USGS Guidelines for the Preservation of Digital Scientific Data
|
|
|
- Eustacia Atkinson
- 10 years ago
- Views:
Transcription
1 USGS Guidelines for the Preservation of Digital Scientific Data Introduction This document provides guidelines for use by USGS scientists, management, and IT staff in technical evaluation of systems for preserving digital scientific data. These guidelines will assist in selecting, specifying, building, operating, or enhancing data repositories. The USGS Fundamental Science Practices Advisory Committee Data Preservation Subcommittee developed these guidelines based on material from the Library of Congress- sponsored National Digital Stewardship Alliance (National Digital Stewardship Alliance, 2013). This document does not cover additional non- technical issues such as preservation policies, funding, or organizational competency and longevity, which are critical for data preservation, but beyond the scope of this document. More information about this topic can be found in Trustworthy Repositories Audit & Certification: Criteria and Checklist (OCLC- NARA, 2007) 1. When considering how to preserve digital data you should address these questions: Where are the data stored? Do you store a copy of the data off- site? How do you ensure the integrity of the data over time? What IT security features does USGS require for storing and accessing the data? What additional IT security features do you need? What metadata standard should be used to document the data? What sustainable file formats should be used for long- term storage? What are the applicable USGS rules regarding record retention periods for the data? 2 Who can you ask for assistance? Page 1
2 Table Element Definitions Each row in the table below represents a technical element of digital data preservation. Storage & Geographic Location Storage systems, locations, and multiple copies to prevent loss of data. Data Integrity Procedures to prevent, detect, and recover from unexpected or deliberate changes to data. Information Security Procedures to prevent human- caused corruption of data, deletion, and unauthorized access. Metadata Documentation of the data to enable contextual understanding and long- term usability. File Formats File types, data structures, and naming conventions to aid long- term preservation and reuse. Physical Media Basic recommendations to reduce obsolescence risks that can threaten the readability of physical media. Long- term and Sustainable Format Definitions Long- term: A period of time long enough for there to be concern about the loss of integrity of digital information held in a repository, including deterioration of storage media, changing technologies, support for old and new media and data formats, and a changing user community. This period extends into the indefinite future. Sustainable format: The ability to access an electronic record throughout its lifecycle, regardless of the technology used when it was originally created. A sustainable format is one that increases the likelihood of a record being accessible in the future. Levels of Digital Preservation Page 2
3 For each element, the columns in the following table describe four levels of increasing assurance that digital data will be preserved. The table is based upon a left- to- right progression. Each level adds requirements to the previous levels. To enhance an existing data repository, upgrade all elements to the same level. For highest assurance of data preservation, specify all elements at Level Four.. The table can be used to evaluate a repository s compliance with the desired levels. For each cell in the table, assign a grade to the repository of Pass, Incomplete, or Fail. Mark each cell (e.g. green, yellow, red backgrounds), to create a quick visual assessment. Pay attention to the lower levels marked Incomplete or Fail. If you are proposing improvements to an existing repository, you could create Before and After tables, to highlight proposed or actual progress. Level One: The minimum criteria and activities needed to maintain data through the life of a research project. Level Two: Better. Implement Level Two elements after all Level One elements are in place. Level Three: Even better. Implement Level Three elements after all Level Two elements are in place.. Level Four: Best. USGS should plan to provide repositories that meet these criteria for all long- term USGS records. ELEMENT LEVEL ONE LEVEL TWO LEVEL THREE LEVEL FOUR Two complete copies Three complete copies At least one copy in a stored physically At least one copy in a geographic location separate from each different geographic with a different disaster other location (offsite threat (e.g. hurricane Transfer the digital locations must follow area versus an content from NARA 1571 earthquake area) temporary media into guidelines 3 ) Maintain an an established storage Document the storage obsolescence system system and storage monitoring process for Managed storage media the storage system and system in place media Storage and Geographic Location Data Integrity Verify checksums on ingest, if provided Verify checksums on all data ingest Verify checksums at fixed intervals At least 3 copies in geographic locations with different disaster threats Implement a comprehensive plan that keeps files and metadata on currently accessible systems and media Verify checksums of all content in response to Page 3
