Uncategorized pages

Jump to: navigation, search

Showing below up to 100 results starting with #1.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. 3) Organizational Infrastructure
  2. 3.1.1 Mission statement
  3. 3.1.2.1 Succession, contigency, escrow plans
  4. 3.1.2.2 Monitor environment for time to deploy succession, contingency, escrow
  5. 3.1.2 Preservation strategic plan
  6. 3.1.3 Collection policy
  7. 3.2.1.1 Identified and established duties
  8. 3.2.1.2 Appropriate number of staff
  9. 3.2.1.3 Professional development program
  10. 3.2.1 Identified duties and appointed staff
  11. 3.3.1 Designated community
  12. 3.3.2.1 Review and update preservation policies
  13. 3.3.2 Preservation policies
  14. 3.3.3 Documented history of changes
  15. 3.3.4 Commit to transparency
  16. 3.3.5 Information integrity measurements
  17. 3.3.6 Self-assessment and external certification
  18. 3.4.1 Business planning processes
  19. 3.4.2 Financial transparency, compliance, and audits
  20. 3.4.3 Risk, benefit, investment, expenditure
  21. 3.5.1.1 Contracts or deposit agreements for preservation rights
  22. 3.5.1.2 Completeness of agreements with depositors
  23. 3.5.1.3 Policies about preservation responsibility
  24. 3.5.1.4 Policies about liability and rights challenges
  25. 3.5.1 Contracts or deposit agreements for content
  26. 3.5.2 Track and manage property rights/restrictions
  27. 4) Digital Object Management
  28. 4.1.1.1 Procedures for identifying information properties that we will preserve
  29. 4.1.1.2 Record of content information and information properties that we will preserve
  30. 4.1.1 Identify content information and information properties
  31. 4.1.2 Specify content information at deposit
  32. 4.1.3 Recognition and parsing of SIPs
  33. 4.1.4 Verify the identity of the Producer
  34. 4.1.5 Verify SIPs for completeness and correctness
  35. 4.1.6 Obtain sufficient control over digital objects
  36. 4.1.7 Provide depositor with responses
  37. 4.1.8 Records of actions and processes related to acquisition
  38. 4.2.1.1 Identify which definition applies to which AIP
  39. 4.2.1.2 Definition of each AIP
  40. 4.2.10 Contemporaneous records of actions and administration processes relevant to AIP creation
  41. 4.2.1 Associated definition for each AIP or class of AIPs
  42. 4.2.2 Description of how AIPs are constructed from SIPs
  43. 4.2.3.1 Procedures if a SIP is not incorporated or discarded
  44. 4.2.3 Document final disposition of all SIPs
  45. 4.2.4.1.1 Have unique identifiers
  46. 4.2.4.1.2 Assign and maintain persistent identifiers of the AIP and its components
  47. 4.2.4.1.3 Describe any processes for changes to identifiers
  48. 4.2.4.1.4 Provide a list of all identifiers and check for duplications
  49. 4.2.4.1.5 System of identifiers is adequate now and in the future
  50. 4.2.4.1 Uniquely identify each AIP
  51. 4.2.4.2 System of reliable linking/resolution services in order to find identified objects
  52. 4.2.4 Convention that generates persistent, unique identifiers for AIPs
  53. 4.2.5.1 Tools or methods to identify the file types of all objects
  54. 4.2.5.2 Tools or methods to determine what Representation Information is necessary for understandability
  55. 4.2.5.3 Have access to the requisite Representation Information
  56. 4.2.5.4 Tools or methods to ensure that Representation Information is persistently associated with objects
  57. 4.2.5 Tool and resources to provide authoritative Representation Information for all objects
  58. 4.2.6.1 Documented processes for acquiring PDI
  59. 4.2.6.2 Execute documented processes for acquiring PDI
  60. 4.2.6.3 PDI is persistently associated with Content Information of AIP
  61. 4.2.6 Documented processes for acquiring PDI for associated Content Information
  62. 4.2.7.1 Processes for testing understandability for Designated Community of the Content Information of AIPs
  63. 4.2.7.2 Execute testing process of Content Information of AIPs
  64. 4.2.7.3 Bring Content Information of AIP up to level of understandability if it fails testing
  65. 4.2.7 Content Information is understandable for Designated Community at the time of AIP creation
  66. 4.2.8 Verify each AIP for completeness and correctness
  67. 4.2.9 Independent mechanism for verifying the integrity of the content
  68. 4.3.1 Documented preservation strategies relevant to its holdings
  69. 4.3.2.1 Mechanisms for monitoring and notification when Representation Information is inadequate for the Designated Community to understand the data holdings
  70. 4.3.2 Mechanisms for monitoring its preservation environment
  71. 4.3.3.1 Mechanisms for creating, identifying or gathering any extra Representation Information required
  72. 4.3.3 Mechanisms to change preservation plans as a result of its monitoring activities
  73. 4.3.4 Provide evidence of the effectiveness of its preservation activities
  74. 4.4.1.1 Preserve the Content Information of AIPs
  75. 4.4.1.2 Actively monitor the integrity of AIPs
  76. 4.4.1 Specifications for how the AIPs are stored down to the bit level
  77. 4.4.2.1 Procedures for all actions taken on AIPs
  78. 4.4.2.2 Demonstrate that any actions taken on AIPs were compliant with the specification of those actions
  79. 4.4.2 Contemporaneous records of actions and administration processes that are relevant to storage and preservation of the AIPs
  80. 4.5.1 Specify minimum information requirements to enable the Designated Community to discover and identify material
  81. 4.5.2 Capture or create minimum descriptive information for each AIP
  82. 4.5.3 Create bi-directional linkages between each AIP and its descriptive information
  83. 4.6.1.1 Log and review all access management failures and anomalies
  84. 4.6.1 Comply with Access Policies
  85. 4.6.2.1 Record and act upon problem reports about errors in data and responses from users
  86. 4.6.2 Follow policies and procedures that enable the dissemination of digital objects that are traceable to the originals
  87. 5) Infrastructure and Security Risk Management
  88. 5.1.1.1.1 Hardware technologies appropriate to the services it provides to its designated communities
  89. 5.1.1.1.2 Procedures in place to monitor and receive notifications when hardware technology changes are needed
  90. 5.1.1.1.3 Procedures in place to evaluate when changes are needed to current hardware
  91. 5.1.1.1.4 Procedures, commitment and funding to replace hardware when evaluation indicates the need to do so
  92. 5.1.1.1.5 Software technologies appropriate to the services it provides to its designated communities
  93. 5.1.1.1.6 Procedures in place to monitor and receive notifications when software changes are needed
  94. 5.1.1.1.7 Procedures in place to evaluate when changes are needed to current software
  95. 5.1.1.1.8 Procedures, commitment and funding to replace software when evaluation indicates the need to do so
  96. 5.1.1.1 Employ technology watches or other technology monitoring notification systems
  97. 5.1.1.2 Adequate hardware and software support for backup functionality sufficient for preserving the repository content and tracking repository functions
  98. 5.1.1.3.1 Record and report to its administration all incidents of data corruption or loss, and steps shall be taken to repair/replace
  99. 5.1.1.3 Effective mechanisms to detect bit corruption or loss
  100. 5.1.1.4 Process to record and react to the availability of new security updates based on a risk-benefit assessment

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)