Disaster Recovery (DR) Team
Executive Summary
Disaster Recovery (DR) response teams are integral to any organization. As the head of the disaster response team, I am writing to inform you of the roles of my team members and why they are needed. The DR team will consist of eleven members. The team leader will be supported by a legal representative, a business continuity expert, and a technical head. The team leader will be in charge of coordinating the activities of the group and communicating with upper management. The legal representative, on the other hand, will be tasked with advising the group on legal matters; a legal representative will be needed to ensure that the company is capable of taking legal action in case of an external intrusion.
…show more content…
Their role, as their title suggests, is to provide advice on business continuity to the business continuity expert who in turn communicates to the team leader. Aside from the business advisors unit, the team also has another division: the technical group. It is composed of four members who are all technical experts in their fields: networks and telecommunication, servers, databases, and system administration. The four are in charge of diagnosing the fault in the system and coordinating with their unit head to formulate a recovery plan. They also implement the recovery plan upon the directions of their leader. The organizational chart of the team is as shown …show more content…
The rest of the team is required to have open lines of communication and to document their activities during the incident handling process. Documentation can be achieved via the effort of the four technical experts. After being informed, the team is expected to assemble at the location of the incident and begin the diagnosis of the problem. During the analysis of the system, the team is supposed to follow specific protocols. For instance, as much information as possible should be retained for legal purposes. Also, they are not required to counterattack in case of external intrusion unless necessary. An attack could result in the company losing vital information that could have been used to track down the perpetrators or in a lawsuit (Ahmad, Hadgkiss, & Ruighaver, 2012). Instead of attacking, the group will try to get rid of the danger without alerting the intruder. Also, suspicious data will be logged for future reference. The team will need a laptop that will have to be preloaded with forensic analysis