Oldest pages
Showing below up to 50 results starting with #1.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- 3) Organizational Infrastructure (00:05, 22 September 2013)
- 4) Digital Object Management (00:17, 22 September 2013)
- 5) Infrastructure and Security Risk Management (00:20, 22 September 2013)
- 5.1.1 Identify and manage the risks to its preservation operations and goals associated with system infrastructure (15:28, 23 September 2013)
- 5.1.1.1 Employ technology watches or other technology monitoring notification systems (15:29, 23 September 2013)
- 5.1.1.1.1 Hardware technologies appropriate to the services it provides to its designated communities (15:31, 23 September 2013)
- 5.1.1.1.2 Procedures in place to monitor and receive notifications when hardware technology changes are needed (15:32, 23 September 2013)
- 5.1.1.1.3 Procedures in place to evaluate when changes are needed to current hardware (15:33, 23 September 2013)
- 5.1.1.1.4 Procedures, commitment and funding to replace hardware when evaluation indicates the need to do so (15:34, 23 September 2013)
- 5.1.1.1.6 Procedures in place to monitor and receive notifications when software changes are needed (15:37, 23 September 2013)
- 5.1.1.1.7 Procedures in place to evaluate when changes are needed to current software (15:38, 23 September 2013)
- 5.1.1.1.8 Procedures, commitment and funding to replace software when evaluation indicates the need to do so (15:39, 23 September 2013)
- 5.1.1.2 Adequate hardware and software support for backup functionality sufficient for preserving the repository content and tracking repository functions (15:42, 23 September 2013)
- 5.1.1.3 Effective mechanisms to detect bit corruption or loss (15:43, 23 September 2013)
- 5.1.1.3.1 Record and report to its administration all incidents of data corruption or loss, and steps shall be taken to repair/replace (15:43, 23 September 2013)
- 5.1.1.5 Defined processes for storage media and/or hardware change (e.g., refreshing, migration) (15:45, 23 September 2013)
- 5.1.1.6 Identified and documented critical processes that affect its ability to comply with its mandatory responsibilities (15:46, 23 September 2013)
- 5.1.1.6.1 Documented change management process that identifies changes to critical processes that potentially affect the repository's ability to comply with its mandatory responsibilities (15:47, 23 September 2013)
- 5.1.1.6.2 Process for testing and evaluating the effect of changes to the repository's critical processes (15:48, 23 September 2013)
- 5.1.2.1 Mechanisms in place to ensure any/multiple copies of digital objects are synchronized (16:09, 23 September 2013)
- 5.2.1 Maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant (16:10, 23 September 2013)
- 5.2.2 Implemented controls to adequately address each of the defined security risks (16:11, 23 September 2013)
- 5.2.3 Staff shall have delineated roles, responsibilities, and authorizations related to implementing changes (16:12, 23 September 2013)
- 5.2.4 Suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information together with an offsite copy of the recovery plan(s) (16:13, 23 September 2013)
- 4.1.1 Identify content information and information properties (16:16, 23 September 2013)
- 4.1.1.1 Procedures for identifying information properties that we will preserve (16:19, 23 September 2013)
- 4.1.1.2 Record of content information and information properties that we will preserve (16:21, 23 September 2013)
- 4.1.2 Specify content information at deposit (16:21, 23 September 2013)
- 4.1.3 Recognition and parsing of SIPs (17:33, 23 September 2013)
- 4.1.4 Verify the identity of the Producer (17:36, 23 September 2013)
- 4.1.5 Verify SIPs for completeness and correctness (17:37, 23 September 2013)
- 4.1.6 Obtain sufficient control over digital objects (17:39, 23 September 2013)
- 4.1.7 Provide depositor with responses (17:40, 23 September 2013)
- 4.1.8 Records of actions and processes related to acquisition (17:42, 23 September 2013)
- 4.2.1 Associated definition for each AIP or class of AIPs (17:54, 23 September 2013)
- 4.2.1.1 Identify which definition applies to which AIP (17:58, 23 September 2013)
- 4.2.1.2 Definition of each AIP (18:03, 23 September 2013)
- 4.2.2 Description of how AIPs are constructed from SIPs (18:05, 23 September 2013)
- 4.2.3 Document final disposition of all SIPs (18:06, 23 September 2013)
- 4.2.3.1 Procedures if a SIP is not incorporated or discarded (18:07, 23 September 2013)
- 4.2.4 Convention that generates persistent, unique identifiers for AIPs (18:35, 23 September 2013)
- 4.2.4.1 Uniquely identify each AIP (18:36, 23 September 2013)
- 4.2.4.1.1 Have unique identifiers (18:37, 23 September 2013)
- 4.2.4.1.2 Assign and maintain persistent identifiers of the AIP and its components (18:39, 23 September 2013)
- 4.2.4.1.3 Describe any processes for changes to identifiers (18:40, 23 September 2013)
- 4.2.4.1.4 Provide a list of all identifiers and check for duplications (18:41, 23 September 2013)
- 4.2.4.1.5 System of identifiers is adequate now and in the future (18:42, 23 September 2013)
- 4.2.4.2 System of reliable linking/resolution services in order to find identified objects (18:43, 23 September 2013)
- 4.2.5 Tool and resources to provide authoritative Representation Information for all objects (18:45, 23 September 2013)
- 4.2.5.1 Tools or methods to identify the file types of all objects (18:48, 23 September 2013)