Short pages
Showing below up to 50 results starting with #1.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- (hist) 5.1.1.1.7 Procedures in place to evaluate when changes are needed to current software [240 bytes]
- (hist) 5.1.1.1.3 Procedures in place to evaluate when changes are needed to current hardware [251 bytes]
- (hist) 3.3.2 Preservation policies [262 bytes]
- (hist) 3.1.2 Preservation strategic plan [270 bytes]
- (hist) 3.1.1 Mission statement [281 bytes]
- (hist) 3.1.3 Collection policy [281 bytes]
- (hist) 4.2.4.2 System of reliable linking/resolution services in order to find identified objects [300 bytes]
- (hist) 4.1.1.2 Record of content information and information properties that we will preserve [310 bytes]
- (hist) 4.1.2 Specify content information at deposit [310 bytes]
- (hist) 4.1.1.1 Procedures for identifying information properties that we will preserve [312 bytes]
- (hist) 3.3.1 Designated community [328 bytes]
- (hist) 4.2.4.1 Uniquely identify each AIP [337 bytes]
- (hist) 3.1.2.1 Succession, contigency, escrow plans [345 bytes]
- (hist) 3.1.2.2 Monitor environment for time to deploy succession, contingency, escrow [345 bytes]
- (hist) 4.2.4.1.1 Have unique identifiers [368 bytes]
- (hist) 4.1.1 Identify content information and information properties [371 bytes]
- (hist) 4.1.7 Provide depositor with responses [414 bytes]
- (hist) 4.1.8 Records of actions and processes related to acquisition [414 bytes]
- (hist) 4.2.1 Associated definition for each AIP or class of AIPs [416 bytes]
- (hist) 5.1.1.1 Employ technology watches or other technology monitoring notification systems [427 bytes]
- (hist) 4.4.2 Contemporaneous records of actions and administration processes that are relevant to storage and preservation of the AIPs [435 bytes]
- (hist) 3.4.3 Risk, benefit, investment, expenditure [442 bytes]
- (hist) 5.2.1 Maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant [444 bytes]
- (hist) 3.5.1 Contracts or deposit agreements for content [456 bytes]
- (hist) 4.2.3 Document final disposition of all SIPs [456 bytes]
- (hist) 4.2.10 Contemporaneous records of actions and administration processes relevant to AIP creation [463 bytes]
- (hist) 3.5.1.2 Completeness of agreements with depositors [471 bytes]
- (hist) 3.3.5 Information integrity measurements [477 bytes]
- (hist) 3.4.1 Business planning processes [477 bytes]
- (hist) 5.2.2 Implemented controls to adequately address each of the defined security risks [491 bytes]
- (hist) 3.5.1.1 Contracts or deposit agreements for preservation rights [499 bytes]
- (hist) 4.2.4.1.3 Describe any processes for changes to identifiers [500 bytes]
- (hist) 4.5.2 Capture or create minimum descriptive information for each AIP [517 bytes]
- (hist) 4.2.4.1.2 Assign and maintain persistent identifiers of the AIP and its components [520 bytes]
- (hist) 4.2.4.1.4 Provide a list of all identifiers and check for duplications [541 bytes]
- (hist) 4.2.9 Independent mechanism for verifying the integrity of the content [546 bytes]
- (hist) 5.2.4 Suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information together with an offsite copy of the recovery plan(s) [553 bytes]
- (hist) 5.1.1.3 Effective mechanisms to detect bit corruption or loss [565 bytes]
- (hist) 5.1.1.3.1 Record and report to its administration all incidents of data corruption or loss, and steps shall be taken to repair/replace [565 bytes]
- (hist) 4.2.3.1 Procedures if a SIP is not incorporated or discarded [569 bytes]
- (hist) 4.2.6.1 Documented processes for acquiring PDI [579 bytes]
- (hist) 4.1.5 Verify SIPs for completeness and correctness [618 bytes]
- (hist) 5.1.2.1 Mechanisms in place to ensure any/multiple copies of digital objects are synchronized [627 bytes]
- (hist) 4.6.1.1 Log and review all access management failures and anomalies [642 bytes]
- (hist) 4.4.1 Specifications for how the AIPs are stored down to the bit level [652 bytes]
- (hist) 4.6.2 Follow policies and procedures that enable the dissemination of digital objects that are traceable to the originals [658 bytes]
- (hist) 4.2.5 Tool and resources to provide authoritative Representation Information for all objects [669 bytes]
- (hist) 3.5.1.3 Policies about preservation responsibility [670 bytes]
- (hist) 3.2.1.2 Appropriate number of staff [681 bytes]
- (hist) 4.2.6.2 Execute documented processes for acquiring PDI [684 bytes]