Responsible Office: Office of Cybersecurity
Last Review: 01/11/2023 Next Review: 01/11/2025
Contact: Chris Madeksho
To specify required treatment of information Resources and systems in the case of an emergency or other events resulting in the loss, destruction, theft or corruption of UTHSC IT Resources, an inability to access information that cannot be resolved in a reasonable time period, or damages to systems which are necessary for the maintenance of confidentiality, integrity and availability of information.
All UTHSC IT Resources and systems.
Disaster – a sudden event, such as an accident or a natural catastrophe, that causes great damage or loss of life.
System Security Plan (SSP) – formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.
System owners are responsible for the development of the documentation of a Business Continuity/Disaster Recovery Plan in which this is a part.
- In the case of disaster:
a. During all phases of a disaster (including, but not limited to, preparation for an impending event, the immediate aftermath of the event, implementation of contingency plans, subsequent recovery and return to normal operation) all policies, laws and regulations required to be followed governing the UTHSC Information Security Program shall remain in effect.
b. Documented procedures to enable continuation of critical business processes for the protection of the security of all UTHSC data or information shall be maintained. For systems with a Level 3 data classification, this should be part of their System Security Plan (SSP). In support of this requirement:
i. Copies of written procedures shall be retained offsite or electronic copies that can be accessed remotely will be retained.
ii. Software and systems that are necessary for continuation of these business processes shall be documented as a part of these procedures. The procedures shall specify how, and in what time frame after their loss or compromise the functionality of these processes shall be restored.
2. Theft of data during a disaster shall be treated as an information security incident and will be handled according to IR-001-Security Incident Response. If data have been stolen, there has been unauthorized access to, or use of, these data, the integrity and validity of these data shall be verified prior to further use.
1. GP-002-Data & System Classification
2. UTHSC Information Security Program
3. IT0128 – Contingency Planning
4. IR-001-Security Incident Response