My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
J.P. MORGAN CHASE BANK-2016
Clerk
>
Contracts / Agreements
>
J
>
J.P. MORGAN CHASE BANK-2016
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/31/2017 12:58:30 PM
Creation date
1/10/2017 3:43:03 PM
Metadata
Fields
Template:
Contracts
Company Name
JP MORGAN CHASE BANK
Contract #
A-2016-366
Agency
FINANCE & MANAGEMENT SERVICES
Council Approval Date
12/6/2016
Expiration Date
12/31/2019
Insurance Exp Date
6/1/2017
Destruction Year
0
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
341
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
J <br />a <br />F <br />z <br />w <br />0 <br />w <br />Z <br />0 <br />V <br />0 <br />z <br />a <br />w <br />a <br />s <br />d <br />r <br />J <br />H <br />V <br />K <br />F- <br />N <br />dedicated IT Resiliency team focused on technology resiliency. These professionals provide <br />governance, oversight and compliance functions for business and technology personnel. The <br />combined team is responsible to ensure that corporate, regulatory and country- specific <br />requirements are met. IT recovery strategies and plans (also known as technology recovery <br />plans) address the recovery of critical systems and applications from an interruption to normal <br />processing cycles. A full range of technical solutions are used, with the specific technologies <br />applied to each application /function depending on the criticality and recovery time objective <br />of the specific application. J.P. Morgan data centers support a wide range of technology to <br />provide high availability environments and alternate site recovery capabilities, including disk <br />mirroring, clustering, geographically dispersed systems, and offsite tape backups, depending <br />on the criticality and recovery time objective of the application(s). <br />Documented business continuity strategies and plans address the recovery of functions and /or <br />people to one or more viable alternate recovery sites. When similar processes utilizing like <br />systems are performed at multiple locations, the use of a sister site or distributed operating <br />model is generally the preferred recovery approach. A sister site is defined as a facility that <br />performs like processes, using similar systems and equipment, and where local management <br />possesses expertise on the processes to be recovered at that location. In situations where <br />only workspace or access to remote applications is required, other J.P. Morgan locations <br />outside the production site zone are the preferred approach. <br />Plan Development <br />The services J.P. Morgan provides to our clients involve multiple systems and services that, <br />when combined, deliver a best in class product to you. A part of our resiliency process is to <br />analyze that stream of systems and services to ensure they have adequate recovery time <br />objectives and supporting resiliency plans to meet our client and J.P. Morgan needs should any <br />one of those systems or services be interrupted. Our global resiliency effort is comprised of <br />over 1,000 active business resiliency plans, each managed by a J.P. Morgan Business Resiliency <br />Manager. <br />J.P. Morgan's Risk Analysis considers numerous specific threats which include the following: <br />• Economic Risk (e.g. economic developments in one country may negatively impact <br />international transactions) <br />• Natural Disaster Risk (e.g. likelihood of earthquakes, floods, fire, tsunamis, tornadoes <br />and other natural hazards) <br />• Operational Risk (e.g. the influence of societal and structural factors on business <br />activity in a country, and the likelihood of state and non -state actors either <br />facilitating or impeding efficient business operations) <br />• Political Risk (e.g. likelihood of state or non -state political actors negatively affecting <br />business operations in a country through regime instability or direct /indirect <br />interference) <br />• Security Risk (e.g. likelihood of state or non -state actors engaging in actions that harm <br />the financial, physical and human assets of a company, and the extent to which the <br />state is willing and able to protect those assets) <br />• Terrorism Risk (e.g. likelihood that acts of terrorism directly or indirectly affect <br />business operations in a country. Terrorist acts may include bombings, murder, <br />hostage - taking, attacks using chemical, biological or radioactive agents, and use of <br />non - conventional weapons, or threats of attacks) <br />J P.Morgan <br />
The URL can be used to link to this page
Your browser does not support the video tag.