Data classification for ILM and DR.Mission-critical data is used in the key business processes and can account for as much as 15% of all data stored online. Mission-critical applications represent those applications that are needed immediately to resume a business after the IT function has been disrupted. Mission-critical data is normally classified as company secret. Losing access to mission-critical data means loss of revenue, potential loss of customers and placing the survival of the business at risk. The optimal replication strategy for mission-critical data is disk mirroring since immediate recovery is mandatory at any cost. Mirroring protects against device failures but not from data corruption Data corruption refers to errors in computer data that occur during transmission or retrieval, introducing unintended changes to the original data. Computer storage and transmission systems use a number of measures to provide data integrity, the lack of errors. . Therefore, all data that is mirrored should also have point-in-time copies that enable recovery prior to the corruption event. These backup copies A disk, tape or other machine readable copy of a data or program file. Making backup copies is a discipline most computer users learn the hard way-- after months of work is lost. See backup and LAN free backup. are most cost effectively stored on magnetic tape. Maintaining mirrored copies of mission-critical data is the key to successful hot-site strategies.
Vital data is used in normal business processes, but doesn't mandate instantaneous in·stan·ta·ne·ous
1. Occurring or completed without perceptible delay: Relief was instantaneous.
2. recovery in order for the business to remain in operation. Vital data may also be classified as company secret. Data recovery times from seconds up to a few minutes are acceptable and vital data is normally backed up using automated virtual (disk-cached) tape libraries or economy SATA-based disk arrays. Mirroring is not normally required for vital data as replication techniques such as point-in-time copy, snapshot (1) A saved copy of memory including the contents of all memory bytes, hardware registers and status indicators. It is periodically taken in order to restore the system in the event of failure.
(2) A saved copy of a file before it is updated. copy and journaling are sufficient.
Sensitive data is used in normal business operations Business operations are those activities involved in the running of a business for the purpose of producing value for the stakeholders. Compare business processes. The outcome of business operations is the harvesting of value from assets and recovery time can take minutes or hours without causing severe operational impact. With sensitive data, alternative sources for accessing or reconstructing the data exist in case of data loss. Tape has been the mainstay backup choice and potentially the new MAID storage category will provide another viable and cost-effective technology option.
Non-critical data averages about 40% of all data stored online, making it the largest classification level. Non-critical data has relatively low security requirements and duplicate copies often exist. Lost, corrupted or damaged data can be reconstructed re·con·struct
tr.v. re·con·struct·ed, re·con·struct·ing, re·con·structs
1. To construct again; rebuild.
2. with minimal effort and cost, and acceptable recovery times can range from hours to several days, in some cases, since this data is not essential for business survival. E-mail archives, digital records and personal data files often fit this profile.
From "Storage Navigator See Netscape Navigator, Netscape and Norton Navigator.
Navigator - Netscape Navigator " by permission of Fred Moore
Fred Moore (born September 7, 1911 in Los Angeles, California, USA; died November 23, 1952 in Burbank, California, USA in a road accident), was an American character , president of Horison Information Strategies (Boulder, CO)