Uncategorized pages

Jump to: navigation, search

Showing below up to 42 results starting with #301.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. 5.1.1.3.1 Record and report to its administration all incidents of data corruption or loss, and steps shall be taken to repair/replace
  2. 5.1.1.3 Effective mechanisms to detect bit corruption or loss
  3. 5.1.1.4 Process to record and react to the availability of new security updates based on a risk-benefit assessment
  4. 5.1.1.5 Defined processes for storage media and/or hardware change (e.g., refreshing, migration)
  5. 5.1.1.6.1 Documented change management process that identifies changes to critical processes that potentially affect the repository's ability to comply with its mandatory responsibilities
  6. 5.1.1.6.2 Process for testing and evaluating the effect of changes to the repository's critical processes
  7. 5.1.1.6 Identified and documented critical processes that affect its ability to comply with its mandatory responsibilities
  8. 5.1.1 Identify and manage the risks to its preservation operations and goals associated with system infrastructure
  9. 5.1.2.1 Mechanisms in place to ensure any/multiple copies of digital objects are synchronized
  10. 5.1.2 Manage the number and location of copies of all digital objects
  11. 5.2.1 Maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant
  12. 5.2.2 Implemented controls to adequately address each of the defined security risks
  13. 5.2.3 Staff shall have delineated roles, responsibilities, and authorizations related to implementing changes
  14. 5.2.4 Suitable written disaster preparedness and recovery plan(s), including at least one off-site backup of all preserved information together with an offsite copy of the recovery plan(s)
  15. CLOCKSS: Access Policy
  16. CLOCKSS: Box Operations
  17. CLOCKSS: Budget and Planning Process
  18. CLOCKSS: Business History
  19. CLOCKSS: Business Plan Overview
  20. CLOCKSS: Collection Development
  21. CLOCKSS: Designated Community
  22. CLOCKSS: Extracting Triggered Content
  23. CLOCKSS: Governance and Organization
  24. CLOCKSS: Hardware and Software Inventory
  25. CLOCKSS: Ingest Pipeline
  26. CLOCKSS: Logging and Records
  27. CLOCKSS: Mandatory Responsibilities
  28. CLOCKSS: Mission Statement
  29. CLOCKSS: Preservation Strategy
  30. CLOCKSS: Succession Plan
  31. CLOCKSS: Threats and Mitigations
  32. Definition of AIP
  33. Definition of DIP
  34. Definition of SIP
  35. LOCKSS: Basic Concepts
  36. LOCKSS: Extracting Bibliographic Metadata
  37. LOCKSS: Format Migration
  38. LOCKSS: Metadata Database
  39. LOCKSS: Polling and Repair Protocol
  40. LOCKSS: Property Server Operations
  41. LOCKSS: Software Development Process
  42. Main Page

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)