4 Information Security Create checksums if not provided Virus check all content Identify who has authorization to read, write, move, and delete individual files Limit authorizations to individual files Metadata Inventory of content and its storage location Ensure backup and physical separation of inventory information Adhere to current USGS metadata standards File Formats Encourage the use of a limited set of documented and open file formats, codecs, compression schemes, and encapsulation schemes Physical Media Inventory all physical media utilized including hard disks. Use read only procedures when working with original media Document access restrictions for content Store all relevant database management information Store information describing changes to the structure or format of the data, including time of occurrence Provide access to all forms of the metadata Inventory the file formats in use Develop a plan to utilize trade studies to evaluate medias Maintain logs of checksums and supply audit information on demand Maintain procedures to detect corrupt data Virus check all content Maintain logs of who performed what actions on files, including deletions and preservation actions Preserve standard technical, descriptive, and preservation metadata Monitor file format obsolescence issues All non- recommended media have been properly disposed of specific events or activities Maintain procedures to replace or repair corrupted data Ensure no one person has write access to all copies Create, store, and verify a second, different checksum for all content Perform audit of logs Same as Level 3 Perform format migrations, emulations (a virtual instance of a previous operating system or procedure) and similar activities Base all media choices on trade studies. All information is Page 4
5 suitable for USGS purposes. Begin to transition away from all media utilized that are 10 years or more in age. following transition activities. migrated from an older media to a newer media every 3 to 5 years including hard disks. Derived from: Library of Congress, National Digital Stewardship Alliance, NDSA Levels of Digital Preservation: Version 1, February Roles and Responsibilities The repository manager or project chief ensures that all of the table elements are addressed, though others may be responsible for implementation and operation (e.g. data managers, IT specialists). Scientists and research staff can use these criteria to judge the suitability of a data repository for preserving data. Management can use these criteria for specifying or selecting data repositories. IT personnel can use these criteria for building, buying, enhancing, or operating data repositories. Checksums A checksum is a short mathematical digest of a file, which changes if any bit in the file changes. You use checksums to detect unexpected changes in file content. Federal agencies, including USGS, should use NIST- approved checksums for new systems. Currently, those are: SHA- 224, SHA- 256, SHA- 384, and SHA MD5 and SHA- 1 checksums are widely used, but not approved for new systems. For more information, see Page 5
6 Assistance Storage & Geographic Location John Faundeen ) Data Integrity Rex Sanders ) Information Security See your local IT security point of contact. Metadata Vivian Hutchison ) Additional USGS information and contacts can be found at Other Recommendations Individual scientists who want to improve the viable longevity of their personal archives could use the Library of Congress recommendations for Personal Archiving at Footnotes Page 6
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS
DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS STATEMENT OF PURPOSE The Delaware Public Archives (DPA) has issued "Model Guidelines for Electronic Records"
Union County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
A Selection of Questions from the. Stewardship of Digital Assets Workshop Questionnaire
A Selection of Questions from the Stewardship of Digital Assets Workshop Questionnaire SECTION A: Institution Information What year did your institution begin creating digital resources? What year did
