Eplc Contingency Plan Template
Eplc Contingency Plan Template
Eplc Contingency Plan Template
<Project Name>
Information Technology Contingency Plan
Version Number: 1.0
Version Date: <mm/dd/yyyy>
VERSION HISTORY
[Provide information on how the development and distribution of the Contingency Plan
Template will be controlled and tracked. Use the table below to provide the version
number, the author implementing the version, the date of the version, the name of the
person approving the version, the date that particular version was approved, and a brief
description of the reason for creating the revised version.]
Version Implemented Revision Approved Approval Description of
Number By Date By Date Change
1.0 <Author name> <mm/dd/yy> <name> <mm/dd/yy> <description of change>
Table of Contents
1 INTRODUCTION 5
1.1 PURPOSE 5
1.2 BACKGROUND 5
1.3 APPLICABILITY 5
1.4 SCOPE 6
1.4.1Planning Principles 6
1.4.2Assumptions 6
1.5 REFERENCES/REQUIREMENTS 7
2 CONCEPT OF OPERATIONS 8
2.1 SYSTEM DESCRIPTION AND ARCHITECTURE 8
2.2 LINE OF SUCCESSION 8
2.3 RESPONSIBILITIES 9
2.4 TESTING AND MAINTENANCE 9
2.4.1Tabletop Testing 9
2.4.2Technical Testing 10
3 NOTIFICATION AND ACTIVATION PHASE 10
4 RECOVERY OPERATIONS 11
5 RETURN TO NORMAL OPERATIONS 12
5.1 ORIGINAL OR NEW SITE RESTORATION 12
5.2 CONCURRENT PROCESSING 13
5.3 PLAN DEACTIVATION 13
APPENDIX A: CONTINGENCY PLAN APPROVAL 14
APPENDIX B: REFERENCES 15
APPENDIX C: KEY TERMS 16
APPENDIX D: RELATED DOCUMENTS 17
1 INTRODUCTION
1.1 PURPOSE
This <System Name> Contingency Plan establishes procedures to recover the <System
Name> following a disruption. The following objectives have been established for this
plan:
1.2 BACKGROUND
This <System Name> Contingency Plan has been developed as required under the
Office of Management and Budget (OMB) Circular A-130, Management of Federal
Information Resources, Appendix III, November 2000, and the Health Insurance
Portability and Accountability Act (HIPAA) Final Security Rule, Section §164.308(a) (7),
which requires the establishment and implementation of procedures for responding to
events that damage systems containing electronic protected health information.
1.3 APPLICABILITY
The <System Name> Contingency Plan applies to the functions, operations, and
resources necessary to restore and resume OPDIV’s <System Name> operations as it
is installed at <Primary location name, City, State>. The <System Name> Contingency
Contingency Plan Template (v1.0) Page 5 of 17
[Insert appropriate disclaimer(s)]
<Project Name>
Plan applies to OPDIV and all other persons associated with <System Name> as
identified under Section 2.3, Responsibilities.
The <System Name> Contingency Plan is supported by <plan name>, which provides
the <purpose of plan>. Procedures outlined in this plan are coordinated with and
support the <plan name>, which provides <purpose of plan>.
1.4 SCOPE
1.4.1 Planning Principles
Various scenarios were considered to form a basis for the plan, and multiple
assumptions were made. The applicability of the plan is predicated on two key
principles.
1.4.2 Assumptions
Based on these principles, the following assumptions were used when developing the IT
Contingency Plan.
The <System Name> is inoperable at the OPDIV computer center and cannot be
recovered within 48 hours.
Key <System Name> personnel have been identified and trained in their
emergency response and recovery roles; they are available to activate the
<System Name> Contingency Plan.
Preventive controls (e.g., generators, environmental controls, waterproof tarps,
sprinkler systems, fire extinguishers, and fire department assistance) are fully
operational at the time of the disaster.
Computer center equipment, including components supporting <System Name>,
are connected to an uninterruptible power supply (UPS) that provides 45 minutes
to 1 hour of electricity during a power failure.
<System Name> hardware and software at the OPDIV <original site> are
unavailable for at least 48 hours.
Current backups of the application software and data are intact and available at
the <offsite storage facility>.
The equipment, connections, and capabilities required to operate <System
Name> are available at the <alternate site> in <City, State>.
Contingency Plan Template (v1.0) Page 6 of 17
[Insert appropriate disclaimer(s)]
<Project Name>
Service agreements are maintained with <System Name> hardware, software,
and communications providers to support the emergency system recovery.
The <System Name> Contingency Plan does not apply to the following situations:
Overall recovery and continuity of business operations. The Business
Resumption Plan (BRP) and Continuity of Operations Plan (COOP) are
appended to the plan.
Emergency evacuation of personnel. The Occupant Evacuation Plan (OEP) is
appended to the plan.
