SlideShare ist ein Scribd-Unternehmen logo
1 von 22
The ultimate backup solution for your school iStorPro  Backup Solutions
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Importance of Backup &  Disaster Recovery for Schools In its recent “ Technical Specification – Institutional Infrastructure ” document, Becta states:  “ There are many reasons why data backup is a crucial requirement for every institution…. … Institutions depend on their computer systems more than ever…. … Loss of data is therefore more expensive than ever in terms of lost educational and administrative work and downtime. ”
The Importance of Backup &  Disaster Recovery for Schools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Importance of Backup &  Disaster Recovery for Schools ,[object Object],[object Object],[object Object],[object Object],[object Object]
iStorPro - How it Works   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
iStorPro - How it Works ,[object Object],[object Object],[object Object],[object Object],[object Object]
iStorPro - How it Works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
iStorPro – How it Works ,[object Object],[object Object],[object Object],[object Object],[object Object]
Becta’s Technical Specifications  for School Backup Systems ,[object Object],[object Object],[object Object]
Becta’s Technical Specifications  for School Backup Systems N/A Institutions  shall  implement FITS OM or equivalent 3.3.2-a ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Institutions  shall  have a backup strategy that includes details of what is backed up, the frequency of backup, storage of backup media (on and off site), recovery procedures, and the person responsible for backing up data. 3.3.2-b iStorPro Design Criterion Technical Specification
Becta’s Technical Specifications  for School Backup Systems See 3.3.2-d.   Users  should  only save work to local devices when that device is regularly synchronised or backed up via removable media. 3.3.2-e iStorPro backs up data held on laptops as well as data held centrally. This process is fully automated requiring no user input. Accordingly, schools do not need to educate individual users or buy removable media thereby saving valuable resources and money.   The person responsible for back up  shall  be appropriately trained. Institutions  should  educate individual users on how to backup their own personal data that is not backed up centrally by the system. 3.3.2-d iStorPro is professional fully managed backup service – schools do not require any additional internal HR or technical support. The person responsible for back up  shall  be appropriately trained. 3.3.2-c
Becta’s Technical Specifications  for School Backup Systems Users can restore any data at any time.   Tests  should  be performed at regular intervals to verify that data can be recovered from the system backup media.   3.3.2-g iStorPro can be set on a daily basis.   It then runs automatically without any user input necessary. User can log on and change settings at any time.  System backup operations  should  be performed on a daily basis and  should  be transparent to users.   3.3.2-f
Becta’s Technical Specifications  for School Backup Systems iStorPro backs up all of the data specified. It supports all systems including Microsoft, Apple, Linux, Novell, Solaris, Oracle, SAP whether held on a server or a laptop. It backs up data on an incremental basis (ie only data changes which have occurred since last backup) to save time and bandwith. Users can restore data from any of the previous 30 backups (eg. If data has been recently deleted or corrupted). Users can conduct a full system restore if required. Institutions  should  perform daily backups of new or changed data complemented by a full weekly backup of: - all institution administrative data, - all users' personal data stored in the network user folders, - all data stored in shared areas, - all changeable educational data stored on the network, - the mail server, or as a minimum, individual mailboxes, - operating system/system state data, - all activity and audit log files. 3.3.2-h
Becta’s Technical Specifications  for School Backup Systems Yes   A copy of all backup documentation  should  be kept off site.   3.3.2-j iStorPro avoids the need to removable media thereby reducing associated risks and the cost of purchasing and upgrading expensive hardware. iStorPro encrypts the backed up data and holds it securely offsite in state-of-the-art high security data centres   Media containing daily backups  should  be stored in fireproof safes wherever possible, and full backups  should  be removed off site to a secure location for safekeeping.   3.3.2-i
Legal Considerations ,[object Object],[object Object],[object Object],[object Object]
Legal Considerations ,[object Object],[object Object],[object Object],[object Object]
Legal Considerations ,[object Object],[object Object],[object Object]
Legal Considerations: A Recent Case ,[object Object],[object Object],[object Object],[object Object]
Conventional Backup Systems are Inadequate  ,[object Object],[object Object],[object Object],[object Object],[object Object],Traditional backup systems are likely to be in breach of Principle 7 of the DPA!
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You! Q&A

