Skip Trinity Banner Navigation

Skip to main content »

Trinity College Dublin

Skip Main Navigation
IT Security
Secondary Navigation

Backup And Recovery - Overview

Backup procedures, ensuring that both data and software are regularly and securely backed up, are essential to protect against the loss of data and software and to facilitate a rapid recovery from an emergency, such as a computer failure, a virus infection, a flood or a fire which could result in the destruction of the original data.

Users should note that only critical systems are routinely backed up by IS Services in the current model. The responsibility for backing up data held on the workstations of individuals regardless of whether they are owned privately or by the College falls entirely to the User.

Users of computers in College Computer Rooms should be familiar with backing up their personal data and email.

IS Services make the following recommendations regarding the backup of data held on College systems:

1. Identify your data

Take time to identify the important data on your computer. Imagine that your computer is destroyed tomorrow what data you would want to get back?

E.g. Important office documents, Microsoft Word and Excel files, any databases held locally on your machine and don't forget your email. If you use an email client like Eudora or Outlook then all you email is downloaded and held in a folder on your computer.

Make a list of all your important documents and their location on your computer and use this to form the basis of your backup plan. For further guidance see What data should I backup?

2. Select an appropriate Backup Media

Backup media refers to the device that you back your data up to. This could be a tape, a zip disk, or a CD.

Your computer most likely has an appropriate drive for one of these devices and this will influence your decision. If you are unsure what backup media you should use please contact Information Systems Services for help.

3. Label your Backups

The backup media (i.e. tapes, zip disks, floppies) should be labeled as precisely as possible with the date, and some information to indicate what data has been backed up. You could alternatively keep more detailed records of what has been backed up on a separate piece of paper and just label a reference number on the backup media.

4. Hold multiple backups of important data

Hold multiple copies of important data from different time intervals e.g. a backup from one day ago, a backup from one week ago and a backup from one month ago.

This protects against loss of data where data becomes corrupt and a user does not notice immediately.

This is known as a 'generational' backup. In this case three generations of back-up data would be kept, known as the grandfather/father/son.

5. Store your Backup Safely

Copies of the back-up media, together with any notes on what has been backed up, should be stored safely e.g. in a locked drawer or fireproof safe.

Ideally you should have a copy of the data in another location, at a sufficient distance away to escape any damage from a disaster (e.g. a fire or flood) at the location of the data i.e. the location of your computer.

6. Test your Backup

Test the process of restoring your data from your backup copy. This will ensure that you have backed up all necessary data correctly and also familiarise you with the process which should speed things up if you ever need to restore data in the case of a real emergency.


Disaster Recovery

All Users should plan for the worst-case scenario i.e. the total loss of their entire system. If this occurs users need to be in a position, once they have procured replacement hardware, to reload the data/software from the back-up media tapes.

Users may also need to re-licence the software, because often the licence manager keys on hardware-specific attributes e.g. size and type of hard disk, MAC address and/or host-id. Arrangements for replacement hardware can be made as follows:

  • Purchase - most vendors will try to provide a rapid delivery in the event of a disaster.
  • Use of spare capacity on a colleague's computer in other building/site.

Legal Requirements

Users when formulating a backup strategy should take the following legal implications into consideration:

  • Where data held is personal data within the meaning of the Data Protection Act, there is a legal requirement to ensure that such back-ups are adequate for the purpose of protecting that data.
  • Depending on legal or other requirements, e.g. Financial Regulations, it may be necessary to retain essential business data for a number of years and for some archive copies to be permanently retained.
  • Depending on legal or other requirements, e.g. Data Protection Act, Software Licensing, it may be necessary to destroy all backup copies of data after a certain period or at the end of a contract.

Checklist

When you have devised your backup strategy run through the checklist below :

  • Are all data, operating systems and utility files adequately and systematically backed up? (Ensure this includes all patches, fixes and updates)

  • Are there adequate records of what is backed up and to where?

  • Are there records of the licensed software?

  • Are copies of the media and records stored remotely and safely?

  • Has the backup viability been checked by regular tests of reloads?

  • Can the new hardware read the backup media?

  • Will the software license run on the new hardware?

  • Has a disaster recovery exercise been practiced successfully?

Contact: ITSecurity@tcd.ie | Sitemap | Last Updated: March 10, 2008