SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Installation and Maintenance of Health
IT Systems
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Lecture c
This material (Comp 8 Unit 9) was developed by Duke University, funded by the Department of Health and
Human Services, Office of the National Coordinator for Health Information Technology under Award
Number IU24OC000024. This material was updated in 2016 by The University of Texas Health Science
Center at Houston under Award Number 90WT0006.
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Learning Objectives
1. Define availability, reliability, redundancy, and fault
tolerance (Lecture a)
2. Explain areas and outline rules for implementing fault
tolerant systems (Lecture a)
3. Perform risk assessment (Lecture a)
4. Follow best practice guidelines for common
implementations (Lecture b)
5. Develop strategies for backup and restore of operating
systems, applications, configuration settings, and
databases (Lecture c)
6. Decommission systems and data (Lecture c)
2
Importance of Backup
• Volume of data: hospital can generate 12
terabytes/yr in radiology alone.
• HIPAA (Health Information Portability &
Accountability Act) Security Rule requires
exact backup copies of all healthcare data,
easily retrievable
• Should be called “Importance of Restore”
(Surviving a Bottleneck, 2009)
3
Backup Strategies:
Requirements
Laws regarding length of time health information data must be retained
depend on the jurisdiction (usually state), and can involve:
• Flat length of time (X years)
• Age of patient
• Time since age of majority, or of discharge, or of death
• Length of statute of limitations for malpractice
What constitutes best practices for a backup?
• Exact, verified copy of the material – Multiple copies!
• Stored off-site location in case of natural disaster, fires, flooding, etc.
• Easily retrievable for timely restoration
• Security via encryption and storage in secure location
Fault tolerant storage protection (like RAID) is not enough
• Deleted files
• Old versions
(AHIMA Practice Brief, n.d.)
4
Backup Strategies:
Backup Window
• Time required to complete a given backup.
– Determined by amount of data to be backed up divided by speed
of network infrastructure
• Backups that occur during production hours may be
inconsistent (bad)
• Problems when backup window reaches peak operation
cycles, potentially straining resources and slowing down
the system
• What to do when system must be available 24/7?
(Harwood, 2003)
5
Backup Strategies:
Which Files?
• Full backups
– All files
– Pro: Ultimate protection, simple restoration
– Con: Requires more time & lots of storage to keep multiple file
versions
• Incremental backups
– Only files that have changed since last backup (full or
incremental)
– Pro: Much faster
– Con: Restoration from multiple files
(Harwood, 2003)
6
Backup Strategies:
Which Files? (cont’d)
• Differential backup
– Middle ground: all the files that have changed since
the last full backup
– Pro: easier restoration
• Synthetic full backup
– Compensates for small/nonexistent backup window
– Data from last full backup + differential / incremental
backup combined to create new full backup tape
(Harwood, 2003)
7
Backup Strategies:
Which Files? (cont’d - 1)
• File system snapshots
– Available through VM environments and later
UNIX versions
– Backups at several times through the day
without needing large amounts of additional
storage media
– Reliable backups without shutting down
applications
(Harwood, 2003)
8
Backup Strategies:
Where to store data
• Direct backup
– Tape drive / autoloader / library directly connected to
every server to directly backup and restore data
– Does not scale well
• Centralized network backup
– One server backs up data of all servers
• SAN (Storage Area Network) backup
– Storage network to which all servers & backup device
connect
(Gordon, n.d.)
9
Backup Strategies:
Backup Media
Storage of media should cycle off-site
• Tapes
– Robust but expensive
• Optical
– Inexpensive, relatively small, convenient
• Flash
– Robust, convenient, fast
• Hard disk
– Cheap, fast but fragile, bulky
• Network or Cloud backup
– Dependent on network throughout
10
Backup Strategies:
Databases
• Databases require extra considerations,
depending on the database infrastructure used
• Consult with database or EHR vendor to ensure
backup strategy is compatible with database
infrastructure.
• Database backup is usually through specialize
tools or applications, often provided with the
database.
11
Decommissioning
• Goals in retiring old systems / applications /
datasets
– Active data properly retained
– Inactive data archived or disposed of securely
• Tips
– Complete full data audit; note redundancies.
– Determine data owners and stakeholders.
– Identify active vs. inactive data.
– Consider reporting / retrieval requirements for
compliance.
12
Decommissioning (cont’d)
• Tips (cont’d)
– Document retention policies well & ensure
consistency with government guidelines.
– Standardize on single, well-navigable archival
system.
– Develop decommissioning plan & schedule.
– Ensure integrity of archived data and
destruction of decommissioned data.
13
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Summary – Lecture c
• Regulatory requirements for backups are stringent
• An effective backup strategy minimizes the backup
window while ensuring data integrity.
• Backup considerations:
• Onsite vs Off-site
• Full vs Partial
• Media
• Verification
• Decommissioning
– Active data properly retained
– Inactive data archived or disposed of securely
14
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Summary
• Regulatory requirements for backups are stringent
• An effective backup strategy minimizes the backup
window while ensuring data integrity.
• Backup considerations:
• Onsite vs Off-site
• Full vs Partial
• Media
• Verification
• Decommissioning
– Active data properly retained
– Inactive data archived or disposed of securely
15
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
References – Lecture c
References
Surviving a Bottleneck - Insights into Managing Exponential Growth of Digitized Medical Images.
(2009, March 16). Retrieved from Scicasts website: asts.com/specialreports/86-healthcare-it/2442-
surviving-a-bottleneck-insights-into-managing-exponential-growth-of-digitized-medical-images
Gordon, S. (n.d.). Comparing different backup strategies. Retrieved February 8, 2007, from
SearchStorage website: http://searchstorage.techtarget.com/tip/Comparing-different-backup-
strategies
Retention and Destruction of Health Information. State Laws or Regulations Pertaining to Retention of
Health Information. (updated 2013). Retrieved June 24, 2016, from AHIMA website:
http://library.ahima.org/PB/RetentionDestruction#.V3Li1fkrJD8
16
Installation and Maintenance of
Health IT Systems
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Lecture c
This material was developed by Duke University,
funded by the Department of Health and Human
Services, Office of the National Coordinator for
Health Information Technology under Award
Number IU24OC000024. This material was
updated in 2016 by The University of Texas Health
Science Center at Houston under Award Number
90WT0006.
17

