{"id":1394,"date":"2024-07-23T21:41:28","date_gmt":"2024-07-23T21:41:28","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1394"},"modified":"2024-09-06T21:17:51","modified_gmt":"2024-09-06T21:17:51","slug":"contingency-planning-cp","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/","title":{"rendered":"Contingency Planning (CP)"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">Contingency Planning (CP)<\/h1>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Purpose &#8211;&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The Contingency Planning Policy and associated controls describe the requirements for written plans to minimize the effects of a disaster and either maintain or quickly resume mission-critical information technology functions.&nbsp;&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Scope and Roles &#8211;&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>This policy applies to information resources owned or managed by Tarleton State University (Tarleton). The intended audience includes the Tarleton Chief Information Officer (CIO), Chief Information Security Officer (CISO), and information resource owners and custodians.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Compliance &#8211;&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Contingency plans for information resources are implemented to ensure compliance with the Texas Department of Information Resources (DIR) Security Control Standards Catalog as required by Title 1 Texas Administrative Code <a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=76\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.76<\/a> and Texas A&amp;M University System (TAMUS) <a href=\"https:\/\/policies.tamus.edu\/29-01-03.pdf\">Regulation 29.01.03, Information Security<\/a>.\u00a0 Information resource contingency plans are a component of the Tarleton Business Continuity Plan, which is a component of the Texas A&amp;M University System Offices Business Continuity Plan which is required by <a href=\"https:\/\/policies.tamus.edu\/34-07-02.pdf\">TAMUS Regulation 34.07.02, Business Continuity Plans<\/a>, and Texas Labor Code <a href=\"https:\/\/statutes.capitol.texas.gov\/Docs\/LA\/htm\/LA.412.htm#412.054\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7412.054<\/a>.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contingency Planning (CP) Purpose &#8211;&nbsp;&nbsp; The Contingency Planning Policy and associated controls describe the requirements for written plans to minimize the effects of a disaster and either maintain or quickly &#8230;<\/p>\n","protected":false},"author":94,"featured_media":580,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1394","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/jgeorge\/","display_name":"jgeorge"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on July 23, 2024","modified":"Updated on September 6, 2024"},"absolute_dates_time":{"created":"Posted on July 23, 2024 9:41 pm","modified":"Updated on September 6, 2024 9:17 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1394"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1394\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}