01 Nov 2016

Disaster Recovery Plan Updates in Chapter 7 Handbook

0 Comment

With recent disasters hitting different areas of the United States—such as Hurricane Matthew causing flooding and severe storms along the eastern seaboard, heavy rains in Louisiana and Texas, and wildfires in California—the UST has revised the Chapter 7 Handbook section on Disaster Recovery Plans to be much more robust.

You can view the changes here.

In addition to a much more detailed outline of what should be included in a Chapter 7 Trustee office’s Disaster Recovery Plan, the UST has also shared this sample plan as a reference for trustees.

The new provisions include:

  • Identify potential disasters that could occur (death of an employee, computer malfunction, or natural disasters) and provide guidelines to follow to address each of these situations.
  • List safeguards in place such as security alarms, smoke detectors, fire extinguishers, and more. Also review the computer security and back-up procedure guidelines in Chapter 5.G.3.e.
  • Provide an alternate location where business operations can be resumed if the office cannot be accessed, and have procedures for arranging mail to be delivered to that location.
  • List other actions to take in the event of a disaster or business interruption.
  • List key telephone numbers such as the trustee and employees, computer vendors, landlord, UST, etc.
  • Designate a place for staff to meet (or a phone number to call).

In accordance with the Handbook’s provisions for Disaster Recovery Plans, BMS recommends that you utilize a cloud-based backup solution such as Carbonite so that all of the files and programs stored on your computer outside of your BMS software are protected. As a reminder, BMS backs up your case data (as well as documents if you use CaseLink Online, CaseLink Web, and CaseLink².)

In addition, BMS has provided the following security protocols for CaseLink², CaseLink Office and CaseLink Web. You can reduce your risk exposure and ensure business continuity for your practice by incorporating the security protocols BMS employs for your software into your disaster recovery plan.

[top]