Weitere ähnliche Inhalte

Ähnlich wie Comp8 unit9c lecture_slides

Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Four Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarFour Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarStorage Switzerland
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentationAndrey Karpov
 
Comp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesComp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesCMDLMS
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
Backing up your data
Backing up your dataBacking up your data
Backing up your dataaaberra
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Karel Kannel
 
research_data_management.pptx
research_data_management.pptxresearch_data_management.pptx
research_data_management.pptxSanjayPatel767445
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practicesiland Cloud
 
Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...
Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...
Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...DesiVPS
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.pptabhichowdary16
 
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Paula Koziol
 
How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving
How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data ArchivingHow to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving
How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data ArchivingStorage Switzerland
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup SystemCSCJournals
 

Ähnlich wie Comp8 unit9c lecture_slides (20)

Final Ucat Ppt
Final Ucat PptFinal Ucat Ppt
Final Ucat Ppt
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Four Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarFour Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage Webinar
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
 
Comp8 unit6b lecture_slides
Comp8 unit6b lecture_slidesComp8 unit6b lecture_slides
Comp8 unit6b lecture_slides
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
research_data_management.pptx
research_data_management.pptxresearch_data_management.pptx
research_data_management.pptx
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 
Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...
Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...
Hybrid Dedicated Servers: Unleashing Efficiency and Performance in Your IT In...
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
 
Unit 3
Unit 3Unit 3
Unit 3
 
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
 
How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving
How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data ArchivingHow to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving
How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 

Mehr von CMDLMS

Culture of healthcare_ week 1_ lecture_slides
Culture of healthcare_ week 1_ lecture_slidesCulture of healthcare_ week 1_ lecture_slides
Culture of healthcare_ week 1_ lecture_slidesCMDLMS
 
Why bother
Why botherWhy bother
Why botherCMDLMS
 
Ensuring two way communications
Ensuring two way communicationsEnsuring two way communications
Ensuring two way communicationsCMDLMS
 
