In larger organizations, consortia of organizations, or public agencies, the set of people, policies, procedures, technologies, and information necessary to detect, react, and recover from an incident that could potentially result in unwanted modification, damage, destruction, or disclosure of the organization's information; in other organizations, a loose or informal association of IT and InfoSec staffers who are called up if an attack on the information assets within the scope of the CSIRT is detected. An exclusive site resumption strategy that consists of a fully configured computer facility, with all services, communications links, and physical plant operations, capable of establishing operations at a moment's notice. Hot sites duplicate computing resources ( servers, appliances, and support computers), peripherals, phone systems, applications, and workstations. Those disasters caused by natural occurrences, such as fire, flood, earthquake, lightning, landslide, tornado, hurricane, tornado, tsunami, electrostatic discharge, dust, or excessive rainfall.