Loading...
HomeMy WebLinkAbout0035 CIT AVENUE - HAZMAT p1ME Tp Town of Barnstable Office:508.862.4644 Public Health Division Fax:508 790 6304 • BARMA�BLE.$• 200 Main Street• Hyannis, MA 02601 p t6M MP p�0 TOXIC AND HAZARDOUS MATERIALS INSPECTION REPORT rED Business Name: ")I,D O, OI AA S O tti �w��� •cR. v Co. Date: S 3 o f$ Location/Mailing Address: 3 C- anv� Contact Name/Phone: (Sra.Ae", &"C. a4y 70 a1 Inventory Total Amount: SDS: License#: Tier II : o Labeling: q k Spill Plan: YeS Oil/WaterSeparator: tX Floor Drains: v Emer enc Numbers: �/ -S Storage Areas/Tanks: I & A l Cb ri°-0Ltw 4-f S t k vt., 5 Emergency/Containment Equipment: - o Waste Generator ID: Waste Product: wtrx �S Date&Amount of Last Shipment/Frequency: v X ! Licensed Waste Hauler&Destination: L Other Waste Disposal Methods: LIST OF TOXIC AND HAZARDOUS MATERIALS ^' G Vw t vN. NOTE: Under the provisions of Ch. 111, Section 31, of the General Laws of MA, hazardous material se, ��5 tKgQ storage and disposal of 111 gallons or more requires a license from the Public Health Division. Antifreeze Dry cleaning fluids Automatic transmission fluid Other cleaning solvents&spot removers Engine and radiator flushes Bug and tar removers Hydraulic fluid (including brake fluid) Windshield wash Motor oils Miscellaneous Corrosives Gasoline,jet fuel, aviation gas Cesspool cleaners Diesel fuel, kerosene, #2 heating oil Disinfectants Miscellaneous petroleum products: Road salts grease, lubricants, gear oil Refrigerants Degreasers for engines&garages Pesticides: Caulk/Grout insecticides, herbicides, rodenticides Battery acid (electrolyte)/batteries Photochemicals(Fixers) Rustproofers Photochemicals(Developer) Car wash detergents Printing ink Car waxes and polishes Wood preservatives(creosote) Asphalt&roofing tar Swimming pool chlorine Paints, varnishes, stains, dyes Lye or caustic soda Lacquer thinners Miscellaneous Combustible Paint&varnish removers, deglossers Leather dyes Miscellaneous Flammables Fertilizers Floor&furniture strippers PCB's Metal polishes Other chlorinated hydrocarbons Laundry soil &stain removers (including carbon tetrachloride) (including bleach) Any other products with "poison labels" (including chloroform, formaldehyde, hydrochloric acid, other acids) VIOLATIONS: ORDERS: INFORMATION RECOMMENDATIONS: N o kS5-',1-S o,<' CP-C•OVA owS G� �S � 2-• Inspector:Facility Representative:Representative: WHITE COPY-HEALTH DEPARTMENT/CANARY COPY- BUSINESS °pIKE�o Town of Barnstable Office:508-862-4644 Public Health Division Fax:508-790-6304 BA MA LE.RR 200 Main Street• Hyannis, MA 02601 i0Tf0 MP+p`0� TOXIC AND HAZARDOUS MATERIALS INSPECTION REPORT Business Name: ob P-t)ow 041" co, Date: 13 17 Location/Mailing Address: 3 < � ,v o -5 Contact Name/Phone: 6—go C'T a cfj, -Svo - 7 - Y//S- Inventory Total mount: ''� I SDS: l s License#: Tier II : o Labeling: ° J,< Spill Plan: Oil/WaterSeparator: Floor Drains: O Emergency Numbers: e5 Storage Areas/Tanks: OvJ A%A.4xa G.,( 4111 0 Emergency/Containment Equipment: *\ I4.J 5 -< o'V- ¢, Waste Generator ID: IJ Was e Product: b4aI -twk3 Date&Amount of Last Shi ment/Fre u nc : 'lam VA0'KA\N15 Licensed Waste Hauler&Destination: e_o %a- Other Waste Disposal Methods: LIST OF TOXIC AND HAZARDOUS MATERIALS NOTE: Under the provisions of Ch. 111, Section 31, of the General Laws of MA, hazardous material use, storage and disposal of 111 gallons or more requires a license from the Public Health Division. Antifreeze Dry cleaning fluids Automatic transmission fluid V Other cleaning solvents&spot removers Engine and radiator flushes ���� Bug and tar removers Hydraulic fluid (including brake fluid)eo�� Windshield wash Motor oils Miscellaneous Corrosives Gasoline,jet fuel, aviation gas Cesspool cleaners Diesel fuel, kerosene, #2 heating oil Disinfectants Miscellaneous petroleum products: Road salts grease, lubricants, gear oil Refrigerants Degreasers f r engines&garages Pesticides: Caulk/Grout gaa��c 5��5 qJG insecticides, herbicides, rodenticides Battery acid (electrolyte)/batteries Photochemicals(Fixers) Rustproofers Photochemicals(Developer) Car wash detergents Printing ink Car waxes and polishes . Wood preservatives (creosote) Asphalt&roofing tar Swimming pool chlorine Paints, varnishes, stains, dyes Lye or caustic soda Lacquer thinners Miscellaneous Combustible Paint&varnish removers, deglossers Leather dyes Miscellaneous Flammables Fertilizers Floor&furniture strippers PCB's Metal polishes Other chlorinated hydrocarbons Laundry soil &stain removers (including carbon tetrachloride) (including bleach) Any other products with "poison labels" (including chloroform, formaldehyde, hydrochloric acid, other acids) VIOLATIONS: ORDERS: INFORMATION/RECOMMENDATIONS: o \ `J 15V•G5 Inspector: Facility Representative: 7 C"i WHITE COPY- HEALTH DEPARTMENT/CANARY COPY-BUSINESS °FINE Town of Barnstable Office:508-862-4644 Public Health Division Fax:508-790-6304 BARN STABLE. ' 200 Main Street• Hyannis, MA 02601 or'�'n+1, TOXIC AND HAZARDOUS MATERIALS INSPECTION REPORT Business Name: go61►,S o N-- PIU VK,L, Opp-,, CD . Date: / /6 Location/Mailing Address: S64 V an0 Contact Name/Phone: raoh-wt (;;'ao.a.Da.,RV -0>0- 7.7.5-- qi 1� Inventory Total ount: A- MSDS: Zg License#: I`1 Z �� Tier II : b Labeling: <¢Ak&.-,\ Spill Plan: e 5 Oil/WaterSeparator: Floor Drains: lSo Emergency Numbers: e5 Storage Areas/Tanks: V b.,4 t6 6L<t, W O,,�c.,^wr` g t�¢, c&W\- w�.t 9 Emer enc /Containmen ui ment: Waste Generator ID: 4 Waste Pro uct: Date&Amount of Last Shi ment/Fre uenc : 4.. St .e Licensed Waste Hauler&Destination: Other Waste Disposal Methods: p LIST OF TOXIC AND HAZARDOUS MATERIALS La��`' �. �c�`o� V5 \°LSOkAk Ov- 3%ke NOTE: Under the provisions of Ch. 111, Section 31, of the General Laws of MA, hazardous material use, storage and disposal of 111 gallons or more requires a license from the Public Health Division. �1 Antifreeze 14�4 2 Dry cleaning fluids Automatic transmission fluid Other cleaning solvents&spot removers�a Engine and radiator flushes Bug and tar removers Hydraulic fluid (including brake fluid) ►u Windshield wash %D Motor oils Miscellaneous Corrosives Gasoline,jet fuel, aviation gas Cesspool cleaners Diesel fuel, kerosene, #2 heating oil Disinfectants ti Miscellaneous petroleum products- boo Road salts Ibo lb grease, lubricants, gear oil R Refrigerants Degreasers for engines&garages Pesticides: V Caulk/Grout/Aj-�4 Jf-s t�q -t 10 insecticides, herbicides, rodenticides Battery acid (electrolyte)/batteries Photochemicals(Fixers) Rustproofers Photochemicals(Developer) Car wash detergents Printing ink Car waxes and polishes Wood preservatives(creosote) Asphalt&roofing tar Swimming pool chlorine Paints, varnishes, stains, dyes Lye or caustic soda Lacquer thinners Miscellaneous Combustible Paint&varnish removers, deglossers Leather dyes Miscellaneous Flammables Fertilizers Floor&furniture strippers PCB's Metal polishes Other chlorinated hydrocarbons Laundry soil &stain removers (including carbon tetrachloride) (including bleach) Any other products with "poison labels" (including chloroform, formaldehyde, hydrochloric acid, other acids) VIOLATIONS: ORDERS: INFORMATION/RECOMMENDATIONS: o .e, b,( Inspector: Facility Representative: WHITE COPY-HEALTH DEPARTMENT/CANARY COPY-BUSINESS INE r � Town of Barnstable Office:508-862-4644 Public Health Division Fax:508-790-6304 • BA MA.Bq 200 Main Street• Hyannis, MA 02601 1639. �'°rFOMP+A, TOXIC AND HAZARDOUS MATERIALS INSPECTION REPORT Business Name: Date: Location/Mailing Address: 3S C , I-I�Is Contact Name/Phone: &ate t, $Z --775-- `III S Inventory Total mount: ?M k MSDS: 2.5 License#: (\�Z Tier II : o Labeling: «kw,k Spill Plan: e S Oil/WaterSeparator: Floor Drains: No Emergency Numbers: e.5 Storage Areas/Tanks: A\ ('o-VO Qk&--&4 fcor-kk6 Emergency/Containment E ui ment: S \L�� raw got(\X `3 S 0 V- 0\kR- Waste Generator ID: 0 Jps Waste Product: Date&Amount of Last Shpment/FrequencX: Licensed Waste Hauler&Destination: Other Waste Disposal Methods: -t L\#,kt w S �e- r°w-• 4V-(qM o LIST OF TOXIC AND HAZARDOUS MATERIALS No .n,- 01 L ��qq� i,,, ,�,vt.nkoly �rt�`alh - NOTE: Under the provisions of Ch. 111, Section 31, of the General La"X of MA, hazardous material use, storage and disposal of 111 gallons or more requires a license from the Public Health Division. y Antifreeze Dry cleaning fluids Automatic transmission fluid -7— Other cleaning solvents&spot removers Engine and radiator flushes Bug and tar removers Hydraulic fluid (including brake fluid) � Windshield wash Motor oils —V Miscellaneous Corrosives Gasoline,jet fuel, aviation gas Cesspool cleaners Diesel fuel, kerosene, #2 heating oil Disinfectants Miscellaneous petroleum products: Road salts grease, lubricants, gear oil Refrigerants Degreasers for engines&garages Pesticides: J Caulk/GroutJA4W-4,\K5 insecticides, herbicides, rodenticides Battery acid (electrolyte)/batteries Photochemicals(Fixers) Rustproofers Photochemicals(Developer) Car wash detergents Printing ink Car waxes and polishes Wood preservatives(creosote) Asphalt&roofing tar Swimming pool chlorine Paints, varnishes, stains, dyes Lye or caustic soda Lacquer thinners Miscellaneous Combustible Paint&varnish removers, deglossers Leather dyes Miscellaneous Flammables Fertilizers Floor&furniture strippers PCB's Metal polishes Other chlorinated hydrocarbons Laundry soil&stain removers (including carbon tetrachloride) (including bleach) Any other products with "poison labels" (including chloroform, formaldehyde, hydrochloric acid, other acids) VIOLATIONS: ORDERS: INFORMATION/RECOMMENDATIONS: NO Inspector: - Facility Representative: WHITE COPY-HEALTH DEPARTMENT/CANARY COPY-BUSINESS 1 � ✓ ____ � / TOWN OF BARNSTABLE, Date: /��/ TOXIC AND HAZ ARDOUS MATERIALS R FORM NAME OF BUSINESS: VvboO- � �� �� � 1 Co BUSINESS LOCATION: I J III INVENTORY MAILING ADDRESS: 3 C I� TOTAL AMOUNT- TELEPHONE NUMBER:. -''D J-7 -- I l > tl jA110VLS CONTACT PERSON: CSq,v av+� u fez a+by-6A' EMERGENCY CONTACT TELEPH NE NU BE MSDS ON SITE? TYPE OF BUSINESS: yg==5 INFORMATION / RECOMMENDATI NS: c o,ti Fire District: �050C�h'c ��. S�al2i '�b a� ✓�(,C. (' 'r v � ® �,,�,.1 a.v� k n✓1 I S _ lKV4Y46<41 Waste Transportation: Last shipment of hazardous waste: Name of Hauler: Destination: Waste Product: Licensed? Yes No NOTE: Under the provisions of Ch. 111, Section 31, of the General Laws of MA, hazardous material use, storage and disposal of 111 gallons or more a month requires a license from the Public Health Division. LIST OF TOXIC AND HAZARDOUS MATERIALS The Board of Health and the Public Health Division have determined that the following products exhibit toxic or hazardous characteristics and must be registered regardless of volume. Observed / Maximum Obs rued / Maximum Antifreeze (for gasoline or coolant systems) Miscellaneous Corrosive Q NEW ❑ USED Cesspool cleaners Automatic transmission fluid ,� Disinfectants Engine and radiator flushes Road salts (Halite) Hydraulic fluid (including brake fluid) Refrigerants Motor Oils Pesticides ❑ NEW ❑ USED (insecticides, herbicides, rodenticides) Gasoline, Jet fuel,Aviation gas Photochemicals (Fixers) Diesel Fuel, kerosene, #2 heating oil ❑ NEW ❑ USED Miscellaneous petroleum products: grease, Photochemicals (Developer) lubricants, gear oil ❑ NEW ❑ USED Degreasers for engines and metal Printing ink Degreasers for driveways &garages Wood preservatives (creosote) Caulk/Grout Swimming pool chlorine Battery acid (electrolyte)/Batteries Lye or caustic soda Rustproofers Miscellaneous Combustible Car wash detergents Leather dyes Car waxes and polishes Fertilizers Asphalt& roofing tar PCB's Paints, varnishes, stains, dyes Other chlorinated hydrocarbons, Lacquer thinners (including carbon tetrachloride) ❑ NEW ❑ USED Any other products with "poison" labels (including chloroform,formaldehyde, Paint&varnish removers, deglossers hydrochloric acid, other acids) Miscellaneous. Flammables Other products not listed which you feel Floor&furniture strippers may be toxic or hazardous (please list): Metal polishes Laundry soil &stain removers (including bleach) Spot removers&cleaning fluids (dry cleaners) Other cleaning solvents Bug and tar removers Windshield wash I WHITE COPY-HEALTH DEPARTMENT/CANARY COPY-BUSINESS Applicant's Signature Staffs Initials I 12. 02.2014 15:13 ROBINSONSUPPLY BR2 15087750773 PAGE. 1/ 7 vo I I I I . I i I I I i I I I 12.02.2014 15:13 ROBINSONSUPPLY BR2 15087750773 PAGE. 2/ 7 PRODUCT CYCLjE COUNT REPORT A {?F 11 Apr 2014 . PRODUCT. . . >Fr NE PRI. L KEY. • . DRSCRTP�'Tg OC, . , 178.38f*2 DIV 3030Pi,U8AN DIV 6-3 .3-O,' 30X' AC OD p p I 83277t2 DIV :'. 3060PI�DgAV DIV ' 6-30$OL 30)(60 AC OD �DAFAN 18341q*2 DIV DIV633p .,'`` DIV 6-330 co TNSUL A 141.78 *2 DIV ,. DIV34, NVKIT DIV S 3/4X6 CO 18 * N' KT DIV 9 4. DTV6 8327a*2 DIV B DIV 6- y1gOA;P TNSLT�. Ag$ 6JMP DIV 6_ ' * 6-imp CQop�NSATE 'iF OAS' 254994 2 DIV 626 �11- SW I ATQ3 DIV 626-A�oAO,�.. 3AM8 F'. 1598$ *2 DIV 4: ',.pj��5 I 12454/ JIV6$� pp DIV 65d100 ;a74'iX1/2 ECG *2 DIV PIV73 DIV 7'. 4 � ' 1598 _ ?38 3I � X 1FTr % Up; 1 *2 DIV DIV73@ ATV 7738 3 f 8" .t? X lod 16177i*2 DIV V/ I DIV76(�'. ; 186997*2 DIV DxV 7-64 AM. BLOC' X36FL 'X�'T PTV 7-P3G ¢` FLEX TIC' DIV 23231p*2 Dry d 7 4 p 3 . DzV 781-04 18IQ09*2 DIV DTV71oQp ; 3 f 3�8BARD 3 4'.MAL)P DIV 7 Q. a. ]. 00 ,i°$100' D C TRA Qp�"2 ' t 2086 pIV DIV7 �} ��„f.: 23766p*2 DIV 1 0 DxV 71 A-1 0 .3 , 7,5X100 ' P � $Tp DIV71'.. DIV 7 2085� *2 DIv Q3'+"3# 0o PUS' , DIV71 100 DZV 710-A16�0�' 3 4K 163676*2 DIV f zQ0 S RAP DIV71 849 DIV 7}0-F�.QQ ' /4"X10Qi P x. Sx 8�: 2 DIV BRA13 71 DIV 76 " 7� /4 L '. 3 202812*2 pIV .''� ,, ,' COF DIV75§ O CI aDxV 7 ,,5 2T917,0*2 6IV -6d � GFr 5P . IS. I DIVB( ; DIV 8,G R 219169*2 DIV 8R � A-p E1V CVO 1991Q7*2 DIV 8 DIV T �T. -fit R -R FOAL; C IV at M- ON EMER 181017*2 DIV r DTV �.. DIVATK� T -� + TEST A � 80 * DIV DTV$5p DTV B� �3. 3 CHIP BRvK 12.02.2014 15:13 ROBINSONSUPPLY BR2 15087750773 PAGE. 3/ 7 PRODUCT CYCpE COUNT REPORT AR Lpr 2014 .. PRODUCT. . . JTNE PRI. . , KEY. . ; : . DF,SCRIP''iTxON:,•, . . . . . . LOC. . . . 188416*2 DIV DIVCH 1' DIV CH101 qg"N CAST li TER I 2191Q *2 DIV DAD0005 DIV DAD083S I,2IdE P9 IHR I 19177 *2 DIV DA.D1631I pIV DAD103S .3/Q FILTERIDRIFR 219114*2 DIV p1V DJW1634,'31� HP DRT R 141755*2 DIV DIV60AMP DIV 1) S-COLT {7Q5-60NFJ 16Q4 DIS { 183417*2 DIV DIVDPqpS pIV DFSG-25 r 18341 *a DIV DIVDPS 3B DIV JDPSG-3 3/§ sIG G�,ASg I f ,. 221485*2 DIV DIVDSogIP306 bIV DySSpD3065V 3/4" P�CTTPN �• sv 16290�*2 Div DIVDSTQ DIV DST-,5 �/2-10 H? HAD START 24514*2 DIV ECocot� DIV 3CO-COIL:. +CQIL CLNN II 2532Q9*2 DIV 2626P)PAD DIV Ep2626-� ;LITE CQ pAP I 235457*2 DIV 30307. PTV E� 30Q-P 3 X30 ETA E :C-PAD I P , 235455*2 DIV 3636PO, D pIV EL3636=2. 3,6X36 Ei4 Ct-PAD 234350*2 DIV FB1 DIV F571 TIT?!A",E MST A' Ci I 245110*2 pSV FLOWP ,FS25 DIV F�,-RLR-25 PAN rf r I 183431*2 DIV DIV4Ca�,t. ?IV.(3d', t +1l , CO2 a I � ' 191244*2 DIV GGC12 61V GC�.-J.2 Co; CART � �+RCK I d. .: 1834�8*2 DIV DIVGQ DIV Gpip-6 �,'a2. PART 6�- K 1638 9*2 DIV HFR6 PzV "A PUMP A;PER 263652*2 DIV HBR62 DIV HPRT6- p, ` T PUM. RTSER 255607*2 DIV DIVHV��+ ? DTV HVENT-�,,INO . TERM Ix` TN I 2471 9*2 DIV IGN00 '' DIV IGN�00.1 lIV IGNJ ER',' l 247140*2 DIV IGNR DTV IG$-mlR `*y7yf Xy RD lq�ITOK 247141*2 DIV IGN2 p.TV, Ian-2- t,p,IV;,,IGNITZ� 12.02.2014 15:13 ROBINSONSUPPLY BR2 i 15087750773 PAGE. 4/ 7 Y 7F�. PRODUCT CYCLg- CO I UNT RTPORT AS QP" 11 Apr 2014 PRODUCT. . . TINE PRI. KEY• . r • • DESCRIPTIQN,�, . . . , LOC. . 18101 j*2 DIV Drvnga +' I PIV M-2 21/41' '..INSPECT N 1607 0* MIR Dxv =�� i DIVMp G IV' i' M A•4 C 44 '�/8 CORK PA [ 163870*2 DIV DIVh[p6 DIV M 6 6387 2 6X 94/.8 RUB /VxB 1 * DIV [ DIVMFC DIV MP-6C 6 ' 233198*2 DIV MSA �x�/8 CO + PAD 45 DIV M'A- 45 #�IQA ADAPT R 245114*2 , . ` DIV PAIJFA ' '. ZV p 229 * AN ATC'!(7.8AG PAIJ S ' 71,5 2 DIV PF16 IV ? ' [ 2971 *2 F-1 PKq. FLUSH RAP' DIV pFKI�!` DIV Pk-KXT 81i4 FLUSH 2451Q *2 DIV . � [ IT DIV PR 2 4$104*2 DIV ., $QAMING p + CL,NR [ PROBRP'lp DIV P p-B ,r ' ' •' ROWN I FARM 24510b*2 DIV ; '• y C' I CLX 2451Q7*2 PROGR N A. DIV PI�O-GPES 'EVAP CIS I1 DIV ), 24511�*2 DTV PROM ?Li7 DIV pR0-R�D.r CpIL CT4 [ PROT� TxS1 DxV Pip-T 24 �, *2 A''-1S 1 PAt1 S1 [ DIV PROTRWAT200 DIV P - 2451o5*a ' %' 1�T=aoo PANT f r, DIV PROYE Q DIV F $A,Yg LAW'1 COIL C*1917g4*2 2< GAL [ DIV r: DIV R.- REAC;I.i.:-TT MATCI{ Fi LI 245112*2 DIV �, PER T" [ SANIGN��� DIV S �� ," �. :; "� DzSI 1833�4*2 DxV DIV 1. '+ +a° °F+C AID" i SC1'9 03A1 pIV s ;: 7�T[) _ M703- WERPT,, •.SAL [ 18340� *2 IDLY RI�' DIVSgN.70 01 PIV COIL I83497*2 DIV GAT, [ I7TVSC q,7.6 01 ` 1 `7 _ SV �1 219CM707��} , TRIPLE .;p' 1`' *2 DIV [ 1)IVS 707, 2 DIV S 1$33�7*2 DIV t4 ' CM707-1;� .STRIPL$. 32�Z i DIV '".' SCM' 1201 DTV SCM7�$ 1$34Q2*2 DI .: - FOAM PpHTFR. GAS, V I)IVS*71801 DIV S ,. 425 2o1$-P} PUPER '4AM. GAL [18 * DIV bIVSc: Ft �te a DTV SCla p1 �T 1$ 4 2*2 DIV Dxv 06�G� PEAK n r I :bAL f SG"1463 DTV � NI8D6 LEAK D ,r - 4J: r �C.x 32� 02 [ ..... •ram• .r�.r. � r .—��+�F— .. , 12.02.2014 15:13 ROBINSONSUPPLY BR2 15087750773 PAGE. 5/ 7 PRODUCT CYCTA COUNT RgPORT Ap OF 11 Apr 2014 I PRODUCT. . . �,INE PRI. . , "Y. . . . DESCRIPTION,`, . . . . . . . . . . . . . . . C LOC. . . 18342f*2 DIV DIVSCMQ3Q32 DIV SCM8�.0,32' SANI C-N-D �QT [ 18340�*2 DIV DTVSC §1601 DIV sCM8 6-0 SAE-T-K4EN 1GAz ' 18100;*2 DIV DIVT3493;' DIV T3403 joy -120/20§/240',.24v [ 200222*2 DIV DIVTLCIXR DIV T ,C3,XQ TERM LOK QMP IKIT L 24510� *2 DIV TRIPLF,,D ATV TRIFLE D'DDII, Ct,EANEIt i1GAL [ 245102*2 DIV TRTPLj93 DIV TKIP�E ) CQzL CLIP 33 [ 88840 2 DIV 1636C . D DIV UC1636-2 16X36 U4,7A 148675*2 DIV 1636CPhN DIV UC163673 �6X36 U�7h 'PAD [ 83653+ 2 DIV 2424C$AD-: , FIV UC2424-2 14X24 UI� RA -PAD [ 82496*2 DIV 2436CP.4 I�IV UC243G-2 4X36 UL'J'RA '-pAD [ f. 209912*2 DIV 2448QP.7p DIV TIC2448-3 24X48 ULTRA �-PAD 197464*2 DIV 2626CR"D. DIV UC2628�a 6X26 UI�' to l-PAD [ 84858*2 DIV 3030CP1 D DIV UC3030-2. 3QX30 UI,TKA -PAD 82497*2 DIV 3036C AD ' DIV UQ�Q36-2 jgX36 ULTM �-PAD [ 12563b*2 DIV 3636CP�An VTV UC;$96-2 3OX36 Ur4TR.A 4-FAD [ i 134168*2 DIV 3648Cp.p plv UC1440-3 3§X48 ULPRA -PAD ( 181012*2 DIV DIVVA40 oIV VA-46 0,!gpSX3/8qp? FtG [ 233990*2 DIV DIVVAK3 Viv V!1X, APSCESS FTq JPK/4) [ 1834'li*2 DIV DIVVP 'PI DIV Vg $-0} Q-CUBE 183410*2 DIV DIVVPf 2 t)IV VP68-33 pr-LURE VAC, JQT [ 1810 3*2 DIV DIVvT 9 . DIV VTS-6$- 3f dDS SOT,'PEP, .���` [ 175023*2 DIV DIVWS; DIV WS-1 WAT SWITCH PP901D PECT [ i 251043*2 DIV DIv23gWS2 230W 2�14 WALK 2391Q5*2 DIV DIM .,6 V6 DI -ES32,G � GA MT �R}� 3 JX63 12.02.2014 15:14 ROBINSONSUPPLY BR2 15087750773 PAGE. 6/ 7 PRODUCT CYCLE COUNT R$PORT AS DF 11 Apr 2014 I! PRODUCT. . . pTNE PRT. . , KEY. . . .''