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
How To Use A Court Record Electronically In Idaho
Idaho Judicial Branch Scanning and Imaging Guidelines DRAFT - October 25, 2013 A. Introduction Many of Idaho s courts have considered or implemented the use of digital imaging systems to scan court documents
Checklist and guidance for a Data Management Plan
Checklist and guidance for a Data Management Plan Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan. v.1.0. Available online: https://wiki.helsinki.fi/x/dzeacw
Digital Media Storage
Summary State and local governments use computers to create, capture, or maintain public records. To be accountable to the citizens of Minnesota, government agencies are required by law to keep records
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as
Let s Talk Digital An Approach to Managing, Storing, and Preserving Time-Based Media Art Works. DAMS Branch Manager Smithsonian Institution, OCIO
Let s Talk Digital An Approach to Managing, Storing, and Preserving Time-Based Media Art Works DAMS Branch Manager Smithsonian Institution, OCIO 1 Love and Marriage Digital Asset Management?? Digital Diamonds
Florida Digital Archive (FDA) Policy and Procedures Guide
Florida Digital Archive (FDA) Policy and Procedures Guide Version 3.0, May, 2011 Last reviewed May, 2010 without updates superseded versions: version 2.5, April 2009 version 2.4, August 2007 version 2.3,
Feet On The Ground: A Practical Approach To The Cloud Nine Things To Consider When Assessing Cloud Storage
Feet On The Ground: A Practical Approach To The Cloud Nine Things To Consider When Assessing Cloud Storage by seth anderson consultant audiovisual preservation solutions 2014 AVPreserve Media Archiving
OCLC Digital Archive Preservation Policy and Supporting Documentation Last Revised: 8 August 2006
OCLC Digital Archive Preservation Policy and Supporting Documentation Last Revised: 8 August 2006 OCLC Online Computer Library Center, Inc. Dublin, Ohio 43017-3395 USA 2004, OCLC Online Computer Library
STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009
STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 Following is a voluntary guideline issued by the State Records
Bradford Scholars Digital Preservation Policy
DIGITAL PRESERVATION The value of the research outputs produced by staff and research students at the University of Bradford cannot be over emphasised in demonstrating the scientific, societal and economic
Institute for Advanced Study Shelby White and Leon Levy Archives Center
Institute for Advanced Study Shelby White and Leon Levy Archives Center Managing Electronic Records - Recommendations for Institute Staff File Management: Guidelines & Policies Which files are considered
North Carolina Digital Preservation Policy. April 2014
North Carolina Digital Preservation Policy April 2014 North Carolina Digital Preservation Policy Page 1 Executive Summary The North Carolina Digital Preservation Policy (Policy) governs the operation,
1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.
Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
Business Process Design As-Is and To-Be Checklists Introduction
Business Process Design As-Is and To-Be Checklists Introduction These business process design checklists were developed to help Federal IT staff, Records Managers, and Program Managers identify records
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
State Records Office Guideline. Management of Digital Records
State Records Office Guideline Management of Digital Records An Information Management Guideline for State Organizations Version 2 January 2015 www.sro.wa.gov.au Contents GLOSSARY... 2 PURPOSE... 5 BACKGROUND...
Exchange Server 2010 & C2C ArchiveOne A Feature Comparison for Email Archiving
Email Archiving is critical for performance of storage, disaster recovery, compliance, litigation support and business continuity. While Exchange 2010 offers basic Email Archiving, an enhanced solution
Education and Workforce Development Cabinet POLICY/PROCEDURE. Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012
Education and Workforce Development Cabinet POLICY/PROCEDURE Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012 Subject: Backup Procedures Tower and Server Farms Policy:
6. FINDINGS AND SUGGESTIONS
6. FINDINGS AND SUGGESTIONS 6.1 Introduction: The advancements in ICT and their proper utilization by research and academic librarians are not only strengthening the capabilities of libraries but also
Digital Records Preservation Procedure No.: 6701 PR2
Digital Records Preservation Procedure No.: 6701 PR2 Policy Reference: Category: Department Responsible: Current Approved Date: 6700 Records Management Information Management Records Management and Privacy