Human Development
Human DevelopmentHuman Development
Human DevelopmentCMDLMS
 
Lecture 11A
Lecture 11ALecture 11A
Lecture 11ACMDLMS
 
lecture C
lecture Clecture C
lecture CCMDLMS
 
lecture 11B
lecture 11Blecture 11B
lecture 11BCMDLMS
 
lecture 10a
lecture 10alecture 10a
lecture 10aCMDLMS
 
lecture 9 B
lecture 9 Blecture 9 B
lecture 9 BCMDLMS
 
Lecture 9 A
Lecture 9 ALecture 9 A
Lecture 9 ACMDLMS
 
Lecture 9C
Lecture 9CLecture 9C
Lecture 9CCMDLMS
 
Lecture 8B
Lecture 8BLecture 8B
Lecture 8BCMDLMS
 
Lecture 8A
Lecture 8ALecture 8A
Lecture 8ACMDLMS
 
Lecture 7B
Lecture 7BLecture 7B
Lecture 7BCMDLMS
 
Lecture C
Lecture CLecture C
Lecture CCMDLMS
 
lecture 7A
lecture 7Alecture 7A
lecture 7ACMDLMS
 
Lecture 6B
Lecture 6BLecture 6B
Lecture 6BCMDLMS
 
Lecture 6A
Lecture 6ALecture 6A
Lecture 6ACMDLMS
 
Lecture 5B
Lecture 5BLecture 5B
Lecture 5BCMDLMS
 
Lecture 5 A
Lecture 5 A Lecture 5 A
Lecture 5 A CMDLMS
 

Mehr von CMDLMS (20)

Culture of healthcare_ week 1_ lecture_slides
Culture of healthcare_ week 1_ lecture_slidesCulture of healthcare_ week 1_ lecture_slides
Culture of healthcare_ week 1_ lecture_slides
 
Why bother
Why botherWhy bother
Why bother
 
Ensuring two way communications
Ensuring two way communicationsEnsuring two way communications
Ensuring two way communications
 
Human Development
Human DevelopmentHuman Development
Human Development
 
Lecture 11A
Lecture 11ALecture 11A
Lecture 11A
 
lecture C
lecture Clecture C
lecture C
 
lecture 11B
lecture 11Blecture 11B
lecture 11B
 
lecture 10a
lecture 10alecture 10a
lecture 10a
 
lecture 9 B
lecture 9 Blecture 9 B
lecture 9 B
 
Lecture 9 A
Lecture 9 ALecture 9 A
Lecture 9 A
 
Lecture 9C
Lecture 9CLecture 9C
Lecture 9C
 
Lecture 8B
Lecture 8BLecture 8B
Lecture 8B
 
Lecture 8A
Lecture 8ALecture 8A
Lecture 8A
 
Lecture 7B
Lecture 7BLecture 7B
Lecture 7B
 
Lecture C
Lecture CLecture C
Lecture C
 
lecture 7A
lecture 7Alecture 7A
lecture 7A
 
Lecture 6B
Lecture 6BLecture 6B
Lecture 6B
 
Lecture 6A
Lecture 6ALecture 6A
Lecture 6A
 
Lecture 5B
Lecture 5BLecture 5B
Lecture 5B
 
Lecture 5 A
Lecture 5 A Lecture 5 A
Lecture 5 A
 

Kürzlich hochgeladen

Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Vipesco
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetcoimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In ChandigarhSheetaleventcompany
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Memriyagarg453
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...Ahmedabad Call Girls
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 

Kürzlich hochgeladen (20)

Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetcoimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
coimbatore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
💚 Punjabi Call Girls In Chandigarh 💯Lucky 🔝8868886958🔝Call Girl In Chandigarh
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

