ACU Technology Disaster Preparedness and Recovery Plan

664 KB | 3 files | null DOC,null PDF

This document is Abiline Christian University's detailed plan to deal with unforeseen circumstances that can cause a computing system to be inoperable for a length of time.

Abilene Christian University has set up a highly computerized operational environment. This includes the use of microcomputers in offices as well as servers that provide much of the operational support for the administrative and academic units. A campus-wide network ties these various systems together and provides communications to other computer networks, universities and the computer diagnostic facilities of selected computer vendors involved.

For the most part, the major problems that can cause a computing system to be inoperable for a length of time result from environmental problems related to the computing systems. The accompanying document is ACU's detailed plan to deal with these unforeseen circumstances.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • ACU Technology Disaster Preparedness and Recovery Plan.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

ACU is a vibrant, innovative, Christ-centered community that engages students in authentic spiritual and intellectual growth, equipping them to make a real difference in the world.

All IT Downloads from Abilene Christian University» | Visit Abilene Christian University »
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....  More >>

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....  More >>

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.