. ,M: . . D$SCRTP'r �N: : 1 ' LOC. . . � . : • . . . . . ,I. 75360�2 864 BREFIL ; + B ACE 'XI�Ei�i #t FZLL 04Y -FL,AMM 60897*2 864 BEMP TY B-TANK ONLY j 61X502 $64 INST09MPTY ;NSTO 20LB, TANK ONLY,' 52340�2 864 INSTOg gTLL TNSTO GAS RE$ILL ONLYf -F y g' 60967*2 864 MAPPZMPTY'' �+!lAPP T p 75361•*2 664 MCREF LY �, ' MC ACETYLEgz ' BFZLL Q CAM 61151*2 864 MCEMp�y •'' . �T T MC TANK pmy { 137992*2 864 4 ONZT. Cva !'y 1VxTROGrN, EMPTf R 4 0CU .� 151045*2 864 2 0NIT 1 `TLL TTROGEN R FILL 20 LivI 137900*2 864 ;1. 40NTT OFTLI, �1T�+'O.Gltj REI ,�, 40 CLT i . 52339*2 864 MAPPGI REFTL +'.MAPP� RFQ EMPT-,y EXL' ANG 75362*2 864 TURBOR11:.NFILL TTJR50 'RE II�L QNLY VII LE 7 2 864 TURBO ':". FMPTY TURBO TANK oNLY � 140771*2 864 LPG33 �PQAS 'FOR FO7 FLIFT(3 4 , 23518�*2 864 .' ':` 64NTTRZFIT,L N 60#."NITRp R j, �T EFI 213444*2 864 OXY20 , GQMP AXY 2 p pA cq"%zTE i I LETS 186312*2 864 OXYRq LL20 QX�CREFTiL 2p.g . f 1.19942*2 864 40LBP ps..NEC TANK " OMPLE . I '' i 1498 7*2 864 �LONITRO�EFI ?X6o TANK .igITR4� REFTL�L ; 19 n4COrds lasted. . j i 12.02.2014 15:14 ROBINSONSUPPLY BR2 15087750773 PAGE. 7/ 7 ' I PRODUCT CYCLE COUNT REPORT AS Qg' II F,Pt 2014 PRODUCT. . , LINE PRI. . . KEY- , ,,— . , LOC. . . � � C 22507P*2 691G LE1225q LFN 122587PGI6 160Z Pt0PAN$ TK 21894X*2 691G LFn 21168-POI4 l40Z P pBAN TK 21894 *2 691G LE211 ,Q LEN 21169 140Z FP`CAS 22507�*2 691G WC308442 WC 300J 32 ' 14P4 MAP$ 4 xec¢rds listed. • i i • i .l . I i I 1 1 , ' j r 1 ' • i i I 1 I Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS $so.00 Town of Barnstable Board of Health This is to Certify that ROBINSON PL UMBING& HEATING SUPPLYCO., INC. .----------------------------------------------------------------------------------------- -------------------------------------- 35 CIT AVE, HYANNIS, MA .----------------------------------------------------------------------------------------------------------------------------------------------------------------------- Is Hereby Granted a License For: Storing or Handling 26 - 110 gallons of Hazardous Materials. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- Restrictions: .------------------------------------------------------------------------------------------------------------------------------------------------------------------. This license is granted in conformity with the Statutes and ordinances relating there to, and expires 06/30/2021 unless sooner suspended or revoked. ---------------------------------------- JOHN NORMAN DONALD A.GUADAGNOLI,M.D. 07/01/2020 PAUL J.CANNIFF,D.M.D. THOMAS A.MCKEAN,R.S.,CHO Director of Public Health '• Town of Barnstable Inspectional Services BARNSTABLE Public Health Division MVY TnP E 6639-1 H•EONR•M1Y4ANI5 639-2014 r� 1 MMSTABUL = Thomas McKean, Director + � t6 9. �`� 200 Main Street, Hyannis,MA 02601 Office: 508-862-4644 Fax: 508-790-6304?-- t APPLICATION FOR PERMIT TO STORE AND/OR UTILIZE. `-t•. HAZARDOUS MATERIALS `' IN ACCORDANCE WITH THE TOWN OF BARNSTABLE GENERAL ORDINANCE,CHAPTER 108, HAZARDOUS MATERIALS,ALL BUSINESSES THAT HANDLE OR STORE HAZARDOUS MATERIALS GREATER THAN HOUSEHOLD QUANTITIES ARE REQUIRED TO OBTAIN AN ANNUAL PERMIT(RUNS JULY I st—JUNE 30th). APPLICATION FEES CATEGORY 1 PERMIT 26- 110 Gallons: $ 50.00 ® VST- CATEGORY 2 PERMIT 111 -499 Gallons: $125.00 ❑ CATEGORY 3 PERMIT 500 or more Gallons: $150.00 Li *A late charge of$10.00 will be assessed if�p/ayment is not received by July 1st. 1. ASSESSOR'S MAP AND PARCEL NO �I `7 0 2. IS THIS A PERMIT RENEWAL? /YES NO. IF YES,SKIP QUESTION 3. 3. FOR ALL NEW PERMIT APPLICATIONS,INDICATE WHETHER BUSINESS HAS ZONING/BUILDING APPROVAL FOR HAZARDOUS MATERIALS STORAGE/USE OF • GREATER THAN HOUSEHOLD QUANTITIES (25 GALLONS)? YES NO. 4. FULL NAME OF APPLICANT: I A\,kj A PA ►'t - 6 A N I\f AT IV 5. NAME OF ESTABLISHMENT: St N SSA 1 6. ADDRESS OF ESTABLISHMENT: C%-A Ave- N&Yl-t\is IVI N• 41461 7. MAILING ADDRESS(IF DIFFERENT FROM ABOVE: 8. TELEPHONE NUMBER OF ESTABLISHMENT: 775- Ll 15 9. EMAIL ADDRESS: eV, oYl S� • CQ>✓� 10. SOLEOWNER: YES NO IF NO,NAME OF PARTNER: 11. FULL NAME,HOME ADDRE S, ND TEL 'HO E#O CORPORATION TVW E rSo+ �-� r C- PRESIDENT TREASURER CLERK 12. IF PREPARED BY OUTSIDE PARTY: - NAME: TELEPHONE#'. COMPANY ADDRESS EMAIL: SIGNATURE OF APPLICANT DATE Z—Uvif- 30g c-20 0 QAApplication Forms\Haz Mat Appli Draft Jan2019.doc • � � .Jtr Cr" Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS $5o.00 Town of Barnstable Board of Health This is to Certify that ROBINSON PL UMBING& HEA TING S UPPL Y CO.,INC. 35 CIT A VE, HYANNIS, MA Is Hereby Granted a License For: Storing or Handling 26 - 110 gallons of Hazardous Materials. i --------------------- ----------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------- -------------------------------------- This license is granted in conformity with the Statutes and ordinances relating there to,and and expires 06/30/2020 unless sooner suspended or revoked. ---------------------------------------- PAUL J.CANNIFF, D.M.D,CHAIRMAN DONALD A.GUADAGNOLI,M.D. 07/01/2019 JUNICHI SAWAYANAGI THOMAS A.MCKEAN,R.S.,CHO Director of Public Health I , Town of Barnstable Inspectional Services BARNSTABLE W�3 CYS�MILL,�'OSTFFN Public Health Division -2Gl4 EARN Ix. Thomas McKean, Director ArEc �a`0 200 Main Street, Hyannis, MA 02601 E°^ Office: 508-862-4644 Fax: 508-790-6304 e APPLICATION FOR PERMIT TO STORE AND/OR UTILIZE HAZARDOUS MATERIALS IN ACCORDANCE WITH THE TOWN OF BARNSTABLE GENERAL ORDINANCE,CHAPTER 108, HAZARDOUS MATERIALS,ALL BUSINESSES THAT HANDLE OR STORE HAZARDOUS MATERIALS GREATER THAN HOUSEHOLD QUANTITIES ARE REQUIRED TO OBTAIN AN ANNUAL PERMIT(RUNS JULY 1 st—JUNE 3 Oth). APPLICATION FEES CATEGORY 1 PERMIT 26— 110 Gallons: $ 50.00 X VSVFX—t = CATEGORY 2 PERMIT 111 —499 Gallons: $125.00 ElC� f3� CATEGORY 3 PERMIT 500 or more Gallons: $150.00 ❑ *A late charge of$10.00 will be assessed if payment is not received by July 1st. 1. ASSESSOR'S MAP AND PARCEL NO. 2. IS THIS A PERMIT RENEWAL? ZYES_NO. IF YES, SKIP QUESTION 3. 3. FOR ALL NEW PERMIT APPLICATIONS,INDICATE WHETHER BUSINESS HAS ZONING/BUILDING APPROVAL FOR HAZARDOUS MATERIALS STORAGE/USE OF GREATER THAN HOUSEHOLD QUANTITIES (25 GALLONS)? YES NO. 4. FULL NAME OF APPLICANT: 6 Iffs e U I'1 pJ0 I ki SO ri 5. NAME OF ESTABLISHMENT: ✓1 suloon & Oa . 6. ADDRESS OF ESTABLISHMENT: 7. MAILING ADDRESS (IF DIFFERENT FROM ABOVE: ?D dcA 8. TELEPHONE NUMBER OF ESTABLISHMENT: 9. EMAIL ADDRESS: o u ►'►'1 i 10. SOLEOWNER: YES NO IF NO,NAME OF PARTNER: 11. FULL NAME,HOME ADDRESS,AND TELEPHONE#OF- CORPORATION NAME i o PRESIDENT i S'C TREASURER CLERK 12. IF PREPARED BY OUTSIDE PARTY: NAME: TELEPHONE#: COMPANY ADDRESS EMAIL: • SIGNATURE OF APPLICANT DATE Q:Wpplication Forms\I-iaz Mat App Revised 09-10-18.d��"""F'4""` Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS $s0.00 Town of Barnstable Board of Health This is to Certify that ROBINSON PL UMBING& HEA TING S UPPL Y CO., INC. 35 CIT AVE, HYANNIS, MA Is Hereby Granted a License For: Storing or Handling 26 - 110 gallons of Hazardous Materials. -------------------------------------------------------------------------------------------------------------------- ---------------- ---------------------------- ------------------------------------------------ ---------------------------------------------------------------------------------------------------------------- This license is granted in conformity with the Statutes and ordinances relating there to, and and expires 06/30/2019 unless sooner suspended or revoked. ---------------------------------------- PAUL J.CANNIFF,D.M.D,CHAIRMAN DONALD A.GUADAGNOLI,M.D. 07/01/2018 JUNICHI SAWAYANAGI THOMAS A.MCKEAN,R.S.,CHO Director of Public Health To of B�rnstable eg atory ervices Richard V. Scali,Director Public Health Division �nAL-nSTA$TE • e MAML"ate P Thomas McKean,Director • sc A` 200 Main Street, Hyannis,MA 02601 Office: 508-862-4644 Fax: 508-790-6304 APPLICATION FOR PERMIT TO STORE AND/OR-UTILIZE HAZARDOUS MATERIALS ]N ACCORDANCE'WITH TIM TOWN OF BAItNSTABLE GENERAL ORDINANCE, CHAPTER 108, HAZARDOUS MATERIALS,ALL BUSINESSES THAT HANDLE OR STORE HAZARDOUS MATERIALS GREATER THAN HOUSEHOLD QUANTITIES ARE REQUIRED TO OBTAIN AN ANNUAL PERMIT(RUNS JULY 1st—JUNE 30th). APPLICATION FEES CATEGORY 1 PERMIT 26— 110 Gallons: $ 50.00 CATEGORY 2 PERMIT 111 —499 Gallons: $125.00 ❑ CATEGORY 3 PERMIT 500 or more Gallons: $150.00 ❑ *A late chRK a of 10;00 will be assessed if payment is not received by July 1st, X. ASSESSOR,'S MAY'AND PARCEL NO. . 2. IS THIS A PERMIT RENEWAL?—e YES NO. IF YES,SIUF QUESTION 3. ^ 3. FOR ALL NEW PERMIT APPLICATIONS,INDICATE R'EO CITHER BUSINESS HAS ZONING/BUILDXN'G APPROVAL FOR HAZARDOUS MATERIALS RORAGEfUSIC OF GREATER THAN HOUSEHOLD QUANTITIES(25 GALLONS)? 'YES NO. 4. FULL NAME OF APPLICANT: 5. NAME OF ESTABLISMS Mi NT: J ' 6. ADDRESS OF ESTABLISHMENT: _ ,� > lF �y,;, j ,'. Y4 eF,'a lo p r� 7. MAILING ADDRESS(IF DU + t NT FROM ABOVE, � �� � �f ,�a',174.1 s. TELEPHONE NUMBER OF ESTABLISHMENT, 9. EMA L ADDRESS: P-rd ` ,- I . r; ►�. 10. SOLE,OWNER:zl —yxS__NO IF NO,NAME OF PARTNER: 11. FULL NAME,HOME ADDRESS,AND TELEPHONE#Q�': C0"ORAUON NAME (r•1 PRESIDENT o TREASURER CLERX 12. IF PREPARED BY OUTSIDE PARTY: NAME: TELEPHONE#: COMPANY ADDRESS EMAIL: .� • T X SIGNATURE OF APPLICANT'Q:\Application FormswAZMAT APP 2017 R);yIS>?D.dooX —`--- Z /Z # 99Z 1LL990S : A j ddnS uosu i qoU:ML£ :Z0:E-ZZ-SO • � t� Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS $50.00 Town of Barnstable Board of Health This is to Certify that ROBINSON PL UMBING& HEATINGSUPPLYCO., INC. 35 CIT AVE, HYANNIS, MA Is Hereby Granted a License For: Storing or Handling 26 - 110 gallons of Hazardous Materials. --------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------- This license is granted in conformity with the Statutes and ordinances relating there to,and and expires 06/30/2018 unless sooner suspended or revoked. ---------------------------------------- PAUL J.CANNIFF,D.M.D,CHAIRMAN DONALD A.GUADAGNOLI,M.D. 07/01/2017 JUNICHI SAWAYANAGI THOMAS A.MCKEAN,R.S.,CHO Director of Public Health Al) Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS $so.00 Town of Barnstable Board of Health This is to Certify that ROBINSON PL UMBING& HEATINGSUPPLYCO., INC. 35 CIT AVE, HYANNIS, MA Is Hereby Granted a License For: Storing or Handling 26 - 100 gallons of Hazardous Materials. ------------------------------------------------------------------------------------------------------------------------------------------------------------------- This license is granted in conformity with the Statutes and ordinances relating there to, and and expires 06/30/2018 unless sooner suspended or revoked. ---------------------------------------- PAUL J.CANNIFF,D.M.D,CHAIRMAN DONALD A.GUADAGNOLI,M.D. 07/01/2017 JUNICHI SAWAYANAGI THOMAS A.MCKEAN, R.S.,CHO Director of Public Health �_. ow of Unstable �o-Regulatorvices THE rpm Richard V. Scali, Director MAIL o Public Health Division BARNTABLE i IMAN5TA--teI&WAs-emun•mncris BARNSTABLE. • Thomas McKean, Director 1,5""�16 9-70;'r=`" 1` `0$ Alf3L 39. A 200 Main Street, Hyannis,MA 02601 � Office: 508-862-4644 Fax: 5`i�38-790-6304 APPLICATION FOR PERMIT TO STORE AND/OR UTILIZE ".a' HAZARDOUS MATERIALS .% IN ACCORDANCE WITH THE TOWN OF BARNSTABLE GENERAL ORDINANCE, CHAPTER 108, HAZARDOUS MATERIALS,ALL BUSINESSES THAT HANDLE OR STORE HAZARDOUS MATERIALS GREATER THAN HOUSEHOLD QUANTITIES ARE REQUIRED TO OBTAIN AN ANNUAL PERMIT(RUNS JULY 1 st—JUNE 30th). APPLICATION FEES CATEGORY 1 PERMIT 26— 110 Gallons: $ 50.00 2<0- CATEGORY 2 PERMIT 111 —499 Gallons: $125.00 ❑ CATEGORY 3 PERMIT 500 or more Gallons: $150.00 ❑ *A late charge of$10.00 will be assessed if payment is not received by July 1st. 1. ASSESSOR'S MAP AND PARCEL NO. ` y p� 2. IS THIS A PERMIT RENEWAL? YES_NO. IF YES,SKIP QUESTION 3. 3. FOR ALL NEW PERMIT APPLICATIONS,INDICATE WHETHER BUSINESS HAS ZONING/BUILDING APPROVAL FOR HAZARDOUS MATERIALS STORAGE/USE OF GREATER THAN HOUSEHOLD QUANTITIES (25 GALLONS)? YES NO. 4. FULL NAME OF APPLICANT: • Q 6G 5. NAME OF ESTABLISHMENT: t 4 SO fQ 6. ADDRESS OF ESTABLISHMENT: qj. 5 G NYC �-(k y-.jS �Ais 02601 7. MAILING ADDRESS (IF DIFFERENT FROM ABOVE: SOime- 8. TELEPHONE NUMBER OF ESTABLISHMENT: 0 D 7 J L4 9. EMAIL ADDRESS: ��ol��nbG,�4��c p� �/. COYA 10. SOLEOWNER:�Y S_NO IF NO,NAME OF PARTNER: 11. FULL NAME,HOME ADDRESS,AND TELEPHONE#OF• CORPORATION NAME d PRESIDENT U S e r of a 0 71 er I n/4 TREASURER CLERK 12. IF PREPARED BY OUTSIDE PARTY: NAME: TELEPHONE#: COMPANY ADDRESS EMAIL: SIGNATURE OF APPLICANT DATE Q\Application Forms\HAZMAT APP 2017 REVISE . oc Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS $50.00 Town of Barnstable Board of Health This is to Certify that ROBINSON PLUMBING& HEATING SUPPLY CO., INC. 35 CIT AVE, HYANNIS, MA Is Hereby Granted a License For: Storing or Handling 26 - 100 gallons of Hazardous Materials. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------ This license is granted in conformity with the Statutes and ordinances relating there to, and and expires 06/30/2017 unless sooner suspended or revoked. --------------------------------------- WAYNE MILLER,M.D.,CHAIRMAN \j PAUL J.CANNIFF,D.M.D. 07/01/2016 JUNICHI SAWAYANAGI THOMAS A. MCKEAN,R.S.,CHO Director of Public Health t.r< i Town of Barnstable �TME To�ti Regulatory Services Richard V. Scali, Director B"R" �` Public Health Division BAMSTABLE w 639. 0 eawrao •�nrntue.mrvn• arcs 3 wusroaKus•osanuF•wsreuwsrws v Thomas McKean,Director 1639-20° 200 Main Street, Hyannis,MA 02601 Office: 508-862-4644 Fax: 508-790-6304 W APPLICATION FOR PERMIT TO STORE AND/OR UTILIZE HAZARDOUS MATERIALS IN ACCORDANCE WITH THE TOWN OF BARNSTABLE GENERAL ORDINANCE, CHAPTER 108, HAZARDOUS MATERIALS,ALL BUSINESSES THAT HANDLE OR STORE HAZARDOUS MATERIALS GREATER THAN HOUSEHOLD QUANTITIES ARE REQUIRED TO OBTAIN AN ANNUAL PERMIT(RUNS DULY 1st—JUNE 30th). APPLICATION FEES I J L' CATEGORY I PERMIT 26— 110 Gallons: $ 50.00 ..3; j 1 CATEGORY 2 PERMIT 111 —499 Gallons: $125.00 CATEGORY 3 PERMIT 500 or more Gallons: $150.00 ❑ • A late charge of$10.00 will be assessed if payment is not received by July 1st. ASSESSORS MAP AND PARCEL NO. DATE FULL NAME OF APPLICANT: NAME OF ESTABLISHMENT: � Ca• 1/ / ADDRESS OF ESTABLISHMENT: v`" �iy� A/Y��r,�s Dd2lo d-Z MAILING ADDRESS(IF DIFFERENT): TELEPHONE NUMBER OF ESTABLISHMENT: Z-5 //j y EMAIL ADDRESS: solo sv F / SOLE OWNER: /YES NO IF NO,NAME OF PARTNER: FULL NAME,HOME ADDRESS,AND TELEPHONE#OF: CORPORATION NAME PRESIDENT TREASURER CLERK • IF PREPARED BY OUTSIDE PARTY: S AA U PP CANT Name: Company Address Telephone#: Email: QAApplication Forms\HAZZAPP Revl6.docx Page 1 of 2 I d� Town of Barnstable Office: 508-862-4644 Regulatory Services Department Fax: 508-790-6304 • Public Health Division Thomas A.McKean,CHO 200 Main Street, Hyannis, MA 02601 Payment Receipt .Hazardous Materials Payment received: $50.00 (Check) on 6/15/2016 Permit number: 1142 .Check number: 199298 Check amount: $50.00 Name on check: Robinson Plumbing &Heating Supply Co., INC Business: ROBINSON PLUMBING &HEATING SUPPLY CO., INC. Owner: RUSSELL B Address: 35 CIT AVENUE, Hyannis s • Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS 1oo.00 Town of Barnstable Board of Health This is to Certify that R OBINSON PL UMBING& HEA TING SUPPLY CO., INC. 35 CIT A PE, HYANNIS, MA Is Hereby Granted a License FOR: STORING OR HANDLING 111 GALLONS OR MORE OF HAZARDOUS MATERIALS. ----------------------------------------------------------------------------------------------------------------------------- ------------------------------------ -------------------------------------------------------------------------------------------------------------------------------------------------------------- This license is granted in conformity with the Statutes and ordinances relating there to, and and expires 06/30/2016 unless sooner suspended or revoked. --------------------------------------- WAYNE MILLER,M.D.,CHAIRMAN PAUL J.CANNIFF,D.M.D. 07/01/2016 JUNICHI SAWAYANAGI THOMAS A.MCKEAN, R.S.,CHO Director of Public Health �. Town of Barnstable Regulatory Services Richard V. Scali,Director s • Public Health Division 1°ric Mn+" Thomas McKean,Director 200 Main Street, Hyannis,MA 02601 Office: 508-862-4644 Fax: 508-790-6304 Application Fee: $100.00 ASSESSORS MAP AND PARCEL NO. .Io2+0 l q R C DATE at,, A .� L APPLICATION FOR PERMIT TO STORE AND/OR UTILIZE MORE THAN 111 GALLONS OF HAZARDOUS MATERIALS FULL NAME OF APPLICANT A Wl-A N\ f A NAME OF ESTABLISHMENT S v. • ADDRESS OF ESTABLISHMENT S CA AY �+/G��Y11 S I" 1 (�0�6� � TELEPHONE NUMB _5 0 S r 77 L{ I I SOLE OWNER: YES NO IF APPLICANT IS A PARTNERSHIP,FULL NAME AND HOME ADDRESS OF ALL PARTNERS: IF APPLICANT IS A CORPORATION: FEDERAL IDENTIFICATION NO. STATE OF INCORPORATION , FULL NAME AND HOME ADDRESS OF: PRESIDENT TREASURER CLERK • SI4AA TOFA�rANT RESTRICTIONS: HOME ADDRESS � . HOME TELEPHONE# C:\cache\Temporary Intemet Fi1es\0LKD3\HAZAPP Rev20I5.DOC t ,r Town of Barnstable Office: 508-862-4644 Regulatory Services Department Fax: 508-790-6304 . BA 8M = Public Health Division Mass. Thomas A. McKean,CHO 200 Main Street, Hyannis, MA 02601 Payment Receipt !Hazardous Materials Payment received: $100.00 (Check) on 6/30/2015 i i ;Check number: 193162 Check amount: $100.00 Name on check: Robinson Plumbing I � 13usiness: Robinson Supply Owner: RUSSELL B ROBINSON Address: 35 CIT AVENUE, Hyannis I � Number Fee 1142 THE COMMONWEALTH OF MASSACHUSETTS 1oo.00 Town of Barnstable Board of Health This is to Certify that ROBINSON PLUMBING& HEATING SUPPLY CO., INC. 35 CIT A VE, HYANNIS, MA Is Hereby Granted a License FOR: STORING OR HANDLING 111 GALLONS OR MORE OF HAZARDOUS MATERIALS. ------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------ This license is granted in conformity with the Statutes and ordinances relating there to,and and expires 6/30/2015 unless sooner suspended or revoked. ---------------------------------------- WAYNE MILLER,M.D.,CHAIRMAN PAUL J.CANNIFF,D.M.D. 6/30/2014 JUNICHI SAWAYANAGI THOMAS A.MCKEAN,R.S.,CHO Director of Public Health n 1 Town of Barnstable °FSHE Tpk, Regulatory Services P� ti Richard V. Scali, Director Y i �'"MASS. � Public Health Division 039. Thomas McKean, Director 200 Main Street, Hyannis, MA 02601 Office: 508-862-4644 Fax: 508-790-6304 Application Fee: $100.00 ASSESSORS MAP AND PARCEL NO. 31a—Wj DATE 7 APPLICATION FOR PERMIT TO STORE AND/Olt UTILIZE MORE THAN II I GALLONS OF HAZARDOUS MATERIALS I o FULL NAME OF APPLICANT NAME OF ESTABLISHMENT L) i nSr I IJ U 0 0 I V 1.