BCDR AT&T Wireless Communications
BCDR AT&T Wireless Communications
BCDR AT&T Wireless Communications
Introduction
Here, at AT&T Wireless Communications, we strive to keep the assets of our company,
our customers, associates, and staff safe from impending harm. This can include and is not
limited to: security breaches, sabotage, natural disasters, and even terroristic threats. Our current
Business Continuity and Recovery Plan strives for excellence in all areas, securing every fabric
or crack of a potential threat that could harm our company. Just like we value our customers
service and do the best we can to secure their accounts we must, in turn, do the same to make
sure our company receives the same treatment. Please read the following addressed plan below
and ensure you do your part when conducting future tests as we continue to grow and improve
upon our policies.
Overview
AT&T is bringing it all together for our customers, from revolutionary smartphones to
next-generation TV services and sophisticated solutions for multi-national businesses. For more
than a century, we have consistently provided innovative, reliable, high-quality products and
services and excellent customer care. Today, our mission is to connect people with their world,
everywhere they live and work, and do it better than anyone else. We're fulfilling this vision by
creating new solutions for consumers and businesses and by driving innovation in the
communications and entertainment industry.
In addition to our companys vision, we have the leverage to back it up. Our company has
been recognized with 2013s J.D. Power Award for: Top Wireless Purchase Experience. Our
company, being as interested in international and social communication, has a lot customers
relying on our powerful network. IT disaster, either corporate or from a sinister outsider, can put
the accounts of this prestigious company in jeopardy. This is why, it would be the companys
current mission to present to the consumer with a safe proof plan. We call it the AT&T Secured
Vault Seclusion or S.V.S for short. To be considered the top wireless purchase experience, the
company guarantees to follow up on that promise by expanding the heights of security and safety
in order to keep the consumer comfortable with such service. A company that takes action for the
consumer as a whole, also benefits from the movement. However, in order to put S.V.S into
effect, a budget must be presented accordingly in order to accommodate such a tall order. As a
one hundred and twenty million dollar company, the order can easily be fulfilled.
Prevention of staff injury in all disasters, whether they be natural or caused from an
outside threat.
Designed with an affordable budget in mind but with a strong infrastructure in place to
have us running back online within a matter of hours or a few days max.
The company intends to have specific teams in place when such disasters occurs. This is
to ensure the BC/DR (S.V.S) is executed professionally, effectively, and in a timely
manner.
Our company intends to contain the problem as soon as humanly possible. This so not
further damage can occur later or continue to spread. The more damage that occurs, the
this time.
To ensure all employees understand their responsibilities as associates of our company
and that the policies are upheld at all times. Safety of our staff is the most important asset
of our company.
This team is responsible for notify all other teams that a disaster is
currently occurring. They will use all forms of communication to notify
associates, customers, or visitors at the facility of its current dire situation.
This team will oversee the evacuation of the facility or facility(s), in a safe
and professional manner.
emergency. If a fire occurs, this team works on containing that said fire.
Policing is involved when evacuation takes place.
Hurricanes
Tornados
Equipment Failure or Malfunction
Terrorist Threat
Internal Risks
Tampering or dismantling
Fires
Floods
BC/DR AT&T WIRELESS COMMUNICATIONS
Security Breach
Risks to Staff
Harmful debris or threats due to natural disaster
Personal attack on character or company
Financial discomfort
Customer
Accounts
Wireless
Support
Information
Type/Sensitivit
y Level
Customer
purchases, level of
sensitivity: 5,
information
usually stored
within terminal
servers
Personal
Information,
Account
Balance/Info, level
of sensitivity: 5,
terminal servers
Connection
Broadband, level
of sensitivity: 3,
Wireless Towers
Associate
d Risks
It could
devastate
corporate
business and
affect
customer
purchases
Hacked
accounts
lead to less
business and
tainted
name
Natural
Disasters
can destroy
towers or
block
connection
Exampl
e of
Current
Control
Constant
security
checks
and
troublesho
oting
Confidenti
ality of
accounts
and
password
support
Delay of
Service
Determinati
on of the
Effectiveness
Regulatio
n or
Standard
s
Next
Action;
Require
