Abstract
During disasters, when all MIS resources are focused on system recovery and repair, computer facilities and information resources are critically vulnerable. Security procedures are often ignored, and security controls are often not in place. This article presents guidelines for MIS managers to ensure that data security and integrity are not further compromised during system recovery and repair.