LEADx System Backup Policy

Desktop and Laptop Backup Policy

Local documents stored on desktop and laptop computers should be backed up so the documents and files can be restored in the event of a physical problem with the machine or if individual files or folders are inadvertently removed.

  • LEADx faculty and staff have access to a networked drive provided by Information Technology. Faculty and staff in the Sturm College of Law and Computer Science may have access to division specific resources.
  • All network storage resources must have a backup policy. Non-IT domains need a IT approved backup policy for Desktop and Laptop Computers. A current copy of this policy must be on file with IT. Individuals using non-IT domains must follow the approved backup policy.

Backup Modes

  • Network file storage is the preferred backup mode.
  • Files may be copied to once-writeable media (CDs, DVDs) or rewriteable storage media (e.g., hard disks, other magnetic media, and flash memory devices/thumb drives). These media must be stored in a secure location.
  • Every device or file should utilize a password so all information is protected. Protected information must be encrypted per the Secure Computing Policy.

Server Backup Policy

Backup procedures and policies are developed for two purposes, disaster recovery and file recovery. In the event of a catastrophe, due to a physical disaster, personnel error, or other misfortune, reliable backups must provide timely and accurate restoration of all functions of the organization. Individual file recovery may be required to restore programs, information, or other data that has become corrupted or inadvertently removed.

  • Backup procedures for all servers must be approved by IT. Procedures must include an appropriate time schedule, media description, storage, documentation, and testing process.
  • Knowledge of the backup location and access to the site should be limited to a few key people within the organization, but at least two individuals should have access to the facility. In addition, access should be documented and given to a senior administrator outside of the technology team.
  • Servers located in the cloud may take advantage of the cloud offsite server backup. This backup will meet all necessary physical security, storage, documentation, and testing criteria.
  • An individual outside of the technology team will audit all backup procedures regularly to ensure that backups are taking place as outlined in the policy.
Date Last Revised: 5/1/2020
Date Established: 5/1/2020
Revision History: