Pages that link to "CLOCKSS: Box Operations"
The following pages link to CLOCKSS: Box Operations:
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Main Page (← links)
- 3.3.3 Documented history of changes (← links)
- 5.1.1.1.1 Hardware technologies appropriate to the services it provides to its designated communities (← links)
- 5.1.1.1.2 Procedures in place to monitor and receive notifications when hardware technology changes are needed (← links)
- 5.1.1.1.4 Procedures, commitment and funding to replace hardware when evaluation indicates the need to do so (← links)
- 5.1.1.1.5 Software technologies appropriate to the services it provides to its designated communities (← links)
- 5.1.1.2 Adequate hardware and software support for backup functionality sufficient for preserving the repository content and tracking repository functions (← links)
- 5.1.1.3 Effective mechanisms to detect bit corruption or loss (← links)
- 5.1.1.3.1 Record and report to its administration all incidents of data corruption or loss, and steps shall be taken to repair/replace (← links)
- 5.1.1.4 Process to record and react to the availability of new security updates based on a risk-benefit assessment (← links)
- 5.1.1.5 Defined processes for storage media and/or hardware change (e.g., refreshing, migration) (← links)
- 5.1.1.6 Identified and documented critical processes that affect its ability to comply with its mandatory responsibilities (← links)
- 5.1.1.6.1 Documented change management process that identifies changes to critical processes that potentially affect the repository's ability to comply with its mandatory responsibilities (← links)
- 5.1.1.6.2 Process for testing and evaluating the effect of changes to the repository's critical processes (← links)
- 5.1.2 Manage the number and location of copies of all digital objects (← links)
- 5.2.3 Staff shall have delineated roles, responsibilities, and authorizations related to implementing changes (← links)
- 4.1.6 Obtain sufficient control over digital objects (← links)
- 4.2.9 Independent mechanism for verifying the integrity of the content (← links)
- 4.3.1 Documented preservation strategies relevant to its holdings (← links)
- 4.3.2 Mechanisms for monitoring its preservation environment (← links)
- 4.4.1.1 Preserve the Content Information of AIPs (← links)
- 4.4.1.2 Actively monitor the integrity of AIPs (← links)
- 4.4.2.1 Procedures for all actions taken on AIPs (← links)
- 4.4.2.2 Demonstrate that any actions taken on AIPs were compliant with the specification of those actions (← links)
- 4.6.1 Comply with Access Policies (← links)
- 4.6.1.1 Log and review all access management failures and anomalies (← links)
- CLOCKSS: Access Policy (← links)
- LOCKSS: Polling and Repair Protocol (← links)
- CLOCKSS: Extracting Triggered Content (← links)
- CLOCKSS: Threats and Mitigations (← links)
- CLOCKSS: Logging and Records (← links)