{"text":"The InterPARES 2 Project\nDictionary\naccess \nacceptance \nv., An agreement, either by express act or by implication from conduct, to the terms of an offer so that a binding contract is formed. [Government] \naccess privileges \nn.,\n The right, opportunity, or means of finding, using or approaching documents and\/or information. [Archives] \nn., The configuration of hardware components and their interfaces. [Archives] \nn., The availability of records\/archives for consultation as a result of both legal authorizatio"} {"text":"n and the existence of finding aids.\n[Archives] \nn., The permission to locate and retrieve information for use (consultation or reference) within legally established restrictions of\nprivacy, confidentiality, and security clearance. [Archives] \nn., The ability to locate relevant information through the use of catalogues, indexes, finding aids, or other tools. [Archives] n., The notion that 'the public' or 'minority groups' should have access to the means of broadcasting to promote their 'voices' or\nopinions."} {"text":" [Arts] \nn., The ability to locate, gain entry to, and use something, such as a building or a database. [Arts] \nn., A de vice or me tho d where by a docu men t may be found; Per mission an d opportun ity to use a doc ument; Th e a pproach\n to any\nmeans to storing information, e.g. index, bibliography, catalogue, computer terminal. [Computer and Information Sciences] \nn., The physical processes of retrieving information from storage media. [Computer and Information Sciences] \nn., To g ain entry t o d ata, "} {"text":" a compu ter syste m, etc. In the US, to ac cess stri ct ly means to ins truc t, communi cat e wit h, \nstore data in,\nretrieve data from, or otherwise obtain the ability to use the resources of a computer or any part thereof. [Computer and\nInformation Sciences] \nn., The reading or writing of data, with the connotation that the content of the reading or writing is taken into account. The word\nis most commonly used in connection with filed information and is often qualified by an indication as to the types"} {"text":" of access that\nare to be permitted. For example, read-only access means that the contents of the file may be read but not altered or erased.\n[Computer and Information Sciences] \nn., The notion that 'the public' or 'minority groups' should have access to the means of broadcasting to promote their 'voices' or\nn., The authority to access a system to compile, classify, register, retrieve, annotate, read, transfer or destroy records, granted to a person, position or office within an organization or agency. [Arc"} {"text":"hives] \nn., The ability to locate, gain entry to, and use something, such as a building or a database. [Arts] \nn., The indication of the person, position or office authorized to annotate a record, delete it, or remove it from the system. [Archives] \nmeans to storing information, e.g. index, bibliography, catalogue, computer terminal. [Computer and Information Sciences] \nn.,\n The authority to read a record, granted to a person, position or office within an organization or agency. [Archives] \nretrieve data fr"} {"text":"om, or otherwise obtain the ability to use the resources of a computer or any part thereof. [Computer and\nn.,\n The indication of the person, position or office authorized to read a record. [Archives] \nis most commonly used in connection with filed information and is often qualified by an indication as to the types of access that\nn., See\n: access privileges; access restrictions. [Archives] \naccession \nn.,\n The availability and usability of information. [Archives] \nn., The characteristic of being easily reach"} {"text":"ed or used with a minimum of barriers. Carries the connotation of providing access to individuals with disabilities that prevent normal use, especially under the terms of the Americans with Disabilities Act (PL 101-336, 42 USC 126). [Archives] \nn., The availability of archival material for consultation as a result of legal authorization and the existence of finding aids.\n[Archives] \nn.,\n The ease with which a person may enter a library, gain access to its online systems, use its resources, and obtain needed"} {"text":"\ninformation regardless of format. In a more general sense, the quality of being able to be located and used by a person. In the\nWeb environment, the quality of being usable by everyone regardless of disability. [Computer and Information Sciences] \n The obligation to answer for actions for which one is responsible. [General Dictionaries] \nn., v.,\n A body of records formally accepted into custody as a unit at a single time. [Archives] \nTo t ak e legal and physica l cu stody of a b ody of reco rds and to do"} {"text":"cumen t it in a regis te r. [Arch ives] \nn., Materials physically and legally transferred to a repository as a unit at a single time; an acquisition. [Archiv\nes] \nv., The formal acceptance into custody and recording of an acquisition. [Archives] \nv., To document the transfer of records or materials in a register, database, or other log of the repository's holdings. [Archives] \nv., To take legal and physical custody of a group of records or other materials and to formally document their receipt. [Archives] "} {"text":"v., The recording of the formal acceptance into custody of an acquisition. [Archives] \nn., An acquisition so recorded. (see definition for accession). [Archives] \nv., To enter in an accessions record or register particulars of each item in the order of its acquisition. [Computer and Information\nSciences] \nv., The act of taking documents into physical custody in an archival agency, records center, or manuscript repository, and\nrecording same. In some cases transfer of legal title may also be involved. [Compu"} {"text":"ter and Information Sciences] \nInformation Sciences] \nn., A record documenting the preserver's acceptance of responsibility for preserving a clearly identified set of records. [Archives] \nn., A record documenting additions to a collection, whether acquired by transfer under a legally based procedure, or by deposit, purchase, gift, or bequest. [Arts] \nn., The chief record of the stock added to a library. Items are numbered progressively as they are added to stock. [Compute\nr and\nInformation Sciences] \nn., Th"} {"text":"e formal record of accessions of archival material received by an archives service, in which information on the immed\niate\nsource and the broader provenance of the material is preserved permanently. [Computer and Information Sciences] \nn., The obligation to answer or answer for discharge of duties or conduct. [General Dictionaries] \nn., Acquired records whose authenticity and feasibility of preservation have been confirmed and have been registered in an accession record. [Archives] \nv., The formal acceptanc"} {"text":"e into custody and recording of an acquisition. [Archives] \nn.,\n The obligation to answer for actions for which one is responsible. [General Dictionaries] \nn., The ability to answer for, explain, or justify actions or decisions for which an individual, organization, or system is responsible. [Archives] \nn., The determination and measure of responsibility and liability to another. [Arts] \nn., The extent to which persons in government and the workplace are held answerable for their conduct in office and for t"} {"text":"he quality of their performance of assigned duties, particularly when incompetence, dereliction, or malfeasance is at issue. See also: performance evaluation. \n[Computer and Information Sciences] \nn., The obligation to answer or answer for discharge of duties or conduct. [General Dictionaries] \nn., Principle that individuals, organizations, and the community are responsible for their actions and may be required to expl\nain them to others. [General Dictionaries] \nn., The conscious exercise of will by a perso"} {"text":"n aimed to create, maintain, modify or extinguish situations. Synonym of action.\nn., An acquisition of the records of a creator that is additional to the records of the creator already in the custody of the preserver. [Archives] \nn., Principle that individuals, organizations, and the community are responsible for their actions and may be required to explain\nthem to others. [General Dictionaries] \nn., The degree to which data, information, documents or records are precise, correct, truthful, free of error or"} {"text":" distortion, or \npertinent to the matter. [Archives] \nn., The closeness of an estimate to the true value. Compare PRECISION. [Sciences] \nn., Accuracy refers to the truthfulness of the content of the record and can only be established through content analysis.\n[Archives] \nn., An accurate performance is a performance that reproduces all that is constitutive of the work's individuality. [Arts] \nn., The quality of correctness as to fact and of precision as to detail in information resources and in the delivery "} {"text":"of information\nservices. [Computer and Information Sciences] \nn., How close to the real value a measurement is. [Computer and Information Sciences] \nn., An accurate record is one that contains correct, precise and exact information. [General Dictionaries] \nv., Freedom from mistake or error: correctness, conforming to an approved or conventional standard, conforming to or agreeing\nwith fact, logic, or known truth, conforming to a set figure. [General Dictionaries] \nn., Conformity to truth or to a standard or"} {"text":" model: exhibiting or marked by strict, particular, and complete accordance with fact or\na standard; marked by thorough consideration or minute measurement of small factual details. [General Dictionaries] \nn., An accurate record is one that contains correct, precise and exact information. [General Dictionaries] \nv.,\n To gain possession or control of; to get or obtain. [Government] \nn., Conformity to truth or to a standard or model: exhibiting or marked by strict, particular, and complete accordance with fac"} {"text":"t or\nn., Records that are taken into the custody of the preserver from the creator, for their permanent preservation. [Models (MCP)] \nact \nv., n.,\n The process of adding to the holdings of an archival repository or records centre. [Archives] An addition to the holdings of an archival repository or records centre. [Archives] \nn., The first stage of the behavioral processes (followed by manufacture, use, deposition), in which raw materials are procured. [Sciences] \nv., Obtaining materials for a library, docum"} {"text":"entation center, archive, or other collection, including selection, ordering, and\nobtaining by exchange or gift. [Arts] \nv., The processes of obtaining books and other items for a library, documentaiton center or archive. [Computer and Information\nSci\nen\nces] \nv., The gaining of possession or control over something. [Government] \n To gain possession or control of; to get or obtain. [Government] \nn., The conscious exercise of will by a person aimed to create, maintain, modify or extinguish\n situations. [Arch"} {"text":"ives] \nn., Legi slation th at has be en made law , especia lly a sta tute. [G overnment] \nSyn\n.: action.\nn., A document formally embodying a decision of a legislative body or public authority; or forming part of a legal transactio\nn and drawn up in due form. [Archives] \nn., The conscious exercise of will by a person aimed to create, maintain, modify or extinguish situations. Synonym of ac\ntion.\n[Archives] \nn.,\n Th\ne conscious exercise of will by an officer of the records creator or by an external person ai"} {"text":"med to create, maintain, modify or extinguish situations. There are two types of act: a mere act and a transaction. Alias: action. [Archives] \n v., To do, operate or function. [Arts] \nv., To portray a character as an actor; to perform a role or play a part. [Arts] \nn., A short performance by one or a group of entertainers. [Arts] \nn., Division of a play, each of which may contain one or more scenes. [Arts] \nn., Something done intentionally. [General Dictionaries] \nn., Division of a play, each of which may c"} {"text":"ontain one or more scenes. [Arts] \nn., A record needed by the creator for the purpose of carrying out the action for which it was created or for frequent reference. Syn.: current record. [Archives] \nn., Records needed by the creator for the purpose of carrying out the actions for which they were created or for frequent\nreference. Syn.: current records. [Archives] \nn., Records regularly used for the conduct of the current business of their creator and that, therefore, continue to be maintained in office spac"} {"text":"e. [Archives] \nn., A record needed by its creator for the purpose of carrying out actions [Archives] \nn., Records that continue to be used with sufficient frequency to justify keeping them in the office of creation. [Archives] \nn., Archival documents regularly maintained and used by their creator. [Archives] \nn., Information stored on computer systems that can be readily accessed by the operating system or software without a need to reload media, undelete the information, or reconstruct the information fro"} {"text":"m other sources. [Computer and Information Sciences] \nn., Records that continue to be used with sufficient frequency to justify keeping them in the office of creation. [Archives] \nn.,\n A series of acts or actions aimed to one purpose. [Archives] \nn., n., n.,\n Used to describe the customary use of a given artifact, such as food preparation. [Sciences] Broadly, the rate or extent of a change associated with some substance or system. [Sciences] The quality or state of being active. [General Dictionaries] \naddr"} {"text":"ess \nn.,\n Persons who carry out acts or actions. [Archives] \naddressee's name \nn., A place or location where a particular piece of information is stored, or where an entity can be communicated with. [Computer and Information Sciences] \nn.,\nn.,\n Person(s) to whom the record is directed or for whom the record is intended. [Archives] \nn., Individual(s) and\/or organisation(s) to which the information in the record was addressed. [Archives] \nn., One to whom something is addressed. E.g. \"The To, CC, and BCC heade"} {"text":"rs list the addressees of the e-mail message\".\nNormally an addressee will eventually be a recipient, unless there is a failure at some point (an e-mail \"bounces\") or the message\nis redirected to a different addressee. [Computer and Information Sciences] \nn., The individual to whom something is to be delivered. [General Dictionaries] \nn., A place or location where a particular piece of information is stored, or where an entity can be communicated with.\n[Computer and Information Sciences] \nn.,\n The name of th"} {"text":"e person to whom the record is directed or for whom the record is intended. [Archives] \nreference. Syn.: current records. [Archives] \nn., The sort of accountability aimed at non-political and non-legal authorities such as civil servants and top ranking administrators. Involves developing and implementing procedures for carrying out actions and documenting them to ensure that everything is done according to rule and in proper sequence, so that administrators can account at any time precisely for anything tha"} {"text":"t has been done. [Archives] \nn., The principle that underlies the concept of accountability [ . . . ] is linked to the conveying and evaluation of information. [ . . . ] For ongoing bodies, accountability required the development and refinement of procedures for carrying out actions and documenting them, \"to ensure that everything was done according to rule and in proper sequence, so that administrators could account at any time precisely for anything that had been done.\" [Archives] \nn.,\nn.,\n The structure,"} {"text":" functions and procedures of the organizational environment in which the creator exists. [Archives] \n Stored on a medium in an unchangeable way. [Archives] \n n., 2. The means of physically locating the holdings of records centres and archival institutions through numbering and listing. [Archives] \nn., 1. The exercise of authority over maintenance, use, disposition, and accessibility of current archives to carry on the\nfunction for which they were created. [Archives] \n The structure, functions and procedures"} {"text":" of the organizational environment in which the creator exists. [Archives] \nn.,\n The quality of being permitted to serve as evidence in trial or hearing or other proceeding. [Archives] \nn.,\n The quality or state of being allowed to be entered into evidence in a hearing, trial, or other proceeding. [Governme\nnt] \nn., An administrative body having the delegated authority to act competently on behalf of a higher body. Every agency is a\njuridical person, composed of juridical persons. [Archives] \nv., To store o"} {"text":"n a medium in an unchangeable way. [Archives] \nn., An active communicating entity that can acquire a role; that is, an abstract representation of a function, service, or identity.\n[Sciences] \nv.,\n Stored on a medium in an unchangeable way. [Archives] \nn., An intermediary who performs various matters of business connected with the theatre. [Arts] \nn., An administrative body having the delegated authority to act competently on behalf of a higher body. Every agency is a ju\nridical person, composed of juridical"} {"text":" persons. [Archives] \nn., The proposition that human beings think about the intentional actions they perform and the resources they need to achieve ends. [Sciences] \nn., A unit of government authorized by law to perform a specific function. [Archives] \nn., An organization entity whose name and legal existence are established by an act, which defines its position in an\nadministrative hierarchy. Such a body possesses powers defined by law or regulations and a head with decision-making authority at his\/her hie"} {"text":"rarchical level. Usually each agency has its own recordkeeping system. [Archives] \nn., The business carried on by an agent. [Government] \nn., A unit of governement that has major policy reponsiblities and that performs regulatory functions. [Government] \nn., The relationship between an agent and his principal. [Government] \nn., A business that provides services by acting on behalf of or as representative of another party. [General Dictionaries] \naffix \nn.,\n One who is authorized to act for or in place of an"} {"text":"other. [Archives] \nn., An active communicating entity that can acquire a role; that is, an abstract representation of a function, service, or identity. [Sciences] \nn., Person or company licenced by the state to represent clients and negotiate their contracts for a standard agent's fee. [Arts] \nn., People authorized to represent or act on behalf of someone else, particularly in business transactions. [Arts] \nn., An intermediary who performs various matters of business connected with the theatre. [Arts] \nn., "} {"text":"An individual or firm acting as a middleman between librarian and publisher in the acquistion of material. [Computer and Info\nrmation Sciences] \nn., In the client-server model, the part of the system that performs information preparation and exchange on behalf of a client or\nserver. Especially in the phrase \"intelligent agent\" it implies some kind of automatic process which can communicate with other\nagents to perform some collective task on behalf of one or more humans. [Computer and Information Sciences] "} {"text":"\nn., An autonomous system that receives information from its environment, processes it, and performs actions on that\nenvironment. Agents may have different degrees of intelligence or rationality, and may be implemented in software, hardware, or both. [Computer and Information Sciences] \nn., An agent is a business representative who handles contractual arrangements between the principal and third persons.\n[Government] \nn., Information presented in dial form (with pointer and graduated markings) or in LCD bar"} {"text":"-graph form. [Arts] \nn.,\n An archival unit composed of multiple archival documents, such as a fonds, series or file. [Archives] \nn., A representation of an object that resembles the original. Analogue devices monitor conditions, such as movement,\ntemperature and sound, and convert them into analogous electronic or mechanical patterns. Analogue implies continuous\noperation in contrast with digital, which is broken up into numbers. [Computer and Information Sciences] \nn., See\n: archival aggregation; arranged "} {"text":"records; records aggregation. [Archives] \nserver. Especially in the phrase \"intelligent agent\" it implies some kind of automatic process which can communicate with other\nn.,\n An act done to a document after its completion whereby its meaning or language is changed. [Archives] \nn., An act done to an instrument, after its execution whereby its meaning or language is changed; esp., the changing of a term \nin a negotiable instrument without the consent of all parties to it. Material alterations void an instrume"} {"text":"nt, but immaterial ones do not. \nv., Use for modifications to an object or structure. Refers especially to the physical evidence of the change. In architecture, use\n\"additions\" if the change increases the structure's volume; \"alterations\" if it does not. [Arts] \nanalogue \nn., (ASCII) The binary code used by most computers to represent in digital format the uppercase and lowercase letters of the Latin script, numerals, and special characters so that they can be sent to, and understood by, other computers and"} {"text":" devices such as modems and printers. Each ASCII character consists of seven information bits and one parity bit for error checking. [Computer and Information Sciences] \naggregated records \na., The representation of an object or physical process through the use of continuously variable electronic signals or mechanical patterns. In contrast to a digitally-encoded representation of an object or physical process, an analogue representation resembles the original. [General Dictionaries] \nn., Using physical vari"} {"text":"ables (\"seeable images\" and sound waves decodable without significant technological assistance). Analog records suffer degradation with each subsequent generation of copying. \nn., Representing data by measuring a continuous physical variable, such as the rotation of hands on a clock, in contrast to a\ndigital clock. \nn., Information recorded and stored in a varying continuous form (with physical variables) in direct correlation to the original\ninformation. [Arts] \nn., Information presented in dial form (with"} {"text":" pointer and graduated markings) or in LCD bar-graph form. [Arts] n., A description of a continuously variable signal or a circuit or device designed to handle such signals. Opp.: 'digital' or\n'discrete'. [Computer and Information Sciences] \nn., A representation of an object that resembles the original. Analogue devices monitor conditions, such as movement, temperature and sound, and convert them into analogous electronic or mechanical patterns. Analogue implies continuous operation in contrast with digital"} {"text":", which is broken up into numbers. [Computer and Information Sciences] \na., The representation of an object or physical process through the use of continuously variable electronic signals or\nmechanical patterns. In contrast to a digitally-encoded representation of an object or physical process, an analogue\nrepresentation resembles the original. [General Dictionaries] \nn.,\n An analogue object that is part of one or more analogue documents, requiring a given preservation action. [Archives] \nannotation \nn., Th"} {"text":"e smallest meaningful units of information, expressed as continuous electronic signals or mechanical patterns affixed to an analogue medium. [Sciences] \nanalogue object \nn., An analogue component, or group of components, that is affixed to an analogue medium and is treated and managed as a document. [Archives] \nanalogue system \nn., The use of continuously variable electronic signals or mechanical patterns rather than discrete numeric values (such as those generated by a digital system). [Sciences] \nanalogue"} {"text":" encoding \nn., Physical material, such as a paper, parchment, stone, clay, film or certain types of magnetic audio- and videotape, used for storage of analogue data. [Archives] \nn.,\nn.,\n A discrete aggregation of one type or class of analogue data (e.g., text, audio, video, image). [Archives] \nn.,n.,\n An analogue document that is treated and managed as a record. [Archives] \n Any system handling analogue data or objects, as opposed to a digital system. [Sciences] \nn.,\n Any system handling analogue data or ob"} {"text":"jects, as opposed to a digital system. [Sciences] \nn., Physical material, such as a paper, parchment, stone, clay, film or certain types of magnetic audio- and videotape,\nused for storage of analogue data. [Archives] \nn.,\n An addition made to a record after it has been created. [Archives] \nn., \u201cAnnotations (additions made to a record after it has been created) constitute the next category of elements included in the\n Template for Analysis. They fall into three basic groups:\n1. additions made to the record a"} {"text":"fter its creation as part of its execution (e.g., the date and time of transmission added to an e-mail\n record at the moment it is sent, or the indication of attachments added before it is transmitted);\n2. additions made to the record in the course of handling the business matter in which the record participates (e.g., comments\n noted on the face of the record, or embedded in it, and dates of transmission to other offices);\n3. additions made to the record in the course of handling it for records management "} {"text":"purposes (e.g., the classification code or file\n number assigned to the record, its draft) [Archives] \nn., Information, especially explanatory notes, added to a completed document. [Archives] \nn., Notes added as comment or explanation. [Arts] \nn., A brief note, usually no longer than two or three sentences, added after a citation in a bibliography to describe or explain the\ncontent or message of the work cited or to comment on it. \nExample: \nBradbury, Malcolm, ed. The Atlas of Literature. London: De Agostin"} {"text":"i Editions, 1997. \nA heavily-illustrated international thematic history of the relationship between geography and literature, from the Middle Ages\nand Renaissance to the post-Cold War era. Includes references for further reading and a list of places to visit by country.\nIn a more general sense, any brief explanatory or descriptive comment added to a document, text, catalog entry, etc. In a critical\nannotation, the commentary is evaluative. Also refers to the process of annotating a document or entry in a bi"} {"text":"bliography or\ncatalog. \n[Arts] \nn., A note added to an entry in a catalogue, reading list or bibliography to elucidate, evaluate or describe the subject and contents\n of a book; it sometimes gives particulars of the author. [Computer and Information Sciences] \nn., A new commentary node linked to an existing node. If readers, as well as authors, can annotate nodes, then they can immediate\nly provide feedback if the information is misleading, out of date or plain wrong. [Computer and Information Sciences] \nn"} {"text":"., Explanation added to a program to assist the reader. This may take the form of manuscript additions to the program listing, but\nmore often takes the form of comments included in the program text. [Computer and Information Sciences] \nn., A basic archival function of determining the eventual disposal of records based upon their archival value. Also referred to as\nn.,\n Initialism for \u201cAmerican National Standards Institute.\u201d [Government] \nn., Software that constitutes any type of program that is tailored to "} {"text":"satisfy real-world needs and requirements. [Archives] \nn.,\n Initialism for \u201capplication programming interface.\u201d [Computer and Information Sciences] \nsoftware such as the operating system kernel, server processes and libraries which exists to support application programs.\nn., Computer software that allows the user to process data or perform calculations necessary to achieve a desired result, as opposed to the operating system designed to control the computer's hardware and run all other programs. [Computer a"} {"text":"nd Information Sciences] \nn., Computer programs, or collections of programs, designed to meet the needs of the users of computer systems by directly c\nontributing to the performance of specific roles. [Sciences] \nn., Software that constitutes any type of program that is tailored to satisfy real-world needs and requirements. [Archives] \nn., A program written to perform a particular function and increasingly used to refer to software packages in general. [Computer and Information Sciences] \nn., A complete, se"} {"text":"lf-contained program that performs a specific function directly for the user. This is in contrast to \nsystem\nsoftware such as the operating system kernel, server processes and libraries which exists to support application programs.\n[Computer and Information Sciences] \nn., Computer programs, procedures, rules, and any associated documentation concerned with the operation of a data processing system. Encarta. Computer programs and applications, such as word processing or database packages, that can be run on "} {"text":"a particular computer system. ICA Dictionary. A set of computer programs, procedures and associated documentation concerned with the operation of an automatic data processing system as distinct from hardware. US NARA, Federal Records. The programs used to operate a computer, as well as the documentation describing how to use them. [General Dictionaries] \nn., Software that constitutes any type of program that is tailored to satisfy real-world needs and requirements. [General \nDictionaries] \napplication \nn.,"} {"text":" A fully conforming instantiation of an element set for a particular community, created to adapt an element set into a package tailored to the functional requirements of a particular application while retaining interoperability with the base standard. Can involve mixing and matching terms from multiple standards to meet the descriptive needs of a particular project or service. [General Dictionaries] \napplication programming interface \nn., (API) A set of routines, protocols and tools for building software ap"} {"text":"plications; specifically, establishing the interface (calling conventions) by which a software application accesses the operating system and other services. [Computer and Information Sciences] \nn.,\nn., The process of assessing the value of records for the purpose of determining the length and conditions of their preservation. [Archives] \nn., Refers to the process of evaluating records to determine whether they are to be archived indefinitely, retained for a shorter period, or disposed of in some other way ("} {"text":"sold, donated, destroyed, etc.). \nn., The process of identifying materials to be preserved because of their enduring value, especially those material\ns to be\nphysically transferred to an archives. [Archives] \nn., A basic archival function of determining the eventual disposal of records based upon their archival value. Also refer\nred to as\nevaluation, review, selection or selective retention. [Archives] \nn., The process of determining the value and thus the disposition of records based upon their current adm"} {"text":"inistrative, legal, and fiscal use; their evidential and information value; their arrangement and condition; their intrinsic value; and their relationship to other records. [Archives] n., The process of determining the length of time records should be retained, based on legal requirements and on their current and\npotential usefulness. [Archives] \nn., The act of estimating the nature, quality, importance etc.of something. [Archives] \nn., A basic archival function aimed at determining the disposition or dispo"} {"text":"sal of records, that is, usually either their continuing\npreservation or their destruction. In some cases, records may be alienated from their creator. Appraisal involves making a\njudgement or estimation of the worthiness of continued preservation of records. [Archives] \nn., Appraisal assesses the continuing value of the records but it also assembles evidence for the presumption of their authenticity,\nand identifies the digital components or objects that need to be stored and reproduced to ensure the preser"} {"text":"vation of authentic\nrecords. [Archives] \nn., The process of evaluating documents for the purpose of continuing preservation. [Archives] \nn., Printed or written statements of evaluation or estimate of the market or other value, cost, utility or other attribute of land,\nbuildings, works of art, or other objects of property, by qualified persons. [Arts] \nn., The monetary valuation of a gift, usually determined at the request of a library, museum, or archives by a professional\nappraiser familiar with the market"} {"text":" for the type of item. [Computer and Information Sciences] \nn., The process of analyzing and selecting records in order to determine which are suitable for retention as archives. [Computer\nand Information Sciences] \nn., Determining the market value of an item; see monetary appraisal. [General Dictionaries] \nand Information Sciences] \nn., Determinations of the retention periods and disposition of records, including the terms and conditions of transfer from the creator to the preserver. [Models (MCP)] \narchit"} {"text":"ecture \nn., The rules and conventions of the entity responsible for permanent preservation that govern the appraisal of records. [Archives] \narchival bond \nn., [diplomatics] An intrinsic element of documentary form that comprises a wish for the realization of the content of the document. [Archives] \nappraisal decisions \nn., [computing] Design, the way components fit together. The term architecture can refer to either hardware or software, or to a combination of hardware and software. The architecture of a s"} {"text":"ystem always defines its broad outlines, and may define precise mechanisms as well. [Computer and Information Sciences] \narchival arrangement \nn.,\n The whole of the archival documents comprising an aggregate archival unit. [Archives] \n The whole of the archival documents comprising an aggregate archival unit. [Archives] \nn.,\n The process of identifying archival documents as they belong to groupings within a fonds. [Archives] \nn., Determinations of the retention periods and disposition of records, including "} {"text":"the terms and conditions of transfer\nfrom the creator to the preserver. [Models (MCP)] \nn., The network of relationships that each record has with the records belonging in the same records aggregation. [Archi\nves] \nn.,\n The interrelationships between a record and other records resulting from the same activity. [Archives] \nn., The originary, necessary and determined web of relationships that each record has at the moment at which it is made or received with the records that belong in the same aggregation. It"} {"text":" is an incremental relationship which begins when a record isfirst connected to another in the course of action (e.g., a letter requesting information is linked by an archival bond to the draft or copy of the record replying to it, and filed with it. The one gives meaning to the other). [Archives] \nn., The relationship that links each record, incrementally, to the previous and subsequent ones and to all those which par\nticipate\nin the same activity. It is originary (i.e., it comes into existence when a reco"} {"text":"rd is made or received and set aside), necessary (i.e.,\nit exists for every record), and determined (i.e., it is characterized by the purpose of the record). [Archives] \nn., A grade of paper that is durable and has a long life expectancy. [Archives] \nit exists for every record), and determined (i.e., it is characterized by the purpose of the record). [Archives] \nn., The date on which a record is set aside by inserting it in the aggregation to which it belongs and classifying it. [Archives] \nn.,\n The date as"} {"text":"signed to a record by the records office. [Archives] \nn., Traditionally it has been a function of archival description to authenticate the records and perpetuate their administrative and\ndocumentary relationships. [Archives] \nn., The creation of an accurate representation of a unit of description and its component parts, if any, by capturing, analyzing, organizing and recording information that serves to identify, manage, locate and explain archival materials and the context and records systems which produc"} {"text":"ed it.S yn.: description. [Archives] \nn., The process of capturing, collating, analyzing, controlling, exchanging, and providing access to information about 1) the origin, context, and provenance of different sets of records, 2) their filing structure, 3) their form and content, 4)their relationship with other records, and 5) the ways in which they can be found and used. [Archives] \nn., A written representation of archival material. [Archives] \nn., Traditionally it has been a function of archival descriptio"} {"text":"n to authenticate the records and perpetuate their administrative and documentary relationships. [Archives] \nn., The process analyzing, organizing, and recording details about the formal elements of a record or collection of records, such\nas creator of, title, dates, extent, and contents, to facilitate the work's identification, management, and understanding. [Archives] \nn., The process of recording information about the nature and makeup of archives to achieve administrative and\/or intellectual\ncontrol. [A"} {"text":"rchives] \nn., The equivalent for archives of cataloguing in librarianship. The most common standards in use are MAD, RAD and APPM.\n[Computer and Information Sciences] \narchival description \nn., The set of descriptive instruments that provide intellectual and physical control over the records of an archival institution or program. Includes, but is not limited to, guides, inventories, indexes, repository locators. [Archives] \narchival documentation \nn., See\n: record. [Archives] \nn., Seen., The information pro"} {"text":"vided by a creator and the repository which provides enough information to establish provenance, history and context of acquired records and to enable its use by others. [Archives] \n: record. [Archives] \nn., See\n: fonds. [Archives] \nn., The set of descriptive instruments that provide intellectual and physical control over the records of an archival\ninstitution or program. Includes, but is not limited to, guides, inventories, indexes, repository locators. [Archives] \nn., The whole of the policies, strategies"} {"text":" and procedures, based on archival concepts, principles and methods, that con\ntrol recordkeeping and preservation. [Archives] \nn., The whole of the policies, strategies and procedures, based on archival concepts, principles and methods, that\ncontrol recordkeeping and preservation. [Archives] \nn., The application of principles and procedures articulated and developed from archival theory. The analysis, recording and maintenance of the links between the function of the information recorded on the one hand and"} {"text":" its form, structure and provenancial context on the other. [Archives] \nSee\nSee\n: records preservation [Archives] \nn., [place] A place where records selected for permanent preservation are kept. [Archives] \nSee\n: records preservation system [Archives] \nn., The whole of the principles, policies, and strategies adopted by an archival institution or program for maintaining digital components and related information over time, and for reproducing the related authentic records and\/or archival aggregations of rec"} {"text":"ords, that is produced by interpreting external controls and applying them to the records selected for preservation. [Archives] \nconduct of affairs, and preserved. Syn.: fonds. [Archives] \nn., A systematic body of knowledge that supports the practice of appraising, acquiring, authenticating, preserving, and\n providing access to recorded materials. [Archives] \nv., To save digital data, documents, and records, typically those that are not current, offline. [Computer and Information\nSciences] \nn., Any of the g"} {"text":"roupings of archival documents comprising a fonds, as delineated during the process of archival arrangem\nent. An archival unit can be a fonds, series, file, item or variation thereof, depending on institutional standards. \nA unit may be divided into sub-units for the purposes of archival description. The smallest (and therefore indivisible) archival unit is the item. [Archives] \nn., Any of the groupings of archival documents comprising a fonds, as delineated during the process of archival\narrangement. An ar"} {"text":"chival unit can be a fonds, series, file, item or variation thereof, depending on institutional standards.