery  v 2 0 2    Contributors  Andrew Conry Murray  Elliot Harmon   Kevin Lo   Chris Peters   Bryan J  Sharkey    Partners    Ahali  cisco    Cisco  http   www cisco com    Collaborating Agencies Responding to Disasters  http   www cardcanhelp org    ONE Northwest  http   www one
104. you have a functional drive up and running   ensure that you immediately make a backup onto another type of media  A good  media is either a USB connected external drive or flash drive  Flash drives would  probably be a good idea anyway so you can share common files easily prior to  restoring your network     1  Let   s takea look at the hard drive itself  Is it plugged in properly  Loose  cables are the most common problem in a case like this  If it is plugged in  properly  try to boot the computer again after checking the connections   Sometimes a connector can come loose a bit on one side     2  Next  does the hard drive spin when you turn the computer on  If it  doesn t  check the power cable to the drive  If that is fine  tap the drive  lightly on the side to see if it spins   If it does  back it up and order a new  drive immediately   I encountered a drive that acted like this a year ago  If  you kept tapping it  it kept spinning  So  for three hours  I sat there tapping  this drive until I got all the company s accounting data off of it  Sometimes  you have to make sacrifices for your customers     3  Ifthe drive is spinning and the cables are properly seated  check the   Detect IDE Hard drives  in the BIOS  To access the BIOS  press    F2    or     DEL    when the system boots  it depends on the vendor   but it may also  say upon boot    Press X to access the BIOS menu     For some reason  on  some of the older motherboards  it will pick up a drive that  AUTO  won t  
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Bedienungsanleitung - Audio  Type3 スリムラインホースフィッティングキット 取扱説明書  IPAirEdit Router Manager User Manual 6.0  Descargar manual    TBMR User Guide  Le bonheur au féminin • Stratégies narratives des romanières des  Ritter sono5  Instrucciones de servicio Notice d`utilisation  Untitled - Instructions Manuals    Copyright © All rights reserved. 
   Failed to retrieve file