Pages that link to "CLOCKSS: Extracting Triggered Content"
The following pages link to CLOCKSS: Extracting Triggered Content:
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Main Page (← links)
- 3.3.3 Documented history of changes (← links)
- 3.5.2 Track and manage property rights/restrictions (← links)
- 5.1.1.2 Adequate hardware and software support for backup functionality sufficient for preserving the repository content and tracking repository functions (← links)
- 5.1.1.6 Identified and documented critical processes that affect its ability to comply with its mandatory responsibilities (← links)
- 4.3.3 Mechanisms to change preservation plans as a result of its monitoring activities (← links)
- 4.3.4 Provide evidence of the effectiveness of its preservation activities (← links)
- 4.4.2.1 Procedures for all actions taken on AIPs (← links)
- 4.4.2.2 Demonstrate that any actions taken on AIPs were compliant with the specification of those actions (← links)
- 4.5.1 Specify minimum information requirements to enable the Designated Community to discover and identify material (← links)
- 4.6.1 Comply with Access Policies (← links)
- 4.6.1.1 Log and review all access management failures and anomalies (← links)
- 4.6.2 Follow policies and procedures that enable the dissemination of digital objects that are traceable to the originals (← links)
- 4.6.2.1 Record and act upon problem reports about errors in data and responses from users (← links)
- CLOCKSS: Preservation Strategy (← links)
- CLOCKSS: Access Policy (← links)
- CLOCKSS: Mandatory Responsibilities (← links)
- Definition of DIP (← links)
- Definition of SIP (← links)
- Definition of AIP (← links)
- LOCKSS: Extracting Bibliographic Metadata (← links)
- CLOCKSS: Ingest Pipeline (← links)
- CLOCKSS: Threats and Mitigations (← links)