Business Continuity and Disaster Recovery Procedure.docx
Business Continuity and Disaster Recovery Procedure |
Document information and change log
Document Information
Header | Information |
Next review | Dec 22, 2026 |
Status | Annual Review |
Regional scope & language | Territory of USA in English |
Applies to entities | GiveCorporation Inc. |
Overall responsibility | Loraine Stewart, CCO |
Approved by | Joshua Rowley, CEO; Aaron Miller, CRTO; Michael Brinker, CBFO |
Change log
Date | Version | Reason for version |
Sep 1, 2017 | 1.0 | Initial Release |
Sep 1, 2018 | 2.0 | Annual Review |
Sep 1, 2019 | 3.0 | Annual Review |
Sep 1, 2020 | 4.0 | Annual Review |
Sep 1, 2021 | 5.0 | Annual Review |
Sep 1, 2022 | 6.0 | Annual Review |
Aug 19, 2023 | 7.0 | Annual Review & Updates PCI Level 1 4.0 & DSS 4 |
Dec 23, 2024 | 8.0 | Annual Review |
Dec 22, 2025 | 9.0 | Annual Review |
Gender And Entity Neutrality
The masculine form is used solely for the sake of better readability. It always refers to persons of any gender identity (m/f/diverse). This document uses the abbreviation “Give” for all legal entities and subsidiaries.
Table of Contents
Key Systems and Disaster Recovery 4
Production and CHD (Cardholder Data) Network 4
Onboarding and Payment Processing Platform 5
Payment Gateways Integration 5
Settlement and Payout Engines 5
Risk Management and Fraud Detection 6
Security Incident Detection and Reporting 7
Incident Response Team (IRT) 7
Incident Response Coordinator (IRC) 7
Web Application Security Team 8
Plan Review and Maintenance 10
Inappropriate Stored Cardholder Data 10
Containment and Eradication 10
Plan Review and Maintenance 11
Physical locations and testing 11
Alternative Physical Location of Employees 11
Business Impact Analysis (BIA) 12
Critical Applications and Systems 12
EKS Hosted Web Application (Critical Application) 12
AWS RDS Database (Critical System) 13
AWS Key Management System (KMS) (Critical Component) 13
Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) 13
AWS Service Specific RTOs/RPOs 13
Staffing Considerations for BC/DR 14
Disaster Recovery Responsibilities 14
Definition of Bankruptcy Proceedings 15
Give’s Financial Distress or Bankruptcy 15
Bank Failure 16
Appendix A: Contact List for Disaster Recovery Team 17
Appendix B: Evacuation Map and Routes 18
Introduction
The ability of GiveCorporation (“Give”) to effectively manage and respond to unforeseen disruptions and disasters is paramount. This Business Continuity and Disaster Recovery (BCDR) Procedure outlines our commitment to ensuring the continued delivery of critical services, safeguarding customer trust, and minimizing the impact of any potential disruptions on our operations.
Purpose
The purpose of this document is to establish a business continuity plan and process to detect, analyze, contain and recover from disasters and security incidents that may impact the confidentiality, integrity, and availability of Give’s networks and data.
Scope
This procedure applies to all employees, contractors, vendors, and other parties who use Give’s network and data resources. There will be resources available 24/7 to respond to disaster and security incidents where they may be reached by electronic communication or telephone. Incident response plan shall be tested at least annually by appropriate (“Incident Response Procedure”) IRP team members. This policy covers a wide range of scenarios, including natural disasters such as snowstorms, pandemics, power outages as well as cyberattacks, employee safety incidents and other unforeseen events, and financial distress situations including bankruptcy. This plan is designed to minimize financial loss to the institution, continue to serve customers and financial market participants, and mitigate the negative effects disruptions can have on our strategic plans, reputation, operations, liquidity, credit quality, market position, and ability to remain in compliance with applicable laws and regulations.
Key Systems and Disaster Recovery
Production and CHD (Cardholder Data) Network
Infrastructure
- Secure and continuous operation of core payment systems.
- DR: Redundant hardware in geographically separate locations to ensure uptime.
Cardholder Data Handling
- Secure storage and transmission mechanisms compliant with PCI DSS.
- DR: Regularly tested encryption protocols and immediate fallback to backup transmission routes.
Backup and Recovery
- Data redundancy and swift recovery systems.