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...IRJET Journal
 
Memory Management in Operating System
Memory Management in Operating SystemMemory Management in Operating System
Memory Management in Operating Systemijtsrd
 
Self learning computer
Self learning computerSelf learning computer
Self learning computerijaia
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
 
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
 QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM  QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM ijscai
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaDavid Kearney
 
ICT HRM Internet MIS
ICT HRM Internet MISICT HRM Internet MIS
ICT HRM Internet MISSayeef Khan
 
Information Intendance System on Cloud
Information Intendance System on CloudInformation Intendance System on Cloud
Information Intendance System on CloudIRJET Journal
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)Badrul Alam
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleChristopher Wynder
 
The enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloudThe enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloudjournalBEEI
 
OS virtual memory
OS virtual memoryOS virtual memory
OS virtual memoryanand hd
 
An analysis of software aging in cloud environment
An analysis of software aging in cloud environment  An analysis of software aging in cloud environment
An analysis of software aging in cloud environment IJECEIAES
 
Workflow enhances ECM adoption_LaserFicheEpower14
Workflow enhances ECM adoption_LaserFicheEpower14Workflow enhances ECM adoption_LaserFicheEpower14
Workflow enhances ECM adoption_LaserFicheEpower14Christopher Wynder
 
Bring IT together_2015_ECOOandOASBO
Bring IT together_2015_ECOOandOASBOBring IT together_2015_ECOOandOASBO
Bring IT together_2015_ECOOandOASBOChristopher Wynder
 
E file(final-defense)
E file(final-defense)E file(final-defense)
E file(final-defense)Badrul Alam
 

Was ist angesagt? (17)

IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...IRJET- Placement Management and Prediction System using Data Mining and Cloud...
IRJET- Placement Management and Prediction System using Data Mining and Cloud...
 
Memory Management in Operating System
Memory Management in Operating SystemMemory Management in Operating System
Memory Management in Operating System
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 
Self learning computer
Self learning computerSelf learning computer
Self learning computer
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
 
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
 QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM  QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
ICT HRM Internet MIS
ICT HRM Internet MISICT HRM Internet MIS
ICT HRM Internet MIS
 
Information Intendance System on Cloud
Information Intendance System on CloudInformation Intendance System on Cloud
Information Intendance System on Cloud
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
 
The enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloudThe enhancement of logging system accuracy for infrastructure as a service cloud
The enhancement of logging system accuracy for infrastructure as a service cloud
 
OS virtual memory
OS virtual memoryOS virtual memory
OS virtual memory
 
An analysis of software aging in cloud environment
An analysis of software aging in cloud environment  An analysis of software aging in cloud environment
An analysis of software aging in cloud environment
 
Workflow enhances ECM adoption_LaserFicheEpower14
Workflow enhances ECM adoption_LaserFicheEpower14Workflow enhances ECM adoption_LaserFicheEpower14
Workflow enhances ECM adoption_LaserFicheEpower14
 
Bring IT together_2015_ECOOandOASBO
Bring IT together_2015_ECOOandOASBOBring IT together_2015_ECOOandOASBO
Bring IT together_2015_ECOOandOASBO
 
E file(final-defense)
E file(final-defense)E file(final-defense)
E file(final-defense)
 

Andere mochten auch

Linux Disaster Recovery Best Practices with rear
Linux Disaster Recovery Best Practices with rearLinux Disaster Recovery Best Practices with rear
Linux Disaster Recovery Best Practices with rearGratien D'haese
 
Bacula Overview
Bacula OverviewBacula Overview
Bacula Overviewsambismo
 
Automating backup provisioning with Bacula and Puppet
Automating backup provisioning with Bacula and PuppetAutomating backup provisioning with Bacula and Puppet
Automating backup provisioning with Bacula and Puppetmiouhpi
 
Linux Disaster Recovery Solutions
Linux Disaster Recovery SolutionsLinux Disaster Recovery Solutions
Linux Disaster Recovery SolutionsGratien D'haese
 
