Uncategorized pages

Jump to: navigation, search

Showing below up to 39 results starting with #101.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. 5.1.1.5 Defined processes for storage media and/or hardware change (e.g., refreshing, migration)
  2. 5.1.1.6.1 Documented change management process that identifies changes to critical processes that potentially affect the repository's ability to comply with its mandatory responsibilities
  3. 5.1.1.6.2 Process for testing and evaluating the effect of changes to the repository's critical processes
  4. 5.1.1.6 Identified and documented critical processes that affect its ability to comply with its mandatory responsibilities
  5. 5.1.1 Identify and manage the risks to its preservation operations and goals associated with system infrastructure
  6. 5.1.2.1 Mechanisms in place to ensure any/multiple copies of digital objects are synchronized
  7. 5.1.2 Manage the number and location of copies of all digital objects
  8. 5.2.1 Maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant
  9. 5.2.2 Implemented controls to adequately address each of the defined security risks
  10. 5.2.3 Staff shall have delineated roles, responsibilities, and authorizations related to implementing changes
  11. 5.2.4 Suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information together with an offsite copy of the recovery plan(s)
  12. CLOCKSS: Access Policy
  13. CLOCKSS: Box Operations
  14. CLOCKSS: Budget and Planning Process
  15. CLOCKSS: Business History
  16. CLOCKSS: Business Plan Overview
  17. CLOCKSS: Collection Development
  18. CLOCKSS: Designated Community
  19. CLOCKSS: Extracting Triggered Content
  20. CLOCKSS: Governance and Organization
  21. CLOCKSS: Hardware and Software Inventory
  22. CLOCKSS: Ingest Pipeline
  23. CLOCKSS: Logging and Records
  24. CLOCKSS: Mandatory Responsibilities
  25. CLOCKSS: Mission Statement
  26. CLOCKSS: Preservation Strategy
  27. CLOCKSS: Succession Plan
  28. CLOCKSS: Threats and Mitigations
  29. Definition of AIP
  30. Definition of DIP
  31. Definition of SIP
  32. LOCKSS: Basic Concepts
  33. LOCKSS: Extracting Bibliographic Metadata
  34. LOCKSS: Format Migration
  35. LOCKSS: Metadata Database
  36. LOCKSS: Polling and Repair Protocol
  37. LOCKSS: Property Server Operations
  38. LOCKSS: Software Development Process
  39. Main Page

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)