\nA unit may be divided into sub-units for the purposes of archival description. The smallest (and therefore indivisible)\narchival unit is the item. [Archives] \nv., To save digital data, documents, and records, typically those that are not current, offline. [Computer and Information Sciences] \nv., To transfer records from the individual or office of creation to a repository authorized to appraise, preser"} {"text":"ve, and provide\naccess to those records. [Archives] \nn., A repository for information that the user wishes to retain, but without requiring immediate access. (The word is also used as\na verb: to transfer into the archive system.) There are three quite different activities that must be distinguished:\n(a) the routine taking of backup copies, initiated by the system manager, to protect users and system managers against corruption\nof stored information;\n(b) the autonomous transferring of information from a high"} {"text":"er-performance to a lower-performance storage system, initiated by\nthe operating system, to achieve economies in the total cost to the system manager of information storage;\n(c) the voluntary transferring of a file between normal file storage and archive storage, initiated by the user, to achieve\neconomies in the total costs to the user of information storage. [Computer and Information Sciences] \nv., To save data onto the disk. [Computer and Information Sciences] \nv., To transfer files to slower, cheaper me"} {"text":"dia (usually magnetic tape) to free the hard disk space they occupied. This is now\nnormally done for long-term storage but in the 1960s, when disk was much more expensive, files were often shuffled regularly\nbetween disk and tape. [Computer and Information Sciences] \nn., A single file containing one or (usually) more separate files plus information to allow them to be extracted (separated) by a\nsuitable program. [Computer and Information Sciences] \nv., To copy data onto a different disk or tape for backup. "} {"text":"Archived files are often compressed to maximize storage media.\n[Computer and Information Sciences] \nbetween disk and tape. [Computer and Information Sciences] \nn., [place] A place where records selected for permanent preservation are kept. [Archives] \nn., [institution] An agency or institution responsible for the preservation and communication of records selected for\npermanent preservation. [Archives] \nn., [records] The whole of the documents made and received by a juridical or physical person or organizati"} {"text":"on in the\nconduct of affairs, and preserved. Syn.: fonds. [Archives] \nn., [place] The building (or portion thereof) housing archival collections. [Archives] \n \nn., [institution] The division within an organization responsible for maintaining the organization's records of enduring value.\n[Archives] \nn., [records] Non-current records preserved, with or without selection, by those responsible for their creation or by their\nsuccessors in function for their own use or by an appropriate archives because of their "} {"text":"archival value. [Archives] \nn., [records] The whole of the records of a creator. [Archives] \nn., [records] The whole of the records created by an agency and preserved. Alias: archival fonds. [Archives] \nn., [records] 1) The documents created or received and accumulated by a person or organization in the course of the conduct of]\naffairs, and preserved because of their continuing value. Historically, the term referred more narrowly to the noncurrent records\n[inactive records] of an organization or institutio"} {"text":"n preserved because of their on going value. [Archives] \nn., [institution] An organization which collects the archives of individuals, families, or other organizations; a collecting\nrepository. [Archives] \nn., [institution] The agency or program responsible for selecting, acquiring, preserving, and making available archival materials;\nalso referred to as an archival agency, archival institution or archival program. [Archives] \nn., [institution] An agency or institution responsible for the acquisition, prese"} {"text":"rvation, and communication of archives selected for\npermanent preservation. [Archives] \nn., [place] Rooms or sets of rooms for the systematic maintenance and storage of records and documents. [Arts] \nn., Archival documents contain accurate and detailed information relevant to many aspects of musical scholarship: to biography,\nchronology, history of institutions and societies, the place and function of musicians in society, performing practice (in the fullest\nsense of that phrase) and many others. They yield"} {"text":" the kind of information that primarily musical manuscripts and printed sources\ncannot provide.\nThe term \u2018archive\u2019 is here used as defined under \u00a71 below. It is also widely used in a second sense, to denote what bibliographers\nwould classify as a \u2018collection\u2019 or even \u2018library\u2019: the Deutsches Musikgeschichtliches Archiv in Kassel, for example, is a library\nof photographic materials relating to sources of German music. Many collections fall halfway between an archive in the strict\nsense, consisting of the sur"} {"text":"viving papers of a historical person, and a collection, which may include material added by\nsubsequent collectors. Such a case is the collection in the Library of Congress known as the \u2018Rachmaninoff Archives\u2019. See also\nLibraries; Collections, private; and Sound archives.\n1. Types of archive.\n2. Preservation; location.\n3. Archival research.\n4. Application to music history.\n5. Skills; aids.\n[Arts] \nn., [records] Collections of original records. [Arts] \nn., [records] An accumulation of original records assembl"} {"text":"ed in the course of the activities of a person or persons, or of a public\nor private organization; or such records from a number of different sources; and kept together to ensure their preservation and to\npromote their use. [Computer and Information Sciences] \nn., [records] Records in any medium which were compiled for the purpose of, or use during, a public or private business\ntransaction of which they themselves formed a part; and which were selected for preservation by the persons concerned with the\ntran"} {"text":"saction, or their successors or delegates, for their own use and as material for research or reference. [Computer and\nInformation Sciences] \nsubsequent collectors. Such a case is the collection in the Library of Congress known as the \u2018Rachmaninoff Archives\u2019. See also\nn.,\n A professional educated in archival science and\/or responsible for the administration of archives. [Archives] \nn., A person professionally occupied in the administration of archives and\/or the management of archives. [Archives] \nn., An ind"} {"text":"ividual responsible for appraising, acquiring, arranging and describing, preserving, and providing access to records of\nenduring value, and who relies on the principles of provenance, original order, and collective control to protect the materials\u2019\nauthenticity and context. [Archives] \nn., A person professionally educated, trained, experienced and engaged in the administration of archival materials including the\nfollowing activities: appraisal and disposition, acquisition, preservation, arrangement and desc"} {"text":"ription, reference service andoutreach. [Archives] \nn., Persons concerned with collecting, evaluating, systemizing, preserving, and making available for reference public records \nand documents of historical significance. [Arts] \nn., A person who is responsible for the management of archives. [Computer and Information Sciences] \nenactment or the subscription). Usually, the subscription takes the form of a signature, but this is not always so; for example\nn., Records of a creator that have been identified as "} {"text":"to their provenance and relationships according to the concepts and principles of archival arrangement. [Models (MCP)] \nn., The signature of witnesses to the making of a will or deed. Under the Wills Act 1837 as amended the testator must\nacknowledge his signature (see acknowledgment) in the presence of two witnesses who must each sign (attest) at the same\ntime in the testator's presence. The signature of each party to a deed must be attested by one witness. [Government] \nSee\n: archival arrangement [Archives"} {"text":"] \naddress. Nontext attachments, such as graphics and database files, may require special encoding and decoding software.\nn.,\n Initialism for \u201cAmerican standard code for information interchange.\u201d [Computer and Information Sciences] \nn., A minimal characteristic of an artefact such that it cannot be further subdivided; attributes commonly studied include aspects\nof form, style, decoration, colour, and raw material. [Sciences] \nn., The determination of whether a document has all the formal elements that it wa"} {"text":"s supposed to present when first made or received and set aside. [Archives] \nattribute is used to classify artifacts into groups and describes objects in terms of their physical traits. [Sciences] \nn.,\n A document that, on its being physically connected to a record by an act, becomes part of that record. [Archives] \nn., Somthing physically added or appended to a document. Also referred to as an annexe or enclosure. [Archives] \nn., A computer file of any type linked to an e-mail message in such a way that th"} {"text":"e two are transmitted together to the designated\naddress. Nontext attachments, such as graphics and database files, may require special encoding and decoding software. \n[Computer and Information Sciences] \nn., A device attached to a machine or implement. [General Dictionaries] \nattachment \nn., [diplomatics] An intrinsic element of documentary form that comprises the written validation of a record (by subscription, superscription or any identifying sign having such function) by those who took part in the iss"} {"text":"uing of it (author, writer, countersigner) and by witnesses to the action or to the signing of the record. [Archives] \nn., A concluding portion of a document, especially a formal record, signed by witnesses and often containing language intended to strengthen the presumption that all statutory requirements have been met. [Archives] \nn., The subscription of those who took part in the issuing of the document (author, writer, coutersigner, and of witnesses to the\nenactment or the subscription). Usually, the su"} {"text":"bscription takes the form of a signature, but this is not always so; for example\ntelegrams and electronic mail messages present subscriptions which are not signatures. [Archives] \nn., The signature of witnesses to the making of a will or deed. Under the Wills Act 1837 as amended the testator must acknowledge his signature (see acknowledgment) in the presence of two witnesses who must each sign (attest) at the same time in the testator's presence. The signature of each party to a deed must be attested by one"} {"text":" witness. [Government] \nSeen.,\n [diplomatics] The characteristics that uniquely identify a record. [Archives] \nn., A minimal characteristic of an artefact such that it cannot be further subdivided; attributes commonly studied include aspects of form, style, decoration, colour, and raw material. [Sciences] \nn., A distinct, individual characteristic of an artifact, which cannot be further subdivided and distinguishes i\nt from another. An\nattribute is used to classify artifacts into groups and describes object"} {"text":"s in terms of their physical traits. [Sciences] \nn., [attributes] Refers most often to characteristics of individual objects, items, or entities, mostly expressions used \nto describe\nthe thin g. Often readi ly apparent t hough not qua ntif iabl e by an establis hed s tan dard . [Arts] \nn., Objects conventionally associated with a person (real or imaginary) by means of which he or she can be identified when portrayed in art. Saints are often shown with the instruments of their martyrdom or torture\u2014Catheri"} {"text":"ne with her wheel and Lawrence with his gridiron, for instance. Other examples are Jove's thunderbolts, the club of Hercules, the scales of Justice, or the anchor of Hope. While some of these were used widely and in many contexts, other attributes were more variable, and in certain periods the invention of esoteric or enigmatic attributes was rife. [Arts] n., A feature, characteristic, or property of a digital object. [Computer and Information Sciences] \nn., For printers and display screens, a characterist"} {"text":"ic that changes a font, for example from normal to boldface or underlined, or \nfrom normal to reverse video. [Computer and Information Sciences] \nn., In co-ordinate indexing a characteristic mentioned as subject matter. [Computer and Information Sciences] \nn., A defined property of an entity, object, etc. In computer graphics it is a particular property that applies to a graphical output primitive; lines have attributes such as line width, color, and line style. See also ERA model, inheritance. [Computer an"} {"text":"d Information Sciences] \nn., A named value or relationship that exists for some or all instances of some entity and is directly associated with that instance.\n[Computer and Information Sciences] \nn., In relational database management, a field within a record. [Computer and Information Sciences] \nmight be made in the audit trail whenever a user logs in or accesses a file. Examination of the audit trail may detect attempts at\na.,\n Of or relating to the use of sound and\/or visual images to present information."} {"text":" [General Dictionaries] \nn., Objects conventionally associated with a person (real or imaginary) by means of which he or she can be identified when\nportrayed in art. Saints are often shown with the instruments of their martyrdom or torture\u2014Catherine with her wheel and\nLawrence with his gridiron, for instance. Other examples are Jove's thunderbolts, the club of Hercules, the scales of Justice, or\nthe anchor of Hope. While some of these were used widely and in many contexts, other attributes were more variabl"} {"text":"e, and in\ncertain periods the invention of esoteric or enigmatic attributes was rife. [Arts] \nn.,\n A record in pictorial and\/or aural form, regardless of format. [Archives] \nn., In co-ordinate indexing a characteristic mentioned as subject matter. [Computer and Information Sciences] \nn., Documentation of all the interactions with records within an electronic system in which any access to the system is recorded as i\nt occurs. [Archives] \nn., An electronic means of auditing all the interactions with records w"} {"text":"ithin an electronic system so that any access to the system can be documented as it occurs for the purpose of preventing unauthorized actions in relation to the records, e.g., modification, deletion, or addition, and of ensuring that changes in one of its components do not cause errors elsewhere in the system (the closest correspondent means for the non-electronic components of the records system is the charge-out procedure which controls access to dossiers and their movement within the agency). [Archives] "} {"text":"\nn., Information in records that track a transaction from beginning to end, making it possible to review whether it was done\naccording to relevant policies and standards. [Archives] \nn., Information about transactions or other activities which have affected or changed entities (e.g. metadata elements), held in\nsufficient detail to allow the reconstruction of a previous activity. [Archives] \nn., A record showing the occurrence of specified events relevant to the security of a computer system. For example, an"} {"text":" entry\nmight be made in the audit trail whenever a user logs in or accesses a file. Examination of the audit trail may detect attempts at\nviolating the security of the system and help to identify the violator. [Computer and Information Sciences] \nn., Methods to demonstrate that records were effectively protected from unauthorized, use, alteration or destruction. [General Dictionaries] \na.,\nn., A record which is a representation of words, music, or any other manifestation of sound that can only be perceived "} {"text":"by hearing it. [Archives] \nn.,\nn., A copy certified by an official authorized to execute such a function, so as to render it legally admissible in court. [Government] \n A record that is what it purports to be and that is free from tampering or corruption. [Archives] \nn.,\n A record that is what it purports to be and that is free from tampering or corruption. [Archives] \nn.,\n A record whose creator or author has been definitely established; it really proceeds from its stated author. [Archives] \nn., Records th"} {"text":"at can be proven to be genuine. Authenticity is conferred on a record by its mode, form, and\/or state of\n transmission, and\/or manner of preservation and custody. [Archives] \nn., An authentic record is one that can be proven: To be what it purports to be; to have been created or sent by the person\npurported to have created or sent it; to have been created or sent at the time purported. [General Dictionaries] \nv., To establish an individual's identity in order to grant access to a system or resources to whic"} {"text":"h the individual is authorized.\n[Archives] \nv., To declare, either orally, in writing, or by affixion of a seal, that an entity is what it purports to be, after having verified its identity. [General Dictionaries] \nv., To establish an individual's identity in order to grant access to a system or resources to which the individual is authorized. [Archives] \nv., To verify that a thing is what it purports to be. [Archives] \nis, when it was created, by whom, what action or matter it participated in, and what its"} {"text":" juridical\/administrative, cultural, and\nn., A record whose authenticity has been declared at a specific point in time by a juridical person entrusted with the au\nthority to make such a declaration (e.g. public officer, notary, certification authority). [General Dictionaries] \nor, if not, what is missing. [Archives] \nn., A declaration of a record\u2019s authenticity at a specific point in time by a juridical person entrusted with the authority to make such a declaration (e.g., public officer, notary, certificati"} {"text":"on authority). [Archives] \nstructure, content, and context. [Archives] \nn., The trustworthiness of a record as a record; i.e., the quality of a record that is what it purports to be and that is free from tampering or corruption. [Archives] \nn., The concept of authenticity is defined as \u201cthe quality of being authentic, or entitled to acceptance\u201d. [Archives] \nn., Established by assessing the identity and the integrity of the record. It must be possible to ascertain at all times what a record\nis, when it was c"} {"text":"reated, by whom, what action or matter it participated in, and what its juridical\/administrative, cultural, and\ndocumentary contexts were. It must also be possible to ascertain the wholeness and soundness of the record: whether it is intact\nor, if not, what is missing. [Archives] \nn., The judgment that something is genuine, based on internal and external evidence, including its physical characteristics,\nstructure, content, and context. [Archives] \nn., The quality of being authentic, or entitled to acceptanc"} {"text":"e. As being authoritative or duly authorized, as being what it professes\nin origin or authorship, as being genuine. [Archives] \nn., The quality of a document of having the character and authority of the original. [Archives] \nn., In Jenkinson\u2019s formulation, the quality of archives deriving from their being preserved in the continuous custody and for the\ninformation of their creator and its legitimate successors. [Archives] \nn., The quality of archival documents to bear authentic testimony of the actions, pro"} {"text":"cesses, and procedures which brought them into being. [Archives] \nn., Requires that the scene has not been tampered with. [photography] [Arts] \nn., Whether the image had a verifiable provenance that could establish its authenticity. [Arts] \nn., The trustworthiness of a digital entity, to its being what it professes to be, as regards its identity, origin, history, authorship,\nintegrity, and\/or the accuracy with which it documents an original work. [Arts] \nn., The most common use refers to classes of performa"} {"text":"nce that might synonymously be termed 'historically informed' or,\n'historically aware, 'or employing 'period' or 'original' instruments and techniques. [Arts] \nn., So the claim of authenticity was based on identification of a photographer a time and place of exposure and a chain of\ntransmission. [Arts] \nn., The term 'authenticity' can also be applied, as in the popular art world, to works that are proved to be genuine, demonstrated\nby the work of a particular composer. [Arts] \nn., An authentic performance i"} {"text":"s (at least) an accurate performance of a work. [Arts] \nn., The quality of being genuine or original. [Arts] \nn., The presence of the original is the prerequisite to the concept of authenticity. [Arts] \nn., The nature of the link between a composer and a work that bears his or her name. [A version of music is authentic]in terms of s\ncoring, number of movements [and is] the authentic musical text with respect to pitches, rhythm, and the like as the composer\n wrote it. [Arts] \nn., Authenticity and genuineness"} {"text":" of photographs examine the photograph as a physical object and a visual image. It is here that\nthe diplomatic notion of authenticity is useful, because it requires that we analyze the photograph in terms of its physical\ncomposition, the correspondence between the image and reality it depicts, and the relationship between the image and its label in\norder to understand the functional context in which the photographic image is transformed into a photographic document. [Arts] \nn., The term \u2018authenticity\u2019 has b"} {"text":"een used in several senses relating to music. The most common use refers to classes of\nperformance that might synonymously be termed \u2018historically informed\u2019 or \u2018historically aware\u2019, or employing \u2018period\u2019 or\n\u2018original\u2019 instruments and techniques. [Arts] \nn., Authenticity in transcription is a relation notion that opertes within the gap between transcriptions that are barely recognizable as such and transcriptions that preserve the musical content of the original work as fully as is consistent with respectng "} {"text":"the characteristics of the medium for which the transcriptions is written. [Arts] \nn., The authenticity of a photographic print should be based on certification by the photographer. Even if two prints were\nvirtually (or even actually)indistinguishable, only the one certified by the photographer would count as genuine or authentic.\n[Arts] \nn., The quality in a thing of being what it is claimed to be (valid, real, genuine, etc.), verified in archives and special colle\nctions through an investigative process k"} {"text":"nown as authentication, essential in appraising the value of an item. See also: forge\nry. [Computer and Information Sciences] \nn., Authenticity and genuineness of photographs examine the photograph as a physical object and a visual image. It is here that\nn., The specification of the elements of form and context that need to be preserved in order to maintain the authenticity of a given type of electronic record. [Archives] \ncomposition, the correspondence between the image and reality it depicts, and the rel"} {"text":"ationship between the image and its label in\nn., The physical or juridical person having the authority and capacity to issue the record or in whose name or by whose command the record has been issued. [Archives] \nn., May be an individual or organisation. To be captured whenever possible. [Archives] \nn., The individual, group, or organization responsible for the content of a document. [Archives] \nn., The person competent, that is, having the authority and capacity, for generating the record, which is issued "} {"text":"by it, by its\ncommand, or in its name. The author of the record may coincide with the author of the action in which the record participates or\nit may not. [Archives] \nn., Persons who write or otherwise compose books, articles, poems, plays, or other works which involve literary composition and\nare intended for publication. [Arts] \nn., The person, persons or corporate body, responsible for the writing or compilation fo a book or other publication not a\nperiodical. [Computer and Information Sciences] \nauthori"} {"text":"tative copy \nn., The instantiation of a record that is considered by the creator to be its official record and is usually subject to procedural controls that are not required for other instantiations. [Archives] \nn., A record that is considered by the creator to be its official record and is usually subject to procedural controls that are not required for other copies. The identification of authoritative records corresponds to the designation of an office of primary responsibility as one of the components o"} {"text":"f a records retention schedule\u2026It is understood that in certain circumstances there may be multiple authoritative copies of records, depending on the purpose for which the record is created. [Archives] \nn., The copy of a record that is considered to be its official record and is usually subject to procedural controls tha\nt are not\nrequired for other copies. [Archives] \nn., The physical or juridical person having the authority and capacity to issue the record or in whose name or by whose\ncommand the record h"} {"text":"as been issued. [Archives] \nn., A record that is considered by the creator to be its official record and is usually subject to procedural controls that\nare not required for other copies. The identification of authoritative records corresponds to the designation of an office of\n primary responsibility as one of the components of a records retention schedule. [Archives] \nbackup \nn., The version of a record that is considered by the creator to be its official record and is usually subject to procedural control"} {"text":"s that are not required for other versions. [Archives] \nauthority \nn., The right or permission to act legally on another's behalf; esp., the power of one person to affect another's legal relations by acts done in accordance with the other's manifestations of assent; the power delegated by a principal to an agent. [Government] \nn., Ability to persuade others by argument or example to accept one's decisions. [Sciences] \nn., The knowledge and experience that qualifies a person to write or speak as an expert on"} {"text":" a given subject. In the academic\ncommunity, authority is indicated by credentials, previously published works on the subject, institutional affiliation, awards,\nimprint, reviews, patterns of citation, etc. [Computer and Information Sciences] \nn.,n.,\n To make a copy of a data file for the purpose of system recovery. [Computer and Information Sciences] \nn., A database that contains and manages data for an information system, distinct from the presentation or interface\ncomponents of that system. [Computer and"} {"text":" Information Sciences] \nn., A database that contains and manages data for an information system, distinct from the presentation or interface compone\nnts of that system. [Computer and Information Sciences] \nn., The right or permission to act legally on another's behalf; esp., the power of one person to affect another's legal\nrelations by acts done in accordance with the other's manifestations of assent; the power delegated by a principal to an\nagent. [Government] \nn.,\n A copy of a data file made for the purp"} {"text":"ose of system recovery. [Computer and Information Sciences] \nn., A resource that can be used as a substitute in the event of, say, a fault in a component or system or loss of data from a computer file. A backup file is a copy of a file taken in case the original is destroyed or unintentionally altered and the data lost. [Sciences] \nn., A resource that is, or can be used as, a substitute when a primary resource fails or when a file has been corrupted. The word is\nalso used as a verb, to back up, i.e. to make"} {"text":" a copy in anticipation of future failure or corruption. Thus a dump forms a backup to\nbe used in cases where a user's file has become unusable; the taking of the dump can be regarded as backing up the version on\ndisk. [Computer and Information Sciences] \nn., A copy of an electronic file usually made and maintained for computer security purposes. [Computer and Information\nSciences] \nn., Additional resources or duplicate copies of data on different storage media for emergency purposes. [Computer and\nInformat"} {"text":"ion Sciences] \nn., A copy of all or portions of software or data files on a system kept on storage media, such as tape or disk, or on a separate\nsystem so that the files can be restored if the original data is deleted or damaged. [Computer and Information Sciences] \nv., To make a copy of all or portions of software or data files on a system on storage media or on a separate system for safety\npurposes. [Computer and Information Sciences] \nn., A duplicate copy of all or portions of software or data files on a"} {"text":" system made for safety purposes. [Computer and Information\nSciences] \nv., To make a copy of all or portions of software or data files on a system on storage media or on a separate system for safety\nn., The ability of a software application or a system to share data or commands with older versions of itself, or sometimes other older applications or systems, particularly applications or systems it intends to supplant. Sometimes backward compatibility is limited to being able to read old data but does not ext"} {"text":"end to being able to write data in a format that can be read by old versions. [Computer and Information Sciences] \nn., A duplicate copy of all or portions of software or data files on a system made for safety purposes. [Computer and Information\nn., The minimum conditions necessary to enable the preserver to attest to the authenticity of copies of a creator's digital records in the custody of the preserver. [Archives] \nbit \nn., A duplicate of a document saved in the file format in which it was originally cre"} {"text":"ated or in which it was last used and saved, thus making it more immediately accessible and human-readable in the creator\u2019s usual desktop environment. [Archives] \nbitstream \nn., The conditions that serve as a basis for the preserver\u2019s assessment of the authenticity of a creator's digital records during appraisal. [Archives] \nbinary code \nn., In the application of theory to real-life situations, a procedure that, when properly applied, consistently yields superior results and is therefore used as a reference"} {"text":" point in evaluating the effectiveness of alternative methods of accomplishing the same task. [General Dictionaries] \nbinary encoding \nn., A code made up of the digits 0 and 1, called bits, transmitted as a series of electrical pulses (0 bits at low voltage and 1 bits at higher voltage). [Computer and Information Sciences] \nSyn\nv., The process of converting data into electronic signals for computer storage and processin\ng purposes. [Computer and Information Sciences] \nn., In the application of theory to rea"} {"text":"l-life situations, a procedure that, when properly applied, consistently yields\nsuperior results and is therefore used as a reference point in evaluating the effectiveness of alternative methods\nof accomplishing the same task. [General Dictionaries] \nn., The smallest un it of data (re pr esente d by 0 o r 1) that a computer ca n h old in its memory . a nd Informati on Scie\nnces] \nSyn\n.: binary bit. [Computer\nn., A code made up of the digits 0 and 1, called bits, transmitted as a series of electrical puls"} {"text":"es (0 bits at low voltage and\n1 bits at higher voltage). [Computer and Information Sciences] \nn., A digital representation composed of dots arranged in rows and columns, each represented by a single bit of data that determines the value of a pixel in a monochrome image on a computer screen. In a gray scale or color image, each dot is composed of a set of bits that determine the individual values of a group of pixels that in combination create the visual impression of a specific shade or hue. Also spelled \u201cb"} {"text":"it map.\u201d [Computer and Information Sciences] \nn., A data file or structure which corresponds bit for bit with an image displayed on a screen, probably in the same format \nas it would be stored in the display's video memory or maybe as a device independent bitmap. [Computer and Information Sciences] \nn., A binary representation in which each bit or set of bits corresponds to some object (image, font etc.) or condition. \n[Computer\nand Information Sciences] \nn., An array of bits that map one to one to the mono"} {"text":"chrome image on a raster display. If a color or gray-level image is required,\nneeding many bits to define each pixel in the display, a pixmap is required. [Computer and Information Sciences] \nn., In computer graphics, an area in memory that represents the video image. For monochrome screens, one bit in the bitmap\nrepresents one pixel on screen. [Computer and Information Sciences] \nn., A raster image formed by an array of bits, each bit representing the corresponding pixel's value (light or dark). [Computer "} {"text":"and\nInformation Sciences] \nn., In computer graphics, an area in memory that represents the video image. For monochrome screens, one bit in the bitmap\nn., Digital data encoded in an unstructured sequence of binary bits that are transmitted, stored or received as a unit. Also spelled \u201cbit stream.\u201d [Computer and Information Sciences] \nn., A sequence of binary data transmitted, stored, or received as a unit without regard for internal organization or grouping. [Computer and Information Sciences] \nn., The transm"} {"text":"ission of binary signals. [Computer and Information Sciences] \ncd \nn., The changes to the form and\/or content of a digital record that are limited and controlled by fixed rules, so that the same query, request or interaction always generates the same result. [Computer and Information Sciences] \nbyte \nn.,\n A series of rules that governs the carrying out of a transaction. [Archives] \nn., Related activities, sequential or parallel, that have been systematically implemented to produce a specific service or prod"} {"text":"uct. [Archives] \ncalling convention \nn., An element in the machine data hierarchy larger than a bit and usually smaller than a word; now nearly always eight bits and the smallest addressable unit of digital storage. A byte typically holds one character. [Computer and\nInformation Sciences] \nbyte-serialized encoding \nn.,\n A bitstream in which data (binary bits) are grouped into units called bytes. [Computer and Information Sciences] \nn.,\nn., The process of converting a digital object\u2019s bitstream state to a by"} {"text":"te stream state. [Computer and Information Sciences] \nn.,n., In computer application programming, the arrangement of arguments (i.e., values or references) for a procedure or function call. [Computer and Information Sciences] \n A series of rules that governs the carrying out of a transaction. [Archives] \nv.,\n To save a particular instantiation or state of a digital component or group of components. [Archives] \nn., Any of various processes in which a system of particles absorbs an extra particle. [Sciences] "} {"text":"\nn., Registration, classification, addition of metadata and storage of a record in a system that manages record\ns. [Archives] \nn., The act of recording or saving a particular instantiation of a digital object. [Archives] \nv., To copy or save what is being displayed on a computer screen. [Arts] \nv., A technique from the film special effects and video game industry which enables a video artist or choreographer t\no \"capture\"\nthe movements of an actor or dancer digitally so that those movements can be reproduce"} {"text":"d by a virtual actor or dancer th\nat's been\ncomputer-generated. [Glossary of Technical Theatre Terms] [Arts] \nv., To save a particular state of a program. The term capture often refers to saving the information currently displayed on a\ndisplay screen. You can capture the screen to a printer or to a file. [Computer and Information Sciences] \nn., The act of recording in a permanent file. [General Dictionaries] \nv., To copy or save what is being displayed on a computer screen. [Arts] \nn.,\n A made or received d"} {"text":"igital document that is saved by the creator. [Archives] \ncomputer-generated. [Glossary of Technical Theatre Terms] [Arts] \nn.,\n Initialism for \u201ccompact disc.\u201d [Computer and Information Sciences] \nn., The act of recording in a permanent file. [General Dictionaries] \nn., Initialism for \u201cComit\u00e9 Europ\u00e9en de Normalisation\u201d (European Committee for Standard-ization). [Computer and Information Sciences\n] \ncharacter \nn., (CPU) The hardware component of a computer that houses the circuitry for storing and processing"} {"text":" data according to instructions contained in the programs installed on it. [Computer and Information Sciences] \ncharacter set \nn., A declaration by the creator or preserver that one or more reproduced or reproducible digital records is authentic. [Archives] \nn., A document included with a software program that proves the program was purchased legally and often has a unique identification number used to verify the program when being installed on the computer. [Computer and Information Sciences] \nchain of pre"} {"text":"servation \nn., A system of controls that extends over the entire lifecycle of records in order to ensure their identity and integrity over time. [Archives] \nn., The succession of offices or persons who held materials from the moment it was created. [Archives] \nn., The processes of creation, maintenance and use, disposition and preservation of records [MG]. A system of controls that\nextends over the entire lifecycle of records and ensures their identity and integrity in any action that affects the way the re"} {"text":"cords\nare represented in storage or presented for use [GL]. [Archives] \nn., One of a set of symbols, such as letters or numbers, that are arranged to express data and\/or information. [General\nDictionaries] \nn., One of a set of symbols, such as letters or numbers, that are arranged to express data and\/or information. [General\n Dictionaries] \n A group of symbols used in computing to print and display text electronically. [Computer and Information Sciences] \nn.,\n A group of symbols used in computing to print a"} {"text":"nd display text electronically. [Computer and Information Sciences] \nn., A system of controls that extends over the entire lifecycle of records in order to ensure their identity and integrity over\ntime. [Archives] \nn., The date (and, possibly, the time of day) of a record, included in the record by its author, or by the electronic system on the author\u2019s behalf, in the course of its compilation. Syn.: date of compilation. [Archives] \nn., A document included with a software program that proves the program was"} {"text":" purchased legally and often has a unique\nidentification number used to verify the program when being installed on the computer. [Computer and Information Sciences] \nn.,\n Text or other data in encrypted form; the product of plaintext after encryption. [Computer and Information Sciences] \nextends over the entire lifecycle of records and ensures their identity and integrity in any action that affects the way the records\nn., The systematic organization of records in groups or categories according to methods, p"} {"text":"rocedures, or conventions represented in a plan or scheme. [Archives] \nn., The ordering of archaeological data into groups (e.g. categories, classes, types) using various ordering systems. Monothetic\n classification is based on all the defined attributes being present all the time before something is accepted as part of a define\nd group. Polythetic classification allows overlapping subsets of attributes to be used in defining membership of a defined clas\ns. [Sciences] \nn., In remote sensing, the computer-as"} {"text":"sisted recognition of surface materials. The process assigns individual pixels of an image to\ncategories (e.g. vegetation, road) based on spectral characteristics compared to spectral characteristics of known parts of an\nimage (training areas). [Sciences] \nn., Any scheme for structuring data that is used to group individuals. [Sciences] \nn., The systematic identification and arrangement of documents in categories according to logically structured conventions,\nmethods and procedural rules represented in a cl"} {"text":"assification plan\/scheme. [Archives] \nn., Any method of recognizing relationships between documents. [Archives] \nn., The preparation of filing plan\/system or classification scheme for records\/archives and the placing of series and\/or items\nwithin such a plan\/system or scheme. [Archives] \nn., A 'coding' system within which the series of symbols indicating a concept, or semantemes, are subject to certain order relat\nionships. [Computer and Information Sciences] \nn., A scheme for the arrangement of books and o"} {"text":"ther material in a logical sequence according to subject or form. [Computer and\nInformation Sciences] \nn., Any method of recognizing relations, generic or other, between items of information, regardless of the degree of hierarchy\nused and of whether those methods are applied in connection with traditional or computerized information systems. [Compute\nr\nand Information Sciences] \nn., The arrangement of things in logical order according to their degrees of likeness. [Computer and Information Sciences] \nn., Th"} {"text":"e process of assigning restrictions to materials, allowing access to specific individuals. [General Dictionaries] \nn., The process of assigning material a code or heading indicating a category to which it belongs; see code. [General Dictionaries] \nn., Systematic identification and arrangement of business activities and\/or records into categories according to logically structured\nconventions, methods, and procedural rules represented in a classification system. [General Dictionaries] \nn., The organization of"} {"text":" materials into categories according to a scheme that identifies, distinguishes, and relates the categories.