- DR: Periodic backup tests and off-site storage for critical data.
Integration APIs and SDKs
- Tools for third-party access and usage.
- DR: Version control and rollback capabilities.
Communication
- Infrastructure for confirmations and payment alerts.
- DR: Secondary communication channels and backup notification systems.
Onboarding and Payment Processing Platform
Onboarding Portals
- Platforms for seamless sub-merchant integration.
- DR: Cloud-based backup portals to ensure continuous onboarding.
KYC and AML Checks
- Automated validation during onboarding.
- DR: Manual verification processes as a backup.
Payment Processing
- Software for transaction management.
- DR: Secondary processing systems or partnerships with backup processors.
Payment Gateways Integration
- For payment detail transmissions.
- DR: Pre-established agreements with alternative gateways.
Settlement and Payout Engines
- Fund distribution systems.
- DR: Manual settlement processes in place as a contingency.
Risk Management and Fraud Detection
Transaction Screening
- Real-time systems for fraud detection.
- DR: Pre-set rules for manual transaction verification during system downtime.
Chargeback Management
- Tools for dispute resolutions.
- DR: Backup databases of dispute histories and manual resolution protocols.
Analytics Platforms
- Insights into transaction patterns.
- DR: Backup reporting tools and off-site data storage for analytics.
Databases
Payment Data Storage
- Databases with encrypted or tokenized sensitive data.
- DR: Regularly backed up databases in secure, off-site locations with rapid restore capability.
Merchant & Transaction Info
- Storage systems for essential operational data.
- DR: Database replication and mirroring for swift recovery.
Compliance Documentation
- Storage for user rights, data handling protocols, etc.
- DR: Digital and physical backups of critical compliance documentation.
Key Personnel
Role Identification
- Clearly defined roles and responsibilities for vital operations.
- DR: Succession plans detailing temporary or permanent replacements for key roles.
Operational Knowledge
- Understanding of critical systems, partnerships, and business nuances.
- DR: Cross-training initiatives to ensure multiple individuals are familiar with critical operations.
Decision Making
- Authority and capability to make significant decisions during crises.
- DR: Pre-established delegation of authority structures to ensure continuous decision-making capabilities.
Communication
- Responsibility to communicate with stakeholders, partners, and employees during disruptions.
- DR: Backup spokespersons and predefined communication templates for various scenarios.
Access Control
- Key personnel having access to critical systems and data.
- DR: Secure backup access methods and multi-factor authentication to prevent unauthorized access.
Security Incident Detection and Reporting
Security incidents may be detected by automated systems, reports from users or customers, or other means. Anyone who suspects a security incident should report it to the (“Incident Response Coordinator”) IRC at aaron@givecorporation.com or the IRT team at irt@givecorporation.com immediately.
Incident Response Team (IRT)
The IRT is responsible for investigating and responding to security incidents.
As soon as an incident is alerted, discovered, suspected; an email should immediately be sent to the IRT team at irt@givecorporation.com.
The IRT is composed of the following individuals or teams:
Incident Response Coordinator (IRC)
- The IRC is responsible for coordinating the response to a security incident,
- The IRC will be the primary contact for all incident related communication.
Network Team
hosni@givecorporation.com[a]
- The Network Team is responsible for overseeing all network-related aspects of the incident response process.
- The Network Team will ensure that network devices are properly configured and that all network traffic is monitored and analyzed for potential security incidents.
- The Network Team will provide recommendations for containment, eradication, and recovery effort in regards to the network, security, backups, AWS resources, database.
Web Application Security Team
abdoo@givecorporation.com[b][c][d]
- The Web Application Security Team is responsible for conducting technical analysis of security incidents having to do with the Web Application.
- The Web Application Security Team will provide recommendations for containment, eradication, and recovery effort in regards to the web application and database.
Compliance Lead
loraine@givecorporation.com
- The Compliance Lead will provide guidance on compliance-related matters throughout the incident response process.
- The Compliance Lead will provide status updates to key stakeholders and communicate important information throughout the incident response process.
Operations Lead
- The Operations Lead is responsible for coordinating operational activities during a security incident.
- The Operations Lead will ensure that all necessary resources are available to support the incident response process and as necessary implement system wide security measures such as User password changes and 2FA re-authentications.
