Purpose
Purpose
Purpose
Policies Manual
Purpose
The purpose of this policy is to ensure that the University will conduct, develop, and maintain a
viable business impact analysis that will identify their business functions, those business
functions that are essential to the University's mission, and identify the IT resources that are
required to support these essential functions.
These roles and responsibilities a r e assigned to individuals, and may differ from the actual role
title or working title of the individual's position. Individuals may be assigned multiple roles, as
long as the multiple role assignments provide adequate separation of duties, provide adequate
protection against the possibility of fraud, and do not lead to a conflict of interests. Refer to
Information Security Policy 6110 for roles and responsibilities.
A. System Owners
Systems Owners are required to participate in the development of the University's Business
Impact Analysis (BIA). Additionally, for each mission essential function (MEF) and primary
business function (PBF), these individuals will assess whether the function depends upon an IT
system for recovery. Each system that is required to recover an MEF or PBF shall be considered
sensitive relative to availability. For each system classified as "Sensitive", S yst e m Owners are
required to establish recovery time objectives (RTO) and recovery point objectives (RPO). The
resources required to support each MEF and PBF must be identified as well. Lastly, the System
Owners reviews and approves the BIA.
B. Data Owners
Data Owners must also participate in the development of the University's Business Impact
Analysis (BIA) to establish recovery time objectives (RTO) and recovery point objectives
(RPO). Additionally, these individuals must identify the type(s) of data handled by each
University IT system for which they are the data owner, determine whether each type of data is
also subject to other regulatory requirements, and determine the potential damages to the
University due to a compromise of confidentiality, integrity, or availability of each type of data
handled by the IT system, and classify the sensitivity of the data accordingly.
University Executives and Senior Management in Academic and Business units of the University
are responsible for and must participate in the development of the University's Business Impact
Analysis (BIA) to ensure that recovery time objectives (RTO) and recovery point objectives
(RPO) are established for the systems and data handled by all the University IT systems within
their purview. These i n d i v i d u a l s a r e also r e sp o n si b l e f o r establishing o v e r a l l
p r i o r i t i e s for
1. Business Impact Analysis (BIA) delineates the steps necessary for VSU to identify the
business functions, identify those business functions (e.g. Primary Business Functions -
PBFs) that are essential to the University's mission (Mission Essential Functions - MEFs),
and identify the resources that are required to support its essential business functions.
2. VSU Department of Police and Public Safety (DPPS) department is the COOP Coordinator
for the University as required in the COOP planning guide by the Virginia Department of
Emergency Management (VDEM).
3. It is the policy of the University that the Technology Services department in conjunction
with academic and business departments, will develop, document and maintain appropriate
policies, standards, and specific written processes and procedures to address Continuity
Plan, IT Disaster Recovery Planning, and IT Systems and Data Backup and Restoration.
4. Designate an employee to collaborate with the VSU COOP coordinator as the focal point for
IT aspects of COOP and related Disaster Recovery (DR) planning activities and DR training
and DR test exercises.
5. Based on results of the Business Impact Analysis (BIA) and Risk Assessments (RA), develop
IT disaster recovery components of the University COOP which identifies:
a. Each IT system that is necessary to recover business essential functions or
dependent business functions and the Recovery Time Objective (RTO) and
Recovery Point Objective (RPO) for each; and
b. Personnel contact information and incident notification procedures.
c. Require an a n n u a l exercise (or more often as necessary) of the VSU COOP
and IT DR components to assess the adequacy and effectiveness of the plan; and
d. Require review and revision of IT DR components following the exercise (and at
other times as necessary).
5. The VSU COOP and IT DRP must be approved by the University President.
6. Periodically review, reassess, test, and revise the VSU COOP and IT DRP to reflect
changes in essential business functions, services, IT system hardware and software, and
personnel.
7. Establish communication methods to support IT system users' local and remote access to
IT systems, as necessary.
8. The Data Backup and Restoration plan must ensure that data and systems can be
recovered and information technology services can be resumed following an event
causing the loss of data. The University and its business partners will operate within
generally accepted best practices for backup and restoration to include, but not be limited
to:
a. Secure off-site storage for backup media.
Policy Statement
This Business Impact Analysis policy applies to all University employees (permanent,
temporary, contractual, faculty, administrators and students) who use VSU information
technology resources to conduct University business.
I. It is the policy of the University that it will develop and periodically update, the business
impact analysis to ensure that the recovery time objectives (RTO) and recovery point
objectives (RPO) for essential business functions and dependent functions that rely upon IT
resources, are identified and documented. The information will be used as input to the IT
Systems and Data Sensitivity Classification, Risk Assessments, IT Contingency Planning,
and IT System Security Plans.
3. Violations of Policy
Violation of this policy may result in disciplinary action under the Virginia Department of
Human Resources Policy 1.60, Standards of Conduct (4116/08, 611111).
References