Barracuda Backup Service - English Presentation
Barracuda Backup Service - English PresentationBarracuda Backup Service - English Presentation
Barracuda Backup Service - English PresentationStéphane Gilliers
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
Introduction to Bacula
Introduction to BaculaIntroduction to Bacula
Introduction to BaculaHemant Shah
 
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015Symantec
 

Andere mochten auch (9)

SVEEP Barwani
SVEEP Barwani SVEEP Barwani
SVEEP Barwani
 
Linux Disaster Recovery Best Practices with rear
Linux Disaster Recovery Best Practices with rearLinux Disaster Recovery Best Practices with rear
Linux Disaster Recovery Best Practices with rear
 
Bacula Overview
Bacula OverviewBacula Overview
Bacula Overview
 
Automating backup provisioning with Bacula and Puppet
Automating backup provisioning with Bacula and PuppetAutomating backup provisioning with Bacula and Puppet
Automating backup provisioning with Bacula and Puppet
 
Linux Disaster Recovery Solutions
Linux Disaster Recovery SolutionsLinux Disaster Recovery Solutions
Linux Disaster Recovery Solutions
 
Barracuda Backup Service - English Presentation
Barracuda Backup Service - English PresentationBarracuda Backup Service - English Presentation
Barracuda Backup Service - English Presentation
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
Introduction to Bacula
Introduction to BaculaIntroduction to Bacula
Introduction to Bacula
 
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
 

Ähnlich wie I Stor School Backup Solutions Presentation Full

IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility controlShashwat Shriparv
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case studyManageEngine
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregonJulie Bozzi, PfPM, PMP
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recoverygeekmodeboy
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
What every IT audit should know about backup and recovery
What every IT audit should know about backup and recoveryWhat every IT audit should know about backup and recovery
What every IT audit should know about backup and recoveryessbaih
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemIRJET Journal
 
PLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfPLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfjosemaza20
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
SAN module_1.pdf
SAN module_1.pdfSAN module_1.pdf
SAN module_1.pdfNandishAC
 
Failure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archiveFailure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archiveDavin Abraham
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 

Ähnlich wie I Stor School Backup Solutions Presentation Full (20)

PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Final Ucat Ppt
Final Ucat PptFinal Ucat Ppt
Final Ucat Ppt
 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility control
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case study
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recovery
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
What every IT audit should know about backup and recovery
What every IT audit should know about backup and recoveryWhat every IT audit should know about backup and recovery
What every IT audit should know about backup and recovery
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android System
 
PLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfPLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdf
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
SAN module_1.pdf
SAN module_1.pdfSAN module_1.pdf
SAN module_1.pdf
 
SAN module_1.pdf
SAN module_1.pdfSAN module_1.pdf
SAN module_1.pdf
 
Failure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archiveFailure analysis buisness impact-backup-archive
Failure analysis buisness impact-backup-archive
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 

I Stor School Backup Solutions Presentation Full

  • 1. The ultimate backup solution for your school iStorPro Backup Solutions
  • 2.
  • 3. The Importance of Backup & Disaster Recovery for Schools In its recent “ Technical Specification – Institutional Infrastructure ” document, Becta states: “ There are many reasons why data backup is a crucial requirement for every institution…. … Institutions depend on their computer systems more than ever…. … Loss of data is therefore more expensive than ever in terms of lost educational and administrative work and downtime. ”
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Becta’s Technical Specifications for School Backup Systems See 3.3.2-d. Users should only save work to local devices when that device is regularly synchronised or backed up via removable media. 3.3.2-e iStorPro backs up data held on laptops as well as data held centrally. This process is fully automated requiring no user input. Accordingly, schools do not need to educate individual users or buy removable media thereby saving valuable resources and money. The person responsible for back up shall be appropriately trained. Institutions should educate individual users on how to backup their own personal data that is not backed up centrally by the system. 3.3.2-d iStorPro is professional fully managed backup service – schools do not require any additional internal HR or technical support. The person responsible for back up shall be appropriately trained. 3.3.2-c
  • 13. Becta’s Technical Specifications for School Backup Systems Users can restore any data at any time. Tests should be performed at regular intervals to verify that data can be recovered from the system backup media. 3.3.2-g iStorPro can be set on a daily basis. It then runs automatically without any user input necessary. User can log on and change settings at any time. System backup operations should be performed on a daily basis and should be transparent to users. 3.3.2-f
  • 14. Becta’s Technical Specifications for School Backup Systems iStorPro backs up all of the data specified. It supports all systems including Microsoft, Apple, Linux, Novell, Solaris, Oracle, SAP whether held on a server or a laptop. It backs up data on an incremental basis (ie only data changes which have occurred since last backup) to save time and bandwith. Users can restore data from any of the previous 30 backups (eg. If data has been recently deleted or corrupted). Users can conduct a full system restore if required. Institutions should perform daily backups of new or changed data complemented by a full weekly backup of: - all institution administrative data, - all users' personal data stored in the network user folders, - all data stored in shared areas, - all changeable educational data stored on the network, - the mail server, or as a minimum, individual mailboxes, - operating system/system state data, - all activity and audit log files. 3.3.2-h
  • 15. Becta’s Technical Specifications for School Backup Systems Yes A copy of all backup documentation should be kept off site. 3.3.2-j iStorPro avoids the need to removable media thereby reducing associated risks and the cost of purchasing and upgrading expensive hardware. iStorPro encrypts the backed up data and holds it securely offsite in state-of-the-art high security data centres Media containing daily backups should be stored in fireproof safes wherever possible, and full backups should be removed off site to a secure location for safekeeping. 3.3.2-i
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.