�0 ADDRESS OF ESTABLISHMENT.�� � � A ile- TELEPHONE NUMBERD�= SOLE OWNER:_�/YES NO IF APPLICANT IS A PARTNERSHIP,FULL NAME AND HOME ADDRESS OF ALL PARTNERS: IF APPLICANT IS A CORPORATION: FEDERAL IDENTIFICATION NO. (} STATE OF INCORPORATION �} FULL NAME AND HOME ADDREj�S OF- PRESIDENT S"S'a-z TREASURER CLERK i SIGNATURE OF APPLICANT RESTRICTIONS: HOME ADDRESS j HOME TELEPHONE# Q\Application Fonns\HAZAPP.DOC i Number Fee 187 THE COMMONWEALTH OF MASSACHUSETTS 100.00 Town of Barnstable Board of Health This is to Certify that Ron's Truck Stop 52 Thornton Dr., Hyannis, MA Is Hereby Granted a License FOR: STORING OR HANDLING 111 GALLONS OR MORE OF HAZARDOUS MATERIALS. ----------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------- This license is granted in conformity with the Statutes and ordinances relating there to,and and expires 6/30/2015 unless sooner suspended or revoked. ---------------------------------------- WAYNE MILLER,M.D.,CHAIRMAN PAUL J.CANNIFF,D.M.D. 6/30/2014 JUNICHI SAWAYANAGI THOMAS A.MCKEAN,R.S.,CHO Director of Public Health Town of Barnstable �FTHE T Regulatory Services Richard V. Scali, Director " '"M `E ' Public Health Division 1639. i Thomas McKean, Director 200 Main Street, Hyannis, MA 02601 Office: 508-862-4644 Fax: 508-790-6304 Application Fee: $100.00 0,tk 5%7'Y ASSESSORS MAP AND PARCEL NO. 1- t 2 3bATE APPLICATION FOR PERMIT TO STORE AND/OR UTILIZE MORE THAN III GALLONS OF HAZARDOUS MATERIALS FULL NAME OF APPLICANT NAME OF ESTABLISHMENT ADDRESS OF ESTABLISHMENT `TELEPHONE.NUMBER 5`, {V^"ll SOLE OWNER: ✓YES NO IF APPLICANT IS A PARTNERSHIP,FULL NAME AND HOME ADDRESS OF ALL PARTNERS: IF APPLICANT IS A CORPORATION: FEDERAL IDENTIFICATION NO. OZ4 0-�7 9-22d STATE OF INCORPORATION V V` R FULL NAME AND HOME ADDRES.$ O PRESIDENT PLW PAD (� OF: 503 C�"� I � � Ati 'W TREASURER _0AA\4 l P&H,'FroG� CLERK (C SIGNATURE OF APPLICANT RESTRICTIONS: HOME.ADDRESS 505 CH UVk6t 6b�0P HOME TELEPHONE# � 54� lS Lb Q\Application FormS1HAZAPP.DOC V� SPILL, CONTINGENCY PLAN Emergency Coordinator, Name: CMS I W& 029 V-CAA Address: CVVtI TM n(S Daytime Phone: -f3?)K5 `7-7 }. �,c541::-2j 7 Evening Phone: Fire Department: 4ya R,V t B 50,8 '1 Barnstable Public Health zvision: 508-862-4644 DEP 24 Hour Spill Hot Line: 888-3 04-113 3 Waste Hauler: Name: Phone: kloo 999 103 Building diagram indicating hazardous material/waste storage area, location of absorbent scavenger materials, fire extinguishers, fire alarms (if present), and evacuation route (if applicable). ------------- rr r { } 0 - Ob5o. , -Qr ex+ - OR- V ION Actions to be - - taken to control a spill or release, and preventing it from reaching a catch basin, sewer system or the ground. Number Fee ` 1142 THE COMMONWEALTH OF MASSACHUSETTS $1oo.00 Town of Barnstable r Board of Health This is to Certify that ROBINSON PLUMBING& HEATING S UPPL Y CO., INC. 35 CIT A VE, HYANNIS,MA 02601 Is Hereby Granted a License FOR: STORING OR HANDLING 111 GALLONS OR MORE OF HAZARDOUS MATERIALS. ----------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------- This license is granted in conformity with the Statutes and ordinances relating there to,and and expires 6/30/2014 unless sooner suspended or revoked. ---------------------------------------- WAYNE MILLER,M.D.,CHAIRMAN PAUL J.CANNIFF,D.M.D. 4/7/2014 JUNICHI SAWAYANAGI THOMAS A.MCKEAN,R.S.,CHO Director of Public Health Town of Barnstable Barnstable Regulatory Services Department kriftnrl Public Health Division • ,A8M87Y,BIS. 200 Main Street,Hyannis MA 02601 . 2007 Office: 508-862-4644 Thomas F.Geiler,Director FAX: 508-790-6304 I I l� 1 Thomas A.McKean,CHO Application Fee: $100.00 ASSESSORS MAP AND PARCEL NO. DATE APPLICATION FOR PERMIT TO STORE AND/OR UTILIZE MORE THAN Ill GALLONS OF HAZARDOUS MATERIALS FULL NAME OF APPLICANT js NAME OF ESTABLISHMENT �j,��$p, v�,�� ADDRESS OFESTABLISHMENT4�ff C 6 Pcve. TELEPHONE NUMBER SOLE OWNER: VYES NO IF APPLICANT IS A PARTNERSHIP,FULL NAME AND HOME ADDRESS OF ALL PARTNERS: IF APPLICANT IS A CORPORATION: FEDERAL IDENTIFICATION NO. �2 a s9 S-S3 STATE OF INCORPORATION �YIIa, FULL NAME AND HOME ADDRESS O PRESIDENT TREASURER CLERK a SIGNATURE OF APPLICANT RESTRICTIONS: HOME ADDRESS �9cS—.C�-� i.�,/ •y /�u%�� HOME TELEPHONE# Syr-6 73"- 7 j�z� i:wm mum Mat Appticatiion=8.DOC SPILL CONTINGENCY PLAN Emergency Coordinator, Name: CLU- � Address: Daytime Phone: Jtr?- 775--y/1,5- Evening Phone: 7F/- ?75-- 6d s-0 Fire Department: Barnstable Public Health Division: 508-862-4644 DEP 24 Hour Spill Hot Line: 888-304-1133 Waste HW: Name: CIS Phone: Building diagram indicating hazardous material/waste storage area, location of absorbent scavenger materials, fire extinguishers, fire alarms (if present), and evacuation route (if applicable). Actions to be taken to control a spill or release, and preventing it from reaching a catch basin, sewer system or the ground. I MAIL-IN REQUESTS Please mail the completed application form to the address below. Also include a copy of your contingency plan (to handle hazardous waste spills, etc.) In addition, please include the required fee of$100. Make check payable to: Town of Barnstable. Allow time for in-house processing. Our mailing address is: Town of Barnstable Public Health Division 200 Main Street Hyannis,MA 02601 FOR FAXED REQUESTS Our fax number is (508) 790-6304. Please fax a completed application form. Also, please fax us a copy of your contingency plan (to handle hazardous waste spills, etc.) In addition, please mail the required fee of$100. Please make the check payable to: Town of Barnstable. The check must be mailed to the address listed above. Allow time for in- house processing. For further assistance on any item above, call (508) 862-4644 Back to Main Public Health Division Page JAinspection handouts\Haz Mat Application2008.DOC n s ROBINSON SUPPLY BR2 CONTINGENCY PLAN f Robinson Supply Contingency Plan Table of Contents 1 Executive Summary.................................................................................................... 1 2 Introduction................................................................................................................. 1 2.1 Purpose ..................................................................................................................3 2.2 Scope......................................................................................................................3 2.3 Plan Information....................................................................................................3 3 Contingency Plan Overview.......................................................................................4 3.1 Applicable Provisions and Directives....................................................................4 3.2 Objectives..............................................................................................................4 3.3 Organization..........................................................................................................5 3.4 Contingency Phases...............................................................................................9 3.4.1 Response Phase...........................................................................................9 3.4.2 Resumption Phase.......................................................................................9 3.4.3 Recovery Phase...........................................................................................9 3.4.4 Restoration Phase...................................................................................... 10 3.5 Assumptions ........................................................................................................ 10 3.6 Critical Success Factors and Issues..................................................................... 10 3.7 Mission Critical Systems/Applications/Services................................................. I 1 3.8 Threats................................................................................................................. 11 3.8.1 Probable Threats ....................................................................................... 12 4 System Description................................................................................................... 12 4.1 Physical Environment.......................................................................................... 13 4.2 Technical Environment........................................................................................ 13 5 Plan............................................................................................................................ 13 5.1 Plan Management................................................................................................ 13 5.1.1 Contingency Planning Workgroups.......................................................... 13 5.1.2 Contingency Plan Coordinator.................................................................. 13 5.1.3 System Contingency Coordinators............................................................ 13 5.1.4 Incident Notification................................................................................. 14 5.1.5 Internal Personnel Notification................................................................. 14 5.1.6 External Contact Notification................................................................... 14 5.1.7 Media Releases ......................................................................................... 14 5.1.8 Alternate Site (s) ....................................................................................... 15 5.2 Teams................................................................................................................... 15 5.2.1 Damage Assessment Team....................................................................... 15 5.2.2 Operations Team....................................................................................... 15 6 Recommended Strategies.......................................................................................... 16 7 Terms And Definitions.............................................................................................. 16 8 Appendices................................................................................................................36 APPENDIX A—CONTINGENCY PLAN CONTACT INFORMATION......................37 APPENDIX B—EMERGENCY PROCEDURES............................................................38 APPENDIX C—TEAM STAFFING AND TASKINGS..................................................39 APPENDIX D—ALTERNATE SITE PROCEDURES............................................. 40 APPENDIX E - CONTINGENCY LOG..........................................................................41 March 26 2014 I Robinson Supply Contingency Plan 1 EXECUTIVE SUMMARY Written upon completion of document. Contains introductory descriptions from all sec- tions. 2 INTRODUCTION This document contains the Contingency Plan for the ROBINSON SUPPLY HYANNIS. It is intended to serve as the centralized repository for the information, tasks, and proce- dures that would be necessary to facilitate the ROBINSON SUPPLY HYANNIS manage- ment's decision-making process and its timely response to any disruptive or extended in- terruption of the department's normal business operations and services. This is especial- ly important if the cause of the interruption is such that a prompt resumption of opera- tions cannot be accomplished by employing only normal daily operating procedures. In terms of personnel and financial resources, the information tasks and procedures de- tailed in this plan represent the ROBINSON SUPPLY HYANNIS management's demon- strated commitment to response, resumption, recovery, and restoration planning. There- fore, it is essential that the information and action plans in this plan remain viable and be maintained in a state of currency in order to ensure the accuracy of its contents. To that end, this introduction is intended to introduce and familiarize its readers with the organi- zation of the plan. It is incumbent upon every individual who is in receipt of the ROBINSON SUPPLY HYANNIS Contingency Plan, or any parts thereof, or who has a role and/or responsibil- ity for any information or materials contained in the document, to ensure that adequate and sufficient attention and resources are committed to the maintenance and security of the document and its contents. Since the information contained in this document describes ROBINSON SUPPLY HYANNIS management's planning assumptions and objectives, the plan should be con- sidered a sensitive document. All of the information and material contents of this docu- ment should be labeled, "Limited Official use". The ROBINSON SUPPLY HYANNIS management has recognized the potential financial and operational losses associated with service interruptions and the importance of main- taining viable emergency response, resumption, recovery and restoration strategies. The ROBINSON SUPPLY HYANNIS Contingency Plan is intended to provide a frame- work for constructing plans to ensure the safety of employees and the resumption of time- sensitive operations and services in the event of an emergency (fire, power or communi- cations blackout, tornado, hurricane,flood, earthquake, civil disturbance, etc.) Although the ROBINSON SUPPLY HYANNIS Contingency Plan provides guidance and documentation upon which to base emergency response, resumption, and recovery plan- ning efforts, it is not intended as a substitute for informed decision-making. Business March 26 2014 Robinson Supply Contingency Plan process managers and accountable executives must identify services for which disruption will result in significant financial andlor operational losses. Plans should include de- tailed responsibilities and specific tasks for emergency response activities and business resumption operations based upon pre-defined time frames. Constructing a plan and presenting it to senior management may satisfy the immediate need of having a documented plan. However, this is not enough if the goal is to have a viable response, resumption, recovery, and restoration capability. In order to establish that capability, plans, and the activities associated with their maintenance (i.e. training, revision, and exercising) must become an integral part of ROBINSON SUPPLY HYANNIS operations. A Contingency Plan is not a one-time commitment and is not a project with an estab- lished start and end date. Instead, a Contingency Plan is an on-going,funded business activity budgeted to provide resources required to: • Perform activities required to construct plans • Train and retrain employees • Develop and revise policies and standards as the department changes • Exercise strategies,procedures, team and resources requirements • Re-exercise unattained exercise objectives • Report on-going continuity planning to senior management • Research processes and technologies to improve resumption and recovery efficiency • Perform plan maintenance activities Developing a Contingency Plan that encompasses activities required to maintain a viable continuity capability ensures that a consistent planning methodology is applied to all of the ROBINSON SUPPLY HYANNIS Contingency Plan elements necessary to create a viable, repeatable and verifiable continuity capability include: • Implementing accurate and continuous vital records, data backup, and off-site stor- age • Implementing capabilities for rapid switching of voice and data communication cir- cuits to alternate site(s) • Providing alternate sites for business operations • Constructing a contingency organization March 26 2014 Robinson Supply Contingency Plan • Implementing contingency strategies 2.1 PURPOSE The purpose of this plan is to enable the sustained execution of mission critical processes and information technology systems for ROBINSON SUPPLY HYANNIS in the event of an extraordinary event that causes these systems to fail minimum production require- ments. The ROBINSON SUPPLY HYANNIS Contingency Plan will assess the needs and requirements so that ROBINSON SUPPLY HYANNIS may be prepared to respond to the event in order to efficiently regain operation of the systems that are made inoperable from the event. 