Any additional constraints should be added to this list.
1.5 REFERENCES/REQUIREMENTS
This <System Name> Contingency Plan complies with the OPDIV IT Contingency
Planning Policy as follows:
The organization shall develop a contingency planning capability to meet the
needs of critical supporting operations in the event of a disruption extending
beyond 48 hours. The procedures for execution of such a capability shall be
documented in a formal contingency plan and shall be reviewed at least annually
and updated as necessary. Personnel responsible for target systems shall be
trained to execute contingency procedures. The plan, recovery capabilities, and
personnel shall be tested to identify weaknesses of the capability at least
annually.
The <System Name> Contingency Plan also complies with the following federal and
departmental policies:
The Computer Security Act of 1987
OMB Circular A-130, Management of Federal Information Resources, Appendix
III, November 2000
Federal Preparedness Circular (FPC) 65, Federal Executive Branch Continuity of
Operations, July 1999
Presidential Decision Directive (PDD) 67, Enduring Constitutional Government
and Continuity of Government Operations, October 1998
PDD 63, Critical Infrastructure Protection, May 1998
Federal Emergency Management Agency (FEMA), The Federal Response Plan
(FRP), April 1999
Defense Authorization Act (Public Law 106-398), Title X, Subtitle G,
“Government Information Security Reform,” October 30, 2000
[Any other applicable federal policies should be added.]
[Any other applicable departmental policies should be added.]
2 CONCEPT OF OPERATIONS
2.1 SYSTEM DESCRIPTION AND ARCHITECTURE
[Provide a general description of system architecture and functionality. Indicate the
operating environment, physical location, general location of users, and partnerships
with external organizations/systems. Include information regarding any other technical
considerations that are important for recovery purposes, such as backup procedures.
Provide a diagram of the architecture, including security controls and
telecommunications connections.]
Contact List
Office
# Name Home Phone Cell Phone Email
Phone
1 <Click here and <Click here <Click here <Click here and <Click here
enter data> and enter and enter enter data> and enter
data> data> data>
2 <Click here and <Click here <Click here <Click here and <Click here
enter data> and enter and enter enter data> and enter
data> data> data>
3 <Click here and <Click here <Click here <Click here and <Click here
enter data> and enter and enter enter data> and enter
data> data> data>
4 <Click here and <Click here <Click here <Click here and <Click here
enter data> and enter and enter enter data> and enter
data> data> data>
5 <Click here and <Click here <Click here <Click here and <Click here
enter data> and enter and enter enter data> and enter
data> data> data>
14 <Click here and <Click here <Click here <Click here and <Click here
Contingency Plan Template (v1.0) Page 8 of 17
[Insert appropriate disclaimer(s)]
<Project Name>
Office
# Name Home Phone Cell Phone Email
Phone
enter data> and enter and enter enter data> and enter
data> data> data>
2.3 RESPONSIBILITIES
The following teams have been developed and trained to respond to a contingency
event affecting the IT system.
The Contingency Plan establishes several teams assigned to participate in recovering
<System Name> operations. The <Team Name> is responsible for recovery of the
<System Name> computer environment and all applications. Members of the team
name include personnel who are also responsible for the daily operations and
maintenance of <System Name>. The team leader title directs the <Team Name>.
[Continue to describe each team, their responsibilities, leadership, and
coordination with other applicable teams during a recovery operation.]
The relationships of the team leaders involved in system recovery and their member
teams are illustrated in Figure XX below.
[Insert hierarchical diagram of recovery teams. Show team names and leaders; do not
include actual names of personnel.]
[Describe each team separately, highlighting overall recovery goals and specific
responsibilities. Do not detail the procedures that will be used to execute these
responsibilities. These procedures will be itemized in the appropriate phase sections]
4 RECOVERY OPERATIONS
This section provides procedures for recovering the application at the alternate site,
whereas other efforts are directed to repair damage to the original system and
capabilities.
The following procedures are for recovering the <System Name> at the alternate site.
Procedures are outlined per team required. Each procedure should be executed in the
sequence it is presented to maintain efficient operations.
Recovery Goal
[State the first recovery objective as determined by the Contingency Plan. For
Recovery Goal
[State the second recovery objective as determined by the CP. For each team
responsible for executing a function to meet this objective, state the team names
and list their respective procedures.]
<Team Name>
Team Recovery Procedures
<Team Name>
Team Recovery Procedures
<Team Name>
Team Recovery Procedures
Recovery Goal
[State the remaining recovery objectives (as determined by the CP). For each team
responsible for executing a function to meet this objective, state the team names and
list their respective procedures.]
Signature: Date:
Print Name:
Title:
Role:
Signature: Date:
Print Name:
Title:
Role:
Signature: Date:
Print Name:
Title:
Role: