Laserfiche WebLink
InfoSend R98ponse— 12/29/2006 <br />2, Server data is backed up to tapes that are taken off-site dally. <br />3, An Image of every system's hard drive is written to a file server after the system is <br />setup and configured. This ensures that entire systems can be quickly restored <br />without having to first install and configure the operating system. <br />Disaster Recovery plan <br />The following outlines the steps InfoSend has taken to avoid the interruption of <br />data processing and mail delivery and outlines the contingency planning in place <br />to ensure that the mailing of client data is performed should extraordinary <br />circumstances arise. <br />Systems Information <br />Data Processing: <br />1. System -wide security policies measures protect data from internal and <br />external threats. <br />2. External third -party security monitoring alerts InfoSend if there is a potential <br />security risk. <br />3. Client programs are written separately and are not run off a template — <br />ensuring accuracy and allowing for programs to be run separate of one <br />another. <br />4. Client programs can be run at InfoSend's Disaster Recovery Facility. (Please <br />refer to the section labeled "Off -Site Location" for more information). <br />5. Multiple methods of secure data transmission are available to ensure that <br />client data reaches InfoSend securely, quickly, and in whole. Before data is <br />processed backup copies are made. <br />B. Anti-virus definitions are updated automatically as they become available tc <br />protect client data from viruses, Trojan horses, worms, etc. Anti-virus software <br />is installed on each client PC, and on the corporate mail server, <br />7. Software updates are tested and applied to harden systems. Subscriptions to <br />e-mail security bulletins inform IT staff of security holes in software products <br />as soon as this Information becomes available. <br />8. Backup data Is verified on a routine basis to ensure that it is useful should the <br />need to use it arise. <br />Baokup/Restore Plan: <br />Three separate backup methods are in place to protect data and assure <br />systems can be restored fully after a disaster of any type: <br />i. All servers are duplicated at the Disaster Recovery Facility, Data is <br />automatically synched between the main facility and the Disaster <br />Recovery Facility over a secure VPN. <br />25H-42 30 <br />