Hinweis der Redaktion

  1. Recent headlines concerning serious data loss and mishandling. NHS, RAF etc in last couple of weeks. Serious consequences under DPA. Government now responding with recent report on data handling procedures, and Becta has set out more specific guidance for schools The iStor service addresses all of these concerns and ensures school backup procedures comply with Data Protection Act, any relevant LA/LEA rules and Becta guidance
  2. Accordingly it is vital that schools have a robust backup and disaster recovery strategy in place which can allow them to store and recover their data efficiently and securely at any time. This will keep school downtime to a minimum and avoid unnecessary disruption to administrators and teachers.
  3. This is a list of threats to data set out by Becta in the same Technical Specifications document. All these scenarios could lead to a significant data loss for any school which could severely inhibit its ability to continue teaching. The threats are greater that ever before: floods (eg. Gloucestershire schools losing data as a result of 2007 floods), fires (according to Government statistics, over 1300 schools in the UK suffer fires which are large enough to be attended by the local fire service), theft (over 30 schools in Cheshire reported burglaries in the first 3 months of 2009), IT threats (software/system failure, malware, viruses etc), human error .
  4. ……… so schools need a robust and efficient backup system to keep their data secure…. … . Now I will give a brief outline of how iStorPro works….
  5. Data Centres are located in Manchester and in South East to ensure disaster recovery.
  6. At end of slide….So why is all of this so important…??? Now going to look at Becta’s requirements and how iStorPro meets and exceeds these requirements… … . And then the legal implications of an inadequate backup system.
  7. … .Failure to implement an effective backup and disaster recovery strategy can result in damaging losses of data causing schools to waste time and resources as their staff have to redo all their work…. … . But there could also be severe legal consequences for schools which fail to backup their data securely….
  8. We are now looking at how data protection laws apply to data backup and the implications of getting it wrong!!
  9. Since November 2007, the ICO has dealt with more than 500 incidents involving local authorities and charities. In schools, Headteachers, Office Managers, IT Managers (and anyone else with responsibility for backup) could face sanctions. Schools and schools alone are responsible for their data…. As you can see, it also results in damaging PR/reputational damage for the organisation and individual.
  10. An Enterprise Storage Group report cited a 60% failure rate for traditional tape media…. But many schools lack the time, expertise or inclination to test their backup systems. Other schools keep their backup tapes onsite – so if a school suffered a fire, flood or theft, all of their data would be lost. Once any file deletions/corruptions are backed up onto tape, there is no way of retrieving files as they were prior to deletion/corruption. Very likely that backup tapes and other media are in breach of Principle 7 because of the lack of protection/security/encryption. NB: some schools will have an offsite backup by the office manager putting the backup tape (unencrypted) in their bag and going home with it(!!) This is clearly inappropriate and almost certainly illegal and could attract criminal sanctions. … as in Leicestershire Nursery case.