Short pages

Jump to: navigation, search

Showing below up to 50 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎5.1.1.1.7 Procedures in place to evaluate when changes are needed to current software ‎[240 bytes]
  2. (hist) ‎5.1.1.1.3 Procedures in place to evaluate when changes are needed to current hardware ‎[251 bytes]
  3. (hist) ‎3.3.2 Preservation policies ‎[262 bytes]
  4. (hist) ‎3.1.2 Preservation strategic plan ‎[270 bytes]
  5. (hist) ‎3.1.1 Mission statement ‎[281 bytes]
  6. (hist) ‎3.1.3 Collection policy ‎[281 bytes]
  7. (hist) ‎4.2.4.2 System of reliable linking/resolution services in order to find identified objects ‎[300 bytes]
  8. (hist) ‎4.1.1.2 Record of content information and information properties that we will preserve ‎[310 bytes]
  9. (hist) ‎4.1.2 Specify content information at deposit ‎[310 bytes]
  10. (hist) ‎4.1.1.1 Procedures for identifying information properties that we will preserve ‎[312 bytes]
  11. (hist) ‎3.3.1 Designated community ‎[328 bytes]
  12. (hist) ‎4.2.4.1 Uniquely identify each AIP ‎[337 bytes]
  13. (hist) ‎3.1.2.1 Succession, contigency, escrow plans ‎[345 bytes]
  14. (hist) ‎3.1.2.2 Monitor environment for time to deploy succession, contingency, escrow ‎[345 bytes]
  15. (hist) ‎4.2.4.1.1 Have unique identifiers ‎[368 bytes]
  16. (hist) ‎4.1.1 Identify content information and information properties ‎[371 bytes]
  17. (hist) ‎4.1.7 Provide depositor with responses ‎[414 bytes]
  18. (hist) ‎4.1.8 Records of actions and processes related to acquisition ‎[414 bytes]
  19. (hist) ‎4.2.1 Associated definition for each AIP or class of AIPs ‎[416 bytes]
  20. (hist) ‎5.1.1.1 Employ technology watches or other technology monitoring notification systems ‎[427 bytes]
  21. (hist) ‎4.4.2 Contemporaneous records of actions and administration processes that are relevant to storage and preservation of the AIPs ‎[435 bytes]
  22. (hist) ‎3.4.3 Risk, benefit, investment, expenditure ‎[442 bytes]
  23. (hist) ‎5.2.1 Maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant ‎[444 bytes]
  24. (hist) ‎3.5.1 Contracts or deposit agreements for content ‎[456 bytes]
  25. (hist) ‎4.2.3 Document final disposition of all SIPs ‎[456 bytes]
  26. (hist) ‎4.2.10 Contemporaneous records of actions and administration processes relevant to AIP creation ‎[463 bytes]
  27. (hist) ‎3.5.1.2 Completeness of agreements with depositors ‎[471 bytes]
  28. (hist) ‎3.3.5 Information integrity measurements ‎[477 bytes]
  29. (hist) ‎3.4.1 Business planning processes ‎[477 bytes]
  30. (hist) ‎5.2.2 Implemented controls to adequately address each of the defined security risks ‎[491 bytes]
  31. (hist) ‎3.5.1.1 Contracts or deposit agreements for preservation rights ‎[499 bytes]
  32. (hist) ‎4.2.4.1.3 Describe any processes for changes to identifiers ‎[500 bytes]
  33. (hist) ‎4.5.2 Capture or create minimum descriptive information for each AIP ‎[517 bytes]
  34. (hist) ‎4.2.4.1.2 Assign and maintain persistent identifiers of the AIP and its components ‎[520 bytes]
  35. (hist) ‎4.2.4.1.4 Provide a list of all identifiers and check for duplications ‎[541 bytes]
  36. (hist) ‎4.2.9 Independent mechanism for verifying the integrity of the content ‎[546 bytes]
  37. (hist) ‎5.2.4 Suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information together with an offsite copy of the recovery plan(s) ‎[553 bytes]
  38. (hist) ‎5.1.1.3 Effective mechanisms to detect bit corruption or loss ‎[565 bytes]
  39. (hist) ‎5.1.1.3.1 Record and report to its administration all incidents of data corruption or loss, and steps shall be taken to repair/replace ‎[565 bytes]
  40. (hist) ‎4.2.3.1 Procedures if a SIP is not incorporated or discarded ‎[569 bytes]
  41. (hist) ‎4.2.6.1 Documented processes for acquiring PDI ‎[579 bytes]
  42. (hist) ‎4.1.5 Verify SIPs for completeness and correctness ‎[618 bytes]
  43. (hist) ‎5.1.2.1 Mechanisms in place to ensure any/multiple copies of digital objects are synchronized ‎[627 bytes]
  44. (hist) ‎4.6.1.1 Log and review all access management failures and anomalies ‎[642 bytes]
  45. (hist) ‎4.4.1 Specifications for how the AIPs are stored down to the bit level ‎[652 bytes]
  46. (hist) ‎4.6.2 Follow policies and procedures that enable the dissemination of digital objects that are traceable to the originals ‎[658 bytes]
  47. (hist) ‎4.2.5 Tool and resources to provide authoritative Representation Information for all objects ‎[669 bytes]
  48. (hist) ‎3.5.1.3 Policies about preservation responsibility ‎[670 bytes]
  49. (hist) ‎3.2.1.2 Appropriate number of staff ‎[681 bytes]
  50. (hist) ‎4.2.6.2 Execute documented processes for acquiring PDI ‎[684 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)