\n[General Dictionaries] \nn., The arrangement of concepts into classes and their subdivisions to express the relationship among them. The classes are\nrepresented by means of a notation. The classification scheme of a record-keeping system is based on the analysis of the\nfunctions, matters and typology of records to determine the rational and systematic aggregation of records: it facilitates the\ncapturi"} {"text":"ng of records and their organization in files, the retrieval and the security of records during the phase of records\nmanagement and also the historical research when records are permanently retained in historical archives. For each category and\nits subdivisions, records are connected as files of one year or two years or a different period of time: each file refers to a specific\ntransaction (or Affaire). (ICA Directives) [General Dictionaries] \ncapturing of records and their organization in files, the retrie"} {"text":"val and the security of records during the phase of records\nn., A series of alphabetical, numerical, or alphanumeric symbols used to identify the record in its documentary context. [Archives] \nits subdivisions, records are connected as files of one year or two years or a different period of time: each file refers to a specific\nn., A plan for the systematic identification and arrangement of business activities and records into categories according to logically structured conventions, methods and procedural r"} {"text":"ules. [Archives] \nclause \nn., A record, made or received by the creator, which has been given a classification code based on the classification scheme. [Archives] \ncompact disc \nv.,\n To arrange systematically in groups or categories according to established criteria. [Arts] \nv., The process of dividing objects or concepts into logically hierarchical classes, subclasses, and sub-subclasses based on the characteristics they have in common and those that distinguish them. Also used as a shortened form of the t"} {"text":"erm classification system or classification scheme. See also: Cataloging and Classification Section and cross-classification [Computer and Information Sciences] \nv., To bring individual items or persons with the same or similar characteristics together actually, or mentally, that is,conceptually. Also, in a secondary sense, to arrange classes in a classification, and to allocate the appropriate class number to a\nbook . [Compute r and In formation Sc ienc es] \nn., [diplomatics] Any of several textual formu"} {"text":"lae found after or within the disposition of a document that ensure the\nexecution of the act, avoid its violation, guarantee its validity, preserve the rights of third parties, attest the execution of\nthe required formalities, or indicate the means employed to give the document probative value. [Archives] \nn., [diplomatics] Any of several textual formulae found after or within the disposition of a document that ensure the ex\n[cution of the act, avoid its violation, guarantee its validity, preserve the right"} {"text":"s of third parties, attest the execution of the required formalities, or indicate the means employed to give the document probative value. [Archives] \nn., A plan for the systematic identification and arrangement of business activities and records into categories according to\nlogically structured conventions, methods and procedural rules. [Archives] \nn., (CD) A type of single-sided, optical digital medium that is capable of storing approximately 700 megabytes of digital data on one continuous, microscopic, s"} {"text":"piral track or groove that is cut and read by a laser beam. Its logical format specifications are governed by the ISO 9660 and 13490 standards. [Computer and Information Sciences] A sphere of functional responsibility entrusted to a physical or juridical person. [General Dictionaries] \nn., The ability of different devices or systems (e.g., programs, file formats, protocols, even programming languages\n) to work together or exchange data without modification. \na., Different systems (e.g., programs, file form"} {"text":"ats, protocols, even programming languages) that can work together or ex\nchange data are said to be compatible. [Computer and Information Sciences] \na., The ability of one device or program to work with another device or program. The term compatible implies different d\negrees\nof partnership. For example, a printer and a computer are said to be compatible if they can be connected to each other. A\nn IBM\ncompatible PC, on the other hand, is a computer that can run the same software as an IBM PC. \n[Computer and"} {"text":" Information Sciences] \ncompile \nn.,\n A sphere of functional responsibility entrusted to a physical or juridical person. [General Dictionaries] \nn., The ability to carry out a task or practice a skill; competence should be capable of evaluation and should be transferable between trainers and trainees. Core competencies are the central skills of a particular group of jobs. [Computer and Information Sciences] \nn., (of witnesses) The legal capacity of a person to be a witness. [Government] \nn., The mandate and"} {"text":" authority given to an office or person to accomplish something. [General Dictionaries] \nn.\n,\n H\naving the basic qualifications to perform a function. [General Dictionaries] \nn., The characteristic of records that present all the elements of physical form and intellectual form required by the agency and\nthe juridical system. [Archives] \nn., The physical or juridical person given the authority and capacity to act within a specific sphere of responsibility. [General Dictionaries] \nn., n.,\n The body which is g"} {"text":"iven the exclusive competence for the indefinite preservation of an agency's inactive records. [Archives] The office which is given a competence and has, therefore, the authority and capacity to act within it. [Archives] \nn., The property of having every necessary step concluded with nothing wanting. [General Dictionaries] \nv., To gather and put together pieces of existing data or information from various sources in an orderly, structured whole. [General Dictionaries] \ncreated the record. [General Dictionar"} {"text":"ies] \nn., A record that contains all the elements required by the creator and the juridical system for it to be capable of generatin\ng consequences. [Archives] \nn., (of witnesses) The legal capacity of a person to be a witness. [Government] \nn., The characteristic of a record that refers to the presence within it of all the elements required by the creator and the juridical system for it to be capable of generating consequences. With primitiveness and effectiveness, a quality presented by an original record"} {"text":". [Archives] \nn., The characteristic of records that present all the elements of physical form and intellectual form required by the agency and the juridical system. [Archives] \nn., The property or state of being logically or mathematically complete. In logic, an inference procedure is complete if it ca\nn\nderive every possible valid conclusion from the given axioms. A knowledge-based system can be considered incomplete if\nmissing data hinders its operation or corrupts the results. [Computer and Information "} {"text":"Sciences] \nn., The property of having every necessary step concluded with nothing wanting. [General Dictionaries] \nn., The property of having all physical and intellectual components required by the process or laws regulating the system that\ncreated the record. [General Dictionaries] \ncontent \nv.,\n Ensuring that the requirements of laws, regulations, industry codes and organizational standards are met. [Archives] \ncompliant \nn.,\n [diplomatics] A brief formula expressing respect, such as \"sincerely yours\" or"} {"text":" \"yours truly\". [Archives] \nconformed copy \nn., Uniquely identifiable input, part, piece, assembly or subassembly, system or subsystem, that (1) is required to\ncomplete or finish an activity, item, or job, (2) performs a distinctive and necessary function in the operation of a system, or (3) is intended to be included as a part of a finished, packaged, and labeled item. Components are usually removable in one piece and are considered indivisible for a particular purpose or use. [General Dictionaries] \nv.,\nv"} {"text":".,\n To compile, formulate, generate or write the content of a document in an orderly, structured manner. [Archives] \nn.,\nv.,\n The (re)coding of digital data to save storage space or transmission time. [Computer and Information Sciences] \nv., Removal from a file or data stream of information that may be redundant either in the sense of information theory, or in the sense that the retention of precision, definition, or some similar measure of quality is less important than the necessity to abbreviate the data"} {"text":". In the former sense, the abbreviation is lossless, while in the latter sense it is lossy. Compression permits either or both kinds, and so its effects are not always exactly reversible. [Computer and Information Sciences] \n [diplomatics] A brief formula expressing respect, such as \"sincerely yours\" or \"yours truly\". [Archives] \nn., An exact copy of a document on which has been written explanations of things that could not or were not copied; e.g., written signature might be replaced on conformed copy with"} {"text":" notation that it was signed by the person whose signature appears on the original. [Archives] \n To compile, formulate, generate or write the content of a document in an orderly, structured manner. [Archives] \nn.,\n The message contained in the body of a record. [Archives] \nn., The intellectual substance of a document \u2013 the text, data, symbols, numerals, images, sound and vision. [Archives] \nn., The information that a document is meant to convey, as opposed to form. [Archives] \nn., The textual, symbolic and\/"} {"text":"or visual message that is meant to be conveyed. [Archives] \nn., The essential matter or substance of a written work or discourse, as opposed to its form or style. In a more general sense, all\nthe ideas, topics, facts, or statements contained in a book or other written work. Synonymous in this sense with subject matter. \nAlso refers to the matter that is the subject of a course of study. Compare with contents. See also: content analysis and editorial\ncontent. \n[Computer and Information Sciences] \nAlso refers"} {"text":" to the matter that is the subject of a course of study. Compare with contents. See also: content analysis and editorial\nn.,\n The framework in which a record is created, used, and maintained. [Archives] \nn., The position of an archaeological find in time and space, established by measuring and assessing its associations, matrix, and\n provenance. The assessment includes the study of what has happened to the find since it was buried in the ground. [Sciences] \nn., The physical and cultural circumstances surrou"} {"text":"nding the deposition of archaeological material and the formation of\narchaeological deposits. [Sciences] \nn., The circumstances that a user may bring to a document that influences that user\u2019s understanding of the document. [Archives] \nn., The organization functional and operational circumstances in which documents are created and\/or received and used.\n[Archives] \nn., The framework in which the action in which the record participates takes place. The types of context include\n juridical-administrative context"} {"text":", provenancial context, procedural context, documentary context, and technological context\n. [Archives] \nn., The framework of action in which the record participates. [Archives] \nn., In a grammar it refers to the symbols before and after the symbol under consideration. If the syntax of a symbol is\n independent of its context, the grammar is said to be context-free. [Computer and Information Sciences] \nn., The process of changing something from one form or medium to another, while leaving the intellectual co"} {"text":"ntent unchanged.\n[Archives] \nn.,\n The agency exercising administrative control (1) over archival documents. [Archives] \nv., To move data to a different format, especially data from an obsolete format to a current format; migration. [Computer and\nn., The process of transforming a digital document or other digital object from one format, or format version, to another one. [General Dictionaries] \nn., The process of changing something from one form or medium to another, while leaving the intellectual content un"} {"text":"changed. [Archives] \nn., A change from one form to another. Umbrella term that includes migration, refreshment, reproduction, etc. [Archives] \nn., [data conversion] Changing the representation of data in a database from one form to another, as for instance changing the storage medium, data format, or the code in which the data is held. [Arts] \nv., To move data to a different format, especially data from an obsolete format to a current format; migration. [Computer and\nInformation Sciences] \nn., The process o"} {"text":"f changing the representation of information to a form which is usable by a computer, e.g. converting it to\nmachine 'language'. [Computer and Information Sciences] \nn., (in equity) The changing (either actually or fictionally) of one kind of property into another. [Government] \nn., Process of changing records from one medium to another or from one format to another. [General Dictionaries] \nn., Reproduction, duplicate or replica. [Arts] \nv., The process of converting records in the usual and ordinary course "} {"text":"of business (otherwise the activity is not conversion but creation) for purposes of security, disaster prevention, conservation, overcoming technology obsolescence, ensuring compatibility with a different hardware or software configuration or generation, or compacting the information, while leaving intact their intellectual form. [Archives] \nv., To change the medium (includes copying to the same kind of medium) and\/or physical form of a record in the usual and ordinary course of business (otherwise the acti"} {"text":"vity is not convert records but create records), leaving intact the intellectual form, for purposes of security, disaster prevention, conservation, overcoming technology obsolescence, or compacting the information while preserving the record\u2019s reliability and authenticity. [Archives] \nimitation than does the term \"reproductions.\" When copies are presented with intent to deceive, use \"forgeries\" or \"counterfeits.\"\nn.,\n The duplicate of an object, resulting from a reproduction process. \nSyn \n.: duplicate. [G"} {"text":"eneral Dictionaries] \nn., A copy is the result of a reproduction process. A copy can be made from an original or from a copy of either an original or another copy. [Archives] \nn., An entity that is generated from and resembles a record. [Archives] \nv., To make a reproduction of a record in any state of transmission for business purposes. [Archives] \nn., A duplication of the text of an original document prepared simultaneously or seperately, usually identified by function or by\nmethod of creation. [Archives]"} {"text":" \nn., Reproduction, duplicate or replica. [Arts] \nn., [copies] Specific specimens of a given written or printed work; may be issued in multiples as an edition. [Arts] \nn., [copies] Refers to objects derived from or made to resemble original existing objects. Implies less precise and faithful\nimitation than does the term \"reproductions.\" When copies are presented with intent to deceive, use \"forgeries\" or \"count\nerfeits.\"\nWhen more than one similar work is produced by the same maker, use \"replicas\" or \"versi"} {"text":"ons.\" [Arts] \nv., Non-fraudulent manual repetition of another work of art. The non-fraudulent copy may be divided into three distinct but not necessarily mutually exclusive categories: the copy as a means of duplication; the copy in art education; and the copy as a starting-point for the creation of another art work (often called \"artists' copies\" to distinguish the genre from the essentially utilitarian function of the first two categories). [Arts] \nv., To reproduce or duplicate something. [Arts] v., To pr"} {"text":"oduce a replica of some stored information in a different part of the store or on a different storage device. For example, a piece of text or graphical information can be copied by marking it in some way, reading it into a temporary storage area, and writing it into a new location (compare cut). [Computer and Information Sciences] \n n., Something that is identical to something else; a facsimile. [General Dictionaries] \n \nn., A change in data such that the data content received is not what was originally sen"} {"text":"t. [Arts] \nn.,\n A copy identical to the original and having the same effects, but generated subsequently. [Archives] \nn.,\n Copy in the form of an original, which is identical to the original although generated subsequently. [Archives] \nv., Non-fraudulent manual repetition of another work of art. The non-fraudulent copy may be divided into three distinct but not\nnecessarily mutually exclusive categories: the copy as a means of duplication; the copy in art education; and the copy as a\nstarting-point for the c"} {"text":"reation of another art work (often called \"artists' copies\" to distinguish the genre from the essentially\nutilitarian function of the first two categories). [Arts] \nn., The reproduction of a document sent to an external juridical or physical person, which is simultaneously set aside as a record by the creator, usually in a recordkeeping system. [Archives] \nv., To produce a replica of some stored information in a different part of the store or on a different storage device. For example, a\npiece of text or gr"} {"text":"aphical information can be copied by marking it in some way, reading it into a temporary storage area, and\nwriting it into a new location (compare cut). [Computer and Information Sciences] \nn., An organization or group of persons created by statute that is identified by a particular name and that acts as a legal entity. [Archives] \nn., An institution, organized body, or assembly of persons known by a corporate or collective name. [Computer and Information Sciences] \ncorrect \na., [diplomatics] The state of a"} {"text":" record whose content and form fulfill the requirements set by the creator and the juridical system for the record to reach the consequences or produce the effects for which it was intended. With pertinent, precise and truthful, a component of accuracy. [Archives] \ncorroboration \nn., [diplomatics] An intrinsic element of documentary form that comprises an explicit statement of the means used to validate a record. [Archives] \nn.,\n Evidence that confirms the accuracy of other evidence \u201cin a material particula"} {"text":"r\u201d. [Government] \ncopy of outgoing document \nn., A change in the form, content or attributes of a record such that the record one is accessing can no longer be considered the one that it purports to be. [Archives] \nn., A change in data such that the data content received is not what was originally sent. [Arts] \nn., The act of doing something with an intent to give some advantage inconsistent with official duty and the rights of others; a\nfiduciary's or official's use of a station or office to procure some b"} {"text":"enefit either personally or for someone else\n, contrary to the\nrights of others. [Government] \nn., The person who, by signing a record, assumes responsibility for the regularity of the procedure generating it and for\nits forms. [General Dictionaries] \nn., The person who, by signing a record, assumes responsibility for the regularity of the procedure generating it and for i\nts forms. [General Dictionaries] \nn., The reproduction of a document sent to an external juridical or physical person, which is simultan"} {"text":"eously set aside as a\nrecord by the creator, usually in a recordkeeping system. [Archives] \nInitialism for \u201ccentral processing unit.\u201d [Computer and Information Sciences] \ncreator \nn., A made or received document declared a record and set aside for action or reference, usually in a recordkeeping system. [Archives] \ncrosswalk \nn.,\n The procedure governing the formation of the record and\/or its participation in the act. [Archives] \ncurrent record \nSee\n: records creator [Archives] \nn., An entity that generates "} {"text":"records in the course of its activities. [Archives] \nn., Individual person, organisation or other body that generates records in the course of their activities (MG). [Archives] \nn., The person or organization that creates or receives and accumulates documents. [Archives] \nn., The physical or juridical person who makes, receives, or accumulates records by reason of its mandate\/mission, functions or\nactivities. [Archives] \nn., In archives, the individual or agency responsible for creating, receiving, accumula"} {"text":"ting, or otherwise producing records or\ndocuments for which some form of disposition must be made once their archival value has been appraised. Also refers to the\nperson responsible for producing an original work of visual art. [Computer and Information Sciences] \nn., The entity that is responsible for something's production, accumulation, or formation. [General Dictionaries] \n: active record. [Archives] \nn., The capability of software or hardware to run identically on different platforms; facilitated by th"} {"text":"e adoption of open-standard products and formats. Syn.: platform-independent; platform-neutral. [Computer and Information Sciences] \n Any computer system that involves cryptography. [Computer and Information Sciences] \nn., A chart or table that represents the semantic mapping of fields or data elements in one metadata standard to fields or data elements in another standard that has a similar function or meaning. [General Dictionaries] \nn., The capability of software or hardware to run identically on differe"} {"text":"nt platforms; facilitated by the adoption of\nopen-standard products and formats. Syn.: platform-independent; platform-neutral. [Computer and Information\nSciences] \nn.,\n Any computer system that involves cryptography. [Computer and Information Sciences] \nn., A chart or table that represents the semantic mapping of fields or data elements in one metadata standard to fields or\ndata elements in another standard that has a similar function or meaning. [General Dictionaries] \nn., The practice and study of protect"} {"text":"ing information by transforming it (encrypting it) into an unreadable format, called\n ciphertext. Only those who possess a secret (private) key can decipher (or decrypt) the message into plaintext. [Compute\nr and Information Sciences] \nn., [custodians] Persons officially entrusted with guarding and keeping things, such as property, artifacts, or records, or with\ncustody or guardianship of people, such as prisoners, inmates, or wards. [Arts] \nn.,\n Shorthand for \u201ccryptographic system.\u201d [Computer and Informati"} {"text":"on Sciences] \nn., The person or organization that creates or receives and accumulates documents. [Archives] \nn., See\n: active record. [Archives] \nn., In archives, the individual or agency responsible for creating, receiving, accumulating, or otherwise producing records or\nn.,\n A person or institution that has charge or custody (of a child, property, papers, or other valuables). [Government] \nn., [custodians] Persons officially entrusted with guarding and keeping things, such as property, artifacts, or recor"} {"text":"ds, or with custody or guardianship of people, such as prisoners, inmates, or wards. [Arts] \nn., In the legal sense, this word means \"guardian\" or \"protector.\" It is used euphemistically in lay contexts to mean \"janitor.\" [Government] \nn.,\nn., The basic responsibility for guardianship of records\/archives based upon their physical possession but not necessarily implying legal title. [Archives] \n n.,\n The care and control of a thing or person for inspection, preservation, or security. [Government] \nn., A coll"} {"text":"ection of information treated as a unit for storage or use on a computer, especially at the level of the operating system.\n[Computer and Information Sciences] \nn.,\n Initialism for \u201cdigital audio tape.\u201d [Computer and Information Sciences] \nautomatically. [Archives] \nn.,\n The smallest meaningful units of information. [Archives] \nn., Relevant observations made on artifacts serving as the basis for study and discussion. [Sciences] \nn., Facts or instructions represented in a formalized manner, suitable for trans"} {"text":"mission, interpretation or processing manually or\nautomatically. [Archives] \nn., The symbolic representation of facts or ideas, especially when in the form in which it was originally collected and is\nunanalyzed. [Archives] \nn., Information, in any form, on which computer programs operate. The distinction between program (instructions) and data is a\nfundamental one in computing (see von Neumann machine). It is in this fundamental sense that the word is used in terms such as\ndata, data break, data bus, data c"} {"text":"artridge, data communications, data compression, data name, data protection, data subject, and\ndata type. [Computer and Information Sciences] \nn., Numbers, characters, images, or other method of recording, in a form which can be assessed by a human or (especially) input\ninto a computer, stored and processed there, or transmitted on some digital channel. [Computer and Information Sciences] \nn., Technically, raw facts and figures, such as orders and payments, which are processed into information, such as bala"} {"text":"nce and\ndue and quantity on hand. However, in common usage, the terms data and information are used synonymously. [Computer and\nInformation Sciences] \nn., Any form of information whether in paper or electronic form. In electronic form, data refers to the files and databases, text documents, images and digitally-encoded voice and video. [Computer and Information Sciences] \nn., A general term for information; particularly used for information stored in a database. [Computer and Information Sciences] \nn., Da"} {"text":"ta is distinguished from other contrasting forms of information on which computers operate, such as text, graphics, speech, and image. The distinguishing characteristic is that it is organized in a structured, repetitive, and often compressed way. Typically the structure takes the form of sets of fields, where the field names are omitted (this omission being a main means of achieving compression). The \u201cmeaning\u201d of such data is not apparent to anyone who does not know what each field signifies (for example, "} {"text":"only a very limited meaning can be attached to \u201c1234\u201d unless you know that it occupies the \u201cemployee number\u201d field). That characteristic gives rise to the popular fallacy that \u201cdata is meaningless\u201d. [Computer and Information Sciences] \nn., Numbers, characters, images or other methods of recording that represent values that can be stored, processed, and transmitted\nby electronic systems. [General Dictionaries] \ndata element \nn.,\n A discrete component of data. [General Dictionaries] \nn., The basic unit of inf"} {"text":"ormation in the structured table of data elements. [Computer and Information Sciences] \n The smallest meaningful units of information. [Archives] \nn., The organization of data within files, usually designed to facilitate the storage, retrieval, processing, presentation, or transmission of the data by software. [Computer and Information Sciences] \nn., A collection of information treated as a unit for storage or use on a computer, especially at the level of the operating s\nystem. [Computer and Information Sci"} {"text":"ences] \nn., The basic responsibility for guardianship of records\/archives based upon their physical possession but not necessarily\nimplying legal title. [Archives] \nn., The registration of digital entities into a logical name space. Manipulations of registered material can then b\n[ automated through any standard computer application programming interface (API). [Archives] \nn., The registration of digital entities into a logical name space. Manipulations of registered material can then be\nautomated through a"} {"text":"ny standard computer application programming interface (API). [Archives] \nn., The system of data objects which provide the methods for information storage and retrieval. Broadly, a data hiera\nrchy may be considered to be either natural or machine. [Computer and Information Sciences] \nn., The product of the database design process which aims to identify and organize the required data logically and\nphysically. A data model says what information is to be contained in a database, how the information will be use"} {"text":"d, and\nhow the items in the database will be related to each other. [Computer and Information Sciences] \nn., The product of the database design process which aims to identify and organize the required data logically and\n physically. A data model says what information is to be contained in a database, how the information will be used, and how\n the items in the database will be related to each other. [Computer and Information Sciences] \nn., An abstract model of some real-world situation or domain of interest "} {"text":"about which information is to be held in a datab\nase and which the logical schema for that database encodes. The term data model (or data modeling method) is also used for a set of logical abstractions employed in constructing such a model. [Computer and Information Sciences] \nn., A grammar of metadata language; a formalized world view that provides a context for metadata by defining the structur\nal\nrelationships between different types of elements and sometimes by characterizing the things to which the ele"} {"text":"ments refer.\n[General Dictionaries] \ndata type \nv., The systematic performance of a single operation or sequence of operations by one or more central processing units on data converted to machine-readable format to achieve the result for which the computer program that controls the processing was written. [Computer and Information Sciences] \ndata stream \nn., The process of recovering data or records as bits from a failed, damaged, degraded or obsolete digital medium, followed by steps to restore the intelli"} {"text":"gibility of the recovered data or records. Syn.: digital archaeology. [Computer and Information Sciences] \ndata restoration \nn., A sequence of digitally encoded signals used to represent information in transmission. Also spelled \u201cdatastream.\u201d [Computer and Information Sciences] \nn., An abstract model of some real-world situation or domain of interest about which information is to be held in a database and\nwhich the logical schema for that database encodes. The term data model (or data modeling method) is al"} {"text":"so used for a set of\nlogical abstractions employed in constructing such a model. [Computer and Information Sciences] \nn., The representation of information according to preset specifications (e.g., plaintext files, HTML, TIFF, etc.). [Computer and Information Sciences] \nrelationships between different types of elements and sometimes by characterizing the things to which the elements refer.\nn., A collection of data items and links between them, structured in a way that allows it to be accessed, manipulated a"} {"text":"nd extracted by a number of different applications programs or query languages. [General Dictionaries] \nn., A large collection of information that has been coded and stored in a computer in such a way that it can be extracted under a\n number of different category headings. [Sciences] \nn., A structured assembly of logically related data designed to meet various applications but managed independently of them.\n[Archives] \nn., Data organized and stored so that it can be manipulated or extracted to meet various "} {"text":"applications but managed independently\nof them. [Archives] \nn., [databases] Structured assemblies of logically related data, usually machine-readable data, designed to meet various\napplications but managed independently of them. [Arts] \nn., Information that is accessed and updated through software (a database management system) that has been organized,\nstructured, and stored so that it can be manipulated and extracted to for various purposes. [Computer and Information Sciences] \nn., Any grouping of data for"} {"text":" a particular purpose or for the use of a particular set of end users, usually organized via fields, and\nproviding tools to enable manipulation of the data such as sorting, grouping and extraction. [Computer and Information Sciences] \nn., Normally and strictly, a body of information held within a computer system using the facilities of a database management system. All accessing and updating of the information will be via the facilities provided by this software as will be the recording of information on th"} {"text":"e log file, database recovery, and multiaccess control. [Computer and Information Sciences] n., A set of interrelated files that is created and managed by a DBMS (Database Management System). [Computer and\nInformation Sciences] \nn., One or more large structured sets of persistent data, usually associated with software to update and query the data. A simple\ndatabase might be a single file containing many records, each of which contains the same set of fields where each field is a\ncertain fixed width. [Compu"} {"text":"ter and Information Sciences] \nn., An organized collection of information held on a computer. [Government] \nn., Any collection of information, automated or not, without regard to how it is accessed or stored. [General Dictionaries] \nn., A (large) collection of data items and links between them, structure in a way that allows it to be access by a number of different applications programs or query languages. The terms is also used loosely to describe any collection of data. [General Dictionaries] \nn., Any col"} {"text":"lection of information, automated or not, without regard to how it is accessed or stored. [General Dictionaries] \nSee\n: chronological date. [Archives] \nn., The date, and possibly the time, a record has been written, included in the record by the author or the electronic system on the author\u2019s behalf. [Archives] \ndate of receipt \nn., The particular place (topical date) and\/or time (chronological date) of the compilation and\/or issuing of recorded information (the document). [Archives] \ndeclared record \nn.,\n "} {"text":"The date the record is received by the agency to which it was sent. [Archives] \ndate of document \nn.,\n The date assigned to it by the author. [Archives] \nn.,\n The date assigned to it by the author. It appears in the intellectual form of the record. [Archives] \nn.,\nn.,\n The date the record leaves the space in which it was generated. [Archives] : chronological date. [Archives] \nn., A standard not issued by any official standards-setting body, but nevertheless widely used and recognized by its users as a stand"} {"text":"ard. [Government] \n The date the record leaves the space in which it was generated. [Archives] \nn., A standard issued by an official standards-setting body, whether national (e.g., ANSI), multi-national (e.g., CEN) or international (e.g., ISO). [Government] \n An identified document, made or received by the creator, which has been classified and registered. [Archives] \nn.,\n An identified document, made or received by the creator, which has been classified and registered. [Archives] \nn., A standard issued by "} {"text":"an official standards-setting body, whether national (e.g., ANSI), multi-national (e.g., CEN) or\ninternational (e.g., ISO). [Government] \nv., Returning a compressed image or compressed data to its uncompressed form. Some compression methods lose information so\n that the uncompressed image or data is not equivalent to the original. [Computer and Information Sciences] \ndigital \nn., The completeness, primitiveness and effectiveness (enforceability) of a record. The three degrees of perfection for a record are "} {"text":"draft, original and copy. [Archives] \ndigital audio tape \nn., Arranged records for which information about their nature, make-up and contexts (juridical-administrative, provenancial, procedural, documentary and technological) are recorded to facilitate administrative and intellectual control. [Archives] \ndigital component \nSee\n: archival description [Archives] \ndescriptive instrument \nn., Presentation of the ideal motivation (preamble) and the concrete reason (exposition) for the action as well as the actio"} {"text":"n or matter itself (disposition) as expressed in the content of the record. [Archives] \ndescription of action or matter \nn., A tool prepared in the course of archival description and indexing of records for the purposes of administrative and intellectual control. [Archives] \nSee\nn., The entity responsible for taking physical and legal custody of and preserving (i.e., protecting and ensuring\ncontinuous access to) authentic copies of a creator\u2019s inactive records. The role of the designated records preserver s"} {"text":"hould be that of a trusted custodian for a creator\u2019s records.S yn.: designated preserver; preserver. [Archives] \n: data restoration [Computer and Information Sciences] \nAnalyse, define and document the requirements for presenting records and their aggregates, based upon the guideline\ns for organizing them, so they can be presented to fulfill requests for records or record aggregates in ways that r\n[flects their interrelationships. [Models (BDR)] \nn., Presentation of the ideal motivation (preamble) and the c"} {"text":"oncrete reason (exposition) for the action as well as the\naction or matter itself (disposition) as expressed in the content of the record. [Archives] \na., The representation of an object or physical process through discrete, binary values. In contrast to an ana\nlogue representation of an object or physical process, a digitally-encoded representation does not resemble the ori\nginal. [Computer and Information Sciences] \nn., Operating on data (textual, numeric, graphic or audio) represented as a series of usua"} {"text":"lly binary digits or in similar\n discrete form.