Why archiving erecords influences the creation of erecords. Martin Stürzlinger scopepartner Vienna, Austria
Why archiving erecords influences the creation of erecords Martin Stürzlinger scopepartner Vienna, Austria Electronic Records In a Productive System Created Used Changed Deleted In an Archival System No
City of Minneapolis Policy for Enterprise Information Management
City of Minneapolis Policy for Enterprise Information Management Origin: Developed by the City Clerk s Office and Business Information Services. Based on requirements set forth in Federal and State regulations
Archiving and Backup - The Basics
Introduction Backup and archiving are useful tools for managing data, especially volumes of ageing data. Agency policies for retention and access necessitate that these tools should be used to implement
Florida Digital Archive (FDA) Policy and Procedures Guide
Florida Digital Archive (FDA) Policy and Procedures Guide Version 3.1, July 1, 2012 Last reviewed May, 2010 without updates superseded versions: version 3.0, May, 2011 version 2.5, April 2009 version 2.4,
Information Management Advice 18 - Managing records in business systems: Overview
Information Management Advice 18 - Managing records in business systems: Overview Introduction The purpose of this Advice is to assist agencies to identify and manage State records in business systems,
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Things You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
SOLUTION GUIDE AND BEST PRACTICES
SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery
Chapter 434-662 WAC PRESERVATION OF ELECTRONIC PUBLIC RECORDS
Chapter 434-662 WAC PRESERVATION OF ELECTRONIC PUBLIC RECORDS WAC 434-662-010 Purpose. Pursuant to the provisions of chapters 40.14 and 42.56 RCW, and RCW 43.105.250, the rules contained in this chapter
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Section 28.1 Purpose. Section 28.2 Background. DOT Order 1351.28 Records Management. CIOP Chapter 1351.28 RECORDS MANAGEMENT
CIOP Chapter 1351.28 RECORDS MANAGEMENT TABLE OF CONTENTS Section 28.1 Purpose... 1 Section 28.2 Background... 1 Section 28.3 Scope and Applicability... 2 Section 28.4 Definitions... 4 Section 28.5 Policy...
The Australian War Memorial s Digital Asset Management System
The Australian War Memorial s Digital Asset Management System Abstract The Memorial is currently developing an Enterprise Content Management System (ECM) of which a Digital Asset Management System (DAMS)
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Monitor file integrity using MultiHasher
Monitor file integrity using MultiHasher Keep Research Data Securely Integrity Monitoring Beginner Introduction This guide describes the use of MultiHasher, an integrity monitoring tool for Microsoft Windows
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
Chapter 25 Backup and Restore
System 800xA Training Chapter 25 Backup and Restore TABLE OF CONTENTS Chapter 25 Backup and Restore... 1 25.1 General Information... 2 25.1.1 Objectives... 2 25.1.2 Legend... 2 25.1.3 Reference Documentation...
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Arizona State Library, Archives and Public Records
Arizona State Library, Archives and Public Records RECORDS MANAGEMENT DIVISION 1919 West Jefferson Phoenix, Arizona 85009 (602) 542-3741 Managing Public Records Sent and Received Via Electronic Mail These
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
E-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
DIGITAL PRESERVATION AT THE U.S. GOVERNMENT PRINTING OFFICE: WHITE PAPER. Version 2.0. 9 July 2008 UNITED STATES GOVERNMENT PRINTING OFFICE
DIGITAL PRESERVATION AT THE U.S. GOVERNMENT PRINTING OFFICE: WHITE PAPER Version 2.0 9 July 2008 Record of Changes Version Description Of Change Revision Date Author Number 1.0 Baseline Document July 12,
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect
WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
Information Resource Management Directive 5000.13 USAP Contingency & Disaster Recovery Program
The National Science Foundation Polar Programs United States Antarctic Program Information Resource Management Directive 5000.13 USAP Contingency & Disaster Recovery Program Organizational Function Policy
AHDS Digital Preservation Glossary
AHDS Digital Preservation Glossary Final version prepared by Raivo Ruusalepp Estonian Business Archives, Ltd. January 2003 Table of Contents 1. INTRODUCTION...1 2. PROVENANCE AND FORMAT...1 3. SCOPE AND
Guidelines for Managing Electronic Records 2013 Edition
Records Management Guidelines Guidelines for Managing Electronic Records 2013 Edition The United Methodist Church General Commission on Archives and History www.gcah.org Guidelines for Managing Electronic