2.2 SCOPE Insert information on the specific systems, locations, Facility divisions, technical bound- aries and physical boundaries of the ROBINSON SUPPLY HYANNIS Contingency Plan. 2.3 PLAN INFORMATION The Contingency Plan contains information in two parts related to the frequency of up- dates required. The first part contains the plan's static information (i.e. the information that will remain constant and will not be subject to frequent revisions). The second part contains the plan's dynamic information (i.e. the information that must be maintained regularly to ensure that the plan remains viable and in a constant state of readiness). This dynamic information is viewed as the action plan. The action plan should be con- sidered a living document and will always require continuing review and modification in order to keep up with the changing ROBINSON SUPPLY HYANNIS environment. The static information part of the Contingency Plan is contained in a MS-Word file and printed as part of this document. This static information should be read and understood by all employees, users, and administrators of the ROBINSON SUPPLY HYANNIS or at least by those individuals who are involved in any phase of business response, resump- tion, recovery, or restoration. The dynamic information resides in the database of the ROBINSON SUPPLY HYANNIS and will be printed as output for the appendixes of this document. By using the database, dynamic information that is vital to the survival of the ROBINSON SUPPLY HYANNIS will be easy to manage and update. The web-enabled database is designed for mainte- nance of personnel contact lists, emergency procedures, and technical components. It is already in operation for R OBINSON SUPPL Y HYANNIS. For ease of use and reference, the static and dynamic information is maintained sepa- rately. While it is necessary to be familiar with the static information during resumption, it should not be necessary to read that information at the time of the event. The complet- ed action plan of dynamic information provides all of the necessary lists, tasks, and re- ports used for response, resumption, or recovery. March 26 2014 Robinson Supply Contingency Plan 3 CONTINGENCY PLAN OVERVIEW 3.1 APPLICABLE PROVISIONS AND DIRECTIVES The development of the ROBINSON SUPPLY HYANNIS Contingency Plan is required by executive decisions and to meet regulatory mandates. The ROBINSON SUPPLY HYANNIS management must maintain an information assurance infrastructure that will ensure that its information resources maintain availability, confidentiality, integrity, and non-repudiation of its data. Furthermore, ROBINSON SUPPLY HYANNIS management must ensure their strategic information resources management capabilities. Therefore, the ROBINSON SUPPLY HYANNIS Contingency Plan is being developed in accordance with the following executive decisions, regulatory mandates,provisions, and directives: • Office of Management and Budget Circular A-130, Revised (Transmittal Memoran- dum No. 4), Appendix III, Security of Federal Automated Information Resources, No- vember 2000. • Computer Security Act of 1987, Public Law 100-235, January 1988. • Presidential Decision Directive 63, Critical Infrastructure Protection, May 1998. • Presidential Decision Directive 67, Enduring Constitutional Government and Conti- nuity of Government Operations, October 1998. • Executive Order 12656, Assignment of Emergency Preparedness Responsibilities, November 1988. • Federal Information Processing Standards (FIPS) Publication 87, Guidelines for ADP Contingency Planning, March 1981. • DOJ Order 2640.21), Information Technology Security, July 12, 2001. The ROBINSON SUPPLY HYANNIS Contingency Plan is designed to be in accordance with the strategic intent of the ROBINSON SUPPLY HYANNIS and the ROBINSON SUPPLY HYANNIS's functional and operational mission. 3.2 OBJECTIVES The ROBINSON SUPPLY HYANNIS is dependent on the variety of systems classified as General Support Systems (GSSs), which provide mission critical functions of connectivi- ty, Internet access, and email, or Major Applications (MAs) which are specific software programs written to produce output to fulfill the ROBINSON SUPPLY HYANNIS service to its customers or enable the ROBINSON SUPPLY HYANNIS to operate. In addition March 26 2014 Robinson Supply Contingency Plan these systems provide the means to offer electronic government (e-government). Alt- hough many threats and vulnerabilities can be mitigated, some of the threats cannot be prevented. Therefore, it is important that ROBINSON SUPPLY HYANNIS develop con- tingency plans and disaster recovery plans to ensure the uninterrupted existence of its business functions and continued service to the ROBINSON SUPPLY HYANNIS and the public. The primary focus of a contingency plan revolves around the protection of the two most important assets of any organization: personnel and data. All facets of a contingency plan should address the protection and safety of personnel and the protection and recov- ery of data. The primary objective of this plan is to establish policies and procedures to be used for information systems in the event of a contingency to protect and ensure func- tioning of those assets. This includes establishing an operational capability to process pre-designated critical applications, recovering data from off-site backup data sets, and restoring the affected systems to normal operational status. The plan seeks to accomplish the following additional objectives: • Minimize the number of decisions which must be made during a contingency • Identify the resources needed to execute the actions defined by this plan • Identify actions to be undertaken by pre-designated teams • Identify critical data in conjunction with customers that will be recovered during the Hot Site phase of recovery operations • Define the process for testing and maintaining this plan and training for contingency teams 3.3 ORGANIZATION In the event of a disaster or other circumstances which bring about the need for contin- gency operations, the normal organization of the ROBINSON SUPPLY HYANNIS will shift into that of the contingency organization. The focus of the ROBINSON SUPPLY HYANNIS will shift from the current structure and function of"business as usual" to the structure and function of a ROBINSON SUPPLY HYANNIS working towards the resump- tion of time-sensitive business operations. In this plan, the ROBINSON SUPPLY HYANNIS contingency organization will operate through phases of response, resump- tion, recovery, and restoration. Each phase involves exercising procedures of the ROBINSON SUPPLY HYANNIS Contingency Plan and the teams executing those plans. The teams associated with the plan represent functions of a department or support func- tions developed to respond, resume, recover, or restore operations or facilities of the ROBINSON SUPPLY HYANNIS and its affected systems. Each of the teams is comprised of individuals with specific responsibilities or tasks, which must be completed to fully ex- March 26 2014 Robinson Supply Contingency Plan ecute the plan. Primary and alternate team leaders, who are responsible to the plan owner, lead each team. Each team becomes a sub-unit of the ROBINSON SUPPLY HYANNIS contingency organ- ization. Coordination teams may be singular for the ROBINSON SUPPLY HYANNIS whereas technical teams will likely be system specific. Figure 3-1, Contingency Planning Organizational Chart, shows the base organizational structure. The teams are structured to provide dedicated,focused support in the areas of their particular experience and ex- pertise for specific response, resumption and recovery tasks, responsibilities, and objec- tives. A high degree of interaction among all teams will be required to execute the cor- porate plan. Each team's eventual goal is the resumption/recovery and the return to sta- ble and normal business operations and technology environments. Status and progress updates will be reported by each team leader to the plan owner. Close coordination must be maintained with CORPORATE OFFICE FALL RIVER and ROBINSON SUPPLY HYANNIS management and each of the teams throughout the resumption and recovery operations. The ROBINSON SUPPLY HYANNIS contingency organization's primary duties are: • To protect employees and information assets until normal business operations are resumed. • To ensure that a viable capability exists to respond to an incident. • To manage all response, resumption, recovery, and restoration activities. • To support and communicate with employees, system administrators, security of- ficers, and managers. • To accomplish rapid and efficient resumption of time-sensitive business opera- tions, technology, and functional support areas. • To ensure regulatory requirements are satisfied. • To exercise resumption and recovery expenditure decisions. • To streamline the reporting of resumption and recovery progress between the teams and management of each system. March 26 2014 Robinson Supply Contingency Plan Contingency Plan CORPORATE FDamage As- Damage As- Police Dept. Fire Dept. 911 DEP 24 Hour Spill Omni Security: Barnstable Servpro: NPalth r)iv Sn Q_�Za_ Emergency Oceanside (nntrartnrc• Ractnratinn• Chief Opera- Branch Opera- tional tional Figure 3-1 Contingency Planning Organizational Chart March 26 2014 Page 7 Robinson Supply Contingency Plan March 26 2014 Page 8 Robinson Supply Contingency Plan 3.4 CONTINGENCY PHASES The ROBINSON SUPPLY HYANNIS Contingency Plan Coordinator, in conjunction with CORPORATE management will determine which Teams/Team members are responsible for each function during each phase. As tasking is assigned, additional responsibilities, teams, and task lists need to be created to address specific functions during a specific phase. 3.4.1 RESPONSE PHASE • To establish an immediate and controlled SAFETY presence at the incident site. • To conduct a preliminary assessment of incident impact, known injuries, extent of damage, and disruption to the ROBINSON SUPPLY HYANNIS services and business operations. • To find and disseminate information on if or when access to the facility will be allowed. • To provide ROBINSON SUPPLY HYANNIS management with the facts neces- sary to make informed decisions regarding subsequent resumption and recov- ery activity. 3.4.2 RESUMPTION PHASE • To establish and organize a management control center and headquarters for the resumption operations. • To mobilize and activate the support teams necessary to facilitate and support the resumption process. • To notify and appraise time-sensitive business operation resumption team leaders of the situation. • To alert employees, vendors and other internal and external individuals and organizations. 3.4.3 RECOVERY PHASE • To prepare and implement procedures necessary to facilitate and support the recovery of time-sensitive business operations. March 26 2014 Page 9 Robinson Supply Contingency Plan • To coordinate with higher headquarters to discern responsibilities that will fall upon ROBINSON SUPPLY HYANNIS Business Operations Recovery Teams and Technology Recovery Teams • To coordinate with employees, vendors, and other internal and external indi- viduals and organizations. 3.4.4 RESTORATION PHASE • To prepare procedures necessary to facilitate the relocation and migration of business operations to the new or repaired facility. • Implement procedures necessary to mobilize operations, support and technolo- gy department relocation or migration. • Manage the relocation/migration effort as well as perform employee, vendor, and customer notification before, during, and after relocation or migration. 3.5 ASSUMPTIONS Include any assumptions that the Contingency Plan will hinge on. This could range from absolutely necessary conditions to helpful information in support of the contingency plan phases. 3.6 CRITICAL SUCCESS FACTORS AND ISSUES This section addresses the factors and issues that specifically apply to the ROBINSON SUPPLY HYANNIS Contingency Plan project that have been identified to be critical to the successful implementation of the Contingency Plan. These factors are as follows: • Absolute commitment by senior management to Contingency Planning and Disaster Recovery. • Budgetary commitment to Disaster Recovery. • Modifications and improvements to the current scheduling procedures for the reten- tion and transportation of back up files to the offsite storage facility. • Completion of requirement assessment for, and then completion of the procurement of a diesel generated alternate power source. March 26 2014 Page 10 Robinson Supply Contingency Plan 3.7 MISSION CRITICAL SYSTEMS/APPLICATIONS/SERVICES The following essential mission critical systems/applications/services that must be recov- ered at the time of disaster in the following order due to critical interdependencies: ROBINSON SUPPLY HYANNIS has identified the applications and services shown in Figure 1.2 as mission critical: SYSTEMS ACRONYM _R. _ SYSTEM NAME NSTAR Business Electrical 800-340-9822 Internet Connectivity VERIZONINTERNET SERVICES 800-837-4966 National Grid Gas Emergencies 800-548-8000 Figure 3-2 Mission Critical Systems 3.8 THREATS When developing strategies for a contingency plan, it is helpful to consider the entire range of probable and possible threats that present a risk to an organization. From that range of threats, likely scenarios can be developed and appropriate strategies applied. A disaster recovery plan should be designed to be flexible enough to respond to extended business interruptions, as well as major disasters. The best way to achieve this goal is to design a contingency plan that could be used to address a major disaster, but is divided into sections that can be used to address extend- ed business interruptions. While each of the identified threats could result in a disaster by itself, in a major disaster several of the threats might be present concurrently or occur sequentially, depending on the circumstances. As a result, it is advisable to develop several levels of strategies that can be applied as needed. For example, a localized fire in the computing center may render some of that space unusable. An appropriate strategy for that event may be temporary relocation of personnel to another office within branch property or in other suitable local office space in another office building or hotel. An event that required temporary evacuation of the computer center, such as a truck accident in the tunnel and a chemical spill that may re- quire several days to resolve, may necessitate switchover capabilities and possible re- gional mirrored redundancy capabilities that would be transparent to the users. An event of greater magnitude, such as an explosion, may render the branch unusable for an ex- March 26 2014 Page 11 Robinson Supply Contingency Plan tended duration of time and might necessitate a strategy based on mirrored redundancy as well as a secondary strategy involving a commercial hot site. Time sensitivity and mission criticality in conjunction with budgetary limitations, level of threat and degree of risk will be major factors in the development of recommended strategies. (See § 6 for Recommended Strategies) 3.8.1 PROBABLE THREATS The table depicts the threats most likely to impact the ROBINSON SUPPLY HYANNIS and components of their management. The specific threats that are represented by (XA) are considered the most likely to occur within the ROBINSON SUPPLY HYANNIS envi- ronment. q PROBABILITY OF THREATSP Probability of Occurrence: High Medium Low Air Conditioning Failure X Aircraft Accident X Blackmail X Bomb Threats X Chemical Spills/HazMat X Cold/Frost/Snow X Communications Loss X Data Destruction X Earthquakes X Fire XX Flooding/Water Damage X Nuclear Mishaps X Power Loss/Outage XX Sabotage/Terrorism X Storms/Hurricanes X Vandalism/Rioting X Figure 3-3 ROBINSON SUPPLY HYANNIS: Risk Analysis Matrix 4 SYSTEM DESCRIPTION In this section include information for each system under ownership or controlling au- thority of the ROBINSON SUPPLY HYANNIS. Controlling authority assumes that a function or mission element of a Facility/System has been contracted to an out- side entity that provides the facilities, hardware, and software and personnel re- quired to perform that task. Corporate and the Facility retain the oversight of that operation and therefore are the controlling activity for that system. March 26 2014 Page 12 Robinson Supply Contingency Plan 4.1 PHYSICAL ENVIRONMENT Include the building location, internal facilities, entry security measures, alarms, and ac- cess control. 4.2 TECHNICAL ENVIRONMENT Include accurate description of hardware (processors, memory, and media storage) and system software (operating system, applications). Include number of users, interconnect- ed systems, and operational constraints. Put specific software and hardware inventories, SLAs, vendor contacts in appendixes. 5 PLAN 5.1 PLAN MANAGEMENT 5.1.1 CONTINGENCY PLANNING WORKGROUPS The development of recovery strategies and work-arounds require technical input, crea- tivity, and pragmatism. The best way to create workable strategies and cohesive teams that leverage out-of-the-box thinking is to involve management and information resource management personnel in an ongoing informative dialogue. The <Facility/System Name> management has developed and is facilitating Contingency Planning workgroups to assist in the development and review of strategies, teams, and tasks. 5.1.2 CONTINGENCY PLAN COORDINATOR A coordinator and an alternate should be appointed by ROBINSON SUPPLY HYANNIS management and system owners to monitor and coordinate the ROBINSON SUPPLY HYANNIS Contingency Plan, training and awareness, exercises, and testing. Additional- ly, this person will coordinate strategy development with Contingency Planning Workgroups, System Contingency Coordinator, Team Leaders, Business Process Owners, and Management. The Contingency Planning Coordinator should work closely with sys- tem technical managers to ensure the viability of the ROBINSON SUPPLY HYANNIS Contingency Plan. The Contingency Plan Coordinator will manage contingency teams that are not system specific (see section 5.2). It is recommended that the individual(s) appointment(s) be documented in writing, and that specific responsibilities be identified and included in their job descriptions. 5.1.3 SYSTEM CONTINGENCY COORDINATORS A coordinator and an alternate should be appointed for each section under ownership or controlling authority of the ROBINSON SUPPLY HYANNIS by Corporate management and system owners. Their primary task will be to monitor and coordinate the ROBINSON SUPPLY HYANNIS contingency planning, training and awareness, exercis- es, and testing. Additionally, this person will manage contingency teams (see Section March 26 2014 Page 13 I Robinson Supply Contingency Plan 5.2) that are assigned specifically to their system and report directly to the Contingency Plan Coordinator. It is recommended that the individual(s) appointment(s) be document- ed in writing, and that specific responsibilities be identified and included in their job de- scriptions. 5.1.4 INCIDENT NOTIFICATION The facilities managers for the locations where the critical components of the ROBINSON SUPPLY HYANNIS systems are located should be provided with the tele- phone numbers of ROBINSON SUPPLY HYANNIS Emergency Response Team members. Upon notification, the team will meet in (TBD)for the purpose of conducting initial inci- dent assessment and issuing advisory reports of status to the Corporate Offices and ROBINSON SUPPLY HYANNIS management. If the facilities manager, emergency re- sponse personnel, or Emergency Response Team Leader has determined that the building cannot be entered, the alternate meeting place will be the (TBD). 