Subscribers may provide unique equipment or software either at the time of disaster or store it at the hot site ready for use.
Data streams, data security services and applications can be hosted and managed by vendors.
Desktop computers, laptops and wireless devices are used by employees to create, process, manage and communicate information.
What do you when your information technology stops working?
The impact of data loss or corruption from hardware failure, human error, hacking or malware could be significant.
A plan for data backup and restoration of electronic information is essential.
It begins by compiling an inventory of hardware (e.g.
servers, desktops, laptops and wireless devices), software applications and data.
Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another.
Servers process information and store large amounts of data.