{"id":10606,"date":"2018-11-09T10:09:02","date_gmt":"2018-11-09T16:09:02","guid":{"rendered":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/?p=10606"},"modified":"2025-02-13T08:46:08","modified_gmt":"2025-02-13T14:46:08","slug":"3-2-1-backup-rule","status":"publish","type":"post","link":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/2018\/11\/3-2-1-backup-rule\/","title":{"rendered":"3-2-1 Backup Rule"},"content":{"rendered":"<p style=\"margin: 0in;margin-bottom: .0001pt\"><span style=\"color: black\">As we all are aware, processes and techniques for managing data are constantly evolving in our industry, following trends and new developments in Information Technology. Backing up essential and\/or vital information has gotten easier to do and should be included in everyone&#8217;s archiving and data duplication protocols. If you attended our Managing Electronic Records classes, then you&#8217;ve heard us mention the Lots of Copies Keep Stuff Safe (LOCKSS) method. We have also shared this method through a few blog articles:\u00a0<\/span><a href=\"https:\/\/www.tsl.texas.gov\/slrm\/blog\/2016\/06\/what-records-should-be-considered-for-back-up-tapes\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0563c1\">What Records Should Be Considered for Back-up Tapes?<\/span><\/a><span style=\"color: black\">\u00a0\u00a0and\u00a0<\/span><a href=\"https:\/\/www.tsl.texas.gov\/slrm\/blog\/2017\/01\/identifying-and-protecting-essential-records\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0563c1\">Identifying and Protecting Essential Records<\/span><\/a><span style=\"color: black\">. This method is still recommended as an accepted backup procedure. However, a newish concept has been passed around the Information Technology circles of professionals. This new strategy is referred to as the &#8220;<b>3-2-1 Backup Rule.<\/b>&#8221; In 2012, the National Cybersecurity and Communications Integration Center (NCCIC) gave its recommendation for the 3-2-1 Backup Rule in a paper titled\u00a0<\/span><a href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/data_backup_options.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0563c1\">Data Backup Options<\/span><\/a><span style=\"color: black\">. This redundancy-driven concept follows the LOCKSS method, but adds one minor change to help ensure you\u2019re able to access your essential\/vital information when you need it.\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black\"><a href=\"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-content\/uploads\/2018\/11\/3-2-1-Backup-Graphic-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10610 alignleft\" src=\"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-content\/uploads\/2018\/11\/3-2-1-Backup-Graphic-2-300x116.jpg\" alt=\"\" width=\"300\" height=\"116\" srcset=\"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-content\/uploads\/2018\/11\/3-2-1-Backup-Graphic-2-300x116.jpg 300w, https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-content\/uploads\/2018\/11\/3-2-1-Backup-Graphic-2.jpg 450w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>The <b>3-2-1 Backup Rule<\/b> strategy is simple to remember: keep <b><u>three<\/u>\u00a0<\/b>complete copies of your information, <b><u>two<\/u><\/b>\u00a0of the copies should be on varied media, and <b><u>one<\/u><\/b> copy should be stored off-site. One copy of the original data will serve as the official or original record, followed by two additional backup copies. Two\u00a0of the three copies should be on different storage\/media formats. For example, in the event of a disaster, if your paper copy has been irreparably\u00a0damaged you will still be able to easily access a scanned PDF copy from your servers. Conversely, if your original record is in PDF format and your PC is crippled by a virus or malware, you can still access the paper copy from long term storage. Lastly, at least one copy should be stored off-site or somewhere in the cloud. This is the final line of defense in case of a catastrophic physical and technological failure.<\/span><\/p>\n<p><span style=\"color: black\">If you search the web for more information concerning the\u00a0<b>3-2-1 Backup Rule<\/b>, you\u2019ll more than likely see recommendations from various vendors to apply this strategy for <i><u>all of your information<\/u><\/i>. This decision however, can become costly and unnecessary if you are maintaining 3 copies of convenience or transitory information, and that&#8217;s not even mentioning short-term retention records.\u00a0That\u2019s why we recommend this particular method <i>only<\/i> for your vital\/essential information. You can still follow the LOCKSS method for non-essential\/non-vital information. Having different media or different locations for copies is a good practice to ensure your information is being preserved for the full retention period.<br \/>\n<\/span><\/p>\n<p><span style=\"color: black\">Following the <b>3-2-1 Backup Rule<\/b> is a good way to safeguard your important records and any data you deem important, as well as the assurance and security that you&#8217;ll be able to access the <\/span>information needed in the event of an emergency.<\/p>\n<div class=\"pld-like-dislike-wrap pld-custom\">\r\n    <div class=\"pld-like-wrap  pld-common-wrap\">\r\n    <a href=\"javascript:void(0)\" class=\"pld-like-trigger pld-like-dislike-trigger  \" title=\"Like it?\" data-post-id=\"10606\" data-trigger-type=\"like\" data-restriction=\"cookie\" data-already-liked=\"0\">\r\n                            <img src=\"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-content\/uploads\/2020\/08\/512x512.png\" alt=\"Like it?\" \/>\r\n            <\/a>\r\n    <span class=\"pld-like-count-wrap pld-count-wrap\">    <\/span>\r\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>As we all are aware, processes and techniques for managing data are constantly evolving in our industry, following trends and new developments in Information Technology. Backing up essential and\/or vital information has gotten easier to do and should be included in everyone&#8217;s archiving and data duplication protocols. If you attended our Managing Electronic Records classes,&hellip;<\/p>\n","protected":false},"author":54,"featured_media":10614,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_s2mail":"no","footnotes":""},"categories":[11],"tags":[294,295],"class_list":["post-10606","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-faqs","tag-backup-rules","tag-information-security"],"_links":{"self":[{"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/posts\/10606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/comments?post=10606"}],"version-history":[{"count":9,"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/posts\/10606\/revisions"}],"predecessor-version":[{"id":21642,"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/posts\/10606\/revisions\/21642"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/media\/10614"}],"wp:attachment":[{"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/media?parent=10606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/categories?post=10606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsl.texas.gov\/slrm\/blog\/wp-json\/wp\/v2\/tags?post=10606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}