5.1.5 INTERNAL PERSONNEL NOTIFICATION The ROBINSON SUPPLY HYANNIS "Emergency Notification"procedure, or a modified version thereof, should be developed and used for notification of the Crisis Management Team and other Disaster Recovery Teams regarding specific response actions taken dur- ing response operations. Within the `personal contact" database, a single source per- sonal information table should readily available that includes home addresses, contact telephone phone numbers, and emergency contact information. In the event of a disaster, a lack of specific personal data, including home addresses, cell phone numbers, pager numbers, and alternate contact information, could result in the inability to locate and contact key personnel and team members. This automated personnel database should be maintained and updated continuously. This database may be maintained internally or somewhere else within the department, as long as the information contained therein re- mains current and accessible. 5.1.6 EXTERNAL CONTACT NOTIFICATION The ROBINSON SUPPLY HYANNIS "Emergency Notification"procedure, or a modified version thereof, should be developed and used for notification of its Contingency Plan service providers, Town of Barnstable state I federal agencies, external contacts, ven- dors, suppliers, etc. 5.1.7 MEDIA RELEASES All incident related information (printed or spoken), concerning the ROBINSON SUPPLY HYANNIS will be coordinated and issued through the Department or Compo- nent Office of Public Affairs (OPA). March 26 2014 Page 14 I Robinson Supply Contingency Plan 5.1.8 ALTERNATE SITE(S) Include location of pre positioned Information Technology Assets for activation in a con- tingency operation mode. It is suggested that local sites for facility-/system-specific con- tingencies be maintained, such as a "Tech Hotel, " where the contingency planner rents space and information technology equipment. Additional local alternatives could be in the form of reciprocating MOAs and/or MOUs with ROBINSON SUPPLY HYANNIS or other Federal agencies for the utilization of space for the installation of equipment, connectivity infrastructure and personnel accom- modations should the need arise. An alternate site with a distance of at least 100 miles should be considered. Should a re- gional event take place that renders Facility systems ineffective and the inability for physical access, a relocation site would serve the needs for contingency operations. 5.2 TEAMS The following are suggested teams that will be assigned to execute the contingency plan: Some teams may not be necessary depending on the system. If this is the case you should simply remove the heading and table. Certain teams will be replicat- ed for each system and placed under the System Contingency Coordinator given the vast differences in hardware, software, and external communications for each system. Each team will have a roster and task list of actions and responsibilities generated by the IMS database to be included in an appendix. 5.2.1 DAMAGE ASSESSMENT TEAM#1 &#2 The Damage Assessment Team is a technical group responsible for assessing damage to the Facility/System and its components. It is composed of personnel with a thorough un- derstanding of hardware and equipment and the authority to make decisions regarding the procurement and disposition of hardware and other assets. This team is primarily responsible for initial damage assessment, accounting of damage assessment, loss mini- mization, salvage and procurement of necessary replacement equipment and interfaces. This team should include vendor representatives. The Damage Assessment Team will enter the facility as soon as they have received per- mission to do so from emergency services. A written detailed account should be made of the general status of the work area, with specific attention to the condition of hardware, software,furnishings, and fixtures. Recommendations should be made that all damaged equipment, media, and documentation be routed immediately to disaster recovery and restoration experts for a determination as to its ability to be salvaged or restored. 5.2.2 OPERATIONS TEAM The Operations Team consists of operators responsible for running emergency produc- tion for critical systems, coordinating with Backup Team to ensure that applications sys- tem data and operating instructions are correct, and with the Liaison Team to advise of March 26 2014 Page 15 Robinson Supply Contingency Plan the production status and any unusual problems requiring assistance. Data In- put/Control Teams could be separate groups or subgroups of the Operations Team. 6 RECOMMENDED STRATEGIES The following information represents potential recommendations to and other tech- nical management positions as appropriate. These should be considered as solu- tions that potentially may assist in the continued development of their recovery ca- pabilities in a post-disaster situation. 7 TERMS AND DEFINITIONS The following is a comprehensive list of terms that are important in contingency planning and recovery operations. Add any Facility specific and system specific terms with defini- tions relevant to the Contingency Plan in the appropriate alphabetical positions. ABC Fire Extinguisher - Chemically based devices used to eliminate ordinary combus- tible, flammable liquid, and electrical fires. Acceptable Level of Risk- typically refers to the point at which the level of risk is more acceptable than the cost to mitigate the risk(in dollars or affect on computer system func- tion). Access - the ability to do something with a computer resource. This usually refers to a technical ability (e.g., read, create, modify, or delete a file, execute a program, or use an external connection); admission; entrance. Access control - the process of limiting access to the resources of an IT system only to authorized users,programs, processes, or other IT systems. Accountability - the property that enables activities on a system to be traced to individu- als, who may then be held responsible for their actions. Actuator - A mechanical assembly that positions the read/write head assembly over the appropriate tracks. Activation - When all or a portion of the recovery plan has been put into motion. Adequate security - security commensurate with the risk and magnitude of the harm re- sulting from the loss, misuse, or unauthorized access to, or modification of information. This includes assuring that systems and applications used by ROBINSON SUPPLY HYANNIS operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, personnel, operational, and technical controls. Alert-Notification that a disaster situation has occurred - stand by for possible activation of disaster recovery plan. Alternate Site - A location, other than the normal facility, used to process data and/or conduct critical business functions in the event of a disaster. Similar Terms: Alternate Processing Facility, Alternate Office Facility, And Alternate Communication Facility. Application - the use of information resources (information and information technology) to satisfy specific set of user requirements. March 26 2014 Page 16 Robinson Supply Contingency Plan Application program - A software program comprising a set of statements, defining cer- tain tasks. Application Recovery - The component of Disaster Recovery that deals specifically with the restoration of business system software and data, after the processing platform has been restored or replaced. Similar Terms: Business System Recovery. Array - An arrangement of two or more disk drives: may be in Redundant Array of Inex- pensive Disks (RAID) or daisy-chain fashion. Asset—a value placed on goods owned by an organization Assumptions - Basic understandings about unknown disaster situations that the disaster recovery plan is based on. Assurance - a measure of confidence that the security features and architecture of an au- tomated information system accurately mediate and enforce the security policy. Asynchronous Transfer Mode (ATM) - A network architecture that divides messages into fixed-size units (cells) and establishes a switched connection between the originating and receiving stations; enables transmission of various types of data (video, audio, etc.) over the same line without one data type dominating the transmission Audit system - an independent review, examination of the records, and activities to ac- cess the adequacy of system controls; to ensure compliance with established policies and operational procedures. The audit system is an essential tool for the determination and recommendation of necessary changes in controls, policies, or procedures. Audit trail - a series of records of computer events about an operating system, an appli- cation, or user activities. Auditing-the review and analysis of management, operational, and technical controls. Authentication - proving (to some reasonable degree) a user's identity. It can also be a measure designed to provide protection against fraudulent transmission by establishing the validity of a transmission, message, station, or originator. Authorization - the permission to use a computer resource. Permission is granted, di- rectly or indirectly, by the application or system owner. Automated—means computerized for the purpose of this document. Availability - the property of being accessible and usable, upon demand by an authorized entity, to complete a function. The information technology system or installation con- tains information or provides services that must be available on a timely basis, to meet mission requirements or to avoid substantial losses. Controls to protect the availability of information are required, if the information is critical to the ROBINSON SUPPLY HYANNIS's activity's functions. Access to some information requires ROBINSON SUPPLY HYANNIS to ensure the availability of that information within a short period of time. Back Office Location - An office or building, used by the organization to conduct sup- port activities,that is not located within an organization's headquarters or main location. Backbone - the underlying network communication conduit or line by which all main servers and devices are connected; backbone devices are typically servers, routers, hubs, and bridges; client computers are not connected directly to the backbone. Backup - means either procedures or standby equipment that are available for use in the event of a failure or inaccessibility of normally used equipment or procedures or to make a copy of data or a program in case the original is lost, damaged, or otherwise unavaila- ble. March 26 2014 Page 17 Robinson Supply Contingency Plan Backup Agreement - A contract to provide a service that includes the method of perfor- mance, the fees, the duration, the services provided, and the extent of security and confi- dentiality maintained. Backup Position Listing - A list of alternative personnel who can fill a recovery team position when the primary person is not available. Backup Strategies (Recovery Strategies) - Alternative operating method (i.e., platform, location, etc.) for facilities and system operations in the event of a disaster. Bandwidth - the amount of data that can be transmitted via a given communications channel (e.g., between a hard drive and the host PC) in a given unit of time. Block - a portion of a volume usually 512 bytes in size; often referred to as a "logical block." Burst mode - a temporary, high-speed data transfer mode that can transfer data at signif- icantly higher rates than would normally be achieved with non-burst technology; the maximum throughput a device is capable of transferring data. Bus - the main communication avenue in a computer; an electrical pathway along which signals are sent from one part of the computer to another. Business Continuity Planning (BCP): An all encompassing, "umbrella" term covering both disaster recovery planning and business resumption planning. Also see disaster re- covery planning and business resumption planning Business Impact Analysis (BIA) - The process of analyzing all business functions and the effect that a specific disaster may have upon them. Business Interruption - Any event, whether anticipated (i.e., public service strike) or unanticipated (i.e., blackout) which disrupts the normal course of business operations at a corporate location. Business Interruption Costs - The costs or lost revenue associated with an interruption in normal business operations. Business Recovery Coordinator-See Disaster Recovery Coordinator. Business Recovery Process - The common critical path that all companies follow during a recovery effort. There are major nodes along the path that are followed regardless of the organization. The process has seven stages: 1) Immediate response, 2) Environmental restoration, 3) Functional restoration, 4) Data synchronization, 5) Restore business func- tions, 6) Interim site, and 7) Return home. Business Recovery Team - A group of individuals responsible for maintaining and coor- dinating the recovery process. Similar Terms: Recovery Team Business Resumption Planning (BRP): The operations piece of business continuity planning. Also see: Disaster Recovery Planning Business Unit Recovery - The component of Disaster Recovery which deals specifically with the relocation of key organization personnel in the event of a disaster, and the provi- sion of essential records, equipment supplies, work space, communication facilities, computer processing capability, etc. Similar Terms: Work Group Recovery. Byte-The fundamental data unit for personal computers, comprising 8 contiguous bits. Cache - A large bank of random access memory used for temporary storage of infor- mation. Computer-Aided Design (CAD) -; the use of a computer in industrial design applica- tions such as architecture, engineering, and manufacturing. March 26 2014 Page 18 I Robinson Supply Contingency Plan Call back- a procedure for identifying a remote terminal. In a call back, the host system disconnects the caller and then dials the authorized telephone number of the remote ter- minal to reestablish the connection. Synonymous with dial back. Central Office - a secure, self-contained telecommunications equipment building that houses servers, storage systems, switching equipment, emergency power systems, and related devices that are used to run telephone systems. Certified Disaster Recovery Planner (CDRP): CDRP's are certified by the Disaster Recovery Institute, a not-for-profit corporation, which promotes the credibility and pro-. fessionalism in the DR industry. Checklist Test - A method used to test a completed disaster recovery plan. This test is used to determine if the information such as phone numbers, manuals, equipment, etc. in the plan is accurate and current. Clustered servers - The concept of combining multiple host computers together through a private communication line, such as Ethernet backbone, to form a ring of host comput- ers; this ring of host computers act as a single entity, capable of performing multiple complex instructions by distributing the workload across all members of the ring. Clustered storage - the concept of combining multiple storage servers together to form a redundant ring of storage devices; clustered storage systems typically perform multiple read and write requests through parallel access lines to the requesting computer. Cold Site - An alternate facility that is void of any resources or equipment except air- conditioning and raised flooring. Equipment and resources must be installed in such a facility to duplicate the critical business functions of an organization. Cold-sites have many variations depending on their communication facilities, Uninterruptible Power Source (UPS) systems, or mobility (Relocatable-Shell). Similar Terms: Shell-site; Back- up site; Recovery site;Alternative site. Command And/Or Control Center (CAC/CNC/CCC) - A centrally located facility having adequate phone lines to begin recovery operations. Typically it is a temporary facility used by the management team to begin coordinating the recovery process and used until the alternate sites are functional. Commerce service provider (CSP) - A company that provides e-commerce solutions for retailers. Competitive local exchange carrier (CLEC) - a long distance carrier, cable company, or small startup local exchange carrier that competes for business in a local telephone market; many CLECs also offer Internet services. Computer virus - A program that "infects" computer systems in much the same way, as a biological virus infects humans. The typical virus "reproduces" by making copies of itself and inserting them into the code of other programs—either in systems software or in application programs. Communications Failure - An unplanned interruption in electronic communication be- tween a terminal and a computer processor, or between processors, as a result of a failure of any of the hardware, software, or telecommunications components comprising the link. (Also refer to Network Outage.) Communications Recovery - The component of Disaster Recovery which deals with the restoration or rerouting of an organization's telecommunication network, or its compo- nents, in the event of loss. Similar Terms: (Telecommunication Recovery, Data Commu- nications Recovery) March 26 2014 Page 19 Robinson Supply Contingency Plan Computer Recovery Team (CRT) - A group of individuals responsible for assessing damage to the original system, processing data in the interim, and setting up the new sys- tem. Confidentiality - the assurance that information is not disclosed to unauthorized entities or processes. The information technology system or installation contains information that requires protection from unauthorized or inappropriate disclosure. Some information must be protected from unauthorized or accidental disclosure. ROBINSON SUPPLY HYANNIS is required to prevent some information from release to persons without the proper qualifications. Information requiring protection from unauthorized disclosure in- cludes classified information, information related to military operations and equipment, confidential commercial business information, confidential ROBINSON SUPPLY HYANNIS business information, Privacy Act information, law enforcement confidential information, procurement-sensitive information, budgetary information prior to OMB release, and information exempt from disclosure under the Freedom of Information Act (FOIA). Configuration control - the process of controlling modifications to the system's hard- ware, software, and documentation that provide sufficient assurance that the system is protected against the introduction of improper modifications before, during, and after sys- tem implementation. Configuration management (CM) - The