Comp8 unit9c lecture_slides

  • 1. Installation and Maintenance of Health IT Systems Creating Fault-Tolerant Systems, Backups, and Decommissioning Lecture c This material (Comp 8 Unit 9) was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000024. This material was updated in 2016 by The University of Texas Health Science Center at Houston under Award Number 90WT0006. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
  • 2. Creating Fault-Tolerant Systems, Backups, and Decommissioning Learning Objectives 1. Define availability, reliability, redundancy, and fault tolerance (Lecture a) 2. Explain areas and outline rules for implementing fault tolerant systems (Lecture a) 3. Perform risk assessment (Lecture a) 4. Follow best practice guidelines for common implementations (Lecture b) 5. Develop strategies for backup and restore of operating systems, applications, configuration settings, and databases (Lecture c) 6. Decommission systems and data (Lecture c) 2
  • 3. Importance of Backup • Volume of data: hospital can generate 12 terabytes/yr in radiology alone. • HIPAA (Health Information Portability & Accountability Act) Security Rule requires exact backup copies of all healthcare data, easily retrievable • Should be called “Importance of Restore” (Surviving a Bottleneck, 2009) 3
  • 4. Backup Strategies: Requirements Laws regarding length of time health information data must be retained depend on the jurisdiction (usually state), and can involve: • Flat length of time (X years) • Age of patient • Time since age of majority, or of discharge, or of death • Length of statute of limitations for malpractice What constitutes best practices for a backup? • Exact, verified copy of the material – Multiple copies! • Stored off-site location in case of natural disaster, fires, flooding, etc. • Easily retrievable for timely restoration • Security via encryption and storage in secure location Fault tolerant storage protection (like RAID) is not enough • Deleted files • Old versions (AHIMA Practice Brief, n.d.) 4
  • 5. Backup Strategies: Backup Window • Time required to complete a given backup. – Determined by amount of data to be backed up divided by speed of network infrastructure • Backups that occur during production hours may be inconsistent (bad) • Problems when backup window reaches peak operation cycles, potentially straining resources and slowing down the system • What to do when system must be available 24/7? (Harwood, 2003) 5
  • 6. Backup Strategies: Which Files? • Full backups – All files – Pro: Ultimate protection, simple restoration – Con: Requires more time & lots of storage to keep multiple file versions • Incremental backups – Only files that have changed since last backup (full or incremental) – Pro: Much faster – Con: Restoration from multiple files (Harwood, 2003) 6
  • 7. Backup Strategies: Which Files? (cont’d) • Differential backup – Middle ground: all the files that have changed since the last full backup – Pro: easier restoration • Synthetic full backup – Compensates for small/nonexistent backup window – Data from last full backup + differential / incremental backup combined to create new full backup tape (Harwood, 2003) 7
  • 8. Backup Strategies: Which Files? (cont’d - 1) • File system snapshots – Available through VM environments and later UNIX versions – Backups at several times through the day without needing large amounts of additional storage media – Reliable backups without shutting down applications (Harwood, 2003) 8
  • 9. Backup Strategies: Where to store data • Direct backup – Tape drive / autoloader / library directly connected to every server to directly backup and restore data – Does not scale well • Centralized network backup – One server backs up data of all servers • SAN (Storage Area Network) backup – Storage network to which all servers & backup device connect (Gordon, n.d.) 9
  • 10. Backup Strategies: Backup Media Storage of media should cycle off-site • Tapes – Robust but expensive • Optical – Inexpensive, relatively small, convenient • Flash – Robust, convenient, fast • Hard disk – Cheap, fast but fragile, bulky • Network or Cloud backup – Dependent on network throughout 10
  • 11. Backup Strategies: Databases • Databases require extra considerations, depending on the database infrastructure used • Consult with database or EHR vendor to ensure backup strategy is compatible with database infrastructure. • Database backup is usually through specialize tools or applications, often provided with the database. 11
  • 12. Decommissioning • Goals in retiring old systems / applications / datasets – Active data properly retained – Inactive data archived or disposed of securely • Tips – Complete full data audit; note redundancies. – Determine data owners and stakeholders. – Identify active vs. inactive data. – Consider reporting / retrieval requirements for compliance. 12
  • 13. Decommissioning (cont’d) • Tips (cont’d) – Document retention policies well & ensure consistency with government guidelines. – Standardize on single, well-navigable archival system. – Develop decommissioning plan & schedule. – Ensure integrity of archived data and destruction of decommissioned data. 13
  • 14. Creating Fault-Tolerant Systems, Backups, and Decommissioning Summary – Lecture c • Regulatory requirements for backups are stringent • An effective backup strategy minimizes the backup window while ensuring data integrity. • Backup considerations: • Onsite vs Off-site • Full vs Partial • Media • Verification • Decommissioning – Active data properly retained – Inactive data archived or disposed of securely 14
  • 15. Creating Fault-Tolerant Systems, Backups, and Decommissioning Summary • Regulatory requirements for backups are stringent • An effective backup strategy minimizes the backup window while ensuring data integrity. • Backup considerations: • Onsite vs Off-site • Full vs Partial • Media • Verification • Decommissioning – Active data properly retained – Inactive data archived or disposed of securely 15
  • 16. Creating Fault-Tolerant Systems, Backups, and Decommissioning References – Lecture c References Surviving a Bottleneck - Insights into Managing Exponential Growth of Digitized Medical Images. (2009, March 16). Retrieved from Scicasts website: asts.com/specialreports/86-healthcare-it/2442- surviving-a-bottleneck-insights-into-managing-exponential-growth-of-digitized-medical-images Gordon, S. (n.d.). Comparing different backup strategies. Retrieved February 8, 2007, from SearchStorage website: http://searchstorage.techtarget.com/tip/Comparing-different-backup- strategies Retention and Destruction of Health Information. State Laws or Regulations Pertaining to Retention of Health Information. (updated 2013). Retrieved June 24, 2016, from AHIMA website: http://library.ahima.org/PB/RetentionDestruction#.V3Li1fkrJD8 16
  • 17. Installation and Maintenance of Health IT Systems Creating Fault-Tolerant Systems, Backups, and Decommissioning Lecture c This material was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000024. This material was updated in 2016 by The University of Texas Health Science Center at Houston under Award Number 90WT0006. 17

