Data

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

[Company Name]

[Company Group, Division, Location]

Document Title: Data Backup Procedures


Document Number: [Document Number]
Document Filename: [Document Filename]

CONTROLLED COPY/ MASTER COPY


STAMP HERE

OTHER
STAMP HERE

Revision Revision DCO/ECO Revision


Level Date Number Description of Revision Author
DRAFT DD/MM/Y YY-00000 Draft Author Name
Y
1.00 DD/MM/Y YY-00000 Initial Release Author Name
Y

COMPANY PROPRIETARY AND CONFIDENTIAL


[Company Name] Data Backup Procedures
[Company Group, Division, Location] [Document Number]
Rev x.xx DD/MM/YY

Table Of Contents

1.0 Purpose..........................................................................................................................................................2

2.0 Scope.............................................................................................................................................................2

3.0 Definition Of Terms......................................................................................................................................2


3.1 Computer System...............................................................................................................................2
3.2 Data....................................................................................................................................................2
3.3 Backup................................................................................................................................................2
3.4 Disk Drive..........................................................................................................................................2
3.5 File Server..........................................................................................................................................2
3.6 Workstation........................................................................................................................................2

4.0 References.....................................................................................................................................................2

5.0 Responsibilities and Requirements...............................................................................................................3

6.0 General Rules................................................................................................................................................3


6.1 Determination of Value......................................................................................................................3
6.1.1 Levels of Importance...........................................................................................................3
6.2 Write Protection.................................................................................................................................3
6.3 Retention............................................................................................................................................3

7.0 Backup Procedures........................................................................................................................................3


7.1 Hard Drive Backup Procedures..........................................................................................................3
7.1.1 Workstation Hard Drive Backup.........................................................................................3
7.1.2 File Server Hard Drive Backup...........................................................................................3
7.2 Compact Disk.....................................................................................................................................3
7.3 Floppy Disk Backup...........................................................................................................................3
7.4 Backup Storage..................................................................................................................................3
7.5 File Server Backup Schedule.............................................................................................................4

[Document Filename] COMPANY PROPRIETARY AND CONFIDENTIAL Page 1 of 4


[Company Name] Data Backup Procedures
[Company Group, Division, Location] [Document Number]
Rev x.xx DD/MM/YY

1.0 Purpose
This defines rules and procedures that control the routine and periodic redundant storage of data,
information and software.

2.0 Scope
These rules and procedures apply to the computers owned and/or operated by [COMPANY NAME] at
its business sites, excepting those servers which are in control of Security.

3.0 Definition Of Terms

3.1 Computer System


This refers to a personal computer, or workstation, with an operating system and networking and
printing capabilities. This would also include a monitor, keyboard, mouse and any additional
peripherals that would be needed for a specific purpose.

3.2 Data
Units of information stored on some type of magnetic media that can be called into a computer
program for use.

3.3 Backup
A copy of a file, directory, or volume placed on a separate storage device for the purpose of
retrieval in case the original is accidentally erased, damaged or destroyed. This separate media
would include CD-ROMs, magnetic tape, hard drives of workstations, floppy disk and other
media as designated by IT Systems personnel. Any copes of files should not be considered a
backup unless they reside on separate media.

3.4 Disk Drive


A physical unit of storage on which data is read from, written to, and deleted from. This is
considered the primary storage device for a computer system.

3.5 File Server


A computer that provides mass file and program storage capabilities for networked computer
systems with control access to sharable resources. A server usually has more computing ability
than a computer system or workstation. It may or may not include a separate disk array for
added disk drive space. System security is the main reason for the network operating system and
server and it should be considered the most important aspect of the server. Depending on the
network operating system, purpose, and abilities of the server, it may also be used as a computer
system.

3.6 Workstation
A highly intelligent terminal often found on a LAN or client/server system. Some workstations
do not require floppy disk drives because data and/or programs are downloaded from a computer
server.

4.0 References
Document Retention, Storage and Disposition
Novell Backup Policy
Fourth Shift Database Startup & Shutdown Instructions

5.0 Responsibilities and Requirements


[Insert the roles and responsibilities for the job positions that are involved with the data backup process.
For example, the Systems Administrator, Department Managers and a Workstation User].
.

[Document Filename] COMPANY PROPRIETARY AND CONFIDENTIAL Page 2 of 4


[Company Name] Data Backup Procedures
[Company Group, Division, Location] [Document Number]
Rev x.xx DD/MM/YY

6.0 General Rules

6.1 Determination of Value


Depending on the area of use within the Company, backup procedures may vary. Not all data and
software have the same value. It is strongly recognized that while this is the case, it is advisable
to be safe and cautious in the frequency and security of backups. If those responsible for backups
question the importance of any data, they will resolve the issues with the Department Manager
responsible for that data.

6.1.1 Levels of Importance


[Indicate the various levels (include all levels: i..e., File Server, Work Station and Server
to Work Station) of importance of data within the company and specify where the
material should be placed. For example: File Server-Data that is considered important
to the advancement of the company should be placed on a file server. However, due to
server storage constraints and frequency of access, it may be placed on other storage
media].

6.2 Write Protection


[Insert company policy on write protection for archive tapes, or any other protection measures to
avoid viruses or changes from the material contained within the tape. It is extremely important
to follow rigid procedures with write protection so that necessary backups are not destroyed.].

6.3 Retention
[Indicate the place where all copied tapes should be retained].

7.0 Backup Procedures

7.1 Hard Drive Backup Procedures

7.1.1 Workstation Hard Drive Backup


[Insert frequency of back-up and the medium of storage for the information. Determine
whose responsibility it is to assign value to the data being backed up].

7.1.2 File Server Hard Drive Backup


[Insert information regarding file server backup including who performs this task and
the frequency with which it occurs].

7.2 Compact Disk


[Insert information about back up material that may need to be placed on a CD].

7.3 Floppy Disk Backup


[Insert policy on floppy disk back up]

7.4 Backup Storage


[Insert company policy on day to day location of back up files, fire proof storage, if necessary, for
certain data, and write protection].

7.5 File Server Backup Schedule


[Insert company schedule for backup of all file servers, examine any possible occurrences that
may interfere with normal back up procedures (i.e.: server problems, staffing issues, etc.) and
who is authorized to perform back ups]

[Document Filename] COMPANY PROPRIETARY AND CONFIDENTIAL Page 3 of 4

You might also like