management of changes made to a system's hardware, software, firmware, documentation, tests, test fixtures, and test documentation throughout the development and operational life of the system. Consortium Agreement - An agreement made by a group of organizations to share pro- cessing facilities and/or office facilities, if one member of the group suffers a disaster. Similar Terms: Reciprocal Agreement. Contingency plan - a plan for emergency response, back-up operations, and post-disaster recovery for information technology systems and installations in the event normal opera- tions are interrupted. The contingency plan should ensure minimal impact upon data pro- cessing operations in the event the information technology system or facility is damaged or destroyed. Contingency planning - a plan that addresses how to keep an organization's critical functions operating in the event of any kind of disruptions. See Disaster Recovery Plan Contingency Planning-See also Disaster Recovery Planning. Controller - a unit or circuitry that manages the information flow between storage disks and the computer. Cooperative Hot sites - A hot site owned by a group of organizations available to a group member should a disaster strike. Also See Hot-Site. Cost Benefit Analysis - the assessment of the costs of providing data protection for a system versus the cost of losing or compromising a system. Cost of ownership - the purchase price of equipment plus the cost of operating this equipment over its projected life span. Commercial Off-the-Shelf(COTS) -; Commercially available products that can be pur- chased and integrated with little or no customization, thus facilitating customer infra- structure expansion and reducing costs. Countermeasure - any action, device, procedure, technique, or other measure that re- duces the vulnerability of, or threat to a system. March 26 2014 Page 20 Robinson Supply Contingency Plan Crate & Ship - A strategy for providing alternate processing capability in a disaster, via contractual arrangements with an equipment supplier to ship replacement hardware with- in a specified time period. Similar Terms: Guaranteed Replacement, Quick Ship. Crisis - A critical event, which, if not handled in an appropriate manner, may dramatical- ly impact an organization's profitability, reputation, or ability to operate. Crisis Management - The overall coordination of an organization's response to a crisis, in an effective, timely manner, with the goal of avoiding or minimizing damage to the organization's profitability, reputation, or ability to operate. Crisis Simulation - The process of testing an organization's ability to respond to a crisis in a coordinated, timely, and effective manner, by simulating the occurrence of a specific crisis. Critical Functions -Business activities or information, which could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization. Critical Records - Records or documents, which, if damaged or destroyed, would cause considerable inconvenience and/or require replacement or recreation at considerable ex- pense. Cryptography - the principles, means, and methods for rendering information unintelli- gible and for restoring encrypted information to intelligible form. Computer Telephony Integration (CTI) - Providing a link between telephone systems and computers to facilitate incoming and outgoing call handling and control; the physical link between a telephone and server. Digital Audio Tape (DAT) - A digital magnetic tape format originally developed for au- dio recording and now used for computer backup tape; the latest DAT storage format is DDS (Digital Data Storage). Damage Assessment - The process of assessing damage, following a disaster, to com- puter hardware, vital records, office facilities, etc. and determining what can be salvaged or restored and what must be replaced. Data Center Recovery - The component of Disaster Recovery that deals with the resto- ration, at an alternate location, of data centers services and computer processing capabili- ties. Similar Terms: Mainframe Recovery. Data Center Relocation - The relocation of an organization's entire data processing op- eration. Declaration Fee - A one-time fee, charged by an Alternate Facility provider, to a cus- tomer who declares a disaster. Similar Terms: Notification Fee. NOTE: Some recovery vendors apply the declaration fee against the first few days of recovery. Decryption - the process of taking an encrypted file and reconstructing the original file. This is the opposite of encryption. Dedicated Line - A pre-established point-to-point communication link between comput- er terminals and a computer processor, or between distributed processors, that does not require dial-up access. Departmental Recovery Team - A group of individuals responsible for performing re- covery procedures specific to their department. Dynamic Growth and Reconfiguration (DGR) - A Dot Hill technology that allows the system administrator to quickly and easily add capacity or change RAID levels while the system is in use. March 26 2014 Page 21 Robinson Supply Contingency Plan Dial Backup - The use of dial-up communication lines as a backup to dedicated lines. Dial-Up Line - A communication link between computer terminals and a computer pro- cessor,which is established on demand by dialing a specific telephone number. Disaster - Any event that creates an inability on an organizations part to provide critical business functions for some predetermined period of time. Similar Terms: Business In- terruption; Outage; Catastrophe. Disaster Prevention - Measures employed to prevent, detect, or contain incidents that, if unchecked, could result in disaster. Disaster Prevention Checklist- A questionnaire used to assess preventative measures in areas of operations such as overall security, software, data files, data entry reports, mi- crocomputers, and personnel. Disaster Recovery - The ability to respond to an interruption in services by implement- ing a disaster recovery plan to restore an organization's critical business functions. Disaster Recovery Administrator - The individual responsible for documenting recov- ery activities and tracking recovery progress. Disaster Recovery Coordinator - The Disaster Recovery Coordinator may be responsi- ble for overall recovery of an organization or unit(s). Similar Terms: Business Recovery Coordinator. Disaster Recovery Period - The time period between a disaster and a return to normal functions, during which the disaster recovery plan is employed. Disaster Recovery Plan (DRP) - The document that defines the resources, actions, tasks and data required to manage the business recovery process in the event of a business in- terruption. The plan is designed to assist in restoring the business process within the stat- ed disaster recovery goals. Disaster Recovery Planning - The technological aspect of business continuity planning. The advance planning and preparations that are necessary to minimize loss and ensure continuity of the critical business functions of an organization in the event of disaster. Similar Terms: Contingency planning; business resumption planning; corporate contin- gency planning; business interruption planning; disaster preparedness. Disaster Recovery Software - An application program developed to assist an organiza- tion in writing a comprehensive disaster recovery plan. Disaster Recovery Teams (Business Recovery Teams): A structured group of teams ready to take control of the recovery operations if a disaster should occur. Disk array (see array) - an arrangement of two or more hard disks, in RAID or daisy- chain configuration, organized to improve speed and provide protection of data against loss. Distributed computing environment - A set of middleware standards that defines the method of communication between clients and servers in a cross-platform computing en- vironment; enables a client program to initiate a request that can be processed by a pro- gram written in a different computer language and housed on a different computer plat- form. Digital Linear Tape (DLT) - A serpentine technology first introduced by Digital Equipment Corporation, and later developed by Quantum for tape backup/archive of net- works and servers; DLT technology addresses midrange to high-end tape backup re- quirements. March 26 2014 Page 22 Robinson Supply Contingency Plan Electronic Industries Association (EIA) - A trade association that establishes electrical and electronics-oriented standards. Electronic Vaulting - Transfer of data to an offsite storage facility via a communication link rather than via portable media. Typically used for batch/journaled updates to critical files to supplement full backups taken periodically. Emergency - A sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property. Emergency Preparedness - The discipline which ensures an organization, or communi- ty's readiness to respond to an emergency in a coordinated,timely, and effective manner. Emergency Procedures - A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage. Electro Magnetic Interference (EMI) —; What occurs when electromagnetic fields from one device interfere with the operation of some other device. Employee Relief Center (ERC) - A predetermined location for employees and their families to obtain food, supplies, financial assistance, etc., in the event of a catastrophic disaster. Encryption - The process of coding a message to make it unintelligible. Enterprise storage network (ESN) - an integrated suite of products and services de- signed to maximize heterogeneous connectivity and management of enterprise storage devices and servers; a dedicated, high-speed network connected to the enterprise's storage systems, enabling files and data to be transferred between storage devices and client mainframes and servers. Environment - the aggregate of external procedures, conditions, and objects that affect the development, operation, and maintenance of a system. Ethernet- a local area network standard for hardware, communication, and cabling. Extended Outage - A lengthy, unplanned interruption in system availability due to com- puter hardware or software problems, or communication failures. Extra Expense Coverage - Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster. Facilities - A location containing the equipment, supplies, voice and data communication lines, to conduct transactions required to conduct business under normal conditions. Sim- ilar Terms: Primary Site, Primary Processing Facility, Primary Office Facility. Failover - the transfer of operation from a failed component (e.g., controller, disk drive) to a similar, redundant component to ensure uninterrupted data flow and operability. Fault tolerance - the ability of a system to cope with internal hardware problems (e.g., a disk drive failure) and still continue to operate with minimal impact, such as by bringing a backup system online. Fiber Channel-Arbitrated Loop (FC-AL) -A fast serial bus interface standard intended to replace SCSI on high-end servers. A Fiber Channel implementation in which users are attached to a network via a one-way ring(loop) cabling scheme. Fiber Channel Community (FCC) -; An international non-profit organization whose members include manufacturers of servers, disk drives, RAID storage systems, switches, hubs, adapter cards,test equipment, cables and connectors, and software solutions. Fiber Channel - A high-speed storage/networking interface that offers higher perfor- mance, greater capacity and cabling distance, increased system configuration flexibility and scalability, and simplified cabling. March 26 2014 Page 23 I Robinson Supply Contingency Plan Fiber Distributed Data Interface (FDDI) - A 100 Mbit/s ANSI standard LAN architec- ture, defined in X3T9.5. The underlying medium is optical fiber (though it can be copper cable, in which case it may be called CDDI) and the topology is a dual-attached, counter- rotating token ring. File Backup - The practice of dumping (copying) a file stored on disk or tape to another disk or tape. This is done for protection case the active file gets damaged. File Recovery-The restoration of computer files using backup copies. File Server - The central repository of shared files and applications in a computer net- work(LAN). Footprint - the amount of floor space that a piece of equipment (e.g., a rackmount enclo- sure) occupies. Form factor - the physical size and shape of a device; often used to describe the size of disk arrays in a rack mount enclosure. Forward Recovery -The process of recovering a data base to the point of failure by ap- plying active journal or log data to the current backup files of the database. Full Recovery Test An exercise in which all recovery procedures and strategies are test- ed(as opposed to a Partial Recovery Test.) Generator-An independent source of power usually fueled by diesel or natural gas. Gigabyte- approximately one billion bytes, 1,024 megabytes. Host Bus Adapter (HBA) -; a hardware card that resides on the PC bus and provides an interface connection between a SCSI device (such as a hard drive) and the host PC. Halon -A gas used to extinguish fires effective only in closed areas. High Priority Tasks - Activities vital to the operation of the organization. Currently be- ing phased out due to environmental concerns. Similar Terms: Critical Functions Home page - The main page on a Web site that serves as the primary point of entry to related pages within the site and may have links to other sites as well. Host-attached storage - A storage system that is connected directly to the network serv- er; also referred to as server-attached storage. Hot site -An alternate facility that has the equipment and resources to recover the busi- ness functions affected by the occurrence of a disaster. Hot-sites may vary in type of fa- cilities offered (such as data processing, communication, or any other critical business functions needing duplication). Location and size of the hot-site will be proportional to the equipment and resources needed. Similar Terms: Backup site; Recovery site; Recov- ery Center;Alternate processing site. Hot spare - a backup component (e.g., disk or controller) that is online and available should the primary component go down. Hot swappable - the ability to replace a component (e.g., disk drive, controller, fan, power source)while the system is on line, without having to power down; also referred to as hot-plug removable. Hierarchical Storage Management (HSM) -; a storage system in which new, frequently used data is stored on the fastest, most accessible (and generally more expensive) media (e.g., RAID) and older, less frequently used data is stored on slower (less expensive) me- dia(e.g., tape). Hub - A device that splits one network cable into a set of separate cables, each connect- ing to a different computer; used in a local area network to create a small-scale network by connecting several computers together. March 26 2014 Page 24 Robinson Supply Contingency Plan Human Threats - Possible disruptions in operations resulting from human actions (i.e., disgruntled employee,terrorism, etc.). Heat, Ventilation, and Air Conditioning (HVAC) — The system that provides and maintains a controlled environment with conditions conducive to continuous and uninter- rupted computer operations. Identification - The process that enables, generally by the use of unique machine- readable names, recognition of users or resources, as indistinguishable, to those previous- ly described to the automated information system. Institute of Electrical and Electronics Engineers (IEEE) - The largest technical socie- ty in the world, consisting of engineers, scientists, and students; has declared standards for computers and communications. Initiator- A Small Computer System Interface (SCSI) device that requests another SCSI device (a target) to perform an operation; usually a host computer acts as an initiator and a peripheral device acts as a target. Information system - The organized collection,processing, transmission, and dissemina- tion of information in accordance with defined procedures, whether automated or manual. Information technology system - an information system that is automated or is an as- sembly of computer hardware and software configured for the purpose of classifying, sorting, calculating, computing, summarizing, transmitting and receiving, storing and re- trieving data with a minimum of human intervention. The term includes single applica- tion programs, which operate independently of other program applications. A "sensitive information technology system" means an information technology system that contains sensitive information. Information technology installation - one or more computer or office automation sys- tems, including related telecommunications, peripheral and storage units, central pro- cessing units, and operating and support system software. Information technology instal- lations may range from information technology installations, such as large centralized computer centers, to individual stand-alone microprocessors, such as personal computers. A "sensitive information technology installation" means an information technology in- stallation, which contains or provides processing for a sensitive information technology system. Infrastructure — (1) the physical equipment (computers, cases, racks, cabling, etc.) that comprises a computer system; (2) the foundational basis that supports the information management capabilities, including the telecommunications and network connectivity. Integrity, data - That attribute of data relating to the preservation of(1) its meaning and completeness, (2) the consistency of its representation(s), and (3) its correspondence to what it represents. The information technology system or installation contains infor- mation that must be protected from unauthorized, unanticipated, or unintentional modifi- cation or destruction, including detection of such activities. Integrity is important to all information because inaccuracy compromises the value of the information system. Law enforcement, mission and life critical, and financial information are examples of infor- mation requiring protection to preserve integrity. Integrity, system - That attribute of a system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. March 