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
ITIL A guide to service asset and configuration management
ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Dell AppAssure Recovery Assure
Technology spotlight Dell AppAssure Recovery Assure The key to Microsoft application protection Your Microsoft applications Microsoft Exchange, SQL Server and SharePoint can be the most business-critical
Questionnaire on Digital Preservation in Local Authority Archive Services
Questionnaire on Digital Preservation in Local Authority Archive Services A - Digital Preservation Planning 1. Would you describe your Archive Service as: Actively seeking digital material Reacting to
What is Digital Archiving? 4/10/2015. Archiving Digital Content ARMA Spring Meeting. Digital Archiving
Archiving Digital Content ARMA Spring Meeting Leigh A. Grinstead April 14, 2015 Digital Archiving This session will Cover the components of digital archiving providing long-term access, aka digital preservation
Electronic and Digital Signatures
Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as
State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Identify and Protect Your Vital Records
Identify and Protect Your Vital Records INTRODUCTION The Federal Emergency Management Agency s Federal Preparedness Circular 65 states The protection and ready availability of electronic and hardcopy documents,
Audit of NSERC Award Management Information System
Internal Audit Audit Report Audit of NSERC Award Management Information System TABLE OF CONTENTS 1. EXECUTIVE SUMMARY... 2 2. INTRODUCTION... 3 3. AUDIT FINDINGS- BUSINESS PROCESS CONTROLS... 5 4. AUDIT
GENERAL RECORDS SCHEDULE 3.1: General Technology Management Records
GENERAL RECORDS SCHEDULE 3.1: General Technology Management Records This schedule covers records created and maintained by Federal agencies related to the general management of technology. It includes
Harvard Library Preparing for a Trustworthy Repository Certification of Harvard Library s DRS.
National Digital Stewardship Residency - Boston Project Summaries 2015-16 Residency Harvard Library Preparing for a Trustworthy Repository Certification of Harvard Library s DRS. Harvard Library s Digital
September 28 2011. Tsawwassen First Nation Policy for Records and Information Management
Tsawwassen First Nation Policy for Records and Information Management September 28 2011 Tsawwassen First Nation Policy for Records and Information Management Table of Contents 1. RECORDS AND INFORMATION
This policy is not designed to use systems backup for the following purposes:
Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa
Scanning and Tossing. Requirements for Scanning and the Destruction of Paper Based Records
Scanning and Tossing Requirements for Scanning and the Destruction of Paper Based Records Overview I want to go paperless! Can I scan and toss? What are the rules and requirements about imaging? What are
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Achieving a Step Change in Digital Preservation Capability
Essential Guide Achieving a Step Change in Digital Preservation Capability An assessment of Preservica using the Digital Preservation Capability Maturity Model (DPCMM) Executive Summary Nearly every organization
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
TECHNOLOGY AND INNOVATION DEPARTMENT BACKUP AND RECOVERY REVIEW AUDIT 14-08 SEPTEMBER 23, 2014
TECHNOLOGY AND INNOVATION DEPARTMENT BACKUP AND RECOVERY REVIEW AUDIT 14-08 SEPTEMBER 23, 2014 CITY OF TAMPA Bob Buckhorn, Mayor Internal Audit Department Christine Glover, Internal Audit Director September
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
Agenda. Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups
Agenda Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups Overview Backup and Recovery generally focuses on the
Larry Patterson, City Manager
Administrative Policy 2-13 August 20, 2008 DATA MIGRATION POLICY PURPOSE To preserve electronic data as required by Oregon Public Records and Archiving statutes. (ORS 192.050) APPLICABILITY This policy
information Records Management Checklist business people security preservation accountability Foreword Introduction Purpose of the checklist
Records Management Checklist Foreword We fi rst developed the Records Management Checklist in 2008 to complement our performance audit Records Management in the Victorian Public Sector. At that time the
RECORDKEEPING MATURITY MODEL
Introduction Maturity Rating Definitions 1 Level 1 Inadequate/Sub-standard Practice is not formalised or documented. Processes and practices are fragmented or non-existent. Where processes and practices
Cloud Service Contracts: An Issue of Trust
Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,