\nn., Representing data as discrete variables in the form of numerical characters, as in a digital clock or a digital comp\nuter. \nn., (DAT) A type of magnetic digital medium that can store up to 4 gigabytes of digital data per cassette by using helical\nscan recording. [Computer and Information Sciences] \nn., See\n: data restoration [Computer and Information Sciences] \nAnalyse, define and document the requirements for presenting records and their aggregates, based"} {"text":" upon the guidelines for\norganizing them, so they can be presented to fulfill requests for records or record aggregates in ways that reflects their\ninterrelationships. [Models (BDR)] \nn., (DAT) A type of magnetic digital medium that can store up to 4 gigabytes of digital data per cassette by using helical scan re\ncording. [Computer and Information Sciences] \nn., Representing data as discrete variables in the form of numerical characters, as in a digital clock or a digital computer. \nn., A digital object tha"} {"text":"t is part of one or more digital documents, and the metadata necessary to order, structure or manifest its content and form, requiring a given preservation action. [Archives] \nn., A digital object that contains all or part of the content of an electronic record, and\/or metadata necessary to order, structure, or manifest the content, and that requires specific methods for preservation of one or more electron [Archives] \n A real or abstract digital construct. [Archives] \nn., The smallest meaningful units of i"} {"text":"nformation, expressed as binary bits that are digitally encoded and affixed to a digital medium. [Computer and Information Sciences] \nn., A discrete aggregation of one or more bitstreams and the metadata about the properties of the object and, if\napplicable, methods of performing operations on the object. [General Dictionaries] \nn., A digital component, or group of digital components, that is saved and is treated and managed as a document.\n [Archives] \nn., (DLT) A type of magnetic digital medium that can st"} {"text":"ore up to 35 gigabytes of digital data per cassette by using\nlongitudinal recording. [Computer and Information Sciences] \nv., The use of discrete numeric values (such as the binary values 0 and 1) rather than a continuous spectrum of value\ns (such as those generated by an analogue system). [Computer and Information Sciences] \nn., The smallest meaningful units of information, expressed as binary bits that are digitally encoded and affixed to a\ndigital medium. [Computer and Information Sciences] \nn.,\n A real "} {"text":"or abstract digital construct. [Archives] \nn.,\n Any aggregation of data. [Archives] Any aggregation of data. [Archives] \nn., The byte-serialized encoding of a digital object that defines the syntactic and semantic rules for the mapping from an inform\nation model to a byte stream and the inverse mapping from that byte stream back to the original information model. In most conte\nxts, digital format is used interchangeably with digital file-related concepts such as file format, file wrapper, file encoding, et"} {"text":"c. However, there are some contexts, \u201csuch as the network transport of formatted content streams or consideration of content streams at a level of granularity finer than that of an entire file, where specific reference to \u201cfile\u201d is inappropriate.\u201dS yn.: digital presentation. [Computer and Information Sciences] \nn., A unit of digital information that includes properties of the object and may also include methods of performing operations on\nn., (DLT) A type of magnetic digital medium that can store up to 35 g"} {"text":"igabytes of digital data per cassette by using longitudinal recording. [Computer and Information Sciences] \nn., A digital object that contains all or part of the content of an electronic record, and\/or metadata necessary to order, structure, or\nmanifest the content, and that requires specific methods for preservation of one or more electron [Archives] \nn., Physical material, such as a CD, DVD, DAT or hard disk, used for storage of digital data. [Computer and Information Sciences] \ndigital entity \nn., A disc"} {"text":"rete aggregation of one or more bitstreams and the metadata about the properties of the object and, if applicable, methods of performing operations on the object. [General Dictionaries] \nn., In the technical sense, a type of data structure consisting of digital content, a unique identifier for the content (called a \"handle\"), and other data about the content, for example, rights metadata. See also: digital asset management and Digital Object Identifier [Computer and Information Sciences] \nn., A unit of digi"} {"text":"tal information that includes properties of the object and may also include methods of performing operations on\nthe object. [General Dictionaries] \ndigital document \nn., See\n: digital format [Computer and Information Sciences] \ndiplomatics \nv., The specific process of maintaining digital materials during and across different generations of technology over time, irrespective where they reside. [Computer and Information Sciences] \ndigital system \nn.,\n A digital document that is treated and managed as a record"} {"text":". [Archives] \nn., A record whose content and form are encoded using discrete numeric values (such as the binary values 0 and 1) rather than a continuous spectrum of values (such as those generated by an analogue system). \nn., A record that has been captured and fixed for storage and manipulation in a computer system and that requires the use of the\nsystem to be intelligible by a person. [Archives] \nn.,\nn.,\n An electronic signature based on public key cryptography. [Archives] \nn., A digital mark that has the"} {"text":" function of a signature in, is attached to, or is logically associated with a record, and is used by a signatory to take responsibility for, or to give consent to, the content of the record. [Archives] \nn., A code, generally created using a public key infrastructure (PKI), that is associated with a digital object that can verify that the\nobject has not been altered and, in some contexts, may be used to authenticate the identity of the sender. [Computer a\nnd\nInformation Sciences] \nn., An electronic signatur"} {"text":"e that cannot be forged. It is a computed digest of the text that is encrypted with the sender p\nrivate key and sent along with the text message. The recipient decrypts the signature with the sender\u2019s public key and recomputes the digest from the received text. If the digests match, the message is authenticated and proved intact from the sender. [Computer and Information Sciences] \nn., In electronic commerce, a system to confirm the identity of a message's sender as well as the authenticity and integrit\ny o"} {"text":"f\nelectronic documents. [Computer and Information Sciences] n., Extra data appended to a message which identifies and authenticates the sender and message data using public-key encryption.\n[Computer and Information Sciences] \nn., Data appended to a unit of data held on a computer, or a cryptographic transformation of a data unit, that allows the recipient\nof the data unit to prove its source and integrity and protects against forgery. The International Standards Organization defined\nthis means of identifica"} {"text":"tion and protection. An electronic signature, as defined by the Electronic Communications Act 2000, has\na similar effect in relation to a commercial agreement. [Government] \nobject has not been altered and, in some contexts, may be used to authenticate the identity of the sender. [Computer and\nn.,\n Any system handling binary data, as opposed to an analogue system. [Computer and Information Sciences] \nn., In electronic commerce, a system to confirm the identity of a message's sender as well as the authentici"} {"text":"ty and integrity of\nn., A binary code attached to a record indicating the time that an event occurred, such as creation, receipt, reading, modification or deletion. [Computer and Information Sciences] \nn., Extra data appended to a message which identifies and authenticates the sender and message data using public-key encryption.\nn., (DVD) A type of single- or double-sided, optical digital medium that is capable of storing from 4.7 to 8.5 gigabytes of digital data on two continuous, microscopic, spiral track"} {"text":"s or grooves that are cut and read by a laser beam. Its logical format specifications are governed by the Universal Disk Format (UDF) specification.S yn.: digital versatile disc. [Computer and Information Sciences] \nn., Data appended to a unit of data held on a computer, or a cryptographic transformation of a data unit, that allows the recipient\nn., The discipline which studies the genesis, forms and transmission of archival documents, and their relationship with the facts represented in them and with their"} {"text":" creator, in order to identify, evaluate, and communicate their true nature. [Archives] \nn.,\n The science dealing with the types and elements of documents. [Archives] \nn., The study of the creation, forms, and transmission of records, and their relationship to the facts represented in them and to their creator, in order to identify, evaluate, and communicate their nature and authenticity. [Archives] \nn., An analytical technique for determining the authenticity of records issued by sovereign authorities in "} {"text":"previous centuries.\n[Archives] \n[Archives] \nn., An order or instruction, especially one issued by an agency, corporate body, organization or other central authority. [Government] \nn., The study of the creation, forms, and transmission of records, and their relationship to the facts represented in them and to\ntheir creator, in order to identify, evaluate, and communicate their nature and authenticity. [Archives] \nn., [archives] Records\u2019 final destruction or transfer to an archives as determined by their appr"} {"text":"aisal. [Archives] \nn., [diplomatics] An intrinsic element of documentary form that comprises the core of the text of a document narrating\nthe expression of the will of the author and the action of the record. [Archives] \nn., The actions taken with regard to non-current records following their appraisal and the expiration of their retention periods as provided for by legislation, regulation or administrative procedure. [Archives] \nn., The destination of archival documents as determined by their appraisal. [A"} {"text":"rchives] \nn., [records schedules] Documents describing the recurring records of an organization or administrative unit, specifying those records to be preserved as having archival value, and authorizing, on a continuing basis and after the lapse of specified retention periods and the occurrence of specified actions or events, the destruction of the remaining records. [Arts] \nn., The arrangement of different stops or registers among the keyboards or divisions of a harpsichord or organ. For example, a\nsingle "} {"text":"unison register of a harpsichord is usually designated as 1 \u00d7 8'; an octave higher (the four foot) as 1 \u00d7 4'. A three-register\nharpsichord with two unisons and an octave would be designated 2 \u00d7 8', 1 \u00d7 4'.\n[Arts] \nn., The action taken after the appraisal of non-current documents. This may include transfer to a records center or archive\ndepository for temporary or permanent storage, reproduction on microfilm, or destruction. [Computer and Information Sciences] \nn., The act of transferring something to anothe"} {"text":"r's care or possession, esp. by deed or will; the relinquishing of property.\n[Government] \nn., Disposal; disposition. Both mean generally \"a getting rid of,\" but \"disposal\" has more often to do with trash or inconsequential\nitems, whereas \"disposition\" is used of assets given to relatives and friends by will. \"Disposition\" connotes a preconceived plan\nand an orderly arrangement. \"Disposal,\" by contrast, bears derogatory connotations--more so in AmE than in BrE. [Government] \ndirective \na.,\n (of a document)"} {"text":" constituting a juridical act. [Archives] \ndisposition \nn., A retrospective record whose purpose is to put into existence an act, the effects of which are determined by the writing itself; that is, the written form of the record is the essence and substance of the act. With enabling, instructive, narrative, probative and supporting, one of six functional categories of records. [Archives] \na.,\nn.,\n Initialism for \u201cdigital linear tape.\u201d [Computer and Information Sciences] \n Initialism for \u201cdigital linear tape"} {"text":".\u201d [Computer and Information Sciences] \nn., An indivisible unit of information constituted by a message affixed to a medium (recorded) in a stable syntactic\n manner. A document has fixed form and stable content. [Archives] \nn., Recorded information or object which can be treated as a unit. [Archives] \nn., Recorded information regardless of medium or characteristics. [Archives] \nn., A combination of a medium and the information recorded on or in it, which may be used as evidence or for consultation.\n[Archive"} {"text":"s] \nn., A single archival, record or manuscript item. Usually physically indivisible. [Archives] \nn., Information that has been fixed in written form. [Archives] \nn., Refers especially to recorded information regardless of medium or characteristics, whether created specifically as records of\ninformation or used as such at some time subsequent to their creation. In its broadest sense, however, can include any i\ntem\namenable to cataloging and indexing, that is, not only written and printed materials in paper "} {"text":"or microform versions but also\nnonprint media and, in some circumstances, three-dimensional objects or realia. [Arts] \nn., A single record or item. Examples include: a sheet of paper with writing; an E-Mail message; a film with images; a magnetic\ntape with a sound recording. [Arts] \nn., A single component or entity in a set of archival materials, usually a physically indivisible object. [Computer and Information\nSciences] \nn., Any specific type of file produced or edited by a specific application; usually c"} {"text":"apable of being printed. E.g. \"Word\ndocument\", \"Photoshop document\", etc. [Computer and Information Sciences] \nn., A generic term for a physical entity consisting of any substance on which is recorded all or a portion of one or more works for\nthe purpose of conveying or preserving knowledge. [Computer and Information Sciences] \nn., A piece of text considered to be a single item and usually stored as a file. The document might be a letter, a report, a chapter,\netc. It will usually have a unique name, and may"} {"text":" have other attributes attached to it, such as a brief description of what it contains\nand who composed it. [Computer and Information Sciences] \nn., Something that records or transmits information, typically in writing on paper. For the purposes of providing evidence to a court, documents include books, maps, plans, drawings, photographs, graphs, discs, tapes, soundtracks, and films. [Government] \nn., A unit of data or information, especially written or textual, that has been compiled and formatted for a sp"} {"text":"ecific purpose that\nincludes content and structure, and may include context. [General Dictionaries] \nn., Something that records or transmits information, typically in writing on paper. For the purposes of providing evidence to a\ncourt, documents include books, maps, plans, drawings, photographs, graphs, discs, tapes, soundtracks, and films. [Government] \nn., A file describing the tag structure of an XML-encoded document, as in an XML Document Type Definition. [Computer and Information Sciences] \nincludes co"} {"text":"ntent and structure, and may include context. [General Dictionaries] \nn., (DTD) A formal specification that contains or points to the syntactic rules according to which an SGML-compliant document can be composed. [Computer and Information Sciences] \nn., (DTD) The definition of a document type in SGML or XML, consisting of a set of mark-up tags and their interpretation. [Computer and Information Sciences] \ndocumentary form \nn.,\n The archival fonds to which a record belongs, and its internal structure. [Archi"} {"text":"ves] \ndocument type definition \nn., The rules of representation according to which the content of a record, its administrative and documentary context, and its authority are communicated. Documentary form possesses both extrinsic and intrinsic elements.S yn.: documentary presentation. [Archives] \nn., Rules that structure a document's extrinsic and intrinsic elements in order to communicate its content, its administrative and documentary context, and its authority. [Archives] \nn., Seen., See\n: documentary fo"} {"text":"rm [Archives] \nn., (DTD) A formal specification that contains or points to the syntactic rules according to which an SGML-compliant\ndocument can be composed. [Computer and Information Sciences] \nn., The body of rules governing the making of an archival document. The more standardized and rigorous the procedure, t\nhe more reliable the record is presumed to be. [Archives] \nn., The body of rules governing the making of an archival document. The more standardized and rigorous the procedure,\nthe more reliable th"} {"text":"e record is presumed to be. [Archives] \nn., All material that serves primarily to describe a system and make it more readily understandable, rather than to contribute in some way to the actual operation of the system. Documentation is frequently classified according to\npurpose; thus for a given system there may be requirements documents, design documents, and so on. In contrast to documentation oriented toward development and maintenance of the system, user documentation describes those aspects of the syste"} {"text":"m that are of interest to end-users. [Computer and Information Sciences] \nn., The organization and processing of documents or data including location, identification, acquisition, analysis, storage, retrieval, presentation and circulation for the information of users. [Archives] \nn., Use broadly for the gathering and recording of information, especially to establish or provide evidence of facts or testimony.For the organizing and controlling of information, use \"information management.\" For the records of i"} {"text":"nformation, regardless of \n medium or characteristics, either created specifically as records of information or used as such at some time subsequent to their\n creation, use \"documents.\" [Arts] \n Initialism for \u201cdynamic random-access memory.\u201d [Computer and Information Sciences] \nn., The aggregation of all the records that participate in the same affair or relate to the same event, person, place,\n project, or other subject. Syn.: file. [Archives] \nn., A file relating to a specific action, event, person, place"} {"text":", project, or other subject. A case file is sometimes\n referred to as a project file or dossier. [Archives] \nn., The smallest interrelated aggregation of records, usually named after the person, activity, or subject to whi\nch it refers. A\ndossier should not be confused with a folder. A dossier is a conceptual unit aggregated on the basic of the action or matter wi\nth\nwhich it deals. [Archives] \nn., The aggregation of all the documents related to the same affair. [Archives] \nn., A dossier may be distributed "} {"text":"across a number of folders. [Archives] \nn., A group of documents assembled to provide information about a specific topic. [General Dictionaries] \nn., The aggregation of all the documents related to the same affair. [Archives] \nn.,\n A record made for purposes of correction. [Archives] \nn., A rough or preliminary form of a document, sometimes retained as evidence. [Archives] \nn., A temporary compilation made for purposes of correction. [Archives] \nn., [Drafts] Preliminary or tentative versions of documents. ["} {"text":"Arts] \nn., A version of a document, in handwritten, typed, printed, or digital form, not intended to be final but instead subject to future\nmodification (correction, revision, etc.), sometimes by a person or persons other than the original author. See also: bill.\n[Computer and Information Sciences] \nn., An initial unsigned agreement, treaty, or piece of legislation, which is not yet in force. [Government] \nn., A document ordering a second party to transfer a specified amount of money to an individual named "} {"text":"in the document.\n[General Dictionaries] \nn., A version of a text or image, especially a preliminary version to be further revised. [General Dictionaries] \nn., The organization and processing of documents or data including location, identification, acquisition, analysis, storage,\nretrieval, presentation and circulation for the information of users. [Archives] \nn.,\n Initialism for \u201cdynamic random-access memory.\u201d [Computer and Information Sciences] \nmedium or characteristics, either created specifically as rec"} {"text":"ords of information or used as such at some time subsequent to their\nn.,\n Initialism for \u201cdocument type definition.\u201d [Computer and Information Sciences] \ndraft \nSee\n: copy \nduplicate \nn., The encoding of digital documents or other digital objects to conform to well-known data processing standards down to the level of encoding bits as ASCII or Unicode UTF-8, and objects as XML. [Computer and Information Sciences] \ndvd \nInitialism for \u201cdigital videodisc\u201d or \u201cdigital versatile disc.\u201d [Computer and Information "} {"text":"Sciences] \ne-government \nn., Flexible and adaptable approaches to tailoring computing resources to demands. [Computer and Information Sciences] \neffective record \nn., (DRAM) A type of semiconductor memory in which the information is stored in capacitors on a metal oxide semiconductor integrated circuit. Due to leakage the capacitor discharges gradually and the memory cell loses the information. Therefore, to preserve the information, the memory has to be refreshed periodically. [Computer and Information Sci"} {"text":"ences] \ndynamic computing \nn., A record the content of which is dependent upon data that might have variable instantiations and be held in databases and spreadsheets internal or external to the system in which the record is generated. [Archives] \nn.,\n A document that includes content taken from external sources that changes as those external sources change. [Archives] \nInitialism for \u201cdigital videodisc\u201d or \u201cdigital versatile disc.\u201d [Computer and Information Sciences] \nn., A system linked to particular algor"} {"text":"ithmic programming and mathematical system capabilities, as expressed i\nn this statement: \"The identification of dynamic systems concerns the definition of a mathematical model which behaves like a process solely on the basis of its measurements\" [Computer and Information Sciences] \nn., Flexible and adaptable approaches to tailoring computing resources to demands. [Computer and Information\nSciences] \nn., A record capable of reaching the consequences or producing the effects for which it was intended. [Gene\n"} {"text":"ral Dictionaries] \nn., The use of information technologies, especially the Internet to improve government services for and interactions with\ncitizens (G2C) , businesses and industry (G2B), and different division of government (G2G) by simplifying processes, and\nby integrating and eliminating redundant systems. [General Dictionaries] \na., The characteristic of a record that refers to the presence within it of all the elements required by the creator and the\n juridical system for it to be capable of reaching "} {"text":"the consequences or producing the effects for which it was intended. Wit\nh completeness and primitiveness, a quality presented by an original record. [Archives] \nn.,\n The capacity to be effective, i.e. to reach the purpose for which the object was generated. [General Dictionaries] \nn.,\nn., The use of information technologies, especially the Internet to improve government services for and interactions with citizens (G2C) , businesses and industry (G2B), and different division of government (G2G) by simplifyi"} {"text":"ng processes, and by integrating and eliminating redundant systems. [General Dictionaries] n., Services on the net, that are customer (citizen\/business) oriented and not service provider oriented. It is service delivery independent of place and time. And it is hopefully a single interface to government. [General Dictionaries] \nn., The delivery of information and services online through the Internet or other digital means. [General Dictionaries] \nn., Cross government co-operation. Data should be a shared res"} {"text":"ource. [General Dictionaries] \nn., Services based on Internet technologies. This involves IP networking, WWW technologies and standard browsers for easy and\nflexible access to information and to interactive services. [General Dictionaries] \nn., Government use of the web to enhance information access and service delivery to citizens, businesses and other government\ncustomers. [General Dictionaries] \nflexible access to information and to interactive services. [General Dictionaries] \nn.,\n An aural record gener"} {"text":"ated by an electronic device. [Arts] \nelectronic \nn.,\n A science that deals with transformation of sound energy into electric energy and vice versa. [General Dictionaries] \nelectronic record \nn., Device or technology associated with or employing low voltage current and solid state integrated circuits or components, usually for transmission and\/or processing of analogue or digital data. [Computer and Information Sciences] \nelectronic address \nn., A location of data, usually in main memory or on a disk. You c"} {"text":"an think of computer memory as an array of storage boxes, each of which is one byte in length. Each box has an address (a unique number) assigned to it. By specifying a memory address, programmers can access a particular byte of data. Disks are divided into tracks and sectors, each of which has a unique address. [Computer and Information Sciences] \nn., A name or token that identifies a network component. In local area networks (LANs), for example, every node has a unique address. On the Internet, every file"} {"text":" has a unique address called a URL. [Computer and Information Sciences] \nn., Device or technology associated with or employing low voltage current and solid state integrated circuits or\ncomponents, usually for transmission and\/or processing of analogue or digital data. [Computer and Information\nSciences] \nn., An analogue or digital record that is carried by an electrical conductor and requires the use of electronic equipment to\n be intelligible by a person. \nn., [Defined as MACHINE READABLE RECORDS\/ARCHIVES"} {"text":"] Records\/archives usually in code, recorded on a medium such as a \nmagnetic disc, magnetic tape, punched card, whose contents are accessible only by machine and organized in accordance\nwith the principle of provenance. [Archives] \nn., A record which is in electronic form. [Archives] \nn., Information that has been captured and fixed for storage and manipulation in an automated system and that requires the u\nsed of the system to render it intelligible by a person. [Archives] \nn., Records on electronic storag"} {"text":"e media. [Archives] \nn., A record that has been made or received, and fixed for storage and manipulation in a computer system and that requires t\nhe\nuse of the system to be intelligible by a person. [Archives] \nn., Bibliographic or archival records stored on a medium, such as magnetic tape\/disk or optical disk, that requires computer\nequipment for retrieval and processing. Compare with machine-readable records. [Computer and Information Sciences] \nn., Information that has been captured and fixed for storage"} {"text":" and manipulation in an automated system and that requires the used\nof the system to render it intelligible by a person. [Archives] \nn., A means of authenticating a record and its author or a means of protecting the confidentiality of the record by ensuring that the record is only opened by the intended addressee. It is a distinct type of electronic signature. [Archives] \nn., A record that has been made or received, and fixed for storage and manipulation in a computer system and that requires the\nn., A digi"} {"text":"tal mark that has the function of a signature in, is attached to, or is logically associated with a record, and is used by a signatory to take responsibility for, or to give consent to, the content of the record. [Archives] \nn., A digital mark, code, or other symbol that identifies an individual and indicates responsiblity for or consent to the content of the material to which it is affixed. [Archives] \nn., An electronic symbol, sound, or process that is either attached to or logically associated with a doc"} {"text":"ument (such as a contract or\nother record) and executed or adopted by a person with the intent to sign the document. Types of electronic signatures include a\ntyped name at the end of an e-mail, a digital image of a handwritten signature, and the click of an \"I accept\" button on an\ne-commerce site. [Government] \ntyped name at the end of an e-mail, a digital image of a handwritten signature, and the click of an \"I accept\" button on an\nn., [Electronic Records System] Any information system that produces, proce"} {"text":"sses, or stores records by using a computer. Often called an automated information system. [Government] \ne-mail \nn.,\n A fundamental, essential, or irreducible constituent of a composite entity. [General Dictionaries] \nelement set \nn., A constituent part of the record\u2019s documentary form, visible on the face of the record. It may be either extrinsic, like a seal, or intrinsic, like a subscription. [Archives] \ne-mail attachment \nn.,\n Collections of elements that have at least one characteristic in common. [Gen"} {"text":"eral Dictionaries] n., Collections of objects or elements that have at least one characteristic in common. For example, the set X may consist of all the elements x1, x2, x3, etc. This is written {x1, x2, x3,\u2026} = X. [Sciences] \n A fundamental, essential, or irreducible constituent of a composite entity. [General Dictionaries] \nn., An abbreviation of electronic mail, an Internet protocol that allows computer users to exchange messages and da\nta files in real time with other users, locally and across networks."} {"text":" [Computer and Information Sciences] \nn., Messages, documents, etc., sent between users of computer systems, the computer systems being used to transp\nort and hold the e-mail. [Sciences] \nn., A means for an originator of information to distribute information to an unlimited number of recipients via a val\nue added\nnetwork service which mimics the functions of the paper postal services. [Arts] \nn., Messages automatically passed from one computer user to another, often through computer networks and\/or via mode"} {"text":"ms over\ntelephone lines. [Computer and Information Sciences] \nn., A means of transmitting correspondence over telephone lines, cable lines and\/or computer networks or of relaying messages\nvia satellite networks. [General Dictionaries] \nn., The transmission of messages over communications networks. Language designation refers to the language of the host site.\n[General Dictionaries] \nn., A means of transmitting correspondence over telephone lines, cable lines and\/or computer networks or of relaying messages\nn"} {"text":"., A file that is linked to and is transmitted along with an e-mail message. The attached file can be of any type. [Computer and Information Sciences] \nn., The transmission of messages over communications networks. Language designation refers to the language of the host site.\nn., The reproduction of the behaviour and results of obsolete software or systems through the development of new hardware and\/or software to allow execution of the old software or systems on future computers. Syn.: preservation emulati"} {"text":"on. [General Dictionaries] \nn., A process of imitation, which is a frequent feature accompanying competition. Customs, buildings, and artifacts in one society\n may be adopted by neighbouring ones through imitation, which is often competitive in nature. [Sciences] \nn., Moving the information to new hardware but with a additional software component which emulates the old hardware, thus\nallowing execution of the old application software. [Archives] \nn., When one system performs in exactly the same way as anoth"} {"text":"er, though perhaps not at the same speed. A typical example\nwould be emulation of one computer by (a program running on) another. You might use an emulation as a replacement for a\nsystem whereas you would use a simulation if you just wanted to analyse it and make predictions about it. [Computer and\nInformation Sciences] \nn., Emulation should be more than simulation. This should mimic exactly the behaviour of the circumstances that it is emulating.\n[Computer and Information Sciences] \nn., The exact execution"} {"text":" on a given computer of a program written for a different computer, accepting the identical data and\nproducing the identical results. Emulation is thus the imitation of all or part of one computer system by another system. It may be\nachieved by software, microprogram, or hardware. A particular emulation could be used as a replacement for all or part of the\nsystem being emulated, and furthermore could be an improved version. For example, a new computer may emulate an obsolete\none so that programs written for"} {"text":" the old one will run without modification. [Computer and Information Sciences] \nn., The use of one system to reproduce the behaviours and results of another system. [General Dictionaries] \nentity \nn., A prospective record encoded in machine language that is actively involved in carrying out an action or process. With dispositive, instructive, narrative, probative and supporting, one of six functional categories of records. [Archives] \nevidence \nn., The process of binding together a digital document or othe"} {"text":"r digital object and the means of providing access to it, normally in a wrapper that describes what it is in a way that can be understood by a wide range of technologies (such as an XML document). [Computer and Information Sciences] \nn., The technique used by layered protocols in which a layer adds header information to the protocol data unit (PDU) from the layer above. As an example, in Internet terminology, a packet would contain a header from the physical layer, followed by a header from the network laye"} {"text":"r (IP), followed by a header from the transport layer (TCP), followed by the application protocol data. [Computer and Information Sciences] \nentity type \nn., The representation of symbols in some alphabet by symbols or strings of symbols in some other alphabet. [Computer and Information Sciences] \nencapsulation \nn., The conversion of data into a secret code (or of plaintext into ciphertext) for transmission over a public network. [Computer and Information Sciences] \nn., The process of encoding plaintext int"} {"text":"o ciphertext so that it can be read only by those who know the cipher to unscramble the message. [Computer and Information Sciences] n., The mechanism of coding data transmitted by various telecommunications systems so that only authorized users may have\naccess to it. [Computer and Information Sciences] \nn., Any procedure used in cryptography to convert plaintext into ciphertext (encrypted message) in order to prevent\n any but the\nintended recipient from reading that data. [Computer and Information Sciences"} {"text":"] \nn., The representation of symbols in some alphabet by symbols or strings of symbols in some other alphabet. [Computer\nand Information Sciences] \nn., [diplomatics] An intrinsic element of documentary form that comprises the name, title, capacity and address of the \nphysical or juridical person issuing the document, or of which the author of the document is an agent. [Archives] \nn., A prospective record encoded in machine language that is actively involved in carrying out an action or process. With\ndisposi"} {"text":"tive, instructive, narrative, probative and supporting, one of six functional categories of records. [Archives] \nn.,\n A real or abstract thing. [Archives] \nn., In Geographic Information Systems, a thing that exists such as a building or a lake, which is distinguishable from another entity, cannot be divided into two or more similar entities, and about which information can be stored, possibly in terms of attributes, position, shape, and relationships. An entity class is a specified group of entities. [Scien"} {"text":"ces] \nn., In programming, any item, such as a data item or statement, that can be named or denoted in a program. [Computer and\nInformation Sciences] \nn., The process of encoding plaintext into ciphertext so that it can be read only by those who know the cipher to unscramble the\nmessage. [Computer and Information Sciences] \nn., The kind of entity identified or described in or addressed by a metadata schema; for example, fonds, records, agents, recordkeeping business. [Archives] \naccess to it. [Computer and I"} {"text":"nformation Sciences] \nn., [documentary form] The final part of the document, which contains the documentary context of the action and the final formulae. [Archives] \nintended recipient from reading that data. [Computer and Information Sciences] \nn., All the means by which any alleged matter of fact, the truth of which is submitted to investigation, is established or disproved. [Government] \nn., The relationship shown between a fact to be proven and the record(s) that prove(s) it. [Archives] \nn., That which "} {"text":"tends to prove the existence or nonexistence of some fact. It may consist of testimony, documentary evidence,\nreal evidence, and, when admissible, hearsay evidence. [Government] \nn., A record, an object, testimony, or other material that is used to prove or disprove a fact. [General Dictionar\nies] \nn., Secondary users (e.g., journalists, researchers and other external users) who are allowed to access the records\ncreator's recordkeeping system on-line. [Archives] \nn., A record that has participated in the ex"} {"text":"ecution phase of an administrative procedure and to which metadata th\nat convey the actions taken during the course of the procedure have been attached, such as priority of transmission, transmission date, time and\/or place, actions taken, etc. [Archives] \nn., A record that has participated in the execution phase of an administrative procedure and to which metadata that\nconvey the actions taken during the course of the procedure have been attached, such as priority of transmission,\ntransmission date, time a"} {"text":"nd\/or place, actions taken, etc. [Archives] \nn., An addition made to a record, after its creation, as part of the document execution phase of an administrative procedu\nre. [Archives] \nn., [diplomatics] An element of the documentary form of a record that constitutes its external appearance. The types of\nextrinsic elements include presentation features, electronic signatures, electronic seals, digital timestamps issued by a\ntrusted third party, and special signs. [Archives] \nn., An administrative procedure co"} {"text":"nstituted by all the actions (validation, communication, notification, publication)\n that give formal character to the transaction and the resulting record. [Archives] \nn., An administrative procedure constituted by all the actions (validation, communication, notification, publication) that\ngive formal character to the transaction and the resulting record. [Archives] \nn.,\n A record produced, used and maintained in an experiential system. [Archives] \nreal evidence, and, when admissible, hearsay evidence. [Go"} {"text":"vernment] \nn.,\n A system which immerses the user in a sensory experience. [General Dictionaries] \nn., Objects whose essence goes beyond the bits that constitute the object to incorporate the behaviour of the rendering system, or\n at least the interaction between the object and the rendering system. [Archives] \nexposition \nn., [diplomatics] An intrinsic element of documentary form that comprises the part of the text of a document that narrates the concrete and immediate circumstances generating the act and\/o"} {"text":"r the document. [Archives] \nexecuted record \nn., (XML) A general-purpose specification for creating custom, cross-platform, text-based, markup languages used both to encode documents and to serialize data; a subset of General Standardized Markup Language (SGML) with use and design similar to Hypertext Markup Language (HTML) but employing user-definable markup tags that indicate the logical structure in addition to the display specifications of data elements. [Computer and Information Sciences] \nextrinsic el"} {"text":"ement \nn., Secondary users (e.g., journalists, researchers and other external users) who are allowed to access the records creator's recordkeeping system on-line. [Archives] \nexperiential system \nn., [diplomatics] An element of the documentary form of a record that constitutes its external appearance. The types of extrinsic elements include presentation features, electronic signatures, electronic seals, digital timestamps issued by a trusted third party, and special signs. [Archives] \nn., Specific, perceiva"} {"text":"ble features of the record that are instrumental in communicating and achieving the purpose for which it was created. [Archives] \nfile \nn., A condition or event that exists, as distinguished from its effects, consequences, or interpretations, such as a state of things or a motion. [General Dictionaries] \nn., An event or state of affairs known to have happened or existed. It may be distinguished from law (as in trier of fact) or, in the law of evidence, from opinion. [Government] \nn., A thing done; an action"} {"text":" performed or incident transpiring; an event or circumstance; an actual occurrence; an actual\nhappening in time, space, or an event mental or physical. [General Dictionaries] \nn., A condition or event that exists, as distinguished from its effects, consequences, or interpretations, such as a state of\nthings or a motion. [General Dictionaries] \nn., Assessment of the cost and technical capability required for the permanent preservation of a given body of records.