Verified Document

Personal Technology Contingency Plan With Nearly Every Essay

Personal Technology Contingency Plan With nearly every aspect of modern life dependent on electronic devices, there has never been a more important time to have a personal technology contingency plan. Smartphones and their many contacts, applications and customized options often represent hundreds of hours of time invested in getting them configured to a person's specific preferences. Multiply this by the number of devices and laptops that many people are relying on in their lives and to do their jobs, and the impact of losing all this data can readily be seen. It would bring anyone's life to a screeching halt and lead to days of chaos as the information, applications and specific settings were regenerated from memory. Too often human memory and effort is the default technology contingency plan (Young-Jai, 2001).

The most common scenarios that lead to lost data include lost or stolen devices, corrupted data and disk storage on systems, or the application and operating system corruption (Young-Jai, 2001). Large scale disasters including earthquakes, tornados, hurricanes and tornados often destroy tens of thousands of devices and lead to billions of dollars in information assets being...

Parts of this document are hidden

View Full Document
svg-one

While the risk of these larger-scale events are not as great as a device being stolen or failing over time, the common denominator to solve this problem is to have automated backups of personal data to cloud-based storage systems. Over a decade ago Web-based storage systems were considered ideal for contingency plans (Young-Jai, 2001) and today they include advanced authentication and security features (Tang, Lee, Lui, Perlman, 2012). Using a cloud-based platform to create a more device-independent strategy of data protection and backup makes more economic sense than local storage, as cloud-based systems can propagate backup and recovery options across a multiple of personal devices (Tang, Lee, Lui, Perlman, 2012). A personal technology recovery plan needs to be based on a solid foundation of automated backup, data verification and authentication options to get data assets completely independent of their hardware dependencies that are often the downfall of data recovery efforts (Young-Jai, 2001). Focusing on how devices and their data can be backed up transparently and with no added steps can assure both data and configuration options are successfully captured for later retrieval in…

Sources used in this document:
Bibliography

Spinellis, D. (2009). Basic etiquette of technical communication. IEEE Software, 26(6), 86-87.

Tang, Y., Lee, P., Lui, J., & Perlman, R. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9(6), 903.

Young-Jai, L. (2001). A case study on developing a web-based contingency plan for business crises. International Journal of Risk Assessment and Management, 2(3), 330-339.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now