26 2014 Page 25 Robinson Supply Contingency Plan InterFacility Contingency Planning Regulation A regulation written and imposed by the Federal Financial Institutions Examination Council concerning the need for financial institutions to maintain a working disaster recovery plan. Interface - A connection between hardware devices, applications, or different sections of a computer network. Interim Organizational Structure - An alternate organization structure that will be used during recovery from a disaster. This temporary structure will typically streamline chains of command and increase decision-making autonomy. Internal Hot sites - A fully equipped alternate processing site owned and operated by the organization. Internet-A worldwide system of linked computer networks. Internet Service Provider (ISP) - A company that provides Internet access services to consumers and businesses; ISPs lease connections from Internet backbone providers; while most ISPs are small companies that service a local area, there are also regional and national ISPs (such as America Online). Interoperability - The ability of one computer system to control another, even though the two systems are made by different manufacturers. Interruption - An outage caused by the failure of one or more communications links with entities outside of the local facility. Intranet - a computer network, based on Internet technology, which is designed to meet the internal needs for sharing information within a single organization or company. Input/Output (I/O) -; Reception (read) or transmission (write) of computer signals; the entire connection path between the CPU bus and the disk drives. I/Os Per Second (IOPS) - A measure of performance for a host-attached storage device or RAID controller. Just A Bunch Of Disks (JBOD) -A disk array without a controller. Kernel- The core of an operating system such as Windows 98, Windows NT, Mac OS or Unix; provides basic services for the other parts of the operating system, making it possi- ble for it to run several programs at once (multitasking), read and write files and connect to networks and peripherals. Local Area Network(LAN) - A LAN consists of personal computers that are connected together through various means, so that they can communicate with each other. A net- work of computers, within a limited area (e.g., a company or organization); Computing equipment, in close proximity to each other, connected to a server which houses software that can be access by the users. This method does not utilize a public carrier. See Also WAN. LAN Recovery - The component of Disaster Recovery which deals specifically with the replacement of LAN equipment in the event of a disaster, and the restoration of essential data and software Similar Terms: Client/Server Recovery Leased Line-Usually synonymous with dedicated line. Legacy - A computer, system, or software that was created for a specific purpose but is now outdated; anything left over from a previous version of the hardware or software. Line Rerouting - A service offered by many regional telephone companies allowing the computer center to quickly reroute the network of dedicated lines to a backup site. Line Voltage Regulators - Also known as surge protectors. These protectors/regulators distribute electricity evenly. March 26 2014 Page 26 I Robinson Supply Contingency Plan Logic Bomb - A computer code that is preset to cause a malfunction, at a later time, when a specified set of logical conditions occurs. For example, a specific social security number in a payroll system is processed and the logic bomb is activated, causing an im- proper amount of money to be printed on the check. Loss - The unrecoverable business resources that are redirected or removed as a result of a disaster. Such losses may be loss of life, revenue, market share, competitive stature, public image, facilities, or operational capability. Loss Reduction - The technique of instituting mechanisms to lessen the exposure to a particular risk. Loss reduction is intended to react to an event and limit its effect. Exam- ples of Loss Reduction include sprinkler systems. Linear Tape Open (LTO) -; A new standard tape format developed by HP, IBM, and Seagate; expected availability in 2000. Logical Unit Number (LUN) - An addressing scheme used to define SCSI devices on a single SCSI bus. Machine-readable Media - Media that can convey data to a given sensing device, e.g., diskettes, disks, tapes, computer memory. Mainframe Computer-A high-end computer processor, with related peripheral devices, capable of supporting large volumes of batch processing, high performance on-line trans- action processing systems, and extensive data storage and retrieval. Similar Terms: Host Computer. Malicious Software - Any of a family of computer programs developed with the sole purpose of doing harm. Malicious code is usually embedded in software programs that appear to provide useful functions but, when activated by a user, cause undesirable re- sults. Media Transportation Coverage - An insurance policy designed to cover transportation of items to and from an EDP center, the cost of reconstruction and the tracing of lost items. Coverage is usually extended to transportation and dishonesty or collusion by de- livery employees. Megabyte-Approximately one million bytes, 1,024 kilobytes Magnetic Ink Character Reader (MICR) Equipment - Equipment used to imprint ma- chine-readable code. Generally, financial institutions use this equipment to prepare paper data for processing, encoding (imprinting) items such as routing and transit numbers, ac- count numbers, and dollar amounts. Mirroring - A method of storage in which data from one disk is duplicated on another disk so that both drives contain the same information,thus providing data redundancy. Mission critical - Any computer process that cannot fail during normal business hours; some computer processes (e.g., telephone systems) must run all day long and require 100 percent uptime. Mobile Hot Site - A large trailer containing backup equipment and peripheral devices delivered to the scene of the disaster. It is then hooked up to existing communication lines. Modulator Demodulator Unit (MODEM) - Device that converts data from analog to digital and back again. Monitoring - An ongoing activity that checks on the system, its users, or the environ- ment. March 26 2014 Page 27 Robinson Supply Contingency Plan Mean Swaps Between Failure (MSBF) -A statistical calculation used to predict the av- erage usefulness of a robotic device (e.g., a tape library) with any interruption of service. Mean Time Between Failure (MTBF) - A statistical calculation used to predict the av- erage usefulness of a device without any interruption of service. Mean Time To Repair (MTTR) - The average amount of time required to resolve most hardware or software problems with a given device. Multi-platform - .The ability of a product or network to support a variety of computer platforms (e.g. IBM, Sun, Macintosh); also referred to as cross-platform. Natural Threats -Events caused by nature causing disruptions to an organization. Network - The Open Systems Interconnect (OSI) seven-layer model attempts to provide a way of partitioning any computer network into independent modules from the lowest (physical) layer to the highest (application) layer. Many different specifications exist at each of these layers. The network is composed of a communications medium and all components attached to that medium whose responsibility is the transference of infor- mation. Network Architecture- The basic layout of a computer and its attached systems, such as terminals and the paths between them. Network-Attached Storage (NAS) - A disk array storage system that is attached directly to a network rather than to the network server (i.e., host attached); functions as a server in a client/server relationship, has a processor, an operating system or micro-kernel, and processes file I/O protocols such as SMB and NFS. Network Service Provider(NSP) - a company that provides the national or international packet-switching networks that carry Internet traffic; also called a backbone operator. Network Outage - An interruption in system availability as a result of a communication failure affecting a network of computer terminals, processors, or workstations. Node (or network node) - Any device that is directly connected to the network, usually through Ethernet cable; nodes include file servers and shared peripherals; the name used to designate a part of a network. This may be used to describe one of the links in the network, or a type of link in the network(for example, Host Node or Intercept Node). Nonessential Function/Data - Business activities or information that could be interrupt- ed or unavailable indefinitely without significantly jeopardizing critical functions of an organization. Nonessential Records - Records or documents, which, if irretrievably lost or damaged, will not materially impair the organization's ability to conduct business. NT (Microsoft Windows NT) - An operating system developed by Microsoft for high- performance processors and networked systems. Original Equipment Manufacturer (OEM) - A company that manufactures a given piece of hardware (unlike a value-added reseller, which changes and repackages the hardware). Off-Host Processing - A backup mode of operation in which processing can continue throughout a network despite loss of communication with the mainframe computer. Off-Line Processing - A backup mode of operation in which processing can continue manually or in batch mode if the on-line systems are unavailable. Off-Site Storage Facility -A secure location, remote from the primary location, at which backup hardware, software, data files, documents, equipment, or supplies are stored. March 26 2014 Page 28 Robinson Supply Contingency Plan On-Line Systems - An interactive computer system supporting users over a network of computer terminals. Open systems network - A network comprised of equipment that conforms to industry standards of interoperability between different operating systems (e.g., Unix, Windows NT). Operating Software -A type of system software supervising and directing all of the oth- er software components plus the computer hardware. Operating System - The master control program (e.g., Windows) that manages a com- puter's internal functions and provides a means of control to the computer's operations and file system. Organization Chart - A diagram representative of the hierarchy of an organization's personnel. Organization-Wide -A policy or function applicable to the entire organization. Outage -See Systems Outage. Outsourcing-The transfer of data processing functions to an independent third party. Owner - The individual designated as being responsible for the protection of IT re- sources. The owner generally falls into two broad categories: custodial and owner. For example, the "owner" of the resources, may be the manager of that facility. Resources located within user areas may be "owned" by the manager of those areas. To assist with the determination of ownership, individual system boundaries must be established. A system is identified by logical boundaries being drawn around the various processing, communications, storage, and related resources. They must be under the same direct management control with essentially the same function, reside in the same environment, and have the same characteristics and security needs. Ownership of information and/or information processing resources may be assigned to an organization, subordinate func- tional element, a position, or a specific individual. When ownership is assigned to an or- ganizational or functional element, the head of the unit so designated will be considered the resource owner. Some, but not necessarily all factors to be considered in the determi- nation of ownership are: 1.The originator or creator of data. 2.The organization or individual with the greatest functional interest. 3.Physical possession of the resource. Parallel Test-A test of recovery procedures in which the objective is to parallel an actual business cycle. Parity data - A block of information mathematically created from several blocks of user data to allow recovery of user data contained on a drive that has failed in an array; used in RAID levels 3 and 5. Password - A string of alphanumeric characters chosen by an individual to help ensure that their computer access is protected. Passwords are changed frequently to minimize the risk of unauthorized disclosure. Additional passwords may be assigned by the user to particular files or data sets. Personal Computer Interconnect (PCI) - An industry-standard bus used in servers, workstations, and PCs. Peripheral Equipment- Devices connected to a computer processor that perform such auxiliary functions as communications, data storage,printing, etc. Petabyte- 1,024 terabytes. March 26 2014 Page 29 I Robinson Supply Contingency Plan Physical Safeguards - Physical measures taken to prevent a disaster, such as fire sup- pression systems, alarm systems, power backup and conditioning systems, access control systems, etc. Platform - A hardware standard, such as IBM, Sun, or Macintosh. Portable Shell - An environmentally protected and readied structure that can be trans- ported to a disaster site so equipment can be obtained and installed near the original loca- tion. Procedural Safeguards - Procedural measures taken to prevent a disaster, such as safety inspections, fire drills, security awareness programs, records retention programs, etc. Proprietary -Privately developed and owned technology. Protocol - A standard that specifies the format of data and rules to be followed in data communication and network environments. RAID Advisory Board (RAB) -; an organization of storage system manufacturers and integrators dedicated to advancing the use and awareness of RAID and associated storage technologies; started in 1992, RAB states its main goals as education, standardization and certification. Rackmount - The cabinet that houses a server/storage workstation (also referred to as a server rack); to mount equipment into a cabinet. Redundant Array of Independent (or inexpensive) Disks (RAID) - A collection of storage disks with a controller(or controllers) to manage the storage of data on the disks. Redundant Data Path (RDP) - Dot Hill's software technology that creates an alternate data path between the server and the storage system in the event of system component failures to ensure continuous access to data. Real-time - Immediate processing of input or notification of status. Reciprocal Agreement - An agreement between two organizations with compatible computer configurations allowing either organization to utilize the other's excess pro- cessing capacity in the event of a disaster. Record Retention - Storing historical documentation for a set period of time, usually mandated by state and federal law or the Internal Revenue Service. Recovery Action Plan - The comprehensive set of documented tasks to be carried out during recovery operations. Recovery Alternative - The method selected to recover the critical business functions following a disaster. In data processing, some possible alternatives would be manual processing,use of service bureaus, or a backup site (hot or cold-site). A recovery alterna- tive is usually selected following a Risk Analysis, Business Impact Analysis, or both. Similar Terms: Backup site, backup alternative. Recovery Capability -This defines all of the components necessary to perform recovery. These components can include a plan, an alternate site, change control process, network rerouting, and others. Recovery Management Team - A group of individuals responsible for directing the de- velopment and on-going maintenance of a disaster recovery plan. Also responsible for declaring a disaster and providing direction during the recovery process. Recovery Planning Team - A group of individuals appointed to oversee the develop- ment and implementation of a disaster recovery plan. March 26 2014 Page 30 Robinson Supply Contingency Plan Recovery Point Objective (RPO) - The point in time to which data must be restored in order to resume processing transactions. RPO is the basis on which a data projection strategy is developed. Recovery Team -See Business Recovery Team. Recovery Time - The period from the disaster declaration to the recovery of the critical functions. Relocatable Shell-See Portable Shell Recovery procedures - the actions necessary to restore a system's processing capability and data files after a system failure. Risk- A combination of the likelihood that a threat will occur, the likelihood that a threat occurrence will result in an adverse impact, and the severity of the resulting adverse im- pact. Risk analysis - A formal systematic approach to assessing the vulnerability of an infor- mation technology system or installation. Risk analysis is the process of analyzing threats to and vulnerabilities of an information system to determine the risks (potential for losses). The resulting data is then analyzed. The analysis is used as a basis for identi- fying appropriate and cost-effective measures to counter the identified threats and vulner- abilities. The risk analysis identifies threats, quantifies the potential losses from threat realization, examines the cost benefit of applying alternative measures to counter the identified threats and reduces potential loss, and defines or documents the degree of ac- ceptable risk. Similar Terms: Risk assessment; impact assessment; corporate loss analy- sis; risk identification; exposure analysis; exposure assessment. Risk management - The process of the identification, measurement, control, and mini- mization of security risk in information systems. Also, it means to assess risk, take ac- tions to reduce risk to an acceptable level, and maintain risk at that level. Inherent in this definition are the concepts that risk cannot be completely eliminated and the most secure computer system is the one that no one uses. Router - An electronic device that connects two or more networks and routes incoming data packets to the appropriate network. Safeguards - The protective measures and controls that are prescribed to meet the securi- ty requirements specified for a system. Salvage & Restoration - The process of reclaiming or refurbishing computer hardware, vital records, office facilities, etc. following a disaster. Salvage Procedures - Specified procedures to be activated if equipment or a facility should suffer any destruction. Sample Plan - A generic disaster recovery plan that can be tailored to fit a particular or- ganization. Storage Area Network (SAN) - A network infrastructure of shared multi-host storage, linking all storage devices as well as interconnecting remote sites. Satellite Communication - Data communications via satellite. For geographically dis- persed organizations, may be viable alternative to ground-based communications in the event of a disaster. Scalable -The ability of a product or network to accommodate growth. Scan - To examine computer coding/programs sequentially, part by part. For viruses, scans are made for virus signatures or potentially unsafe practices. (E.g., changes to an executable file, direct writes to specific disk sectors, et al.). March 26 2014 Page 31 r Robinson Supply Contingency Plan Scope-Predefined areas of operation for which a disaster recovery plan is developed. Small Computer System Interface (SCSI) - An interface that serves as an expansion bus that can be used to connect hard disk drives, tape drives, and other hardware compo- nents. Secure - In terminology, such as e.g., secure LAN or secure device, means that the rout- ing addresses on the network are monitored and allowed to proceed only for authorized users. Security features - Are controls that protect against the identified vulnerabilities, i.e. fire and water alarms, passwords and other access protection, use of removable media for da- ta storage, data validation controls, audit trails, un-interruptible power sources (UPS) to protect against electrical outages, personnel screening, computer security awareness training of users, etc. Security infraction - The failure to follow applicable laws and regulations and estab- lished ROBINSON SUPPLY HYANNIS policies and procedures pertaining to the protec- tion of the company. Security policy - The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security specification - A detailed description of the security requirements and specifi- cations necessary to protect an information technology system or installation. Sensitive information - Information that requires a degree of protection due to its nature, magnitude of loss, or harm that could result from inadvertent or deliberate disclosure, modification, or destruction. This includes information that is 1.Mission critical (i.e., loss or harm would be such that an office could not per- form essential functions). 