\n [Archives] \nn., An item of data consisting of"} {"text":" a number of characters, bytes, words, or codes that are treated together, e.g., to form a\nnumber, a name, or an address. [Computer and Information Sciences] \na., The determination that the digital components conferring identity and ensuring the integrity of the things you want to\n preserve can indeed be preserved given current and future anticipated preservation capabilities. [Archives] \nn., The aggregation of all the records that participate in the same affair or relate to the same event, person, place, p"} {"text":"roject,\nor other subject. Syn.: dossier. [Archives] \nn., An item of data consisting of a number of characters, bytes, words, or codes that are treated together, e.g., to form a number, a name, or an address. [Computer and Information Sciences] \nn., In Geographic Information Systems, a group of one or more characters incorporating map information. [Sciences] \nn., Refers to the spread of light intensity across a beam. Most profile lanterns have an adjustable field. A Flat field h\nas an even\ndistribution, a pe"} {"text":"ak field has a \"hot spot\" in the centre of the beam. A flat field is essential when using gobos. \n[Arts] \nn., Used in videotape. Videotape runs 30 frames per second. Each frame has two fields, one which scans odd lines and one which\nscans even lines. [Arts] \nn., An area of a database record, or graphical user interface form, into which a particular item of data is entered. [Computer and\nInformation Sciences] \nn., In machine-readable records, the position of a data element or a set of data elements, regarded"} {"text":" as a single descriptive element;\nit may be allocated a unique identification symbol in the record format. [Computer and Information Sciences] \nn., A collection of documents usually related in some way, stored together, and arranged in a systematic order. In computing, a\nn., The aggregation of all the records that participate in the same affair or relate to the same event, person, place, project, or other subject. Syn.: dossier. [Archives] \nv., To set aside a made or received document among the records that"} {"text":" participate in the same action\/affair or relate to the\nsame person or subject, so that they may be retrieved for action or reference. [General Dictionaries] \nn., A collection of data stored in a computer. It may consist of program instructions or numerical, textual, or graphical information\n. It usually consists of a set of similar or related records. [Sciences] \nn., Where this term is used in isolation, it refers to both electronic files and paper files. [Archives] \nn., An organized unit (folder, volume, "} {"text":"etc.) of documents grouped together either for current use or in the process of archival arrangement. [Archives] \nn., In machine-readable records\/archives, two or more records of identical layout treated as a unit. The unit is larger than a\nrecord but smaller than a data system, and is also known as a data set or file set. [Archives] \nv., [Defined as FILING] The placing of individual documents within a file. [Archives] \nn., An integrated aggregation of records that are related by person, project, or other s"} {"text":"ubject. Syn.: dossier. [Archives] \nn., A collection of information, referred to by file name; for example, a user-created document, program data, or the program\nitself. [Computer and Information Sciences] \nn., A collection of documents usually related in some way, stored together, and arranged in a systematic order. In computing, a\ncollection of structured data elements stored as a single entity or a collection of records related by source and\/or purpose, stored\non a magnetic medium (floppy disk, hard disk,"} {"text":" Zip disk, etc.). [Computer and Information Sciences] \nn., An element of data storage in a file system. [Computer and Information Sciences] \nn.,\n v.,\n Something that is used to support an understanding or argument. [General Dictionaries] \nArranging and sorting documents so that they may be retrieved rapidly when needed. [General Dictionaries] \nn., A folded sheet of cardboard or heavy paper serving as a cover for a file or a number of documents. [Archives] \nn., The organization of data within digital objects"} {"text":", usually designed to facilitate the storage, retrieval, processing, presentation an\nd\/or transmission of the data by software. [Archives] \nn., The way in which the information in a file is encoded. There are many proprietary formats \u2013 nearly every application has its own, often changing with new versions \u2013 as well as standard file formats such as RTF, TIFF, and EPS. In some systems, such as Apple Macintosh, the information about file format and originating application is part of the file, but in other syst"} {"text":"ems it is up to the user to know what the format is, although there are more-or-less strict file-naming conventions. The multiplicity of file formats is a continuing problem for both software developers and users. [Computer and Information Sciences] \ndepicted as folders (like small briefcases). [Computer and Information Sciences] \nn., A formula at the end of the text of a document intended to ensure the execution of the act embodied in the document, or avoid its violation, guarantee its validity, preserve t"} {"text":"he rights of third parties, attest the execution of required formalities, or indicate the means employed to give the document probative value. [Archives] \nInformation Sciences] \nn., The documentary form that a record has when it is open for the first time upon receipt or after having been captured and dec\nlared as a record. [Archives] \nn., The whole of the records of a creator. [Archives] \nn.,\n The quality of a record that ensures its content remains complete and unaltered. [General Dictionaries] \na., Once "} {"text":"output is created, it is immutable. If it needs to be changed, either an update must be appended or a new version must be created. [Archives] \nn., The way in which the information in a file is encoded. There are many proprietary formats \u2013 nearly every application has its\nown, often changing with new versions \u2013 as well as standard file formats such as RTF, TIFF, and EPS. In some systems, such as\nApple Macintosh, the information about file format and originating application is part of the file, but in other s"} {"text":"ystems it is up to\nthe user to know what the format is, although there are more-or-less strict file-naming conventions. The multiplicity of file\nformats is a continuing problem for both software developers and users. [Computer and Information Sciences] \na., The quality of a record that makes it immutable and requires changes to be made by appending an update or creating a new versi\non. [Archives] \nfixity \nn., A cover in which non-electronic records, belonging in the same dossier, are loosely kept, usually i"} {"text":"n chronological order. A dossier may be distributed across a number of folders. [Archives] \nn., A folded sheet of cardboard or heavy paper serving as a cover for a file or a number of documents. [Archives] \nn., [folders] Folded sheets of light cardboard used to cover or hold papers, letters, or other flat documents, as in a file. [Arts] n., A directory in the sense of a collection of computer files. The term is more common in systems such as the Macintosh or\nWindows 95 which have a graphical user interface "} {"text":"and provide a graphical file browser in which directories are traditionally\ndepicted as folders (like small briefcases). [Computer and Information Sciences] \nn., In the Macintosh and Windows 95, a simulated file folder that holds data, applications and other folders. [Computer and\nInformation Sciences] The quality of a record that ensures its content remains complete and unaltered. [General Dictionaries] \nn., The whole of the records that a physical or juridical person accumulates by reason of its function"} {"text":" or activity; the\n highest-level archival aggregation.S yn.: archives [records]; archival fonds. [Archives] \nn., The whole of the records created (meaning made or received and set aside for action or reference) by a physical or\n juridical person in the course of carrying out its activities. [Archives] \nn., The whole of the records of a creator. [Archives] \nn., The whole of the records created by an agency and preserved. Alias: archives. [Archives] \nn., The whole of the documents, regardless of form or mediu"} {"text":"m, organically created and\/or accumulated and used by a parti\ncular\nperson, family, or corporate body in the conduct of personal or corporate activity. [Archives] \nn., The whole of the do cuments t ha t ev ery organiz ation or physi cal or jurid ical pe rson accumulat es by reason of its fu\nnction of activity. [Archives] \nn., The total body of records\/archives accumulated by a particular individual, institution or organization in the exercise of i\nts\nactivities and its functions. [Archives] \nn., Use"} {"text":" to designate the documents created or accumulated and used by a particular individual, organization, or other entity that\nare kept together within a larger collection. [Arts] \nare kept together within a larger collection. [Arts] \nn.,\n Rules of representation that determine the appearance of an entity and convey its meaning. [General Dictionaries] \nn., The physical characteristics\u2014size, shape, composition, etc.\u2014of any archaeological find. Form is an essential part of attribute analysis. [Sciences] \nn., A "} {"text":"document, printed or otherwise produced, with predesignated spaces for the recording of specified information. [Archives] \nn., All the characteristics of a record determined by the application of the rules of representation of content typical of a given environment. Form breaks down into physical form, the characteristics of the external appearance of the record; and intellectual form, the characteristics of the internal composition of the record. [Archives] \nn., A document intended to serve as a model. [Ar"} {"text":"chives] \nn., The structure and design of a composition. [Arts] \nn., Term applied to such aspects of a work of art as internal organization and shape, often used with some degree of distinction\nfrom the subject-matter, content, function and style of works of art. [Arts] \nn., Used with reference to works of art and architecture to mean the arrangement of visual elements such as line, mass, shape, or\ncolor. [Arts] \nn., A classification term applied to the manner in which the text of a book is arranged, as a di"} {"text":"ctionary, or the literary form in\nwhich it is written, as drama, poetry, etc. [Computer and Information Sciences] \nn., The data structure within a computer system representing the final result to be printed or displayed. [Computer and\nInformation Sciences] \nn., A page of printer media. [Computer and Information Sciences] \nfrom the subject-matter, content, function and style of works of art. [Arts] \nn.,\n The structure or layout of an entity. [Computer and Information Sciences] \nn., The plan or arrangement of"} {"text":" a document. [Archives] \nn., Any particular physical representation of a document. [Archives] \nn., In automatic data processing, the arrangement of data. [Archives] \nn., Width to height ratio of the film as it is projected on the screen. [Arts] \nn., In the context of bibliographic control, the formalised structure in which the specific elements of bibliographic description are\naccommodated. [Arts] \nn., To put data into a predetermined structure or divide a storage medium, such as a disk, into sectors, so t"} {"text":"hat it is ready to receive\ndata. [Computer and Information Sciences] \nn., The layout or presentation of items in a machine-readable form according to hardware and software requirements. [Computer\nand Information Sciences] \nn.,n., [diplomatics] An intrinsic element of documentary form that comprises a sentence declaring that the rights put into existence by the document are not circumscribed by time. [Archives] \nn., A basic conceptual structure of rules, policies, procedures, tools and mechanisms intended to"} {"text":" serve as a support or\nguide for the design, implementation and maintenance of an integrated system. [General Dictionaries] \nn., A basic conceptual structure of rules, policies, procedures, tools and mechanisms intended to serve as a support or\n guide for the design, implementation and maintenance of an integrated system. [General Dictionaries] \nn., In object-oriented systems, a set of classes that embodies an abstract design for solutions to a number of related problems. [Computer and Information Sciences]"} {"text":" \ngis \nn.,\n A rule that guides the design of the record-making, recordkeeping, and permanent preservation system. [Archives] \nfunction \nv., To lock an evolving software distribution or document against changes so it can be released with some hope of stability. [Computer and Information Sciences] \nfunctionality \nn.,\n All of the activities aimed to accomplish one purpose, considered abstractly. [Archives] \nn., Any operation or procedure that relates one variable to one or more other variables. [Sciences] \nn.,"} {"text":" The goal to which an institution addresses its activity and produces the relative records. The function is the scope of an\nactivity; the jurisdiction indicates the territory and the sector of competence to pursue a function. [Archives] \nn., All of the acts aimed to accomplish one purpose within a given jurisdiction or locale. [Archives] \nn., 1. The activities of an organization or individual performed to accomplish some mandate or mission. \u2013 2. Computing \u2022 \nSoftware code that performs a specific task, usua"} {"text":"lly accepting one or more data values as input and, based on a manipul\nation of\n]\nthe input values, returning a single output value. [Archives] \nn., [functions] Areas of responsibility in which activities are conducted in order to accomplish a purpose. [Arts] \nn., The capabilities or behaviours of a computer program, part of a program, or system, seen as the sum of its features.\n[Computer and Information Sciences] \nn., The capabilities or behaviours of a computer program, part of a program, or system, seen "} {"text":"as the sum of its features. [Co\nmputer and Information Sciences] \nn., Features built into a search interface that determine the ease with which users may formulate queries and obtain\n results. [Computer and Information Sciences] \nv., To lock an evolving software distribution or document against changes so it can be released with some hope of stability.\n[Computer and Information Sciences] \nn., A record having actual character, which is not counterfeited, imitated or adulterated, and a definite origin from a "} {"text":"certain known source. [Archives] A digital mapping used for exploration, demographics, dispatching and tracking. [General Dictionaries] \nn., The quali ty of a rec or d that is truly w hat i t purports to be. T he tw o conc epts t hat allow for the indi rect asses\nsment and verification of the genuineness of a record are those of reliability and authenticity. [Archives] \nn., Any operation or procedure that relates one variable to one or more other variables. [Sciences] \nn., (GIS) A computer-based system c"} {"text":"onsisting of hardware, software, geographic information, procedures and personnel designed to facilitate the efficient capture, storage, maintenance, manipulation, analysis, querying and display of spatially-referenced (geospatial) data from a wide variety of data sources in a wide variety of data formats\u2014such as maps, graphs, photographs, remotely sensed data, tabular data and text\u2014providing an automated link between the geospatial (locational) data and the descriptive (attribute) data, usually in relation"} {"text":" to a system of coordinates (latitude, longitude, elevation or depth, etc.). [Sciences] \nn.,\n A digital mapping used for exploration, demographics, dispatching and tracking. [General Dictionaries] \nn., 1. The activities of an organization or individual performed to accomplish some mandate or mission. \u2013 2. Computing \u2022\nInitialism for \u201cgeographic information system.\u201d \nthe input values, returning a single output value. [Archives] \nn., A note explaining a difficult or obscure word or phrase, especially such a no"} {"text":"te made between lines or in the margin of a document. [Archives] \nhtml \nn., A record that represents an object or outline of a figure, plan, or sketch by means of lines. A representation of an object formed by drawing. [Archives] \nn.,\n A broad class of records that are primarily images, as distinguished from textual records. [Archives] \nhearsay rule \nn., A statement or other indication of policy or procedure by which to determine a course of action, accomplish a given task or achieve a set of goals and obje"} {"text":"ctives, formulated by a body with authority to speak on the subject but less binding than a directive or formal standard. [General Dictionaries] \nhtml document \nn., The office (or officer) formally competent for carrying out the action to which the record relates or for the matter to which the record pertains. Syn.: handling person. [Archives] \nhandling person \nn., See\n: handling office [Archives] : handling office [Archives] \nn., A magnetic digital medium, composed of one or more flat, circular plates (pla"} {"text":"tters) of a hard material capable of storing a large quantity of digital data, which (typically) resides permanently within a computer. Syn.: hard drive. [Computer and Information Sciences] \nn., A legal provision excluding testimony that is based on second-hand, rather than personal, knowledge (hearsay).\n[Archives] \nn., A legal provision excluding testimony that is based on second-hand, rather than personal, knowledge (hearsay). [A\nrchives] \nn., A statement, other than one made by the declarant while testif"} {"text":"ying at the trial or hearing, offered in evidence to p\nrove the truth of the matter asserted. [Government] \nn., The rule that no assertion offered as testimony can be received unless it is or has been open to test by cross-examin\nation or an\nopportunity for cross-examination, except as provided otherwise by the rules of evidence, by court rules, or by statute.\n[Government] \nn., An SGML-compliant digital document encoded using Hypertext Markup Language (HTML) in conformance with the\nsyntactic rules described"} {"text":" in a Document Type Definition (DTD) or a schema document. [Computer and Information\nSciences] \nn., A group of related entities, or information about the entities, within a system arranged in a graded order, typic\nally from the most general to the most specific. [General Dictionaries] \nn.,n., A need to provide and receive explanation and understanding from one generation to another. Groups of individuals often derive their cohesiveness, legitimacy and the authority for their actions from their understanding"} {"text":" and evaluation of the past. [Archives] \nn., A statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth\nof the matter asserted. [Government] \nInitialism for \u201cHypertext Markup Language.\u201d \nopportunity for cross-examination, except as provided otherwise by the rules of evidence, by court rules, or by statute.\nn., An SGML-compliant digital document encoded using Hypertext Markup Language (HTML) in conformance with the syntactic rules descri"} {"text":"bed in a Document Type Definition (DTD) or a schema document. [Computer and Information Sciences] \nidef0 \nn., A document or code that can be read by a human being, with or without the aid of magnification, as opposed to one in a format that can be read only by a computer. [Computer and Information Sciences] \nidentify \nn., A method of presenting digital information that allows related files and elements of data to be interlinked, rather than viewed in linear sequence; usually differentiated from the normal t"} {"text":"ext in a document by a different colour, by\nunderlining, or by both. [Computer and Information Sciences] \nimitative copy \nn., (HTML) A cross-platform, text-based, markup language used to define a single, fixed type of document with markup tags that structure the layout, styling and display of text and provide some provision for hypertext and multimedia; a subset of General Standardized Markup Language (SGML). [Computer and Information Sciences] \nhuman-readable format \nAcronym for \u201cintegrated definition func"} {"text":"tion modeling method.\u201d \nn.,\n A method designed to model the decisions, actions, and activities of an organization or system. [Models (MCP)] \nn., Terms, such as acronyms, projects, proper names of persons, geographical locations, the number of a patent's\nspecification or of a national standard, or any part or a bibliographical description, test names, and trade names which\nprovide subject indexing, in addition to descriptors. [Computer and Information Sciences] \nn., A made or received document to which the i"} {"text":"dentity metadata (e.g., persons, actions and dates of compilation) have been\n attached. [Models (MCP)] \nn., The whole of the characteristics of a document or a record that uniquely identify it and distinguish it from any other\ndocument or record. With integrity, a component of authenticity. [Archives] \nn., Terms, such as acronyms, projects, proper names of persons, geographical locations, the number of a patent's spe\ncification or of a national standard, or any part or a bibliographical description, test na"} {"text":"mes, and trade names which \nprovide subject indexing, in addition to descriptors. [Computer and Information Sciences] \nn., A document or code that can be read by a human being, with or without the aid of magnification, as opposed to one\nin a format that can be read only by a computer. [Computer and Information Sciences] \nn., The whole of the characteristics of a document or a record that uniquely identify it and distinguish it from any other d\nocument or record. With integrity, a component of authenticity. "} {"text":"[Archives] \nunderlining, or by both. [Computer and Information Sciences] \nn., The whole of the characteristics of a document or a record that uniquely identify it and distinguish it from any other document or record. With integrity, a component of authenticity. [Archives] n., The definition and status of individuals and groups in the past. Such studies include the recognition of gender, rank, status, or place within society at the individual level, but may also look more widely at the relationships between "} {"text":"contemporary cultures and the extent to which material culture is used to signal differences between social groups. [Sciences] \nn., The way in which achaeological remains are widely used in order to promote and support particular views of contemporary\npersonal, local, regional, and national identity, especially through the application of ARCHAEOLOGICAL RESOURCE\nMANAGEMENT, the deployment of public funds, and state legislation. In this sense archaeology is an extremely powerful\npolitical tool, and has been f"} {"text":"or many generations. [Sciences] \nn., The characteristics determining the individuality of a being or entity; in the constitution of national identities these\ncharacteristics may be fostered by myths. [Sciences] \nn., Those characteristics or conditions of a thing, person, or group that remain the same amid change or that distinguish a thing,\nperson, or group from another. [Arts] \nn., [Evidence]. The authenticity of a person or thing. [Government] \nn., [Evidence]. The authenticity of a person or thing. [Gover"} {"text":"nment] \nn., A copy that reproduces both the content and form of the record, but in such a way that it is always possible to tell the copy from the original. [Archives] \nn.,\nn., A record that is no longer used in the day-to-day course of business, but which may be kept and occasionally used for legal, historical, or operational purposes.S yn.: non-current record. [Archives] \nn., n., n., n., Records no longer needed by their creator to conduct current business. [Archives] \nRecords which are no longer needed f"} {"text":"or ongoing agency business. [Archives] \n[Defined as NON-CURRENT RECORDS] Records no longer needed for current business. [Archives] A record which is no longer needed for the ongoing activity of their creator. [Archives] \n An assemblage of data intended for communication either through space or across time. [Archives] \nn., See\n: received document [Archives] \nn., A record that is no longer used in the day-to-day course of business, but which may be kept and occasionally used\nfor legal, historical, or operatio"} {"text":"nal purposes.S yn.: non-current record. [Archives] \nn., See\n: received record [Archives] \ninactive record \nn.,\n The subject line(s) and\/or the title at the top of a record. [Archives] \nindication of action \nn., The mention of autonomous items that have been linked inextricably to the record before transmission (i.e., added during its execution) for it to accomplish its purpose. [Archives] \nindication of attachments \nn., An assemblage of data intended for communication either through space or across time. [A"} {"text":"rchives] \nn., Recorded data. [Archives] \nn., An ac cus ation exhibi ted again st a per son for so me crim inal offense , without indictment. \n[Archives] \nn., A message or knowledge which has been voluntarily or involuntarily conveyed. [Archives] \nn., An aggregate of data meant for communication. [Archives] \nn., Recorded data. Examples include: writing on a sheet of paper; the dyes on a photographic still; the sound in the grooves of a\ndisc; the binary digits forming an E-Mail message. [Arts] \nn., Data pr"} {"text":"esented in readily comprehensible form to which meaning has been attributed within the context of its use. In a more\ndynamic sense, the message conveyed by the use of a medium of communication or expression. [Computer and Information\nSciences] \nn., All ideas, facts, and imaginative works of the mind which have been communicated, recorded, published and\/or distributed formally or informally in any format. [Computer and Information Sciences] \nn., An assemblage of data in a comprehensible form capable of commu"} {"text":"nication. [General Dictionaries] \nn., Knowledge communicated or received concerning a particular fact or circumstance. [General Dictionaries] \nn., Knowledge derived from study, experience, or instruction. [General Dictionaries] \nn., An assemblage of data in a comprehensible form capable of communication. [General Dictionaries] \nn., A computer-based system with the defining characteristic that it provides information to users in one or more organizations. Information systems are thus distinguished from, for "} {"text":"example, real-time control systems, message-switching systems, software engineering environments, or personal computing systems. [Computer and Information Sciences] \nn., A computer hardware and software system designed to accept, store, manipulate, and analyze data and to report results, usually on a regular, ongoing basis. An IS usually consists of a data input subsystem, a data storage and retrieval subsystem, a data analysis and manipulation subsystem, and a reporting subsystem. [Computer and Information"} {"text":" Sciences] \nintegrity \nn.,\n A group of commands that initialize a device, such as a printer. [Computer and Information Sciences] \nintact record \nn., [diplomatics] An intrinsic element of documentary form that comprises the name, title and address of the addressee of the document and\/or the action. [Archives] \ninstructive record \nn.,\n To represent by an instance. [Government] \nintegrated definition function modeling method \nn., A prospective record that contains instructions about executing an action or proc"} {"text":"ess. With dispositive, enabling, narrative, probative and supporting, one of six functional categories of records. [Archives] \nn.,\nn.,\n A record that has had no relevant part removed or destroyed. [Archives] \nn., Seen., Procedures for carrying out the creator\u2019s business that have been linked to a scheme or plan for organization of the creator\u2019s records. [Models (MCP)] \n To represent by an instance. [Government] \nn., (IDEF0) A method designed to model the decisions, actions, and activities of an organization"} {"text":" or system. [Computer and Information Sciences] \n A group of commands that initialize a device, such as a printer. [Computer and Information Sciences] \nn., Th e quality of being compl ete and u naltered in a ll ess ential res pec ts. Wit h i dentity, a com ponent of au\nthenticity. [General Dictionaries] \nn., The integrit y o f a re cord refe rs t o its whol ene ss a nd soundne ss: a reco rd ha s integrit y when it is c\nomplete and uncorrupted in\nall its esse nt ial res pects. [A rch ives] \nn., The preserv"} {"text":"ation of programs and data for their intended purpose. [Arts] \nn., A digital entity has integrity when it is whole and sound or when it is complete and uncorrupted in all its essent\nial respects. [Arts] \nn., The accuracy and completeness of data, particularly after it has undergone transmission from one system to another.\n[Computer and Information Sciences] \nn., Resistance to alteration by system errors. A user who files data expects that the contents of the files will not be changed by\nsystem errors in eit"} {"text":"her hardware or software. Since such errors inevitably will occur from time to time, the prudent system\nmanager maintains a system of protective dumps, organized in such a way that there always exists a valid copy of a recent version\nof every file on the system. [Computer and Information Sciences] \nn., Integrity refers to the protection of information from unauthorized access or revision. [Computer and Information Sciences] \nn., The quality of being whole and unaltered through loss, tampering, or corruption"} {"text":". [General Dictionaries] \nmanager maintains a system of protective dumps, organized in such a way that there always exists a valid copy of a recent version\nn., See\n: intellectual form [Archives] \nn., The quality of being whole and unaltered through loss, tampering, or corruption. [General Dictionaries] \nn., The control established over archival material by documenting in finding aids its provenance, arrangement,\n composition, scope, informational content and internal and external relationships. [Archives] \n"} {"text":"n., The creation of tools such as catalogs, finding aids, or other guides that enable researchers to locate materi\nals relevant to their interests. [Archives] \nn., A system in which each user entry causes a response from or an action by the system, by virtue of\nautomated reasoning based on data from its apparatus. [General Dictionaries] \nn., [diplomatics] The whole of the formal attributes of the record that represent and communicate the elements of the \naction in which the record is involved and of its imm"} {"text":"ediate context, both documentary and administrative. [Archives] \nv., An expression of the extent that in a given series of communication exchanges, any third (or later) transmission (or\nmessage) is related to the degree to which previous exchanges referred to even earlier transmissions. [Computer and\nInformation Sciences] \nn., (IPR) The rights of individuals or organizations to control the use or dissemination of ideas or information.\n The y inclu de copyri ght, tradem ark s and pat ents . [ Gove rnment] \n"} {"text":"n., A document that is transmitted across space or through time only within the creating organization, rather than to an\nexternal party. [Archives] \nn., A record with variable content or form that is dependent on user input that is often based on earlier content. [Arc\nhives] \nn., Records corresponding to one of four possible models:\n* Navigable structure: An articulation of space; real, virtual or conceptual. Here the artist provides the architecture and the\n audience chooses the path (ex: hypertext narrati"} {"text":"ves).\n* The use of new media: Artistic interaction via new medium invented by the artist (ex: programs with modify user input into a\n visual or sound medium).\n* Transforming mirrors: viewer image becomes an active force in a computer generated context (ex: video installations).\n* Automata: not intended to be extensions of the interactor; creations are essentially self-motivated and autonomous (ex:\n autonomous robots). [Archives] \nThe authority derived from external mandates and within the given strategic fr"} {"text":"amework, invested by management or a corporate\nboard or subsidiary to perform specific functions. [Models (BDR)] \nn., A system in which each user entry causes a response from or an action by the system, by virtue of automated reasoning bas\ned on data from its apparatus. [General Dictionaries] \nn., An interactive system is a machine system which reacts in the moment, by virtue of automated reasoning based on data from its senso\nry apparatus. An Interactive Artwork is such a system which addresses artistic is"} {"text":"sues. A painting is an instance of representation. A film is a sequence of representations. Interactive artworks are not instances of representations, they are virtual machines which themselves produces instances of representation based on real-time outputs. [Arts] \ninteractivity \nv., An expression of the extent that in a given series of communication exchanges, any third (or later) transmission (or message) is related to the degree to which previous exchanges referred to even earlier transmissions. [Comput"} {"text":"er and Information Sciences] \nintellectual form \nn., A document that is transmitted across space or through time only within the creating organization, rather than to an external party. [Archives] \nn., A document, such as a memorandum or report, intended for distribution within an organization, rather than for wider publication. Sensitive internal documents may be classified to restrict access to authorized personnel, and shredded when no longer needed. [Computer and Information Sciences] \ninteractive syste"} {"text":"m \nThe authority derived from external mandates and within the given strategic framework, invested by management or a corporate board or subsidiary to perform specific functions. [Models (BDR)] \nintellectual property rights \nn., A record, such as a memorandum or report, which is transmitted across space or through time only within the creating organization, rather than to an external party. [Archives] \nn.,\nRequests from internal users to consult or receive records, their aggregates, or information about rec"} {"text":"ords. [Models (BDR)] \n Initialism for \u201cintellectual property rights.\u201d [Government] \n n.,\n The ability of one application\/system to communicate or work with another. [General Dictionaries] \nn., The ability of one application, system, or metadata schema to communicate, work, or interface with another;\n the ability to provide services and accept services from other systems, enabling information that originates in one context to be used in another in ways that are as highly automated as possible. [Archives] \nn."} {"text":", The ability of software and hardware on multiple machines from multiple vendors to communicate. [Computer \nand\nInformation Sciences] \nn., The processes, technologies and protocols required to ensure data integrity when transferring it from one computer s\nystem to\nanother, together with the transmission of meaningful and correct results to the end user. [Computer and Information Sciences] \niso \nn., [diplomatics] An element of the documentary form of a record that constitutes its internal composition and th"} {"text":"at conveys the action in which the record participates and its immediate context. [Archives] \nn., The elements of a record that constitute its internal composition. The types of intrinsic elements include name of author, name of originator, chronological date, name of place of origin of record, name of addressee(s), name of receiver(s), indication of\naction (matter), name of writer, corroboration, attestation, and qualification of signature. [Archives] \nn., The discursive parts of the record that communicat"} {"text":"e the action in which the record participates and the immediate context.\nThey fall into three groups:\n1) elements that convey aspects of the record's juridical and administrative context (e.g., the name of the author, addressee, the\ndate);\n2) elements that communicate the action itself (e.g., the indication and description of the action or matter);\n3) elements that convey aspects of the record's documentary context and its means of validation (e.g., the name of the writer, the\nattestation, the corroboration"} {"text":"). [Archives] \nn., The inherent worth of a document upon factors such as age, content, usage, circumstances of creation, signature or attached seals. [Archives] \nThey fall into three groups:\nn., A descriptive instrument that represents the records of a fonds in their hierarchical structure and arrangement, and illustrates the administrative history of their creator, their custodial history and their administrative and documentary context. [Archives] \nn., [inventories] Detailed lists of things in one's view "} {"text":"or possession, as of all goods and materials on hand, or detailed lists of all items in a given category. For documentation of examination conducted to achieve a comprehensive view, use \"surveys.\" [Arts] \n2) elements that communicate the action itself (e.g., the indication and description of the action or matter);\nn., [diplomatics] An intrinsic element of documentary form that comprises the mention of God in documents issued by religious bodies. [Archives] \nattestation, the corroboration). [Archives] \nn.,\n "} {"text":"Initialism for \u201cintellectual property rights.\u201d [Government] \nn., The ability of software and hardware on multiple machines from multiple vendors to communicate. [Computer and\nn.,\n Initialism for \u201cInternational Organization for Standardization.\u201d [Government] \nanother, together with the transmission of meaningful and correct results to the end user. [Computer and Information Sciences] \nn., The smallest indivisible archival unit, which represents the smallest intellectual entity within a fonds no longer useful"} {"text":"ly subdivisible for descriptive purposes. [Archives] \nn.,\nn., An entity having the capacity or the potential to act legally and constituted either by a succession or collection of physical persons or a collection of properties. [Archives] \nn., Juridical persons are collections or successions of natural persons having the capacity to act legally in the context of the enacted law or system of rules peculiar to any one people, such as an organization (collection) or a position (succession). [Archives] : record"} {"text":"s lifecycle [Archives] \n n., A social group that is organized on the basis of a system of rules and that includes three components: the social group, the organizational principle of the social group, and the system of binding rules recognized by the social group. [Models (MCP)] \nn., A collectivity organized on the basis of a system of rules. [Models (MCP)] \nn., A social group founded on an organizational principle that gives its institution(s) the capacity of making compulsory rules.