Hinweis der Redaktion

  1. Welcome to Installation and Maintenance of Health IT Systems, Creating Fault Tolerant Systems, Backups, and Decommissioning, This is lecture c. This component, Installation and Maintenance of Health IT Systems covers fundamentals of selection, installation, and maintenance of typical Electronic Health Records (EHR) systems. This unit, Creating Fault Tolerant Systems, Backups, and Decommissioning, will discuss ensuring availability and resiliency through fault tolerance, data reliability through backup, and secure decommissioning of EHR systems
  2. The objectives for this unit, Creating Fault-Tolerant Systems, Backups, and Decommissioning are to: Define availability, reliability, redundancy, and fault tolerance Explain areas and outline rules for implementing fault tolerant systems Perform risk assessment Follow best practice guidelines for common implementations Develop strategies for backup and restore of operating systems, applications, configuration settings, and databases and Decommission systems and data As healthcare organizations adopt new technology to improve their efficiency, their dependence on that technology increases exponentially. However, what happens to all of these critical applications if a failure were to occur? What about the integrity of the caregiver’s data in the event of a disaster? In lecture c, we will finalize our discussion and outline some backup strategies. And since we are on the subject of backing up, we will finish with some tips on archiving and decommissioning data and hardware.
  3. Healthcare institutions must now cope with the need to retain vast and ever-increasing quantities of medical data for protracted periods of time to safeguard themselves and their patients. The average 100-bed hospital generates anywhere between 40,000 to 45,000 radiological examinations yearly, equating to approximately 12 Terabytes of space needed for storage of these documents alone. This figure doesn’t even count the vast amounts of data generated yearly from billing, staffing and administration, and other typical needs of a healthcare setting. The HIPAA , or Health Information Portability & Accountability Act, Security Rule establishes the requirement to keep exact backup copies of all healthcare data that can be retrieved in a timely manner to restore documentation, should data be corrupted or lost. Think of a backup as a first step – the real reason to make a backup is not the backup, but the restoration of what was lost.
  4. Besides federal regulation such as HIPAA, state laws often describe retention requirements for health information. They may look at a fixed amount of time, or the age of the patient (especially for minors) or of the health record, time since discharge or death, or malpractice suit statute of limitations regulations. Let’s take a look at best practices for general backups. The copy of the information should be verified to ensure its correctness. A backup that cannot be restored is not a backup at all. Additionally, multiple copies, with a copy of the data at a location off-site geographically to protect it from natural disasters, fires, flooding, and such. The data must be easily retrievable so data can be restored in a timely fashion. The data must be encrypted for security, especially if stored off-site or transported. Note that RAID or other fault-tolerant systems (as discussed in lecture b) are NOT a substitute for backup. RAID does not protect against file deletion, or help in recovering older versions of the data. Backups can.
  5. Another issue you need to consider when developing your backup strategy is how often and when you will complete your backups. Backups, which can sap network bandwidth and hinder access to resources should be conducted, whenever possible, in a manner that reduces performance issues during peak cycles. A ‘backup window’ is “… the time it takes to complete a given backup. This backup window is determined by both the amount of data that must be backed up and by the speed of the network infrastructure that handles the data.” In a small organization, backups can complete in a small window, outside of production hours. An off-hours backup is advantageous because you may assume no changes to the data will be made during the backup. Any change to a backup mid-stream may lead to an inconsistent (and therefore flawed and possibly useless) backup. However, as the amount of data increases, backups may extend into production hours, introducing that possibility and impacting system speed as well. Finally, many systems are expected to run 24/7, and have only production time in which to backup.