Alerts
Any security event that triggers an alert having to do with the network or AWS resources should be sent to the IRT and logged in CloudWatch and/or CloudTrail.
Alerts may include but not limited to the following:
- Changes to operating system time configuration, files and NTP
- Change detection to critical files
- AWS GuardDuty High Severity Findings
- AWS VPC Flow Logs detecting DDoS, IP Spoofing, frequent failed attempts to access resources
- Amazon Inspector Critical and High Vulnerabilities
- IAM unusual login locations, failed login attempts, privilege escalation, creation of new IAM users, disabling of MFA
- WAF Block and Alert Events for DDoS, SQL injection and XSS attempts
Triage
The IRC, Network Team and Web Application Security Team will perform an initial assessment of the reported incident to determine its severity and scope. This sub-team of the IRC will collectively be called the IAT (Initial Assessment Team).
The IAT will classify incidents based on its impact and level of severity. Depending on the impact and level of severity the IRC will determine if the entire IRT needs to be involved.
Investigation
- The IAT will conduct a detailed analysis of the incident.
- The IAT will gather evidence and perform forensics as necessary.
- The IRC may request additional information and review all evidence gathered.
Containment and Eradication
- The IRT will work to contain the incident and prevent further damage.
- The IAT will recommend actions to eradicate the incident.
- If necessary, the Operations Lead will coordinate all necessary activities outside the engineering team to contain the incident.
Recovery
- The IRT will work to restore systems and data to their pre-incident state.
- The IAT will recommend actions to prevent future incidents.
- If necessary, the Operations Lead will coordinate all necessary activities to support the recovery effort.
Reporting
- The IRT will document the incident and all actions taken to respond to it.
- The Compliance Lead will report the incident to appropriate stakeholders, as necessary.
Communication
- The IRC will determine if an incident needs to be communicated to stakeholders.
- The Compliance Lead will be responsible for all incident-related communications.
Plan Review and Maintenance
- The Incident Response Procedure will be reviewed and updated annually.
- Any changes to the plan will be communicated to all relevant stakeholders.
- Lessons learned will append the incident response plan if necessary to adapt to new industry threats.
Inappropriate Stored Cardholder Data
In the event that cardholder data is found outside of the appropriate provisioned areas, the following process will be performed to eradicate the inappropriately stored data and prevent the issue from occurring again.
Investigation
- The IAT will conduct a detailed analysis of the potential leak of cardholder data.
- The IAT will gather evidence and perform forensics as necessary.
- The IRC may request additional information and review all evidence gathered.
Containment and Eradication
- The IRT will work to contain the incident and prevent further inappropriate storage.
- The IAT will recommend actions to eradicate the incident. This includes a secure delete operation and appropriate safety measures to prevent propagation of cardholder data.
- If necessary, the Operations Lead will coordinate all necessary activities outside the engineering team to contain the incident.
Recovery
- The IRT will work to restore systems and data to appropriate order.
- The IAT will recommend actions to prevent future incidents.
- If necessary, the Operations Lead will coordinate all necessary activities to support the recovery effort.
Reporting
- The IRT will document the incident and all actions taken to respond to it.
- The Compliance Lead will report the incident to appropriate stakeholders, as necessary.
Communication
- The IRC will determine if an incident needs to be communicated to stakeholders.
- The Compliance Lead will be responsible for all incident-related communications.
Plan Review and Maintenance
- The Incident Response Procedure will be reviewed and updated annually.
- Any changes to the plan will be communicated to all relevant stakeholders.
- Lessons learned will append the incident response plan if necessary to adapt to new industry threats.
Physical locations and testing
Alternative Physical Location of Employees
In the event of a significant business disruption impacting Give’s office at 3200 E Camelback Rd., STE 275, Phoenix, AZ 85018, the company will move to a back-up location at 1020 E Missouri Ave, Phoenix, AZ 85014. Alternatively, and preferably, Give may decide for staff to work from a remote location. In this event, Give will maintain a list of employees working locations and contact information.