\n[Mod els (MCP)] \nn., An"} {"text":" entity having the capacity or the potential to act legally and constituted either by a succession or collection\nof physical persons or a collection of properties. [Archives] \nn.,\n The legal and organizational system in which the creating body belongs. [Archives] \nn.,\n The legal and organizational system in which the creating body belongs. [Archives] \nn., Recorded information about modifications to a record\u2019s documentary form or digital format after it has been created.\n[Archives] \nn.,\n Initialism for \u201cloca"} {"text":"l area network.\u201d [Computer and Information Sciences] \nlanguage \nn., [diplomatics] An extrinsic element of documentary form that comprises the expression and organization of ideas and discourse including composition, style, rhythm, and vocabulary. [Archives] \njuridical person \nn., Either the person or organization acquiring the function(s) from which the records in question result and the records themselves, or a designated records preserver. [Archives] \nlist of annotations \nn., See\n: records lifecycle [Arch"} {"text":"ives] \njuridical-administrative context \nn., Recorded information about additions made to a record after it has been created. [Archives] \nn., Juridical persons are collections or successions of natural persons having the capacity to act legally in the context of the\nenacted law or system of rules peculiar to any one people, such as an organization (collection) or a position (succession).\n[Archives] \nn., Recorded information about modifications to a record\u2019s documentary form or digital format after it has be"} {"text":"en created. [Archives] \nn., A social group founded on an organizational principle that gives its institution(s) the capacity of making compulsory rules.\nn., The mandate from law, professional best practices, professional literature, and other social sources requiring the creation and continued maintenance of archival description and other metadata supporting the accuracy, reliability, authenticity and preservation of records. [Archives] \nlongevity \nn., (LAN) A data communications network that is geographica"} {"text":"lly limited (typically to a one kilometre radius) allowing easy interconnection of terminals, microprocessors and computers within adjacent buildings. [Computer and Information Sciences] \nlogical format \nn., The organized arrangement of data on a digital medium that ensures file and data control structures are recognizable and recoverable by the host computer operating system. Two common logical formats for files and directories are ISO 9660\/13490 for CDs, and Universal Disk Format (UDF) for DVDs. [Computer"} {"text":" and Information Sciences] \nmachine language \nn.,\n A set of names in which all names are unique. [Computer and Information Sciences] \nn., The set of names in a naming system. [Computer and Information Sciences] \nn., A logical grouping of the names used within a program. Also called name scope. \n[Computer and Information Sciences] \nn.,\nn.,\n The syntactic organization of data elements in an SGML-compliant document. [Computer and Information Sciences] \nn., See\nn.,\n Long life; long duration of existence. [Gener"} {"text":"al Dictionaries] \nn., The expectation of the lifespan of a person, culture, and so on. [Sciences] \nn., The persistence of an individual for longer than most members of its species, or of a genus or species ov\ner a prolonged period\nof geological time.\n[Sciences] \nn., The length of time for which a given information medium remains fit for use under normal conditions, before deterior\nation\nand other factors render it unusable. Longevity is affected by inherent vice, preservation procedures (cleaning, storag\ne\n"} {"text":"conditions, etc.), and obsolescence of technology in the case of electronic media. \n The syntactic organization of data elements in an SGML-compliant document. [Computer and Information Sciences] \nn., A term describing a data compression algorithm which retains all the information in the data, allowing it to be recovered perfectly by decompression.O pp.: lossy compression. [Computer and Information Sciences] \nn., A logical grouping of the names used within a program. Also called name scope. \nn., A term desc"} {"text":"ribing a data compression algorithm which actually reduces the amount of information in the data, rather than just the number of bits used to represent that information. Opp.: lossless compression. [Computer and Information Sciences] \nn., The expectation of the lifespan of a person, culture, and so on. [Sciences] \nn., See\n: machine language [Computer and Information Sciences] \n[Sciences] \nn., A data hierarchy that reflects the facilities of the computer, both hardware and software. [Computer and Information"} {"text":" Sciences] \nand other factors render it unusable. Longevity is affected by inherent vice, preservation procedures (cleaning, storage\nn., A set of instructions for a specific central processing unit, designed to be usable by a computer without being translated. Syn.: machine code. [Computer and Information Sciences] \nman \nn., Data in a form that can be recognized, accepted, and interpreted by a machine, such as a computer or other data processing device, whether created in such a form or converted from a for"} {"text":"mat that a machine cannot read. [Computer and Information Sciences] \nmanifest \nn.,\n A document composed or compiled by the creator. [Models (MCP)] \nmade document \nn., A made document declared a record and set aside for action or reference, usually in a recordkeeping system. [Archives] \nmaintenance strategy \nn., A coherent set of objectives and methods for protecting and maintaining accessibility of authentic copies of digital records through their early stages in the chain of preservation. [Archives] \nmachi"} {"text":"ne-readable format \nn.,\n Initialism for \u201cmetropolitan area network.\u201d [Computer and Information Sciences] \nn.,\nv., To render a stored digital object in a form suitable for presentation either to a person (i.e., in human-readable form) or to a computer system (i.e., in machine language). [Archives] \nn.,\nn., A digital component that is visualized or rendered from a stored digital component in a form suitable for presentation within a document either to a person (i.e., in human-readable form) or to a computer s"} {"text":"ystem (i.e., in machine language). [Models (MCP)] \nSyn\nn., A digital document that is visualized or rendered from a stored digital document and\/or stored digital component(s) in a form suitable for presentation either to a person (i.e., in human readable form) or to a computer system (i.e., in machine language). [Models (MCP)] \nSyn\nnN\n,\n A manifested digital document that is treated as a record. \nSyn\n.: presented digital record. [Models (MCP)] \n Initialism for \u201cmetropolitan area network.\u201d [Computer and Info"} {"text":"rmation Sciences] \nn.,\n Notes made in the margin of a document. \nSyn\n.: marginal notes. [Archives] \nn., Data in a form that can be recognized, accepted, and interpreted by a machine, such as a computer or other data\nprocessing device, whether created in such a form or converted from a format that a machine cannot read. [Computer\nand Information Sciences] \nv., To add codes (markup tags) to a digital document to give semantic structure to the content. Information Sciences] \nSyn\n.: tag. [Computer and\nn., A dig"} {"text":"ital component that is visualized or rendered from a stored digital component in a form suitable for presentation\nwithin a document either to a person (i.e., in human-readable form) or to a computer system (i.e., in machine language).\n[Models (MCP)] \nn., A computer-processable encoding language and associated rules that can be used to mark-up or tag SGML-\ncompliant documents to indicate their logical structure, layout, display and styling. [Computer and Information\n Sciences] \nn., A notation for defining th"} {"text":"e structure and formatting of a document by using ordinary characters embedded in the text. This\n system of tags identifies the logical components of the document and relates them to a syntactic definition of the documen\nt structure. [Computer and Information Sciences] \nn., In computing, a predefined set of descriptors (symbols and tags) or a method of defining descriptors that are used to embed\nexternal information in an electronic text document, usually to specify formatting or facilitate analysis. [Compu"} {"text":"ter and\nInformation Sciences] \nn., Data describing data and data systems; that is the structure of databases, their characteristics, location and usage. [Archives]\nn., Structured or semi-structured information which enables the creation, management and use of records through time and\nn., The markup characters that indicate the start or end of a data element in an SGML-compliant document. A tag serves as an instruction to a processing or reading program, specifying how the data element is defined or displaye"} {"text":"d. [Computer and Information Sciences] \nn., Data describing context, content and structure of records and their management through time. [Archives] \nn., [diplomatics] An extrinsic element of documentary form that comprises the material carrying the message of a document. [Archives] \nn., The physical material or substance upon which information can be or is recorded or stored. [Archives] \nn., In information storage and retrieval, the physical substance or material on which data is recorded (parchment, paper,"} {"text":" film, magnetic tape or disk, optical disk, etc.) or through which data is transmitted (optical fiber, coaxial cable, twisted pair, etc.). In a more general sense, the material or technical means by which any creative work is expressed or communicated, in print or nonprint format. \nn., The material support of the record content and form. Alias: storage medium. [Archives] \nn., The physical material in or on which data may be recorded, i.e. clay tablet, papyrus, paper, parchment, film, magnetic tape (plural: "} {"text":"mediums). [Archives] \nn., A material or base on which information is stored or transmitted. It may be a physical medium such as a gramophone record\nor a piece of paper or be virtual (for example, a radio carrier signal). [Arts] \nn., Term used to refer to the material or form of expression employed by an artist; thus painting, sculpture, and drawing are t\nhree\ndifferent media, and bronze, marble, and wood are three of the media of sculpture. [Arts] \nn., Term used to refer to the actual physical material chos"} {"text":"en as a vehicle of expression for any work of art. In painting it is\n used\nmore specifically for the liquid in which the pigment is suspended. [Arts] \nor a piece of paper or be virtual (for example, a radio carrier signal). [Arts] \nn., Any file or database that holds information about a document, record, aggregation of records or another database's structure, attributes, processing or changes. [Computer and Information Sciences] \nn., [data] Information that characterizes another information resource, especi"} {"text":"ally for purposes of documenting,\ndescribing, preserving or managing that resource. [General Dictionaries] \nn., Data describing data and data systems; that is the structure of databases, their characteristics, location and usage. [Archives] n., Structured or semi-structured information which enables the creation, management and use of records through time and\nwithin and across domains in which they are created. [Archives] \nn., Data describing context, content and structure of records and their management th"} {"text":"rough time. [Archives] \nn., Information about a publication as opposed to the content of the publication; includes not only bibliographic description but\nalso other relevant information such as its subject, price, conditions of use, etc. [Arts] \nn., Data about data. In data processing, meta-data is definitional data that provides information about or documentation of other\ndata managed within an application or environment. [Computer and Information Sciences] n., Data describing or documenting the management"} {"text":", nature, or use of information resources. [General Dictionaries] \nn., Data associated with either an information system or an information object for purposes of description, ad\nministration, legal\nrequirements, technical functionality, use and usage, and preservation. [General Dictionaries] \nn., Any file or database that holds information about a document, record, aggregation of records or another\ndatabase's structure, attributes, processing or changes. [Computer and Information Sciences] \nn.,\n A discrete "} {"text":"component of metadata. [General Dictionaries] \nn., The markup characters that indicate the start or end of a data element in an SGML-compliant document. A tag serves\nas an instruction to a processing or reading program, specifying how the data element is defined or displayed. [Computer\nand Information Sciences] \nn., A grouping of metadata elements along with their attributes, such as name, identifier, definition or relationship to other concepts, collated for a specific purpose, community or domain. [Genera"} {"text":"l Dictionaries] \nn.,\nn.,\n A controlled vocabulary for metadata element values and encoding structures. [Computer and Information Sciences] : metadata element set [Archives] \nn.,\n A particular collection of metadata elements associated with a set of values for those elements. [Archives] \n (MAN) A data network intended to serve an area the size of a large city. [Computer and Information Sciences] \nn., A formal identification of equivalent or nearly equivalent metadata elements or groups of metadata elem\nents "} {"text":"within different metadata schemas, carried out in order to facilitate semantic interoperability. [Archives] \nn., An authoritative resource that can be used to catalogue, describe, document and analyze metadata schemas\nand versions thereof. [Archives] \nn., An a uthorit ati ve sou rce of repo sit ory fo r nam es, se mantics a nd synta xes for one or mor e s chemas. An\n application that uses metadata languages in a form processable by machines to make those languages available for u\nse by both humans and mac"} {"text":"hines. [Archives] \nn., A grouping of metadata elements along with their attributes, such as name, identifier, definition or relationship to\nother concepts, collated for a specific purpose, community or domain. [General Dictionaries] \nn., A framewo rk that specifi es and describ es a stand ard set of metadata elements and their int errelatio nships t\nhat need to be recorded to ensure the identification of records and their authenticity. Schemas provide a formal syntax (or structure) and semantics (or defini"} {"text":"tions) for the metadata elements. [Archives] \nn., A framework that specifies and describes a standard set of metadata elements and their interrelationships that need\nto be recorded to ensure the identification of records and their authenticity. Schemas provide a formal syntax (or\nstructure) and semantics (or definitions) for the metadata elements. [Archives] \nn., An authoritative resource that can be used to catalogue, describe, document and analyze metadata schemas and versions thereof. [Archives] \nn., An "} {"text":"authoritative source of repository for names, semantics and syntaxes for one or more schemas. An application that\nuses metadata languages in a form processable by machines to make those languages available for use by both humans\nand machines. [Archives] \nn., See\n: metadata element set [Archives] \nmethodology \nn., The system of broad principles or rules from which specific methods or procedures may be derived to understand different situations (or solve different problems) within the scope of a particular di"} {"text":"scipline. [General Dictionaries] \nmetadata registry \nn.,\n (MAN) A data network intended to serve an area the size of a large city. [Computer and Information Sciences] \nmigration of records \nn., The process of moving or transferring digital objects from one system to another. [Computer and Information Sciences] \nmetropolitan area network \nn., The process of moving records from one system to another to ensure their continued accessibility as the system becomes obsolete, while leaving intact their physical and"} {"text":" intellectual forms. [General Dictionaries] \nn., Converting information to new formats which can be accessed by current hardware and software. [Archives] \nn., Process of moving records from one system to another while maintaining the records\u2019 authenticity, integrity, reliability and\nusability. [Archives] \nn., The process of moving records from one system or storage medium to another to ensure their continued accessibility as the system or medium becomes obsolete or degrades over time. [General Dictionaries]"} {"text":" n., The process of translating from one to another. Data migration is necessary when an organization decides to use new\ncomputing systems or that is incompatible with the current system. [General Dictionaries] \nn., The process of copying data from one information system or storage media to another to ensure continued access to the\ninformation as the system or media becomes obsolete or degrades over time. [General Dictionaries] \nn., The process of copying data from one information system or storage media t"} {"text":"o another to ensure continued access to the\nn.,\n The method of transmission of a record (e.g., by fax). [Archives] \nnetwork \nn., A schematic description of a system, theory, or phenomenon that accounts for its known or inferred properties and may be used for further study of its characteristics. [General Dictionaries] \nnamespace \nn.,\n The subject line(s) and\/or the title at the top of the record. [Archives] \nnatural hierarchy \nn., The name of the geographic place where the record was generated; included in "} {"text":"the content of the record by the author or by the electronic system on the author's behalf. [Archives] \nmode of transmission \nn.,\n A collection of names, identified by a URL reference, used as element types and attribute names. [Archives] \nn.,\n The names of the variables accessible at a particular point in the text of a program. \nn.,\nn.,\n (of a document) Constituting written evidence of an activity which is juridically irrelevant. [Archives] \nn., Seen., A retrospective record constituting written evidence o"} {"text":"f activities that are juridically irrelevant. With dispositive, enabling, instructive, probative and supporting, one of six functional categories of records. [Archives] \n: physical person [Archives] \nn., A data hierarchy that arises from the alphabet or syntax of the language in which the information is expressed. [Computer and Information Sciences] \n The subject line(s) and\/or the title at the top of the record. [Archives] \nn., See\n: physical person [Archives] \nn., A data hierarchy that arises from the alp"} {"text":"habet or syntax of the language in which the information is expressed.\n[Computer and Information Sciences] \nn., A hardware and software data communication system. Networks are often also classified according to their geographical\n extent: local area network (LAN), metropolitan area network (MAN), wide area network (WAN) and also according to the protocols used. [Computer and Information Sciences] \nn., A schematic description of a system, theory, or phenomenon that accounts for its known or inferred properti"} {"text":"es\nand may be used for further study of its characteristics. [General Dictionaries] \nn., See\n: inactive record [Archives] \nobject \nn., In reference to hardware technology, software applications and\/or file formats, the state of not being protected by trademark, patent or copyright nor owned or controlled solely by one company or institution. Opp.: proprietary. [Computer and Information Sciences] \nnotification \nn., The capacity of a digital security service of ensuring that a transferred message has been sen"} {"text":"t and received by the parties claiming to have sent and received the message, and of providing proof of the integrity and origin of data, both in an unforgeable relationship, which can be verified by any third party at any time. [General Dictionaries] \nn., A security service which prevents the receiver of a message from denying that the message had been received . [Arts] \nn., In reference to digital security, nonrepudiation means to ensure that a transferred message has been sent and received by the\nparties"} {"text":" claiming to have sent and received the message. [General Dictionaries] \nn., Non-repudiation gives a recipient the confidence that the sender cannot deny having sent the data at a later date. [General\nDictionaries] \nobsolete technology \nn., Computer memory that does not require electrical power to maintain its stored content. secondary storage. Opp.: volatile storage. [Computer and Information Sciences] \nSyn\n.: persistent storage;\nn.,\nn., The process of creating and\/or storing digital documents or other dig"} {"text":"ital objects in a limited number of, often standardized, data or file formats. [Computer and Information Sciences] \nn.,\nn.,\n An annotation or comment in a document, often handwritten marginalia or a gloss. [Archives] \nn., The written recording of movement through signs. [Arts] \nn., Also known as stenochoregraphy, choreography or dance-script. Visual and graphic metho\nds for recording dances, which\ninclude numerous systems, geometric, anatomical, and cinematographic. [Arts] \n The process of becoming obsolete"} {"text":" or the condition of becoming nearly obsolete. [General Dictionaries] \nn., [diplomatics] An intrinsic element of documentary form that comprises the expression of the purport of the document intended to communicate to all who have an interest in the act consigned to the document. [Archives] \nn., The process of creating and\/or storing digital documents or other digital objects in a limited number of, often\nstandardized, data or file formats. [Computer and Information Sciences] \nn.,\n A tangible entity. [Gener"} {"text":"al Dictionaries] \nn., The capacity of a digital security service of ensuring that a transferred message has been sent and received by the\nparties claiming to have sent and received the message, and of providing proof of the integrity and origin of data, both in\nan unforgeable relationship, which can be verified by any third party at any time. [General Dictionaries] \nn.,\n The process of becoming obsolete or the condition of becoming nearly obsolete. [General Dictionaries] a) No longer in use or no longer us"} {"text":"eful. b) Of a kind of style no longer current. [General Dictionaries] \nn.,\n A record no longer in use or no longer useable or useful to the creator for action or reference. [Archives] \nn.,\n a) No longer in use or no longer useful. b) Of a kind of style no longer current. [General Dictionaries] \nn., In reference to digital security, nonrepudiation means to ensure that a transferred message has been sent and received by the\nn.,\n An out-of-date technological invention no longer in use. [General Dictionaries] \n"} {"text":"Dictionaries] \nn., The office given the formal competence for maintaining the authoritative version or copy of records belonging to a given class within a classification scheme. [Archives] \nn.,\n The corporate body or administrative unit in which a group of records are created or received and accumulated in the conduct of its business. [Archives] \nn., The office given the formal competence for maintaining the authoritative (that is, official) records belonging to a given class\nwithin an integrated classifica"} {"text":"tion scheme and retention schedule. The purpose of designating an Office of Primary Responsibility\nfor each class of record is to reduce duplication and to designate accountability for records. [Archives] \nn., The office given the formal competence for maintaining the authoritative version or copy of records belonging to a\ngiven class within a classification scheme. [Archives] \nn.,\n A complet e, fi nal, and au thor ized version or instant iat ion of a reco rd. [Archiv es] \nn., A complete, final, and auth"} {"text":"orized copy of a record, especially the copy bearing an original signature or seal. [Archive\ns] \nn., A record created by, received by, sanctioned by, or proceeding from an individual acting within their design\nated capacity. \u2013 2.\nA complete, final, and authorized copy of a record, especially the copy bearing an original signature or seal. [Archives] \nn., A record, in law, having the legally recognized and judicially enforceable quality of establishing some fact. [Archives] \nn., The formal written documents "} {"text":"in which the ongoing activities of a company, government, organization, or institution are\nrecorded, usually retained in archives for their evidential, legal, informational, or historical value, in accordance with instr\nuctions\ncontained in a disposition schedule (example: Congressional Record). See also: office of record [Computer and Information\nSciences] \nfor each class of record is to reduce duplication and to designate accountability for records. [Archives] \nn., [computing] An architecture whose specif"} {"text":"ications are public. This includes officially approved standards as well as privately designed architectures whose specifications are made public by the designers. [Computer and Information Sciences] \nn., A record created by, received by, sanctioned by, or proceeding from an individual acting within their designated capacity. \u2013 2.\na., A method and philosophy for software licensing and distribution designed to encourage use and improvement of software written by volunteers by ensuring that anyone can copy th"} {"text":"e source code and modify it freely. Opp.: proprietary. [Computer and Information Sciences] \nn., A computer program in which the source code is available to the general public for use and\/or modification from its\noriginal design free of charge (open). Opp: proprietary. [Computer and Information Sciences] \nrecorded, usually retained in archives for their evidential, legal, informational, or historical value, in accordance with instructions\nn., Freely available structures, procedures, or tools for the uniform"} {"text":" creation and description of data. Usually defined and perhaps maintained by a central body, but, unlike proprietary standards, users are not reliant on a private organization to license use and provide support. [Archives] \nSciences] \nn., Syn\n A record that relates to the substantive activities an organization undertakes to accomplish its mission or mandate. .: program record. [Archives] \nSyn\norganization \nn., A high-density, direct access, digital storage medium consisting of a specially coated disk on whi"} {"text":"ch data are encoded in a pattern of tiny pits burned into the surface with a laser, to be read by a device that reflects a laser beam off the pitted surface, then decoded by a microprocessor into digital signals. [Computer and Information Sciences] \nopen architecture \nn., A social system that has an unequivocal collective identity, and exact roster of members, a program of activity, and procedures for replacing members. [Government] \nopen-standard products and formats \nn., In the paper environment, a file t"} {"text":"hat contains originals of documents received and drafts and\/or copies of documents sent (i.e., the first complete and effective file). [Archives] \nn.,\nn., The first copy or archetype of a record; that from which another instrument is transcribed, copied, or initiated. [Government] \nn., Seen., The person assigned the electronic address where the record has been generated (i.e., from which the record is sent or where the record is compiled and kept). [Archives] \nn., The person owning the address where the rec"} {"text":"ord has been generated (i.e. from which the record is sent or where the record is compiled and kept) [Archives] \n The name of the person from whose electronic address the record has been sent. [Archives] \nn.,\n The name of the person from whose electronic address the record has been sent. [Archives] \nn., The first copy or archetype of a record; that from which another instrument is transcribed, copied, or initiated.\n[Government] \nn., A document that is sent to an external juridical and\/or physical person in "} {"text":"the course of the activities of the\n records creator, a draft or record copy of which is also set aside by the creator, usually in a recordkeeping system. [Archives] \nn., A document that is sent to an external juridical and\/or physical person in the course of the activities of the\nrecords creator, a draft or record copy of which is also set aside by the creator, usually in a recordkeeping system.\n[Archives] \nn., See\n: ou tgo ing docume nt [Archives] \nn., The person assigned the electronic address where the"} {"text":" record has been generated (i.e., from which the record is sent\nor where the record is compiled and kept). [Archives] \nn., [diplomatics] An extrinsic element of documentary form concerning a record\u2019s overall information configuration; i.e.,\n the manner in which the content is presented to the senses using text, image or sound, either alone or in combination\n. [Archives] \npacket \nn., A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the "} {"text":"destination address in addition to the data. [Computer and Information Sciences] \nparity bit \nn., Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Once all the packets forming a message arrive at the destination, they are recompiled into the original message. [Computer and Information Sciences] \nperfect record \nn.,\n A bit included in a unit of digital data to detect error"} {"text":"s in transmission. [Computer and Information Sciences] \npacket switching \na.,\n [law; diplomatics] Complete, finished, without defect and enforceable. [Archives] \noverall presentation \nn., A record that is able to produce the consequences wanted by its author; perfection is conferred on a record by its form. [Archives] \nn., The person owning the address where the record has been generated (i.e. from which the record is sent or where the record is\ncompiled and kept) [Archives] \nn., See\n: records preservation "} {"text":"[Archives] \nn., The physical and technological stabilization and protection of intellectual content of materials intended for their continuing, enduring, stable, lasting, uninterrupted, and unbroken chain of preservation, without a foreseeable end. [Archives] \nn., See\nn., See\n: records preservation system [Archives] \n: non-volatile storage [Computer and Information Sciences] \nn., A strategy that seeks to make the architecture of archival information systems used to preserve digit\nal records independent of t"} {"text":"he technology used to implement them. [Archives] \nn., A strategy that seeks to make the architecture of archival information systems used to preserve digital\nrecords independent of the technology used to implement them. [Archives] \nn., A data type, which may be simple or complex, that is independent of specific hardware or software, such that an object in this data type can be transferred from a source platform to an arbitrary target platform with no significant alteration of essential attributes or behavio"} {"text":"urs. [Computer and Information Sciences] \nn., A data type, which may be simple or complex, that is independent of specific hardware or software, such that an\nobject in this data type can be transferred from a source platform to an arbitrary target platform with no significant\nalteration of essential attributes or behaviours. [Computer and Information Sciences] \nn., A digital object normalized to a persistent format and encapsulated so that it is self-describing a\nnd readable by newer platforms. [Computer an"} {"text":"d Information Sciences] \nn., An individual or legally defined entity who is the subject of rights and duties, and who is recognized by the juridical\nsystem as capable of or having the potential for acting legally. [General Dictionaries] \nn., (POP) A permanent preservation technique to ensure digital records remain accessible by making them self-describing i\nn a way that is independent of specific hardware and software. [Computer and Information Sciences] \nn., A digital object normalized to a persistent form"} {"text":"at and encapsulated so that it is self-describing and readable by\nnewer platforms. [Computer and Information Sciences] \nn., See\n: non-volatile storage [Computer and Information Sciences] \npkc \nn., An individual or legally defined entity who is the subject of rights and duties, and who is recognized by the juridical system as capable of or having the potential for acting legally. [General Dictionaries] \npertinent \na., [diplomatics] The quality of a record whose content is relevant to the purpose for which it"} {"text":" is created and\/or used. With correct, precise and truthful, a component of accuracy. [Archives] \nphysical person \nn.,\n [diplomatics] The whole of the formal attributes of the record that determine its external make-up. [Archives] \npersistent storage \nn., A human being, as distinguished from a juridical person, who has natural rights and duties and who has the ability to act in his or her own right in relations with other people.S yn.: natural person. [General Dictionaries] \nphysical structure \nn., Constitu"} {"text":"ting the data storage elements in an SGML-compliant document and their content. [Computer and Information Sciences] \npermanent preservation system \nn.,\n Initialism for \u201cpublic key cryptosystem.\u201d [Computer and Information Sciences] \nn.,\nn.,\n Initialism for \u201cpublic key encryption.\u201d [Computer and Information Sciences] \nn., See\nn.,\n Initialism for \u201cpublic key infrastructure.\u201d [Computer and Information Sciences] \nn., See\nn.,\n Text or other data that contains no formatting and\/or is not encrypted. [Computer and I"} {"text":"nformation Sciences] \n: cross-platform [Computer and Information Sciences] \nn., See\n : disposition rule [Archives] \n Initialism for \u201cpublic key cryptosystem.\u201d [Computer and Information Sciences] \n n., The specific hardware architecture of a computer and\/or its operating system; usually for a model or entire family of computers. [Computer and Information Sciences] \n Initialism for \u201cpersistent object preservation.\u201d [Computer and Information Sciences] \nn., See\n: cross-platform [Computer and Information Science"} {"text":"s] \n Text or other data that contains no formatting and\/or is not encrypted. [Computer and Information Sciences] \nn., See\n: cross-platform [Computer and Information Sciences] \nn., A document that is a record in becoming. If the creator treats it is as a record, associates it with entities that are\nundeniably records, and does so in the course of an activity and for its purpose, such an object only needs a stable content\nand a fixed form to materialize itself as a complete record. [Archives] \nn., A formal st"} {"text":"atement of direction or guidance as to how an organization will carry out its mandate, functions or activities, motivated by determined interests or programs. [Archives] \npke \nn.,\n Initialism for \u201cpersistent object preservation.\u201d [Computer and Information Sciences] \nprecise \nn., A document that is a record in becoming. If the creator treats it is as a record, associates it with entities that are undeniably records, and does so in the course of an activity and for its purpose, such an object only needs a sta"} {"text":"ble content and a fixed form to materialize itself as a complete record. [Archives] \nplaintext \nn., [diplomatics] An intrinsic element of documentary form that comprises the part of the text of a document that expresses the ideal motivation of the action. [Archives] \npotential record \na., [diplomatics] The quality of a record that strictly conforms in every detail of content and form to an established standard, guideline or convention. With correct, pertinent and truthful, a component of accuracy. [Archives"} {"text":"] \nplanned disposition \nn., See\n: manifested digital record [Models (MCP)] \npreserver \nn., The whole of the principles, policies, rules and strategies aimed at prolonging the existence of an object by maintaining it in a condition suitable for use, either in its original format or in a more persistent format, while leaving intact the object\u2019s intellectual form. [Archives] \nn., Preservation has been defined as the protection of human features in the landscape, as opposed to conservation which is concerned wi"} {"text":"th the protection of the natural landscape. This distinction is not always made. [Sciences] \nn., Processes and operations involved in ensuring the technical and intellectual survival of authentic records through time.\n[Archives] \nn., The process of protecting documents from deterioration or damage; the non-invasive treatment of fragile documents.\n[Archives] \nn., The storing and protecting of archives against damage and deterioration. [Archives] \nn., The totality of processes and operations involved in the s"} {"text":"tabilization and protection of documents against damage and\ndeterioration and in the treatment of damaged or deteriorated documents preservation may also include the transfer of\ninformation to another medium such as microfilm. [Archives] \nn., Refers to actions taken to prevent further changes or deterioration in objects, sites, or structures. [Arts] \nn., The overall package of administrative and\/or practical measures, such as boxing, good housekeeping, careful handling and\nenvironmental control, which ensur"} {"text":"e the survival of documents without specialist intervention. Conservation and restoration\nprocedures are part of a preservation policy. [Arts] \nn., To keep from harm, injury, decay, or destruction. [General Dictionaries] \n [Computer and Information Sciences] \nn., See\n: emulation [Computer and Information Sciences] \n: records preservation strategy [Archives] \nn., See\n: records preservation strategy [Archives] \n Attestations by the preserver that one or more records are authentic. [Models (MCP)] \nn., See\n: re"} {"text":" co rds pre ser vati on syste m [Archives] \nn., An inference as to the fact of a record's authenticity that is drawn from known facts about the manner in which that\nrecord has been created and maintained. [Archives] \nn., A record in the records preservation system that is the result of good record-making, recordkeeping and permanent prese\nrvation practices, and is available for output (upon request). [Archives] \nn., Processes and operations involved in ensuring the technical and intellectual survival of aut"} {"text":"hentic records through time.