2.Should not be disclosed under the Freedom of Information Act, such as proprie- tary data and economic forecasts. Proprietary data includes trade secrets, com- mercial, or financial data obtained in the course of Government business, from or relating to a person or persons outside the government, not generally available to the public, and which is privileged, would cause competitive harm if released, or impair the ability of the government to obtain data in the future. 3.Complies with OMB Circular A-127 Financial Management Systems. 4.Complies with the Privacy Act of 1974. Data, which pertains to a specific indi- vidual by name, Social Security Number or by some other identifying means, and is part of a system of records as defined in the Privacy Act of 1974. S.Classified. Server - A computer that stores application and data files for all workstations on a net- work; also referred to as a file server. Shadow File Processing - An approach to data backup in which real-time duplicates of critical files are maintained at a remote processing site. Similar Terms: Remote Mirror- ing Simulation Test - A test of recovery procedures under conditions approximating a spe- cific disaster scenario. This may involve designated units of the organization actually ceasing normal operations while exercising their procedures. Skills Inventory - A listing of employees that lists their skills that apply to recovery. Spindle- Mechanism inside a hard disk drive that moves the heads into place; the axle on which a disk turns. March 26 2014 Page 32 Robinson Supply Contingency Plan Serial Storage Architecture (SSA) - A high-speed method of connecting disk, tape, and CD-ROM drives,printers, scanners, and other devices to a computer. Stand-Alone Processing - Processing, typically on a PC or mid-range computer, which does not require any communication link with a mainframe or other processor. Striping - A method of storage in which a unit of data is distributed and stored across several hard disks, which improves access speed but does not provide redundancy. Structured Walk-Through Test - Team members walk through the plan to identify and correct weaknesses. Subscription - Contract commitment providing an organization with the right to utilize a vendor recovery facility for recovery of their mainframe processing capability. Super-user- A system account that has full system-wide administrative privileges. Most UNIX machines have a log on account called"root", which acts as the super-user. Sustained mode- The measured transfer rate of a given device during normal operation. Switch - A network traffic-monitoring device that controls the flow of traffic between multiple network nodes. System - A generic term used for its brevity to mean either a major application or a gen- eral support system. A system is identified by logical boundaries drawn around the vari- ous processing communications, storage, and related resources. They must be under same direct management control (not responsibility), perform essentially the same func- tion, reside in the same environment, and have the same characteristics and security needs. A system does not have to be physically connected. Systems Downtime - A planned interruption in system availability for scheduled system maintenance. Systems integrator - An individual or company that combines various components and programs into a functioning system, customized for a particular customer's needs. System Outage - An unplanned interruption in system availability as a result of comput- er hardware or software problems, or operational problems. System Security Plan (SSP) - A plan to be developed by ROBINSON SUPPLY HYANNIS in accordance with OMB and NIST guidelines implementing the Computer Security Act of 1987, to safeguard the security of its information technology systems and installations. Target- a SCSI device that performs an operation requested by an initiator. TCQ - Tag command queuing; a feature introduced in the SCSI-2 specification that per- mits each initiator to issue commands accompanied by instructions for how the target should handle the command; the initiator can either request the command to be executed at the first available opportunity, in the order in which the command was received, or at a time deemed appropriate by the target. Technical Threats - A disaster causing event that may occur regardless of any human elements. Telco -Abbreviation for a "telecommunications company." Temporary Operating Procedures - Predetermined procedures, which streamline oper- ations while maintaining an acceptable level of control and auditability during a disaster situation. Terabyte-Approximately one trillion bytes, 1,024 gigabytes. March 26 2014 Page 33 Robinson Supply Contingency Plan Test Plan - The recovery plans and procedures that are used in a systems test to ensure viability. A test plan is designed to exercise specific action tasks and procedures that would be encountered in a real disaster. Test scenarios - Are descriptions of the tests to be performed to check the effectiveness of the security features. They may include validation of password constraints, such as length and composition of the password, entry of erroneous data to check data validation controls, review of audit information produced by the system, review of contingency plans and risk analyses, etc. Threat - Any circumstance or event with the potential to cause harm to a system in the destruction, disclosure, modification of data, and/or denial of service. Throughput - Measures the number of service requests on the I/O channel per unit of time. Time Bomb - Computer code that is preset to cause a later malfunction after a specific date, time, or a specific number of operations. The "Friday the 13tn" computer virus is an example. This virus infects the system several days or even months before and lies dormant until the date reaches Friday the 131n Topology - Geometric arrangement of nodes and cable links in a local area network; may be either centralized or decentralized. Transfer rate - The number of megabytes of data that can be transferred from the read/write heads to the disk controller in one second. Trap Door - A set of instruction codes embedded in a computer operating system that permits access, while bypassing security controls. Trojan Horse - A program that causes unexpected (and usually undesirable) effects when willingly installed or run by an unsuspecting user. A Trojan horse is commonly disguised as a game, a utility, or an application. A person can either create or gain access to the source code of a common, frequently used program and then add code, so that the program performs a harmful function, in addition to its normal function. These programs are generally deeply buried in the code of the target program, lie dormant for a pre- selected period, and are triggered in the same manner as a logic bomb. A Trojan horse can alter, destroy, disclose data, or delete files. Turnkey - A product or system that can be plugged in, turned on, and operated with little or no additional configuring. Uninterruptible Power Supply (UPS) - A backup power supply with enough power to allow a safe and orderly shutdown of the central processing unit should there be a disrup- tion or shutdown of electricity. UNIX-An operating system that supports multitasking and is ideally suited to multi-user applications (such as networks). Uploading - Connecting to another computer and sending a copy of program or file to that computer. SEE ALSO Downloading Useful Records - Records that are helpful but not required on a daily basis for continued operations. User - A person or a process accessing an automated information system, either by direct or indirect connection. User Contingency Procedures - Manual procedures to be implemented during a com- puter system outage. March 26 2014 Page 34 Robinson Supply 1 Contingency Plan S cY User ID - A group of characters and/or numbers that uniquely identify an individual and g p q Y Y are used to gain valid access to a computer system. A user id is normally coupled with a password that is set by the owner of the user id. Value-Added Reseller (VAR) - A business that repackages and improves hardware manufactured by an original equipment manufacturer. Virus - A code segment that replicates by attaching copies of itself to existing executable programs. This is usually done in such a manner that the copies will be executed when the file is loaded into memory, allowing them to infect still other files, and so on. The new copy of the virus is executed when a user executes the new host program. The virus may include any additional "payload" that is triggered when specific conditions are met. For example, some viruses display a text string on a particular date. There are many types of viruses including variants, overwriting, resident, stealth, and polymorphic. Vi- ruses often have damaging side effects, sometimes intentionally, sometimes not. Virus detection software - Software written to scan machine-readable media on com- puter systems. There are a growing number of reputable software packages available that are designed to detect and/or remove viruses. In addition, many utility programs can search text files for virus signatures or potentially unsafe practices. Virus signature - A unique set of characters, which identify a particular virus. This may also be referred to as a virus marker. Vital Records - Records or documents, for legal, regulatory, or operational reasons, can- not be irretrievably lost or damaged without materially impairing the organization's abil- ity to conduct business. Voice Recovery - The restoration of an organization's voice communications system. Vulnerability - A weakness in an information system or component (e.g., security pro- cedures, hardware design, internal controls) that could be exploited, attacked or fail. Vulnerabilities include susceptibility to physical dangers, such as fire or water, unauthor- ized access to sensitive data, entry of erroneous data, denial of timely service, fraud, etc. Wide Area Network (WAN) - A network that uses high-speed, long-distance communi- cations technology (e.g., phone lines and satellites) to connect computers over long dis- tances. Similar to a LAN, except that parts of a WAN are geographically dispersed, pos- sible in different cities or even on different continents. Public carriers like telecommuni- cations carriers are included in most WANs; very large WANs may have incorporate sat- ellite stations or microwave towers. Warm Site - An alternate processing site which is only partially equipped (As compared to Hot Site which is fully equipped). Web cache - A Web cache fills requests from the Web server, stores the requested in- formation locally, and sends the information to the client; the next time the web cache gets a request for the same information, it simply returns the locally cached data instead of searching over the Internet, thus reducing Internet traffic and response time. Web site - A location on the World Wide Web that is owned and managed by an individ- ual, company or organization; usually contains a home page and additional pages that in- clude information provided by the site's owner, and may include links to other relevant sites. World Wide Web (WWW) - A global hypertext system operating on the Internet that enables electronic communication of text, graphics, audio, and video. March 26 2014 Page 35 Robinson Supply Contingency Plan Worm - A complete program that propagates itself from system to system, usually through a network or other communication facility. A worm is similar to a virus. It is able to infect other systems and programs usually by spawning copies of itself in each computer's memory. A worm differs from a virus, in that a virus replicates itself, while a worm does not. A worm copies itself to a person's workstation over a network or through a host computer and then spreads to other workstations. A worm might duplicate itself in one computer so often that it causes the computer to crash. Sometimes written in separate segments, a worm is introduced surreptitiously into a host system, either for fun or with intent to damage or destroy information. It can easily take over a network, as the "internet" worm did. The "internet" worm was intentionally released into the ARPANET (predecessor to the internet) by Robert Morris in 1976, as an experiment. Unlike a trojan horse, a worm enters a system uninvited. XOR engine: Process or set of instructions that calculates data bit relationships in a RAID subsystem. 8 APPENDICES All the items in this section should receive a separate appendix. In many cases infor- mation will be generated from the IMS database. Frequent updates and reviews should be made for this data. A printed copy should be made for inclusion in the Contingency Plan. However, as this is the dynamic information, the official record should be the IMS. Access to the IMS should be available from outside the ROBINSON SUPPLY HYANNIS normal operation location. IMS data should be stored in a location geographically sepa- rate from ROBINSON SUPPLY offices. A means to access this data from alternate loca- tions should be in place and tested. March 26 2014 Page 36 Robinson Supply Contingency Plan APPENDIX A-CONTINGENCY PLAN CONTACT INFORMATION WILLIAM OBIN CEO POLICE 911 Fire Dept.911 Barnstable Heath Dept. 508-642-8717 508-775-0812 508-362-3312 508-862-4644 Eugene Oldham III BOM Omni Security DEP 24 Hr Spill Hotline 508-971-5829 978-465-5000 888-304-1133 Gautam Ganapathy Br Mgr. Servpro Emergency Contractors Oceanside Restoration 781-775-6250 508-534-8791 508-281-1065 877-332-3282 Michael Mansanii 781-500-1046 Peter Pells 508-280-5234 James Steeves 508-367-3142 James Field 508-364-0416 Richard Gacek 774-328-222 March 26 2014 Page 37 Robinson Supply Contingency Plan APPENDIX B - EMERGENCY PROCEDURE ALL EMPLOYEEES OF ROBINSON SUPPLY HYANNIS EXIT in a safely manner TO SAFE LOCATION AT SIDE OF BUILDING BY THE EMPLOYEE PARKING LOT FOR HEAD COUNT March 26 2014 Page 38 Robinson Supply Contingency Plan APPENDIX C — TEAM STAFFING AND TASKING za To be carried out by employees if spill, occurs at Robinson Supply Hyannis Ro le Name Contingency Plan Coordinator (Br Mgr.) G.GANAPATHY Damage Assessment Team 91 Mike M&James F Damage Assessment team #2 James S&Rich G Pre-Contingency Action I put on safety gear Action 2assess the environment Disaster Contingency Immediate Response Action 1 de loy spill kit if spill had occurred Action 2call the corporate office and emergency authorities. Post-Contingency Action ]make sure clean up area secure Action 2account for all employee personal March 26 2014 Page 39 Robinson Supply Contingency Plan APPENDIX D -ALTERNATE SITE PROCEDURES The safe area is the front of building and or employee parking lot in the event of explo- sion or fire or a chemical spill at store. The head count will be done and calls to corporate offices and the proper authorities will be made from this location March 26 2014 Page 40 Robinson Supply Contingency Plan APPENDIX E - CONTINGENCY LOG This Robinson Supply Hyannis Contingency Plan was created to help preserve the lives of the employees and customers in a hazardous situation. In the event of such a situation fire, power failures, chemical spills or explosions. All staff are asked to exit the building in a safe manner and escort anyone who maybe injured due to the occurrence. Call the proper authorities ASAP March 26 2014 Page 41 t i Isla �. � 'Ft oz C�c'�tt36�4SH�� t 4 3 : Ob1 `a ,. -pat& i i k � l � F l r S IN D i q p a-....w.._ w..., - ....,.rA�..mo...m �'�1.•✓..mwn�...:.eM..rs.,.v.aAp::.. # i K s , A r -owl }