Evacuation Plan
The detailed evacuation procedures are outlined in Appendix B of this document. This plan includes specific routes and exits to be used in different types of emergencies. The highest manager role on a day of emergency is responsible for leading all employees to the respective exits. In case no manager is present, all employees follow the designated evacuation signs present in the building. It is imperative that all employees familiarize themselves with these procedures and the layout of evacuation routes, which are clearly marked and regularly inspected for accessibility and safety. In addition to the outlined procedures, Give is committed to conducting regular evacuation drills to ensure that all staff members are prepared in the event of an actual emergency. These drills will be held annually and will be mandatory for all employees. The drills will be supervised and evaluated to identify any areas for improvement in the evacuation procedures.
Annual Failover Testing[e][f][g][h]
Give will conduct an annual failover test of its business continuity and disaster recovery procedures to determine whether any modifications are necessary in light of changes to the company’s operations, structure, business, or location. The test must be designed to ensure that the company can continue to provide critical financial services in the event of an unexpected disruption. During the testing, a comprehensive review of the company’s data backup and recovery procedures, all mission-critical systems, financial and operational assessments, alternate communications between customers and the bank, alternate communications between the bank and its employees, alternate physical location of employees, critical business constituents, bank, and counter-party impact, and regulatory reporting is conducted.
Business Impact Analysis (BIA)
Introduction to BIA
The BIA is integral to Give’s BCDR policy, specifically addressing the resilience of our AWS hosted services. It identifies critical operations, services, and assets to establish RTOs and RPOs, which guide our recovery strategies. This section covers Critical Applications and Systems, critical assets, Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), and Staffing Considerations for BCDR.
Critical Applications and Systems
EKS Hosted Web Application (Critical Application)
Function: Serves as the primary interface for customer interactions and transactions.
RTO: 2 hours
RPO: 15 minutes
Justification: The application's availability is crucial to maintain uninterrupted customer service and support business operations.
AWS RDS Database (Critical System)
Function: Stores all transactional data for the web application.
RTO: 1 hour
RPO: 5 minutes
Justification: The integrity of transaction data is essential for order processing and reporting.
AWS Key Management System (KMS) (Critical Component)
Function: Manages encryption keys for securing sensitive data.
RTO: 4 hours
RPO: 24 hours
Justification: KMS is critical for security but can tolerate a longer RTO as keys are less likely to require immediate rotation/recovery.
Critical Assets
AWS Network Infrastructure
Components: VPC, Internet Gateways, Route Tables, Network ACLs, Subnets.
Asset Description: Backbone of the cloud environment supporting the EKS cluster and web application.
Ownership: Managed by Give Corporation’s Cloud Operations Team.
EKS Cluster Configuration
Configuration Details: Node types, pod configurations, auto scaling settings.
Storage: EBS volumes for persistent storage across cluster nodes.
Backup: Snapshot and backup configurations managed by AWS Backup services.
Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs)
AWS Service Specific RTOs/RPOs
EKS Web Application: RTO of 2 hours, RPO of 15 minutes.
RDS Database: RTO of 1 hour, RPO of 5 minutes.
AWS KMS: RTO of 4 hours, RPO of 24 hours.
Staffing Considerations for BC/DR
Cloud Infrastructure Team
Roles include DevOps Engineers and Network Administrators.
Responsibilities: Implementing recovery strategies, restoring services, and managing AWS configurations during an incident.
Disaster Recovery Responsibilities
Disaster Recovery Lead: Initiates and oversees the DR process within the AWS environment.
Network Administrators: Ensures the web application’s return to operational status.
DevOps Engineer: Focus on restoring RDS instances and ensuring data integrity.
Bankruptcy Management
Overview
This chapter outlines procedures and policies to be followed in the event of financial distress or bankruptcy of either Give or its sub-merchants. The primary aim is to ensure the safeguarding of funds, the continuity of operations, and the minimization of disruptions to all stakeholders involved.
Definition of Bankruptcy Proceedings
Under this policy, "Bankruptcy Proceeding" encompasses:
- The initiation by or against Give or any of its sub-merchants of any bankruptcy, receivership, insolvency, reorganization, dissolution, liquidation, or any similar legal process.
- The institution of such proceedings against a party that are not dismissed within sixty (60) days.
- Any assignment made for the benefit of creditors, or any offer of settlement, extension, or composition made to creditors generally.
- The appointment of a trustee, conservator, receiver, or similar fiduciary for Give or a significant portion of its assets.