\nn., See\n: designated records preserver [Models (MCP)] \n[Archives] \nn.,\n Attestations by the preserver that one or more records are authentic. [Models (MCP)] \ndeterioration and in the treatment of damaged or deteriorated documents preservation may also include the transfer of\nn., An inference as to the fact of a record's authenticity that is drawn from known facts about the manner in which that record has been created and maintained. [Archives] \nn., Refers to actions taken to pre"} {"text":"vent further changes or deterioration in objects, sites, or structures. [Arts] \nn.,\n See: volatile storage\n [Computer and Information Sciences] \nn., To keep from harm, injury, decay, or destruction. [General Dictionaries] \nn., The quality of being first, of not being derived from something else. With completeness and effectiveness, a quality presented by an original record. [Archives] \nn.,\nn., Indication of the relative importance or urgency with which a record is to be transmitted. [Archives] \n (of a docum"} {"text":"ent) Constituting evidence of a completed juridical act. [Archives] \nn., In a Public Key cryptosystem, that part of a key pair that is held by a logical or legal entity in an authentication system, protected by a password, and not made available to anyone else. [Computer and Information Sciences] \nn., In general, the body of written and unwritten rules governing the conduct of a transaction, or the formal steps\nundertaken in carrying out a transaction. [Archives] \na.,\n (of a document) Constituting evidence "} {"text":"of a completed juridical act. [Archives] \nn., A retrospective record for which the juridical system requires a written form as evidence of an action that came into\nexistence and was complete before being manifested in writing. With dispositive, enabling, instructive, narrative and\nsupporting, one of six functional categories of records. [Archives] \nn., A retrospective record for which the juridical system requires a written form as evidence of an action that came into exi\nstence and was complete before bein"} {"text":"g manifested in writing. With dispositive, enabling, instructive, narrative and supporting, one of six functional categories of records. [Archives] \nn., Records whose written form is required by the juridical system as proof that an action has taken place prior to its documentation. [Archives] \nn., Documents constituting written evidence of a juridical act which was complete before being documented. [Archives] \nprobative \nn.,\n The business procedure in the course of which a record is created. [Archives] \npr"} {"text":"obative record \nn., In general, the body of written and unwritten rules governing the conduct of a transaction, or the formal steps undertaken in carrying out a transaction. [Archives] \nn., Records of established forms or methods for conducting the affairs of a business, legislative body, or court of law. [Arts] n., A section of a program that carries out some well-defined operation on data specified by parameters. It can be called from\nanywhere in a program, and different parameters can be provided for eac"} {"text":"h call. [Computer and Information Sciences] \nn., The formal manner in which legal proceedings are conducted. [Government] \nn., Records of established forms or methods for conducting the affairs of a business, legislative body, or court of law. [Arts] n.,\nA section of a program that carries out some well-defined operation on data specified by parameters. It can be called from\nn., The series of motions, or activities in general, carried out to set oneself to work and go on towards each formal step of a proced"} {"text":"ure. [Archives] \nn., Used for actions or procedures followed to produce some end, and for the actions or changes that take place in materials or objects. When emphasis is on the manner or method by which actions or procedures are performed, use \"techniques.\" [Arts] \nn., The sequence of states of an executing program. A process consists of the program code (which may be shared with other\nprocesses which are executing the same program), private data, and the state of the processor, particularly the values in "} {"text":"its\nregisters. It may have other associated resources such as a process identifier, open files, CPU time limits, shared memory, child\nprocesses, and signal handlers. [Computer and Information Sciences] \nv., To manipulate data by mechanical means. [Computer and Information Sciences] \nn., Process has special legal senses (1) \"the proceedings in any action or prosecution\" , and (2) \"the summons by which a person\nis cited to appear in court\" . Sense (2) is especially baffling to nonlawyers unfamiliar with legal"} {"text":" procedures. E.g., \"an execution is\na 'process' of the court issued to enforce the judgment of that court.\" [Government] \nn., A summons or writ, esp. to appear or respond in court. [Government] \nn., The proceedings in any action or prosecution. [Government] \nn., The proceedings in any action or prosecution. [Government] \nn.,\n An analysis representing the extent to which an entity exhibits various characteristics. [General Dictionaries] \nn.,\nn., See: operational record [Archives] \n The creating body, its man"} {"text":"date, structure and functions. [Archives] \na., In reference to hardware technology, software applications and\/or file formats, the state of being privately owned and controlled. A proprietary design or technique...implies that the company has not divulged specifications that would allow other companies to duplicate the product. [Computer and Information Sciences] \nn., A record that guides what to do and\/or how to do it. A prospective record can enable (enabling record) or inform\n(instructive record) interac"} {"text":"tions, experiences or dynamic processes. [Archives] \nn., A record that guides what to do and\/or how to do it. A prospective record can enable (enabling record) or inform (\ninstructive record) interactions, experiences or dynamic processes. [Archives] \nn., [documentary form] The initial section of a document, usually containing the identification of the persons concurring\nto its formation and of its temporal, geographical and administrative context. [Archives] \nn., [documentary form] The initial section of a"} {"text":" document, usually containing the identification of the persons concurring to its formation and of its temporal, geographical and administrative context. [Archives] \nn., [record] See: protocol register [Archives] \nn., [computing] A set of formal rules describing how to transmit data, especially across a network. Low level protocols de\nfine the electrical and physical standards to be observed, bit- and byte-ordering and the transmission and error detectio\nn and correction of the bitstream. High level protoco"} {"text":"ls deal with the data formatting, including the syntax of messages, the terminal to computer dialogue, character sets, sequencing of messages, etc. [Computer and Information Sciences] \nn., Either the minutes of the proceedings at an international conference or an addendum to a treaty. [Government] \nn., A summary of a document or treaty. [Government] \nn., A treaty amending and supplementing another treaty. [Government] \nn., A set of conventions governing the treatment and especially the formatting of data in"} {"text":" an electronic communications system.\n[General Dictionaries] \nprogram record \nn., A type of register that records the identifying attributes of incoming, outgoing, and\/or internal records, specifying the action taken. [Archives] \nn., A register containing unique, consecutive numbers assigned to records and including additional information about the identity of persons involved and the documentary context of the record. [Archives] \nn., The protocol register [...] records the document's protocol number (i.e.,"} {"text":" a unique identifier), the name and official title of the\nsender, the protocol number in the office of the sender (if applicable), the nature of the action, and indication of any enclosures\nand their types, the assigned classification number, and the office handling the matter. [Archives] \nn., Either the minutes of the proceedings at an international conference or an addendum to a treaty. [Government] \nn., The relationships between records and the organizations or individuals that created, accumulated and\/o"} {"text":"r maintained and used them in the conduct of personal or corporate activity. [Archives] \nn., A treaty amending and supplementing another treaty. [Government] \nn.,\n The creating body, its mandate, structure and functions. [Archives] \nn., A register containing unique, consecutive numbers assigned to records and including additional information about the identity\nof persons involved and the documentary context of the record. [Archives] \nn.,\n A copy of a record in which the maker of the copy tries to imitate pe"} {"text":"rfectly the original in order to deceive. [Archives] \nand their types, the assigned classification number, and the office handling the matter. [Archives] \nn., 'Right to know,' a right to receive openly declared facts that may lead to public debate by the citizens and their elected representatives. [Government] \nn.,\nn., In a public key cryptosystem, that key of a user\u2019s key pair that is publicly known. [Computer and Information Sciences] \nn.,\nn., (PKC) A cryptographic system that uses two keys: a public key "} {"text":"known to everyone and a private or secret key known only to the recipient of the message. [Computer and Information Sciences] \n Person(s) to whom the record is copied for information purposes. \n n., (PKE) The use of two keys\u2014a public key known to everyone and a private or secret key known only to the recipient of the message\u2014to encrypt and decrypt information transmitted between two parties. [Computer and Information Sciences] \n.: receiver. [Archives] \nn., (PKI) The underlying systems and processes necessar"} {"text":"y to support the trustworthiness and wide-scale use of public key encryption to authenticate individuals in a digital environment, especially over the Internet. [Computer and Information Sciences] \nn., A system of public key encryption using digital certificates from Certificate Authorities and other registrat\nion authorities that verify and authenticate the validity of each party involved in an electronic transaction. \nPKIs are currently evolving and there is no single PKI nor even a single agreed-upon sta"} {"text":"ndard for setting up a PKI.\n However, nearly everyone agrees that reliable PKIs are necessary before electronic commerce can become widespread. [Computer and Information Sciences] \n Recorded information that is intended for communication and\/or dissemination to the public at large. [Archives] \nn.,\n Recorded information that is intended for communication and\/or dissemination to the public at large. [Archives] \nn., 'Right to know,' a right to receive openly declared facts that may lead to public debate by the"} {"text":" citizens and their elected\nrepresentatives. [Government] \nn., [diplomatics] An intrinsic element of documentary form that comprises the mention of the title and capacity of the s\nigner, usually accompanying the attestation. [Archives] \nn.,\n The mention of the title and capacity of the signer of a document. [Archives] \nrecipient \nn.,\n Initialism for \u201cresource description framework.\u201d [Computer and Information Sciences] \nreceived record \nn.,\n A document transmitted to a creator from an external juridical or p"} {"text":"hysical person. [Archives] \npublic key cryptosystem \nn., A received document declared a record and set aside for action or reference, usually in a recordkeeping system. [Models (MCP)] \nqualification of signature \nn.,\n P\ne\nrs\non(s) to whom the record is copied for information purposes. \nSyn\n.: receiver. [Archives] \nn., n.,\n An electronic device that detects and amplifies radio signals captured by an antenna. [Sciences] The end of a linear proces\ns of message transfer. [Arts] \nn., A person appointed by the co"} {"text":"urt to preserve and protect property that is at risk, to enable another person to obtain the benefit\n of rights over the property or to obtain payment of a debt if the common-law remedy is inadequate. [Government] \nn., Recorded information (documents) regardless of form or medium created, received and maintained by an agency, institution,\norganization or individual in pursuance or its legal obligations or in the transaction of business. [Archives] \nn.,\n The name of the office or individual receiving the rec"} {"text":"ord. [Archives] \nn., A representation of a fact or act that is memorialized on a physical carrier-that is, a medium-and preserved by a physical or\nv., To link and assemble the stored digital component(s) of a document to enable the document to be reproduced and manifested in authentic form. [Archives] \nn., Documents created or received by public authorities in the course of carrying out their public function. [Archives] \nn., A document made or received in the course of a practical activity as an instrument "} {"text":"or a by-product of such activity, and set aside for action or reference.S yn.: archival document. [Archives] \nn., Recorded information (documents) regardless of form or medium created, received and maintained by an agency, institution, organization or individual in pursuance or its legal obligations or in the transaction of business. [Archives] \nn., Recorded information produced or received in the initiation, conduct or completion of an institutional or individual activity\nthat comprises content, context an"} {"text":"d structure sufficient to provide evidence of the activity. [Archives] \nn., A representation of a fact or act that is memorialized on a physical carrier-that is, a medium-and preserved by a physical or\njuridical person in the course of carrying out its activities. [Archives] \nn., Documents created or received by public authorities in the course of carrying out their public function. [Archives] \nn., In data processing, a grouping of interrelated data elements forming the basic unit of a file. [Archives] \nn.,"} {"text":" Data or information that has been fixed on some medium; that has content, context, and structure; and that is used as an\nextension of human memory or accountability. [Archives] \nn., A document created or received and maintained by an agency, organization, or individual in pursuance of legal obligations\n or\nin the transaction of business. [Archives] \nn., Document(s) produced or received by a person or organisation in the course of business, and retained by that person or\norganisation. A record may incorpora"} {"text":"te one or several documents (e.g. when one document has attachments), and may be on any\nmedium in any format. In addition to the content of the document(s), it should include contextual information and, if applicable,\nstructural information (i.e. information which describes the components of the record). A key feature of a record is that it cannot\nbe changed. [Archives] \nn., Recorded information, regardless of medium, created, received, and maintained by an agency, institution, organization, or individual i"} {"text":"n pursuance of its legal obligations or in the transaction of business. [Arts] \nn., Any electronic, photographic or mechanical recording of music, singing, dialogue, sound effects or visual events, in cluding\nCDs, DVDs, audio tapes, films, videos and the like. [Arts] \nn., A document preserving an account of fact in permanent form, irrespective of media or characteristics. [Computer and\nInformation Sciences] \nn., An ordered set of fields, usually stored contiguously. The term is used with similar meaning in "} {"text":"several different contexts. In a\nfile, a \"record\" probably has some fixed length, in contrast to a \"line\" which may have any length and is terminated by some End\nOf Line sequence). A database record is also called a \"row\". In a spreadsheet it is always called a \"row\". Some programming\nlanguages use the term to mean a type composed of fields of several other types (C calls this a \"struct\"). [Computer and\nInformation Sciences] \nn., The documents constituting an authentic account of the proceedings before a co"} {"text":"urt, including the claim form or other originating process, the statements of case, and the judgment or order, but usually not the evidence tendered. [Government] \n The name of the office or individual receiving the record. [Archives] \nn.,\n [diplomatics] A defining characteristic of a record or of a record element (e.g., the name of the author). [Archives] \n [diplomatics] A defining characteristic of a record or of a record element (e.g., the name of the author). [Archives] \nn., [diplomatics] A quality that"} {"text":" belongs to all records, such as a fixed documentary form, a stable content, an archival\n bond with other records either inside or outside the system, and an identifiable context. [Archives] \nrecord profile \nn., The first phase of a record's lifecycle in which a record is made or received and then set aside for action or reference, usually in a recordkeeping system. [Archives] \nn.,\n The generation of bibliographic records by, for example, a bibliographic agency. [Arts] \nrecord element \nn., [diplomatics] A c"} {"text":"onstituent part of a record's documentary form; an element is a formal expression visible on the face of the record (e.g., a signature) [Archives] \nrecord integrity \nn., The distinct character of a record, identifiable through the attributes that uniquely characterize it and distinguish it from other records. [Archives] \nrecordkeeping access privileges \nn.,\n A record\u2019s wholeness and soundness. The quality or state of being complete and uncorrupted. [Archives] \nn.,n., An electronic form designed to contain t"} {"text":"he attributes of the record that attest to its identity and integrity, and which is generated when a user tries to send or to close an electronic record and remains inextricably linked to the record for the entire period of its existence. [Archives] \n A record\u2019s wholeness and soundness. The quality or state of being complete and uncorrupted. [Archives] \nn.,\n One of two or mo re f orms in whic h a record is is sued . [Archives ] \nn., The state of a document at some point during its development. A version "} {"text":"is usually one of the drafts of a document\n, or the final document. In some cases, however, finished documents exist in several versions, e.g. technical manuals. Note also that records cannot exist in more than one version. [Archives] \nn., Lists of all necessary metadata to be recorded to ensure the identification and integrity of records maintained in the\nrecordkeeping system. [Models (MCP)] \nv., The whole of the principles, policies, rules and strategies employed by the creator that establishes and mainta"} {"text":"ins admin\nistrative, intellectual and physical control on its records. [Archives] \nv., The making, receiving, setting aside, and handling of records; the intellectual and physical maintenance of those reco\nrds; and their ultimate disposition all done in accordance with a set of internally consistent rules plus any tools and mechanisms to implement those tools. [Archives] \nv., The systematic storage, use, maintenance and disposition of records by the creator to meet its administrative, programmat\nic,\nlegal a"} {"text":"nd financial needs and responsibilities. [Archives] \nn.,n., The authority to annotate, read, retrieve, transfer and\/or destroy records in the recordkeeping system, granted to officers and employees of the creator. [Models (MCP)] \nn., The state of a document at some point during its development. A version is usually one of the drafts of a document, or the\nfinal document. In some cases, however, finished documents exist in several versions, e.g. technical manuals. Note also that\nrecords cannot exist in more t"} {"text":"han one version. [Archives] \nn., Lists of all necessary metadata to be recorded to ensure the identification and integrity of records maintained in the recordk\neeping system. [Models (MCP)] \nv., The systematic storage, use, maintenance and disposition of records by the creator to meet its administrative, programmatic,\nn., The office given the formal competence for designing, implementing and maintaining the creator\u2019s trusted recordkeeping system. [Archives] \nrecords forms \nn., A set of rules governing the s"} {"text":"torage, use, maintenance and disposition of records and\/or information about records, and the tools and mechanisms used to implement these rules. [Models (MCP)] \nrecord-making \nn., The whole of the principles, policies, rules and strategies that controls the process of creating records from made or received documents. [Archives] \nn., The process of drafting or compiling, capturing and identifying a document and declaring (i.e., classifying and registering) it a record. [Archives] \nrecords aggregation \nn., T"} {"text":"he authority to compile, annotate, read, retrieve, transfer and\/or destroy records in the record-making system, granted to officers and employees of the creator. [Models (MCP)] \nrecord-making system \nn., Lists of all necessary record-making metadata to be recorded to ensure the reliability, accuracy, identification and integrity of records created in the record-making system. [Models (MCP)] \nrecord-making metadata schemes \nn., A set of rules governing the making of records, and the tools and mechanisms used"} {"text":" to implement these rules. [Models (MCP)] \nn., See\nn., A natural accumulation of an interrelated group of records, such as a file, dossier, series or fonds, which results from the way in which a records creator carries out its activities or functions. Syn.: aggregated records. [Archives] \n: records manager [Archives] \nn., A model of archival science that emphasizes overlapping characteristics of recordkeeping, evidence, transaction, and the identity of the creator. [Archives] \nA records continuum perspectiv"} {"text":"e can be contrasted with the life cycle model. The life cycle model argues that there \nare clearly definable stages in record-keeping and creates a sharp distinction between current and historical record-keeping. The record continuum, on the other hand, has provided Australian records managers and archivists with a way of thinking about the integration of record-keeping and archiving processes. [Archives] \nn., The whole extent of a record's existence. Refers to a consistent and coherent regime of management"} {"text":" processes from th\ne time\nof the creation of records (and before creation, in the design of recordkeeping systems), through to the preservation and us\ne of\nrecords as archives. [Archives] \nn., The physical or juridical person who makes, receives or accumulates records by reason of its mandate\/mission,\nfunctions or activities and who generates the highest-level aggregation in which the records belong (that is, the fonds).\nSyn.: creator. [Archives] \nn., The physical or juridical person who makes, receives or "} {"text":"accumulates records by reason of its mandate\/mission, funct\nions or activities and who generates the highest-level aggregation in which the records belong (that is, the fonds). Syn.: creator. [Archives] \nSyn\nn.,\n The person or office that generates the highest-level aggregation in which the record belongs (that is, the fonds). [Archives] \nA records continuum perspective can be contrasted with the life cycle model. The life cycle model argues that there are clearly\ndefinable stages in record-keeping and crea"} {"text":"tes a sharp distinction between current and historical record-keeping. The record\ncontinuum, on the other hand, has provided Australian records managers and archivists with a way of thinking about the\nintegration of record-keeping and archiving processes. [Archives] \nn.,\n Specifications of the documentary forms for the various types of records of the creator. [Models (MCP)] \nrecords as archives. [Archives] \nn., See\n: records manager [Archives] \nrecords officer \nn., A model of records management and archival"} {"text":" science that characterizes the life span of a record as comprising eight sequential stages: creation or receipt; classification; maintenance and use; disposition through destruction or transfer to an archival institution or agency; description in archival finding aids; preservation; reference and use. [Archives] \nn., The theory that records go through four distinct stages of change in activity, including creation or receipt, use and maintenance, in-active storage, and disposition (destruction or transfer t"} {"text":"o an archives). [Archives] \nrecords preservation \nn., The field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposition of records, including processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records. [Archives] \nn., The systematic design, implementation, maintenance and administrative control of a framework for the making and\nkeeping of records by a records manag"} {"text":"er (trusted records officer) to ensure efficiency and economy in their creation, use,\nhandling, control, maintenance and disposition. [Archives] n., The systematic control of the creation, maintenance, use, and disposition of records. [Archives] \nn., The creation and implementation of systematic controls for records and information activities from the poi\nnt where they are\ncreated or received through final disposition or archival retention, including distribution, use, storage, retriev\nal, protection and\npr"} {"text":"eservation. [Archives] \nn., The application of systematic and scientific control to the creation, use, maintenance, storage, retrieval, dispositi\non, and\npreservation of all form of recorded information produced by an organization in the conduct of its operations. [Archives] \nn., That area of general administrative management concerned with achieving economy and efficiency in the creation,\nmaintenance, use and disposal of records, i.e. during their entire life cycle. [Archives] \nn., The systematic control o"} {"text":"f all records form their creation or receipt through their processing, distribution, organization, storage\nand retrieval, and to their ultimate disposition. [Archives] \nn., The discipline concerned with the control and use of information-bearing media within an organization. [Computer and\nInformation Sciences] \nn., The creation and implementation of systematic controls for records and information activities from the point where they are\nn., The whole of the activities of a creator aimed at the creation, use"} {"text":" and maintenance of records to meet its administrative, programmatic, legal, financial and historical needs and responsibilities. [Archives] \npreservation. [Archives] \nn., The person responsible for the management of active and semiactive records of a creator. The role of a records manager should be that of a trusted records officer. Syn.: records keeper; records officer. [Models (MCP)] \npreservation of all form of recorded information produced by an organization in the conduct of its operations. [Archives]"} {"text":" \nn., See\n: records manager; trusted records officer [Archives] \nn., The systematic control of all records form their creation or receipt through their processing, distribution, organization, storage\nn., The whole of the principles, policies, rules and strategies that controls the physical and technological stabilization and protection of the intellectual form of acquired records intended for their continuing, enduring, stable, lasting, uninterrupted and unbroken chain of preservation, without a foreseeable"} {"text":" endS. yn.: archival preservation; permanent preservation. [Archives] \nn., The discipline concerned with the control and use of information-bearing media within an organization. [Computer and\nn., A coherent set of objectives and methods for protecting and maintaining (i.e., safeguarding authenticity and ensuring accessibility of) digital components and related information of acquired records over time, and for reproducing the related authentic records and\/or archival aggregations.S yn.: preservation strateg"} {"text":"y; permanent preservation strategy. [Archives] \nrefreshing \nn., A set of rules governing the permanent intellectual and physical maintenance of acquired records and the tools and mechanisms used to implement these rules.S yn.: archival preservation system; preservation system; permanent preservation system. [Archives] \nrecords system \nn., See\n: retention schedule [Archives] \nrecords preservation system \nn., Dossiers, file units or individual documents that are arranged in accordance with a classification or"} {"text":" filing system or that are maintained as a unit because they result from the same accumulation or filing process, the same function or the same activity, and that have a particular form or because of some other relationship arising out of their creation, receipt or useS. yn.: series. [Archives] n., A grouping of documents within a fonds created to accomplish one function. [Archives] \nn., Documents arranged systematically or maintained as a unit because they relate to a particular function or s\nubject, resul"} {"text":"t from\nthe same activity, have a particular form, or because of some other relationship arising from their creation, receipt,\n and use.\n[Archives] \nn., A group of related records arranged according to a filing system that are the product of the same business process, or\n because\nof some other relationship arising out of the process of creation, receipt, or use. Large, complex record series may\n be subdivided.\n[Archives] \nn., A group of record items, either controlled by numbers or other symbols or not, whic"} {"text":"h results from the same accumulation, are\nsubject to the same processes and procedures of organization, or have similar physical shape and informational content.\n[Archives] \nn., The records system of a creator comprises the methods and the rules which determine the regular accumulation of records\nn., A set of rules governing record-making and recordkeeping, as controlled by the creator\u2019s records management function, and the tools and mechanisms used to implement these rules. [Archives] \nn., Information syst"} {"text":"em which captures, manages and provides access to records through time. [Archives] \nn., File units or documents arranged in accordance with a filing system or maintained as a unit because they result from the same\naccumulation or filing process, the same function or the same activity; have a particular form or because of some other\nrelationship arising out of their creation, receipt, or use. [Archives] \nn., The records system of a creator comprises the methods and the rules which determine the regular accum"} {"text":"ulation of records\nproduced or acquired, and permits the delineation of a coherent archival structure adequate for the administrative and\ninformational needs of the creator in the following areas \u00b7 control of provenance, definition of the procedures for production,\nacquisition, accumulation, and movement of records; \u00b7 organization and regular accumulation, which involves the same records\nfunctions with respect to the activities from which the records results (creation and maintenance of the archival bond); "} {"text":"\u00b7 secure\npreservation and transmission of integral and authentic records (elimination of risks of manipulation and dispersion). (Richard\nPearce-Moses) [Archives] \nn., The system that comprises the creator\u2019s records, its record-making and recordkeeping systems and is controlled by the\ncreator\u2019s records management function. [Archives] \n[Archives] \nn., The process of copying the digital content from one digital medium to another (includes copying to the same kind of medium). [Archives] \nsubject to the same pro"} {"text":"cesses and procedures of organization, or have similar physical shape and informational content.\nn., The process of refreshing digital records in the usual and ordinary course of business to ensure their continued accessibility as their storage medium becomes obsolete or degrades over time, while leaving intact their intellectual form. [Archives] \nrender \nn., A record that has been assigned a registration number and for which all the data necessary to identify the persons and acts involved and the documenta"} {"text":"ry context of the record are recorded within a protocol register. [Archives] \nreproduce \nn., A consecutive number added to each incoming or outgoing record in the protocol register, which connects it to previous and subsequent records made or received by the creator. [Archives] \nregistry system \nn.,\n A method for assigning a unique identifier to each record. [Models (MCP)] \nregistration number \nn., A system controlling the creation, maintenance, and use of current and semicurrent records through the use of "} {"text":"formal registers, lists and indexes. [Archives] \nv.,\nn., The trustworthiness of a record as a statement of fact. It exists when a record can stand for the fact it is about, and is established by examining the completeness of the record's form and the amount of control exercised on the process of its creation. [Archives] \nn., The records ability to serve as reliable evidence. [Archives] \nn., An attribute of any system that consistently produces the same results, preferably meeting or exceeding its specificat"} {"text":"ions. The\nterm may be qualified, e.g software reliability, reliable communication. [Computer and Information Sciences] \nn., The ability of a computer system to perform its required functions for a given period of time. It is often quoted in terms of]\npercentage of uptime, but may be more usefully expressed as MTBF (mean time between failures). [Computer and Information\nSciences] \nn., The quality of being sufficiently accurate and authentic to serve as the basis for a decision or action; wort\nhy of trust. [G"} {"text":"eneral Dictionaries] \nn., The trustworthiness of a record as a statement of fact. It exists when a record can stand for the fact it is about, and is\nestablished by examining the completeness of the record's form and the amount of control exercised on the process of\nits creation. [Archives] \nn.,\n A record capable of standing for the facts to which it attests. [Archives] \nn., A reliable record is one whose contents can be trusted as a full and accurate representation of the transactions, activities or\nfacts t"} {"text":"o which they attest and can be depended upon in the course of subsequent transactions or activities. Records should be c\nreated at the time of the transaction or incident to which it relates, or soon afterwards, by individuals who have direct knowledge of the facts or by instruments routinely used within the business to conduct the transaction. [Archives] \n[Computer and Information Sciences] \nv.,\n To draw a real-world object as it actually appears. [Computer and Information Sciences] \nv., The conversion of "} {"text":"a high-level object-based description into a graphical image for display. \nFor example, ray-tracing takes a mathematical model of a three-dimensional object or scene and converts it into a bitmap image. Another example is the process of converting HTML into an image for display to the user. \n[Computer and Information Sciences] \nSciences] \nv.,\n To make a copy. [Archives] \nfacts to which they attest and can be depended upon in the course of subsequent transactions or activities. Records should be\ncreated at t"} {"text":"he time of the transaction or incident to which it relates, or soon afterwards, by individuals who have direct knowledge\nof the facts or by instruments routinely used within the business to conduct the transaction. [Archives] \nn., An authentic representation or other version of a digital record reconstituted from its digital component(s). [Models (MCP)] \nn.,\nn., The digital component(s) of a record together with the technical information or software necessary to reproduce and manifest it from the digital co"} {"text":"mponent(s). [Models (MCP)] \n A record that is a means of remembering what was done. [Archives] \nn.,\n The process of generating a copy. [Archives] \nn., An exact copy of a document in content and form but not necessarily in size and appearence. [Archives] \nn., Object made as an exact copy of an earlier original. [Arts] \nn., Copies of art images, art objects, or other valued images or objects, made without intent to deceive; with regard to \nart images,\nincludes photographic reproductions; implies more precise "} {"text":"and faithful imitation than does the term \"copi\nes (derivative objects).\"\nWhere the intent is to deceive, see \"forgeries\" or \"counterfeits.