by whom
Yes
Customer
Support and
Service
Backup
server in
case of
crash
No
Network
Security
Consult
Stronger
account
protection
Support
Electricians
Elevate
Towers to
safer
locations
Yes
Mobile
Internet
Business
Sites
Connection
Broadband, level
of sensitivity: 3,
Wireless Towers
Property of
Business, level of
sensitivity: 4,
Associates
Natural
Disasters
can destroy
towers or
block
connection
Natural
Disasters
can damage
property or
employees
Delay of
Service
Corporate
Emergenc
y
Yes
Yes
Support
Electricians
Elevate
Towers to
safer
locations
Evacuation
Build
business in
safer
locations
Unit
EXAMP
LE:
Professi
onal
Service
s
Custom
er
Service
s
Degre
Activity
e of
Proces (Type of Activity Impac
s ID
Data)
Owner t
EXAMP
LE:
Sales
(Personal
Customer
Informatio
John Doe
CRD77-9111
Sales
(Customer
Account
Informatio
n)
Jacob
Young
Corporate
Managem
ent
(Stock/Sh
ares
Anthony
Zimmerm
an
Sales
(Store
locations/
Areas)
Mathew
Chang
Sales
(Internal
Affairs
Informatio
n)
Jessica
Little
Corporate
Managem
ent
(Corporat
e Affairs
Liam
Palmer
Sales
(Client
Informatio
n)
Patrick
Claim
FRD-789111
Store
Division
s
SRD79-9111
Corpora
te
Division
Sponsor
Service
s
IRD-809111
CCRD81-9111
SRD99-0111
Financia Probabilit
l Costs
y of Loss
1.75
3.25
4.25
1.75
3.5
Overal
l
Weight
EXAMPL
E:
PRD99-0111
Financia
l
Service
s
Internati
onal
Service
s
EXAMPL
E:
Political
or
Sensitivit
y
Activity
Owner
Acceptable
Down Time
Data
Owner
Confidentialit
y
Integrity
Availability
Other
Regulatory
Requirement
s
2 hours
Jason
Druid
High
High
Medium
HIPPA
2 hours
Felicia
Auburn
Medium
High
Low
Privacy
of 1974
Act
5 hours
Zack
Groan
Low
High
Medium
Privacy
of 1974
Act
7 hours
Lilly
Mitchell
High
High
High
HIPPA and
Privacy Act
of 1974
1 hour
Hannah
Joel
High
High
High
Privacy
of 1974
3 hours
Keith
Cotton
Low
High
Low
N/A
Jacob
Young
(Customer
Services)
Anthony
Zimmerman
(Financial
Services)
Matthew
Chang
(Store
Divisions)
Jessica
Little
(Internationa
l Affairs)
Liam Palmer
(Corporate
Division)
Patrick
Claim
(Sponsor
Services)
Act
APPLICATION PROFILE
Develop Application Profiles only for applications that support critical business functions (as identified in Step 1) or
contain confidential or sensitive information (as identified in Step 2).
Process ID:
ERD-7003-89076
System
Name:
Inventory
Information
:
6789-09870-4567LP-09KOL7-000567
System
Owner:
(include contact
information such
as campus,
telephone, etc.)
Data
Owner:
(include contact
information such
as campus,
telephone, etc.)
System
Administrat
or:
(include contact
information such
as campus,
telephone, etc.)
Data
Custodian:
(include contact
information such
as campus,
telephone, etc.)
External
Contact
Information
:
(State Agencies,
Vendors, etc.)
BC/DR AT&T WIRELESS COMMUNICATIONS
Primary
Users:
Required
Recovery
Time:
(Based on the
Acceptable
Down Time and
mission critical
overall rating)
System
Description
:
(Datebase,
language,
hardware,
components,
and release
level, etc.)
The general consensus is to have less than a 24 hour window of down time. The
overall critical rating of the mission is a dire contraint. The focus would be to get all
systems up and running again within the 24 hour window.
Off shore cold servers will serve as back up for when all systems are down. The
system will run on a Wi-fi, typical bus, and equipped with both English and Spanish
dialect. The release level will be based on the threat level of the problem.
Network
Access:
If "other" is
selected
provide
description:
System
Interface
and
Boundary:
If the IT
system
connects to
other IT
systems, is
Yes
an
Interoperabi
lity Security
Agreement
(ISA) in
place?
Authenticati
Passcode: AU-70040-9876
on
Mechanism:
BC/DR AT&T WIRELESS COMMUNICATIONS
Change
Managemen
Authorization is always through management
t
Description
:
Role Definitions
Data
Custodian
Data Owner
The Data Owner is the manager responsible for the policy and practice
decisions regarding data, and is responsible for the following:
1.
Evaluate and classify sensitivity of the data.
2.
Define protection requirements for the data based on the sensitivity of the
data, any legal or regulatory requirements, and business needs.
3.
Communicate data protection requirements to the System Owner.
4.
Define requirements for access to the data.
IT System All users of COV IT systems including employees and contractors are
Users
responsible for the following:
1.
Read and comply with VCCS Contingency Planning and Business
Recovery program requirements as well as VCCS and college IT polices,
standards, and guidelines.
2.
Report breaches of IT security, actual or suspected, to their college
management and/or the ISO.
3.
Take reasonable and prudent steps to protect the security of IT systems
and data to which they have access.
System
Administrat
or
System
The System Owner is the manager responsible for operation and maintenance
of an IT system. With respect to IT security, the System Owners
Owner