In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are cited in the bibliography.