  6. There are different types of backups which can be run, depending on your specific needs. Each has its advantages and disadvantages: Full backups save all files, and provide a convenient restore because all of the programs and data needed are in the same backup. The largest drawback to a full backup is the size of the backup and the time required. Retaining multiple versions of backup data can make the size requirements grow quickly. Incremental backup is faster because it saves only the copies of files which have changed since the last backup. For systems where a relatively few number of files change each day, this can save tremendously on storage. The drawback is that restoration requires access to multiple backups, increasing the time and effort for a restoration. Well-tended data libraries are recommended for incremental backups to allow easy identification of the proper backup from which to restore.
  7. Differential backups reduce the restoration problems from the incremental backup. Now only two backups are needed: the last full backup, and the last differential. This works by copying all data that has changed since the last full backup. It does mean, however, that the size of a differential backup will grow over time, eventually nearly reaching the size of the full backup. Synthetic full backups are generated by merging a full backup with an incremental to allow for on-stop restoration. While it combines the speed of an incremental with the easy restore of a full, it does take some post-processing to merge the data. This increases the complexity of the backup, and the potential for error. If the majority of your data files change frequently, then full backups are likely the best option
  8. Snapshots are a recommended backup method for systems that have no downtime or off-hours. This feature, often implemented in a platform specific environment, allows the data to be “frozen” so a backup is taken of guaranteed consistent data, no matter how long the backup takes. It does this by writing all changes to data in a temporary area during the snapshot, which is used transparently for all other system access. Then once the backup is complete, the data in the temporary area is merged back with the primary system. The biggest benefit of file system snapshots is that they allow backups on live data without disabling application access.
  9. The most straightforward backup is to copy the data to an attached tape drive, optical drive, or other file storage system directly connected to the server. This is fine for small environments, but for multiple servers, tracking the storage media may be difficult. Having a single backup server that connects to other networked servers is the next step up. This allows for extensive configured tracking of backed-up data in the backup server, and scales well. Also, it allows flexibility in restoration – anything that is on the network may be given a copy of freshly restored data. At still larger scales, the Storage Area Network (or SAN) is a separate system of interfaces and connections between data servers. A SAN will provide bulk data storage for the network, and have provision for backup of that data on the same network, usually integrated by the storage vendor.
  10. Backups will start on-site, but any media that are created should periodically be stored off-site. The media to use for a backup are available in several types. Tapes are historically the most robust, but also relatively slow and the media is expensive. Storing large amount of data on tapes can create a physical inventory problem. For several years, the capacity and cost of hard drives have greatly outdistanced that of tapes. Optical media is familiar and relatively inexpensive, and is readable for easy restoration without specialized equipment, as optical drives are standard equipment on most computers. They hold relatively little data though, and can be fragile. Their small space is attractive when considering physical size requirements of storage. Flash media is mentioned because of its ubiquity. USB memory sticks are available in fairly large capacity at increasingly attractive prices, and the media is robust. Their maximum capacity can mean difficulty scaling to very large data sizes. Backup to hard disk may sound oxymoronic, but because of advances in hard drive technology, huge amounts of data can be stored inexpensively and quickly. Because of their bulk and relative fragility, hard disks need careful physical storage. Finally, backup to network or cloud locations, while not technically media, depend on the network throughput to the backup site. Processes that continually run in the background, updating any changes to an off-site backup, are an ideal solution as long as the cost and network bandwidth are available to support it.
