Previous Topic: TSSCPR UtilityNext Topic: Designating Backup-Responsible System


Recovering from Security File Loss

This section contains the following topics:

Security File Recovery Strategy

Designating Backup-Responsible System

Managing Data Sets and Tape Backups

Selecting Host System(s) for Recovery

Reestablish the System after a Loss

Reconstructing the Security File

Reinstate Normal Operation

Security File Recovery Strategy

You should familiarize yourself with these steps and, in consultation with your Systems Programming staff, use this content as a guide to developing your own particular operating procedures and recovery strategy.

Implementation of a recovery strategy consists of the following parts:

While each of these steps may vary according to your particular needs or system configuration, all are essential components of an effective backup and recovery implementation.