Give’s Financial Distress or Bankruptcy
Safeguarding of Funds: Give will take all necessary steps to ensure that funds processed on behalf of sub-merchants are segregated and protected from creditors in the event of bankruptcy. These funds will be held in trust accounts as per regulatory requirements.
Operational Continuity: Give is committed to maintaining operational capabilities to process payments with minimal disruption. This includes:
- Engaging in interim management solutions.
- Exploring the possibility of business reorganization.
- Notifying all stakeholders, including sub-merchants, of the bankruptcy proceedings and the steps being taken to ensure continuity or orderly wind-down.
Disbursement of Funds: The procedures for distributing funds held on behalf of sub-merchants will adhere to the directives issued by the bankruptcy court. This approach guarantees that all parties receive fair and equitable treatment throughout the process, aligning with the established principles and regulations governing bankruptcy proceedings.
Sub-Merchant Bankruptcy
Handling of Funds: Upon learning of a sub-merchant's bankruptcy, Give will review the status of held funds for that sub-merchant. Actions will comply with bankruptcy laws to either return these funds to the sub-merchant, disburse them to lawful claimants, or hold them as required by the bankruptcy court. This ensures a lawful and orderly process in handling the sub-merchant's funds during bankruptcy proceedings.
Liabilities and Chargebacks: Give will manage outstanding liabilities and chargebacks in accordance with merchant agreements and the directives of the bankruptcy court. This includes setting aside reserves for potential chargebacks and disputes to ensure that all financial obligations are met in a manner that is fair and compliant with legal requirements.
Operational Procedures: Give will implement mechanisms for dealing with the customers of the bankrupt sub-merchant, including notifications and the handling of pending transactions. This may involve coordination with other payment processors or financial institutions to ensure minimal disruption to customer transactions, adhering to a structured approach that respects the legal framework of bankruptcy proceedings.
Legal and Compliance
Give will ensure full compliance with all relevant laws and regulations, including those governing bankruptcy proceedings. This encompasses the filing of necessary notices, claims, and documents with the bankruptcy courts, as well as adherence to any court orders or directives. This commitment to legal and regulatory compliance ensures that Give operates within the framework established for financial distress and bankruptcy situations.
Bank Failure
In the case of a bank failure, Give’s strategy is to utilize a local community bank that accesses the IntraFi network. This provides multi-million dollar FDIC insurance, which exceeds the standard per-merchant account coverage.
Conclusion
This bankruptcy management policy is designed to protect the interests of all parties involved, including Give, its sub-merchants, and their respective customers, in the event of financial distress or bankruptcy. By establishing a clear and actionable framework, it ensures adherence to the principles of American law, fostering an environment of transparency, fairness, and continuity in operations.
Appendix A: Contact List for Disaster Recovery Team
CRTO / Disaster Recovery Lead: Aaron Miller, aaron@givecorporation.com
Lead DevOps Engineer: Marian Kopriva, marian@givecorporation.com
Senior Network Administrator: Youcef Elmerebi, youcef@givecorporation.com
Appendix B: Evacuation Map and Routes
The information contained herein is intended to provide a general overview of the Company’s policies and procedures relating to compliance with this Policy and does not constitute legal advice or a complete description of the laws and regulations relating to this Policy. The Company has made every effort to ensure the accuracy and completeness of this Policy. This document is intended to provide guidance to employees of Company on how to comply with applicable laws and regulations related to this Policy. Employees should consult with the Legal or Compliance Department if they have any questions about the Policy or how to comply with it. The Company reserves the right to modify or update this Policy at any time without notice. Employees are responsible for reviewing the Policy on a regular basis to ensure that they are aware of any changes. This Policy applies to all employees of Company, regardless of their position or location unless stated otherwise in the Policy. Employees are responsible for complying with the Policy and for reporting any suspected violations to their respective supervisor, the Legal Department, AMLCO or respective recipient of such violation as outlined in this Policy.
Copyright © GiveCorporation Inc. All Rights Reserved
[a]Is Hosni gone?
[b]Is Abdoo still here?
[c]Yes, you can remove him
[d]Thank you. Go enjoy your vacation.
[e]When did we do this last?
[f]What we’re doing on annual basis is a DR recovery test. We did it in october 2025 last time.The test validated our AWS RDS automated backup and restoration process, including restoring a new instance from snapshot and verifying data integrity against production.
[g]_Marked as resolved_
[h]_Re-opened_