  11. Database backup requires extra considerations. Before embarking on a backup strategy for your EHR databases, consult with your EHR vendor to ensure your backup strategy is compatible with your database infrastructure. They should have outlined best practices for your system. Often the database or application vendor will provide specialized tools or additional applications to backup.
  12. Legacy systems are often maintained simply to reference historical data, sometimes at great cost to the organization. At some point, systems or applications past their prime, or datasets which must be retired, must be evaluated and dealt with in a manner that ensures that active data is properly retained and inactive data is archived or disposed of securely, consistent with the organizational needs. Here are some tips for identifying and decommissioning legacy systems: Complete a full data audit and identify the data you are collecting and retaining and note redundancies. Complete a full inventory of EHR systems and determine what kinds of data you collect and retain, and require. This is a complex task, since managing the many overlaps and redundancies will make it confusing as to which application is being used for which purpose. Determine who owns the data so you can work with them to resolve any compliance or archiving requirements. Identify which data is inactive and which data is still active. This is done through both using logs and conferring with data owners and stakeholders. Remember, archiving and retrieval of data, particularly in the healthcare arena, is a lifelong commitment. Be sure to plan adequately for archiving and tracking the data for compliance even once it’s off the servers.
  13. Be sure your retention policies are well documented and are consistent with federal and state guidelines. Be sure to standardize on a single, well-navigable archival system. This makes locating archived data easier and faster. Develop a plan and a schedule for decommissioning. Be sure to notify your data owners and stakeholders of the event, what will happen to their data once the application is decommissioned, and any potential impacts or replacement applications brought online. Once the server or applications are decommissioned, ensure the integrity of any archived data. Remember, simply erasing data from decommissioned hardware using conventional means is not enough. Data erased in this fashion can be retrieved using simple utilities. Be sure to render storage media useless or ensure it has been erased according to industry standards.
  14. This concludes Creating Fault-Tolerant Systems, Backups, and Decommissioning. Let’s take a quick moment to summarize the important points presented in this unit: Regulations require healthcare institutions to keep exact backup copies of all healthcare data. That data should be protected, encrypted and stored in multiple locations to protect it from foreseeable harm for the duration of its retention period. Backups often will occur during a limited timeframe, or backup window. As the amount of the data needing to be backed up increases, generally, so does the backup window. It is important to develop a backup strategy that minimizes the backup window while ensuring data integrity. Consider on versus off-site and full versus partial backups, as well as the type of media to use. However, always remember that any backup without a restore is useless – verification of stored data is critical to ensure availability. Lastly, decommissioning obsolete data or data storage devices require extra considerations to ensure that active data is properly retained, that inactive data is properly and safely discarded or archived and that regulatory compliance is maintained.
  15. This concludes Creating Fault-Tolerant Systems, Backups, and Decommissioning. Let’s take a quick moment to summarize the important points presented in this unit: Regulations require healthcare institutions to keep exact backup copies of all healthcare data. That data should be protected, encrypted and stored in multiple locations to protect it from foreseeable harm for the duration of its retention period. Backups often will occur during a limited timeframe, or backup window. As the amount of the data needing to be backed up increases, generally, so does the backup window. It is important to develop a backup strategy that minimizes the backup window while ensuring data integrity. Consider on versus off-site and full versus partial backups, as well as the type of media to use. However, always remember that any backup without a restore is useless – verification of stored data is critical to ensure availability. Lastly, decommissioning obsolete data or data storage devices require extra considerations to ensure that active data is properly retained, that inactive data is properly and safely discarded or archived and that regulatory compliance is maintained.
  16. No Audio. Ten seconds of silence.
  17. No Audio.