CONTINUITY OF OPERATIONS PLAN TEMPLATE - Sedgwick County
CONTINUITY OF OPERATIONS PLAN TEMPLATE - Sedgwick County CONTINUITY OF OPERATIONS PLAN TEMPLATE - Sedgwick County
Storage sheds should be padlocked.Structural Assessment: A building diagram should be kept of off site as a vital record. An emergency generator and an alternate generation unit should be availablewhich supports the power supply of the facility. There are back-ups for utilities (gas, water, sewer, etc…). There are procedures to locate and control the HVAC unit. Personnel know where there is a structurally sound and well ventilated area in thefacility away from glass and heavy loose objects. It is known which equipment operates on the back-up power system and whichbecome inoperable when the power is down. Rooms are left open if you do not have keys.Miscellaneous: If possible, have security guards control each public access. If possible, have security guards roam the facility, or have a security guard visiblymonitoring the grounds via Closed Circuit TV. Closed Circuit TV systems, access control, and burglar alarms all reduce afacility’s vulnerability. Make them visible. Mail and packages are screened before being delivered Post signs that clearly state to all visitors and vendors that their actions are beingmonitored. Employees should wear their identification in a plainly visible manner. Visitors should wear “visitor” badges and be checked in by security personnel. Visitors are required to sign in. Identification badges are routinely checked. Surge protectors are used, or the building electrical system protected againstsurge. Finally, go back to the drawing board and sit down to figure out how and what can be done tominimize or even eliminate these security vulnerabilities. Ensure the Vulnerability AnalysisWorksheet reflects your security analysis and define those issues that need to be resolved inthe Mitigation/Prevention Spreadsheet.42
MITIGATION/PREVENTIONSPREADSHEETBased upon the vulnerability assessment, attention should be directed at taking steps to enhancethe safety, security and continuity of operations.Criteria for Estimates:TIME FRAME:COST:Short Term < 3 months Low < $10,000Intermediate 3 months to 1 year Medium $10K to $25 KLong Term > 1 year High > $25,000Area of Mitigation Time Frame Cost CommentsDefine issueLong,Intermediate,short termHigh,Medium,LowPrimary/Alternate FacilityDevelop Standard Operating Procedure Intermediate Lowto deactivate/control building airhandling systems duringemergencies/disasters.Vital RecordsVital Equipment & SystemsPhysical/Cyber SecurityPersonnel/SafetyTraining, Testing, ExercisesProgram Strategy & MaintenanceResource ManagementOther43
- Page 1 and 2: BUSINESS NAMECONTINUITY OFOPERATION
- Page 3 and 4: RECORD OF CHANGESCHANGE DATE OF DAT
- Page 5 and 6: BUSINESS NAME[INSERT DEPARTMENT OR
- Page 7 and 8: 8. MULTI-YEAR STRATEGY AND PROGRAMM
- Page 10 and 11: 2. ESSENTIAL FUNCTIONS AND COOP PER
- Page 12 and 13: U.S. General Services Administratio
- Page 14 and 15: This section should identify the im
- Page 16 and 17: event status.A field office is best
- Page 18 and 19: Mitigation activities and responsib
- Page 20 and 21: specifying the purpose and scope of
- Page 22 and 23: coordination plans; establishment o
- Page 24 and 25: A. Alternate FacilityA critical ele
- Page 26 and 27: organization’s COOP program is ca
- Page 28 and 29: Following joint development of the
- Page 30 and 31: ANNEX ADEFINATIONS AND ACRONYMSThis
- Page 32 and 33: T. INCIDENT COMMAND SYSTEM (ICS): A
- Page 34 and 35: ANNEX BHAZARD VULNERABILITY ANALYSI
- Page 36 and 37: VULNERABILITY ANALYSISWORKSHEETINST
- Page 38 and 39: Cost to repairBUSINESS IMPACTConsid
- Page 40 and 41: Vulnerability Analysis WorksheetTYP
- Page 44 and 45: ANNEX COPERATIONAL CHECKLISTSThis a
- Page 46 and 47: Deployment Readiness ChecklistThe f
- Page 48 and 49: Operational Readiness ChecklistThis
- Page 50 and 51: ALTERNATE FACILITY INFORMATIONFacil
- Page 52 and 53: Requirements for Alternate Work Sit
- Page 54 and 55: ANNEX FESSENTIAL FUNCTIONSDuring th
- Page 56 and 57: Resource Requirements for Critical
- Page 58 and 59: Priority of Essential Functions(PA
- Page 60 and 61: Essential Functions and Essential C
- Page 62 and 63: Employee CascadeListEssential COOPP
- Page 64 and 65: Order of Succession(PA CoG Workshee
- Page 66 and 67: Authority of be Delegated(PA CoG Wo
- Page 68 and 69: ANNEX JCOOP RESPONSE AND RECOVERY O
- Page 70 and 71: Vital Records, Files & Databases(Ta
- Page 72 and 73: End of yearOn clean up daysPeriodic
- Page 74 and 75: eing created at the time of the inv
- Page 76 and 77: Vital Record Protection Methods(PA
- Page 78 and 79: ANNEX MVITAL EQUIPMENT AND SYSTEMSC
- Page 80 and 81: Vital System and Equipment Protecti
- Page 82 and 83: ANNEX NCOMMUNICATION SYSTEMSCOOP Pl
- Page 84 and 85: Preventative Controls for Communica
- Page 86 and 87: ANNEX ORESOURCE MANAGEMENTAnnex can
- Page 88 and 89: ANNEX PEMERGENCY RESPONSE PLANInser
- Page 90 and 91: Transportation, Lodging and Food(PA
MITIGATION/PREVENTIONSPREADSHEETBased upon the vulnerability assessment, attention should be directed at taking steps to enhancethe safety, security and continuity of operations.Criteria for Estimates:TIME FRAME:COST:Short Term < 3 months Low < $10,000Intermediate 3 months to 1 year Medium $10K to $25 KLong Term > 1 year High > $25,000Area of Mitigation Time Frame Cost CommentsDefine issueLong,Intermediate,short termHigh,Medium,LowPrimary/Alternate FacilityDevelop Standard Operating Procedure Intermediate Lowto deactivate/control building airhandling systems duringemergencies/disasters.Vital RecordsVital Equipment & SystemsPhysical/Cyber SecurityPersonnel/SafetyTraining, Testing, ExercisesProgram Strategy & MaintenanceResource ManagementOther43