Hero Image

BACKUP AND RECOVERY POLICY

The centralized backup system is designed to provide consistent, reliable backup for servers maintained by Information Technology. This policy governs the design and use of the backup facilities.
Backup System Description
The backup system is housed in two locations (on and off campus). Southern’s network is connected to these two locations by fiber-optic Ethernet.
Individual Recovery
Users needing individual files restored may contact Information Technology during business hours. Requests must include the specific file name, location, and restore date. Files may be restored on a best-effort basis.
Disaster Recovery

When the operating system and large portions of data are destroyed from a server or if the server is physically damaged, the following disaster-recovery procedures are activated to assure an orderly and timely recovery.

  1. Information Technology makes disaster recovery the highest priority. The executive director meets with the networking staff to assess the situation.
  2. If more than one server is down, priorities are set based on the number of people using the server and the type of information it contains. First priority is given to servers containing financial or student records. Because it is not feasible to enumerate every combination of servers in this policy, priorities are set by the executive director at the time of the disaster.
  3. As the recovery process begins, the executive director is responsible for communicating to users the plan of action and the methods we are using to communicate updated information.
  4. As the recovery process progresses, networking staff will communicate status on a regular basis using the defined communication methods.
Policy evaluation and review

This policy will be reviewed annually to ensure that it is relevant, serves the needs and priorities of the institution, and is consistent with current trends in information technology. The following process will be followed:

  1. The I/T advisery committee reviews this policy before the May meeting. Additional input is solicited from members of the University Senate.
  2. The executive director of Information Technology compiles possible changes for discussion at the summer I/T advisery committee meeting.
  3. The I/T advisery committee votes policy changes.
  4. Policy changes involving funding are voted by the Administrative Council.