Rationarium Disaster Recovery Plan

Effective Date: January 1, 2026 Review Cycle: Annual Plan Owner: Chief Executive Officer / Chief Technology Officer, Rationarium Inc. Last Documented Review: December 9, 2025

Purpose

This plan describes how Rationarium Inc. detects, responds to, and recovers from unplanned disruptions to its WeBWorK hosting services, and defines recovery objectives that customers can rely on when planning their own continuity obligations.

Scope

This plan covers all production WeBWorK hosting environments operated by Rationarium Inc., including:

Recovery Objectives

ObjectiveTargetMeasured From
Recovery Point Objective (RPO)≤ 24 hoursLast successful nightly backup
Recovery Time Objective (RTO) — single instance≤ 60 minutesIncident declared
Recovery Time Objective (RTO) — multi-instance or regional event≤ 48 hoursIncident declared
Customer Notification Time≤ 4 hoursIncident confirmed

Threats Covered

Data Protection Controls

All customer environments use the following protections:

  1. Nightly encrypted backups of the WeBWorK database and the WeBWorK root directory (courses, templates, user uploads), with a seven-day rolling retention. Backup integrity is verified at capture time.
  2. VM snapshot images maintained at DigitalOcean for each customer instance. Snapshots are refreshed after significant configuration or software changes.
  3. Off-box backup storage separate from the production virtual machine, so that a host-level compromise cannot destroy both the live data and the backups.
  4. Infrastructure-as-code artifacts — Docker compose files, installation scripts, and configuration templates — retained in version control.

Recovery Procedures

Scenario A — Single VM Failure

  1. Incident detected via the monitoring stack or a customer report.
  2. The failed instance is assessed; where recoverable, services are restarted via the automated watchdog (status-check.sh).
  3. If the virtual machine is unrecoverable, a replacement VM is provisioned from the most recent snapshot image.
  4. The latest nightly database backup is restored.
  5. DNS, TLS, and LMS integrations are verified.
  6. The customer is notified of restoration and any data-loss window.

Target RTO: 60 minutes from incident declaration.

Scenario B — DigitalOcean nyc3 Regional Event

  1. Incident detected via the monitoring stack or DigitalOcean status notifications.
  2. Replacement infrastructure is provisioned in an alternate DigitalOcean region (for example nyc1 or sfo3) or, if DigitalOcean is unavailable, at a backup hosting provider.
  3. Latest off-box backups are deployed to the new environment.
  4. Customer DNS records are updated to point to the new endpoints.
  5. LMS integration credentials and callbacks are reissued or migrated as needed.
  6. Customers are notified as each instance is restored.

Target RTO: 48 hours from incident declaration, contingent on backup-provider capacity.

Scenario C — Intra-Instance Data Loss

  1. The customer reports loss — for example, an accidental course deletion, bulk grade overwrite, or corrupted import.
  2. Relevant tables or directories are restored from the most recent nightly backup into a staging environment.
  3. Affected data is merged or replaced in the live instance in coordination with the customer administrator.
  4. A post-incident review is conducted with the customer.

Target RTO: Varies by complexity; typically four hours from request to remediation.

Communication

Testing

Rationarium tests components of this plan on a rolling basis rather than through a single annual full test. The following activities constitute ongoing plan exercise:

Last documented plan review and component test: April 9, 2026.

Roles and Responsibilities

Rationarium’s operating scale consolidates disaster-recovery responsibilities in the CEO/CTO role:

Standards Alignment

This plan aligns with the disaster-recovery practices described in NIST SP 800-34 Rev. 1 (Contingency Planning Guide for Federal Information Systems), scaled to Rationarium’s size and risk profile.

Review

This plan is reviewed annually and updated following any material incident, architectural change, or change of hosting provider.