Pages that link to "CLOCKSS: Threats and Mitigations"
The following pages link to CLOCKSS: Threats and Mitigations:
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Main Page (← links)
- 3.4.3 Risk, benefit, investment, expenditure (← links)
- 5.1.1 Identify and manage the risks to its preservation operations and goals associated with system infrastructure (← links)
- 5.1.1.1 Employ technology watches or other technology monitoring notification systems (← links)
- 5.1.1.1.1 Hardware technologies appropriate to the services it provides to its designated communities (← links)
- 5.1.1.1.2 Procedures in place to monitor and receive notifications when hardware technology changes are needed (← links)
- 5.1.1.1.4 Procedures, commitment and funding to replace hardware when evaluation indicates the need to do so (← links)
- 5.1.1.1.5 Software technologies appropriate to the services it provides to its designated communities (← links)
- 5.1.1.1.6 Procedures in place to monitor and receive notifications when software changes are needed (← links)
- 5.1.1.1.8 Procedures, commitment and funding to replace software when evaluation indicates the need to do so (← links)
- 5.2.1 Maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant (← links)
- 5.2.2 Implemented controls to adequately address each of the defined security risks (← links)
- 5.2.3 Staff shall have delineated roles, responsibilities, and authorizations related to implementing changes (← links)
- 5.2.4 Suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information together with an offsite copy of the recovery plan(s) (← links)
- 4.1.6 Obtain sufficient control over digital objects (← links)
- 4.3.1 Documented preservation strategies relevant to its holdings (← links)
- CLOCKSS: Preservation Strategy (← links)
- CLOCKSS: Access Policy (← links)
- CLOCKSS: Mandatory Responsibilities (← links)
- CLOCKSS: Threats and Mitigations (← links)