\" [Arts] \nrepurposing \nn., The process of taking content from one medium (such as from a book, a newspaper, TV, or radio) and repackaging it for use in another medium (such as on the Web). [General Dictionaries] \nn., The creation of a new fonds. The process of updating the documentary context through changes to descriptive metadata. [Archives] \nn., The process of modifyi"} {"text":"ng the content of an existing record to use it for a different purpose. [Archives] \nn., Part of reusability or re-purposing clearly is the ability to contribute, over time, to a large array of interpretations or presentations of materials for many different audiences and purposes. [General Dictionaries] \nretrospective record \nn., A constraint, demand, necessity, need, or parameter that must be met or satisfied, usually within a certain timeframe or as a prerequisite. [General Dictionaries] \nresource descrip"} {"text":"tion framework \nn., (RDF) An XML-based language for representing information about resources in the World Wide Web. It is particularly intended for representing metadata about Web resources, such as the title, author, and modification date of a Web page, copyright and licensing information about a Web document, or the availability schedule for some shared resource. [Computer and Information Sciences] A sequence of actions which result in obtaining required information. [Computer and Information Sciences] \n"} {"text":"n., A document providing description of records series and\/or classes and specifying their authorized dispositions. [Arch\nives] \nn., [record schedule] Documents describing the recurring records of an organization or administrative unit, specifying those records to be preserved as having archival value, and authorizing, on a continuing basis and after the lapse of specified retention periods and the occurrence of specified actions or events, the destruction of the remaining records. [Arts] \nn., Part of reusa"} {"text":"bility or re-purposing clearly is the ability to contribute, over time, to a large array of interpretations or\npresentations of materials for many different audiences and purposes. [General Dictionaries] \nn., A set of rules governing searching and finding records in recordkeeping and records preservation systems, and the tools \nand mechanisms used to implement these rules. [Archives] \nn.,\n A sequence of actions which result in obtaining required information. [Computer and Information Sciences] \nn., Copies o"} {"text":"f art images, art objects, or other valued images or objects, made without intent to deceive; with regard to art images,\nn.,\n A record that is a means of remembering what was done. [Archives] \nrule \nn., An authoritative statement of what to do or not to do in a specific situation, issued by a competent person. [General Dictionaries] \nsave \nn., [diplomatics] An intrinsic element of documentary form comprising a form of greeting that appears only in letters, usually following the inscription. [Archives] \nscie"} {"text":"nce \nv.,\n To affix a digital object in non-volatile storage on a digital medium. [Computer and Information Sciences] \nsalutation \nn.,\n A structured framework or plan. [General Dictionaries] \nv.,\nn., An SGML-compliant document that defines the structure and contents of other SGML-compliant documents, in a similar manner to a Document Type Definition (DTD). Syn.: document schema. [Computer and Information Sciences] \nn.,\nn.,\n A group of independent but interrelated elements comprising a unified whole. [General"} {"text":" Dictionaries] \n To affix a digital object in non-volatile storage on a digital medium. [Computer and Information Sciences] \nn., The body of knowledge comprising measurable or verifiable facts acquired through application of the scientific\n method, and generalized into scientific laws or principles. [Sciences] \nn., A piece of wax, lead or other material upon which an impression has been made and attached to a document or\napplied to the face thereof. Originally serving as a means of authentication of the aut"} {"text":"hor of a record and of the record\nitself. [Archives] \nn., A rigorous, systematic approach, designed to eliminate bias and other subjective influences in the search,\nidentification, and measurement or validation of facts and cause-effect relationships, and from which scientif\nic laws may be deduced. [Sciences] \nn., An authoritative statement of what to do or not to do in a specific situation, issued by a competent person. [General\nDictionaries] \nn., [diplomatics] An extrinsic element of documentary form that"} {"text":" comprises the characteristics of a document\u2019s writing\n such as the layout of the writing with respect to the physical form of the document, the presence of different hands o\nr types of writing in the same document, the correspondence between paragraphs and conceptual sections of the text, ty\npe of punctuation, abbreviations, initialisms, ink, erasures, corrections, etc. [Archives] \nn., A rigorous, systematic approach, designed to eliminate bias and other subjective influences in the search,\nn., A piece of "} {"text":"wax, lead or other material upon which an impression has been made and attached to a document or applied t\no the face thereof. Originally serving as a means of authentication of the author of a record and of the record itself. [Archives] \nn., A device for impressing characteristic marks into a soft surface, often to indicate ownership. Seals may be in the form of\n stamps or cylinder seals. [Sciences] \nn., A piece of wax, lead or other material upon which an impression in relief from a seal has been made, at"} {"text":"tatched to a document\nor applied to the face thereof, originally serving as a means of authentication; also used to close a document. [Archives] \nn., A die or signet, having a raised or incised emblem used to stamp an impression upon a receptive substance such as wax or\nlead. [Archives] \nn., A die\/matrix, usually of metal, engraved in intaglio with the device or design used to produce by the application of pressure a\nseal. Dies may be of one\/sided design only or in pairs producing dissimilar designs simulta"} {"text":"neously on each seal. [Archives] \nn., Electronic Seal. Specific electronic means of authenticating a record or ensuring that it is only opened by the intended addr\nessee. It is a distinct type of electronic signature. [Archives] \nn., Artifacts bearing monograms, writing, numbers, or designs in intaglio for making an impression in relief on some soft,\ntenacious substance such as clay or wax. They may be flat or cylindrical, the impression made by rolling the seal over the\nsurface. [Arts] \nn., Die or signet, "} {"text":"often in the form of a cylinder or ring, having a raised (cut) or incised (engraved) emblem, such as a heraldic device or monogram. A seal is used to stamp an impression on wax or lead as a means of authentication or to seal closed a document or letter. [Arts] \nn., A stamp, carved cylinder, signet ring, etc., used to make an impression in molten wax to secure a letter or other document,\nconfirming the identity of the sender and\/or the authenticity of the contents. Also refers to the impressed design or mark"} {"text":" itself, a\nbroken seal indicating that the document has been opened. [Computer and Information Sciences] \nn., Wax impressed with a design and attached to any document as a sign of its authenticity; alternatively, an adhesive wafer or anything else intended to serve the purpose of a seal may be used. [Government] \nv., a) To confirm or make secure by or as if by a seal. b) To solemnize for eternity. [General Dictionaries] \nv., a) To confirm or make secure by or as if by a seal. b) To solemnize for eternity. ["} {"text":"General Dictionaries] \nn., See\n: non-volatile storage [Computer and Information Sciences] \nsecretarial note \nn., [diplomatics] An intrinsic element of documentary form that comprises any of several types of clerical notes that might appear on a document, such as the initials of the typist, the mention of enclosures, or an indication that the document is copied to other persons. [Archives] \nsemiactive record \nv., Authentication without extrinsic evidence of truth or genuineness. In federal courts, certain wr"} {"text":"itings, such as notarized documents and certified copies of public records, may be admitted into evidence by self-authentication. [Government] \nself-authenticating \nn., An object whose data structure, form, or layout provides both definitions and values for the data or formats of the object. A self-describing entity can be evaluated, with all its elements and forms understood, without the need of external references. [Computer and Information Sciences] \nn., See\nn., A rule that governs the meanings or interp"} {"text":"retations of symbols or elements within an object. [Computer and Information Sciences] : semiactive record [Archives] \nn., The representation of a vocabulary in a particular machine-processable form, such as an RDF or relational-database schema. [Computer and Information Sciences] \nn., A rule that governs the meanings or interpretations of symbols or elements within an object. [Computer and\nInformation Sciences] \nn., A record which are no longer needed for the purpose of carrying out the action for which it"} {"text":" was created, but whic\nh is needed by the records creator for reference. Syn.: semicurrent record. [Archives] \nn., Records required so infrequently in the conduct of current business that they should be transferred from offices t\no a records centre pending their ultimate disposal\/disposition. [Archives] \nn., A record which are no longer needed for the purpose of carrying out the action for which it was created, but which is\nneeded by the records creator for reference. Syn.: semicurrent record. [Archives] \nn"} {"text":"., See\n: semiactive record [Archives] \nsgml \nn., See\n: outgoing document [Models (MCP)] \nset aside \nn., See\n: outgoing document [Archives] \nsent document \nv., To save a digital object onto a storage medium in a location-independent way so that it can be transmitted or stored elsewhere. [Computer and Information Sciences] \nsgml-compliant document \nn., See\n: records series [Archives] \nn., See\nv.,\n To declare a record and retain it for future reference or use, usually in a recordkeeping system. [Archives] a., "} {"text":"Of a record that is filed or archived, by assigning to it a classification code, including it in a folder or consigning it to a recordkeeping system, or that is associated with other records by any other means. [Archives] \nv., (Of a court) to annul or vacate (a judgment, order, etc.) [Government] \n: outgoing document [Models (MCP)] \nn.,\n Initialism for \u201cStandard Generalized Markup Language.\u201d [Computer and Information Sciences] \nn., A digital document encoded using Standard Generalized Markup Language (SGML)"} {"text":" in conformance with the\nsyntactic rules described in a Document Type Definition (DTD) or a schema document. [Computer and Information\nSciences] \nn., A digital document encoded using Standard Generalized Markup Language (SGML) in conformance with the syntactic rules\n described in a Document Type Definition (DTD) or a schema document. [Computer and Information Sciences] \nn., The name or special mark of a person, affixed by the person\u2019s hand or by its authorized agent on a document for the\npurpose of taking r"} {"text":"esponsibility for, approving, or validating all or part of its content. [Archives] \nn., A digital document encoded using Standard Generalized Markup Language (SGML) or any one of its derivative\n markup languages, such as Hypertext Markup Language (HTML) and eXtensible Markup Language (XML) [Compute\nr and Information Sciences] \na., Of a record that is filed or archived, by assigning to it a classification code, including it in a folder or consigning it to a\nrecordkeeping system, or that is associated with ot"} {"text":"her records by any other means. [Archives] \nn., The name or special mark of a person, affixed by the person\u2019s hand or by its authorized agent on a document for the purpose of taking responsibility for, approving, or validating all or part of its content. [Archives] \nn., The characteristics of geophysical anomalies within a region or along a profile. It is often based on Fourier or power-spectrum\n analyses of either gravity (gravity signature) or magnetic (magnetic signature) residual anomalies. [Sciences] \n"} {"text":"n., The name of a person written in his own hand. Also known as an autograph. [Archives] \nn., The name or special mark of a person written on a document. The signature may be handwritten by the person in his\/her own\n hand or typed, or may be affixed by an office authorized to do so. [Archives] \nn., Persons' names written in their own hand. [Arts] \nn., A \u2018sign\u2019 placed at the opening of a comp. or of a section of a comp., indicating the key (key signature) or the value of the beat and\n the no. of beats in eac"} {"text":"h measure (time signature). [Arts] \nn., Letters or numbers, or combinations of letters and numbers, printed at the foot of the first page, and sometimes on subsequent\nleaves of a gathering, as a guide to the binder in arranging them in their correct order. [Arts] \nn., A few lines of information about the sender of an electronic mail message or news posting. Most Unix mail and news\nsoftware will automagically append a signature from a file called .signature in the user's home directory to outgoing mail and\nn"} {"text":"ews. [Computer and Information Sciences] \nn., A collection of symbols intended to be associated with sets and with functions on and elements from the sets. [Computer and Information Sciences] n., A name or other distinctive mark made by an individual or made with his or her authority. [General Dictionaries] \nn., A collection of symbols intended to be associated with sets and with functions on and elements from the sets. [Computer and\nInformation Sciences] \nn.,\n A copy that only reproduces the content of a "} {"text":"record. [Archives] \nn.,\n The mere transcription of the content of the original. [Archives] \nn., An acceptable level or criterion according to which something is compared, measured, or judged. Also refers to an amount,\nn., The systematic transformation of existing software or systems into a new form to realize quality improvements in operation, system capability, functionality, interoperability, performance or evolvability. [Computer and Information Sciences] \nstandard size of a catalog card used by librarie"} {"text":"s prior to the development of machine-readable cataloging. A standard may also be\nn., [diplomatics] An extrinsic element of documentary form that comprises a symbol that identifies one or more of the persons involved in the compilation, receipt or execution of a record. [Archives] \nstandards body, such as NISO. A de facto standard is one that becomes generally accepted without the formal endorsement of a\nn., [diplomatics] An extrinsic element of documentary form concerning specific aspects of the record\u2019s f"} {"text":"ormal presentation that are necessary for it to achieve the purpose for which it was created, such as special layouts, hyperlinks, deliberately employed type fonts or colours, image resolutions, audio sampling rates, etc. [Archives] \nCompare with bench mark, best practices, and guidelines. See also: standards. \nn., A detailed description of features and\/or functions in the design of an entity or system. [Computer and Information Sciences] \n[Computer and Information Sciences] \na., With reference to content, "} {"text":"either unchangeable or changeable according to fixed rules, that is, endowed with bounded variability. [Archives] \nn., A set of rules and guidelines co-operatively adhered to by national and international peer entities. [General Dictionaries] \nn., The complex of established norms aiming to make the characteristic of a product, process, or service uniform within or across a sector, a country, or a system. [Archives] \nn., Established principle, rule, guide or measure. [Arts] \nn., A publicly available definiti"} {"text":"on of a hardware or software component, resulting from international, national, or industrial\nagreement. [Computer and Information Sciences] \nn., An acceptable level or criterion according to which something is compared, measured, or judged. Also refers to an amount,\nextent, quality, pattern, criterion, etc., fixed by usage or convention or established as the norm by prevailing authority, as in the\nstandard size of a catalog card used by libraries prior to the development of machine-readable cataloging. A s"} {"text":"tandard may also be\na specification that identifies model methods, materials, or practices. A standard may be approved by a formal ANSI-accredited\nstandards body, such as NISO. A de facto standard is one that becomes generally accepted without the formal endorsement of a\nstandard-setting organization. A community standard is a de facto standard developed and used within a particular user group.Compare with bench mark, best practices, and guidelines. See also: standards. \nAlso, any object, such as a flag or "} {"text":"banner, used to symbolize a nation, people, military unit, etc. \n[Computer and Information Sciences] \nn., Rules established to prescribe qualities or practices in order to achieve common goals. [General Dictionaries] \nn., A set of rules and guidelines co-operatively adhered to by national and international peer entities. [General Dicti\nonaries] \nn., Benchmarks used to measure some quality or practice. [General Dictionaries] \nn., [diplomatics] An extrinsic element of documentary form concerning specific aspe"} {"text":"cts of the record\u2019s formal\npresentation that are necessary for it to achieve the purpose for which it was created, such as special layouts, hyperlinks,\ndeliberately employed type fonts or colours, image resolutions, audio sampling rates, etc. [Archives] \nn., (SGML) An ISO standard text-formatting language for defining descriptions of the structure and content of different types of digital documents. [Computer and Information Sciences] \nn.,\nn.,\n Sets of rules or guidelines co-operatively adhered to by peer e"} {"text":"ntities. [Models (MCP)] \nn., Criteria, rules, procedures, or devices approved by official authority or general consent, that serve as examples to be followed or as measures for evaluation or comparative judgment. [Models (MCP)] \nn., A set of guidelines, usually drafted by experts in a particular field of technology, that are issued for general use by national\nand international standards organisations. [Models (MCP)] n., The format used to distribute a television signal. Examples include NTSC, PAL, SECAM. [M"} {"text":"odels (MCP)] \n A stored digital document that is treated and managed as a record. [Models (MCP)] \nn., See\n: status of transmission [Archives] \n A digital object that is placed in a storage system on a digital medium. [Models (MCP)] \nn.,\n The degree of perfection of a record; that is, whether a record is a draft, an original or a copy. [Archives] \nn., [diplomatics] An intrinsic element of documentary form that comprises a symbol that identifies one or more of the\npersons involved in the compilation, receipt,"} {"text":" or execution of a record. [Archives] \nn., A digital object that is placed in a storage system on a digital medium and is treated and managed as a digital compon\nent. [Models (MCP)] \n Location of statement signifying what a document is about such as specific topics, functions, or activities. [Archives] \nn., A digital document that is placed in a storage system on a digital medium and is treated and managed as a document.\n [Models (MCP)] \nn., A digital document that is placed in a storage system on a digital"} {"text":" medium and is treated and managed as a document.\n[Models (MCP)] \nn.,\n A digital object that is placed in a storage system on a digital medium. [Models (MCP)] \nstandards \nn.,\n A stored digital document that is treated and managed as a record. [Models (MCP)] \nsuperscription \nn., The complex of practical means formally articulated by an entity for reaching a specific purpose, that is, a plan or a road map for implementing policies. [Archives] \nstored digital record \nn., [diplomatics] An intrinsic element of d"} {"text":"ocumentary form that comprises a symbol that identifies one or more of the persons involved in the compilation, receipt, or execution of a record. [Archives] \nstatus of transmission \nn.,\n Location of statement signifying what a document is about such as specific topics, functions, or activities. [Archives] \nn., Criteria, rules, procedures, or devices approved by official authority or general consent, that serve as examples to be followed\nor as measures for evaluation or comparative judgment. [Models (MCP)] "} {"text":"\nn.,\n The act of signing one's name on a document; the signature so affixed. [Government] \nn., The format used to distribute a television signal. Examples include NTSC, PAL, SECAM. [Models (MCP)] \nn., [diplomatics] An intrinsic element of documentary form that comprises the mention of the name of the author of the document and\/or the action and which may take the form of an entitling. [Archives] \nn., Something written, printed, or engraved at the top or on the outside surface of an object, especially a name"} {"text":" and\/or address on the outside of an envelope or parcel. [Computer and Information Sciences] Seea.,\n (of a document) Constituting evidence of a juridically relevant activity. [Archives] \nn., A rule that governs the ways symbols or elements within an object can be arranged and used. [Computer and\nInformation Sciences] \nn., A retrospective record constituting written evidence of an activity that does not result in a juridical act, bu\nt is itself juridically relevent. With dispositive, narrative, probative and"} {"text":" prospective, one of five functional categories of records. [Archives] \nn., The characteristics of the hardware, software, and other components of an electronic computing system in which\nrecords are created. [Archives] \nn., A character, image, mark, shape, characteristic, or thing used to represent or denote something else by associatio\nn, convention, or unintended resemblance. [General Dictionaries] \nn., A character, image, mark, shape, characteristic, or thing used to represent or denote something else by"} {"text":" association,\nconvention, or unintended resemblance. [General Dictionaries] \nn., A rule that governs the ways symbols or elements within an object can be arranged and used. [Computer and Information Scie\nnces] \nn., A digital records preservation strategy that involves maintaining the original software and hardware platforms with\nwhich the records were created or last manifested in authentic form. [Archives] \nn., An organized and integrated set of detailed methods, policies, procedures, resources, routines, "} {"text":"rules and tools es\ntablished or formulated to carry out a specific activity, perform a duty, or solve a problem. [General Dictionaries] \nn., The authentication of records based on the use of administrative procedures to establish a presumption of authenticity\nor, if necessary, a verification of authenticity, especially through comparison of the evidence compiled about a record\u2019s\nidentity and integrity and the procedural controls exercised over its creation, use, maintenance and\/or preservation with\nthe requ"} {"text":"irements for authentic records. [Archives] \nn., See: mark-up; markup tag [Computer and Information Sciences] \nn., Something written, printed, or engraved at the top or on the outside surface of an object, especially a name and\/or address on\nthe outside of an envelope or parcel. [Computer and Information Sciences] \nn., The characteristics of the hardware, software, and other components of an electronic computing system in which records are created. [Archives] \nn.,\n The hardware and software environment in wh"} {"text":"ich the record exists or was created. [Archives] \nsupporting \nn., A digital records preservation strategy that involves maintaining the original software and hardware platforms with which the records were created or last manifested in authentic form. [Archives] \nsupporting record \nn., The use of technological mechanisms, such as digital signatures or other cryptographic techniques, to authenticate records; technology-independent authentication. [Archives] \ntechnology preservation \nn., The authentication of "} {"text":"records based on the use of administrative procedures to establish a presumption of authenticity or, if necessary, a verification of authenticity, especially through comparison of the evidence compiled about a record\u2019s identity and integrity and the procedural controls exercised over its creation, use, maintenance and\/or preservation with the requirements for authentic records. [Archives] \ntechnology-dependent authentication \ntechnology-independent authentication \nn., Formal instruments that identify in arc"} {"text":"hival and technological terms digital records to be transferred, together with relevant documentation, and that identify the medium and format of transfers, when the transfers will occur, and the parties to the transfers. [Models (MCP)] \nn.,\nn., [documentary form] The central section of a document, which contains the action, including the considerations and circumstances which gave origin to it, and the conditions related to its accomplishment. [Archives] \nn., A collection of words, numbers, or symbols that"} {"text":" conveys meaning as language. [General Dictionaries] n., The main body of a document as distinct from its introductory part and conclusive parts. [Archives] \nn., The wording of a document. [Archives] \nn., Generally, written or printed words, phrases, or sentences arranged to make a communication. Includes oral verbal \ncommunications set down in writing or print. [Arts] \nn., A signifying structure organized by codes and conventions, capable of creating meaning, capable of being read. [Arts] \nn., Words, numbe"} {"text":"rs, or symbols. [General Dictionaries] \nn., Formal instruments that identify in archival and technological terms digital records to be transferred, together with\nrelevant documentation, and that identify the medium and format of transfers, when the transfers will occur, and the\nparties to the transfers. [Models (MCP)] \nn.,\n Rights belonging to a party other than the author or the addressee of a record. [Archives] \n Information, technology and other equipment and supplies used to manage the lifecycle of reco"} {"text":"rds. [Models (MCP)] \nn.,\n An attestation by a trusted third party that a record was received at a particular point in time. [Archives] \nn., A notation made on a record indicating the time, and sometimes the date, that some action occured. [Archives] \nn., The time and date of an operation or event when automatically added to a screen display, log file, or output file of a computer\nprocedure. It is a valuable aid to the tracking down of errors and can be used as part of an auditing process. The time and date "} {"text":"are\nderived from the computer's internal real-time clock. [Computer and Information Sciences] \ntransformative migration \nn., [diplomatics] An intrinsic element of documentary form comprising an indication of the action, matter of subject of the record, usually under the entitling or in its place. [Archives] \nn., The main body of a document as distinct from its introductory part and conclusive parts. [Archives] \nn.,\n Information, technology and other equipment and supplies used to manage the lifecycle of rec"} {"text":"ords. [Models (MCP)] \ncommunications set down in writing or print. [Arts] \nn.,\n The place of the compilation of a record, included in the record by its author. [Archives] \nn., Element in the organization of a file or consisting of documents which relate to a specific administrative action; case\npapers\/files may be restricted to a single transaction (Canadain usage: transactional files). [Archives] \nn., An act or several interconnected acts in which more than one person is involved and by which the relations"} {"text":" of those persons are altered. [Archives] \nn., Element in the organization of a file or consisting of documents which relate to a specific administrative action; case pap\ners\/files may be restricted to a single transaction (Canadain usage: transactional files). [Archives] \nn., An act capable of changing the relationship between two or more physical or juridical persons. [Archives] \nn., A unit of interaction with a DBMS or similar system. It must be treated in a coherent and reliable way independent of other"} {"text":" transactions. [Computer and Information Sciences] \nn., An action or set of actions occurring between two or more persons relating to the conduct of business, commercial, or\ngovernmental affairs (TISH). [General Dictionaries] \nprocedure. It is a valuable aid to the tracking down of errors and can be used as part of an auditing process. The time and date are\nn., The process of converting or upgrading digital objects or systems to a newer generation of hardware and\/or software computer technology. [Computer a"} {"text":"nd Information Sciences] \nudf \nn., The process of converting records in the usual and ordinary course of business (otherwise the activity is not migration but creation) to maintain their compatibility with a newer generation of hardware and\/or software computer technology, while leaving intact their intellectual form. [Archives] \ntransmission \nn., The moving of a record across space (from a person or organization to another, or from a system to another), or through time. [Archives] \ntrusted custodian \nn., A"} {"text":" preserver who can demonstrate that it has no reason to alter the preserved records or allow others to alter them and is capable of implementing all of the requirements for the preservation of authentic copies of records. [Archives] \ntrusted records officer \nn., The whole of the rules that control the preservation and use of the records of the creator and provide a circumstantial probability of the authenticity of the records, and the tools and mechanisms used to implement those rules. [Models (MCP)] \ntrust"} {"text":"ed recordkeeping system \nn., The whole of the rules that control the creation, maintenance use and disposition of the records of the creator and provide a circumstantial probability of the authenticity of the records, and the tools and mechanisms used to implement those rules. [Archives] \nn., A type of system where rules govern which documents are eligible for inclusion in the record-keeping system, who may place records in the system and retrieve records from it, what may be done to and with a record, how "} {"text":"long records remain in the\nsystem, and how records are removed from it. [Archives] \nn., A system that comprises the whole of the rules that control the creation, maintenance, use and disposition of the records of the\ncreator and that provide a circumstantial probability of the authenticity of the records within the system. [Archives] \n Initialism for \u201cuniform disk format.\u201d [Computer and Information Sciences] \nn., An individual or a unit within the creating organization who is responsible for keeping and man"} {"text":"aging the creator\u2019s records, who has no reason to alter the creator\u2019s records or allow others to alter them and who is capable of implementing all of the requirements for authentic records. [Archives] \nn., The moving of a record across space (from a person or organization to another, or from a system to another), or\nthrough time. [Archives] \nn.,\n Any outsider or person not a party to the fact or act nor immediately concerned with it. [General Dictionaries] \nn., The whole of the rules that control the creati"} {"text":"on, maintenance use and disposition of the records of the creator and\nprovide a circumstantial probability of the authenticity of the records, and the tools and mechanisms used to implement\nthose rules. [Archives] \nn.,\n The accuracy, reliability and authenticity of a record. [Archives] \nn., n.,\n B\no\nth\n an accurate statement of facts and a genuine manifestation of those facts. [Archives] Dependable as authentic, reliable, and having integrity. [General Dictionaries] \n Both an accurate statement of facts and"} {"text":" a genuine manifestation of those facts. [Archives]\nDependable as authentic, reliable, and having integrity. [General Dictionaries] \na., [diplomatics] The quality of a record whose content is in accordance with the actual state of affairs. With correct, perti\nnent and precise, a component of accuracy. [Archives] \nsystem, and how records are removed from it. [Archives] \nn.,\n Initialism for \u201cuniform disk format.\u201d [Computer and Information Sciences] \nurl \nn., A traceable and uninterrupted line of care, control"} {"text":" and usually possession of a body of records from creation to preservation that can serve as a means of protecting the authenticity of the record. [Archives] \nversion \nn., A universal 16-bit (two byte) standard character set for representing all scripts in active modern use as plain text in computer processing. [Computer and Information Sciences] \nupgrade \nn., (URL) A standard way of [uniquely] specifying the location of an object, typically a Web page, on the Internet; the form of address used on the Worl"} {"text":"d-Wide Web. Syn.: universal resource locator. [Computer and Information Sciences] \nuniversal disk format \nn., (UTF-8) An ASCII-compatible scheme for encoding Unicode values in sets of eight bits. [Computer and Information Sciences] \nuniversal resource locator \nn., A universal, vendor-independent file system standard (ISO 13346) for storing data on optical media; designed for data interchange and portability, allowing an operating system to read, write and modify data stored on optical media that were create"} {"text":"d by another operating system. [Computer and Information Sciences] \nupdated storage information \nn., See\n: uniform resource locator [Computer and Information Sciences] \nn.,\nn., Information indicating a change in the location of a digital component in storage, the occurrence of a storage problem, the action taken to correct a storage problem, the results of such actions, or the copying of the components from older to new storage media. [Archives] : uniform resource locator [Computer and Information Sciences]"} {"text":" \nn., A new or better version of some hardware or software computer technology. [Computer and Information Sciences] v., To develop or install a new or better version of some hardware or software computer technology. [Computer and\nInformation Sciences] \nv., To raise (something esp. equipment or facilities) from one grade to another; to improve or enhance physically. [\nGeneral Dictionaries] \nn., Information indicating a change in the location of a digital component in storage, the occurrence of a storage\nprob"} {"text":"lem, the action taken to correct a storage problem, the results of such actions, or the copying of the components\nfrom older to new storage media. [Archives] \nn.,\n Initialism for \u201cuniform resource locator.\u201d [Computer and Information Sciences] \nInformation Sciences] \nn.,\n Initialism for \u201cuniversal character set transformation format 8.\u201d [Computer and Information Sciences] \nn., The act or process of establishing a correspondence of known facts about the record itself and the various contexts in\nwhich it has b"} {"text":"een created and maintained with the proposed fact of the record's authenticity. [Archives] \nn., The act or process of establishing a correspondence of known facts about the record itself and the various contexts i\nn which it has been created and maintained with the proposed fact of the record's authenticity. [Archives] \nv., To raise (something esp. equipment or facilities) from one grade to another; to improve or enhance physically. [General\nDictionaries] \nn., One of several variations of an intellectual wo"} {"text":"rk, possibly created for a purpose or use other than the one originally intended. [General Dictionaries] \nn.,\nn.,\n A digital document perceived as existing by the user, but not existing in the system as seen. [General Dictionaries] \nn., The characteristics of an entity as perceived by the user, regardless of how they have been physically represented in a database. Thus an employee would have one virtual record, but may have numerous physical records linked together to accommodate repeating addresses, jobs "} {"text":"held, benefits received, etc. [Archives] \nn., Documents existing only as variables which are not connected by statements expressing their significance and relationships,\nsuch as annotations on the verse of a blank parchment or date sent by electronic mail but remaining in non-related fo\nrm with the\nsender. [General Dictionaries] \nn., One of several variations of an intellectual work, possibly created for a purpose or use other than the one originally\nintended. [General Dictionaries] \nn., The indication of t"} {"text":"he degree of importance of a record to continue the activity for which it was created or the \nbusiness of the person\/office that created it. [Archives] \nn., [computing] A fundamental unit of storage in a computer. The size of a word in a particular computer architecture is\none of its chief distinguishing characteristics. [Computer and Information Sciences] \nn., Computer memory that requires electrical power and, in some cases periodic refreshment (e.g., DRAM), to maintain its sto\nred content. Syn.: primary "} {"text":"storage. Opp.: non-volatile storage. [Computer and Information Sciences] \nn., A distinct expression of human thought or emotion made in language, signs, symbols, numerals, images, or some other\nform, for purposes of communication and remembrance. [Archives] \nn.,\n Initialism for \u201cwide area network.\u201d [Computer and Information Sciences] \nword \nn., (WAN) A data network usually constructed over distances greater than one kilometre. [Computer and Information Sciences] \nwriter \nn., [computing] A fundamental unit o"} {"text":"f storage in a computer. The size of a word in a particular computer architecture is one of its chief distinguishing characteristics. [Computer and Information Sciences] \nvirtual record \nn., A distinct expression of human thought or emotion made in language, signs, symbols, numerals, images, or some other form, for purposes of communication and remembrance. [Archives] \nwrapper format \nn., A data structure or software that encapsulates (\u201cwraps around\u201d) other data or software objects, appends code or other so"} {"text":"ftware for the purposes of improving user convenience, hardware or software compatibility, or enhancing data security, transmission or storage. [Computer and Information Sciences] \nwide area network \nn., A specified wrapper structure for encapsulating multiple bitstreams into a single file. [Computer and Information Sciences] The person responsible for the intellectual form of the record. [Archives] \nn.,\n Person having the authority and capacity to articulate the content of the record. [Archives] \nn.,\n The"} {"text":" person responsible for the intellectual form of the record. [Archives] \nn., Writer is an obsolescent Scottishism in the sense \"an attorney or law-agent; an ordinary legal practitioner in country towns; a\n law-clerk\" (OED). [Government] \nn., [Securities]. A person or institution that sells securities or futures option contracts. [Government] \nxml \nn.,\n The designation (name) of the person competent for the articulation of the content of the record. [Archives] \nxml document \nn., A document created by a physi"} {"text":"cal or juridical person in the course of practical activity that is produced on a medium (paper, magnetic tape, disc, plate, etc.) by means of a writing instrument (pen, pencil, typing machine, printer, etc.) or of an apparatus for fixing data, images and\/or voices. [Archives] \nn.,n.,\n Initialism for \u201ceXtensible Markup Language.\u201d [Computer and Information Sciences] \nn., An SGML-compliant digital document encoded using eXtensible Markup Language (XML) in conformance with the\nsyntactic rules described in a Do"} {"text":"cument Type Definition (DTD) or a schema document. [Computer and Information\nSciences] \nn., An SGML-compliant digital document encoded using eXtensible Markup Language (XML) in conformance with the syntactic r\nules described in a Document Type Definition (DTD) or a schema document. [Computer and Information Sciences] \n"} {"text":"Self-Rewarding Language Models\nWeizhe Yuan1,2\nRichard Yuanzhe Pang1,2\nKyunghyun Cho2\nSainbayar Sukhbaatar1\nJing Xu1\nJason Weston1,2\n1 Meta\n2 NYU\nAbstract\nWe posit that to achieve superhuman agents, future models require super-\nhuman feedback in order to provide an adequate training signal. Current\napproaches commonly train reward models from human preferences, which\nmay then be bottlenecked by human performance level, and secondly these\nseparate frozen reward models cannot then learn to improve during LLM\nt"} {"text":"raining. In this work, we study Self-Rewarding Language Models, where the\nlanguage model itself is used via LLM-as-a-Judge prompting to provide its\nown rewards during training. We show that during Iterative DPO training\nthat not only does instruction following ability improve, but also the ability\nto provide high-quality rewards to itself. Fine-tuning Llama 2 70B on three\niterations of our approach yields a model that outperforms many existing\nsystems on the AlpacaEval 2.0 leaderboard, including Claude 2, G"} {"text":"emini Pro,\nand GPT-4 0613. While only a preliminary study, this work opens the door\nto the possibility of models that can continually improve in both axes.\n1\nIntroduction\nAligning Large Language Models (LLMs) using human preference data can vastly improve\nthe instruction following performance of pretrained models [Ouyang et al., 2022, Bai et al.,\n2022a]. The standard approach of Reinforcement Learning from Human Feedback (RLHF)\nlearns a reward model from these human preferences. The reward model is then fro"} {"text":"zen and\nused to train the LLM using RL, e.g., via PPO [Schulman et al., 2017]. A recent alternative\nis to avoid training the reward model at all, and directly use human preferences to train the\nLLM, as in Direct Preference Optimization [DPO; Rafailov et al., 2023]. In both cases, the\napproach is bottlenecked by the size and quality of the human preference data, and in the\ncase of RLHF the quality of the frozen reward model trained from them as well.\nIn this work, we instead propose to train a self-improving"} {"text":" reward model that, rather than\nbeing frozen, is continually updating during LLM alignment, in order to avoid this bottleneck.\nThe key to such an approach is to develop an agent that possesses all the abilities desired\nduring training, rather than separating them out into distinct models such as a reward\nmodel and a language model. In the same way that pretraining and multitasking training of\ninstruction following tasks allow task transfer by training on many tasks at once [Collobert\nand Weston, 2008, Radfo"} {"text":"rd et al., 2019, Ouyang et al., 2022], incorporating the reward\nmodel into that same system allows task transfer between the reward modeling task and the\ninstruction following tasks.\nWe thus introduce Self-Rewarding Language Models, agents that both (i) act as instruction\nfollowing models generating responses for given prompts; and (ii) can generate and evaluate\nnew instruction following examples to add to their own training set. We train these models\nusing an Iterative DPO framework similar to that recentl"} {"text":"y introduced in Xu et al. [2023].\nStarting from a seed model, as shown in Figure 1, in each iteration there is a process\narXiv:2401.10020v1 [cs.CL] 18 Jan 2024\nGenerate\nresponses\nGenerate\nrewards\nPreference \npairs\nDPO \ntraining\n select\nGenerated \nnew prompts\nSelf-Instruction creation\nInstruction following training\nNext iteration model\nSeed model\n(for t=1)\nFigure 1: Self-Rewarding Language Models. Our self-alignment method consists of two\nsteps: (i) Self-Instruction creation: newly created prompts are used"} {"text":" to generate candidate\nresponses from model Mt, which also predicts its own rewards via LLM-as-a-Judge prompting.\n(ii) Instruction following training: preference pairs are selected from the generated data,\nwhich are used for training via DPO, resulting in model Mt+1. This whole procedure can\nthen be iterated resulting in both improved instruction following and reward modeling ability.\nof Self-Instruction creation whereby candidate responses are generated by the model for\nnewly created prompts, and are then "} {"text":"assigned rewards by that same model. The latter\nis implemented via LLM-as-a-Judge prompting, which can also be seen as an instruction\nfollowing task. A preference dataset is built from the generated data, and the next iteration\nof the model is trained via DPO.\nIn our experiments, we start with a Llama 2 70B [Touvron et al., 2023] seed model fine-tuned\non Open Assistant [K\u00f6pf et al., 2023], and then perform the above training scheme. We\nfind that not only does the instruction following performance improve fr"} {"text":"om Self-Rewarding\nLLM alignment compared to the baseline seed model, but importantly the reward modeling\nability, which is no longer fixed, improves as well. This means that the model during iterative\ntraining is able, at a given iteration, to provide a higher quality preference dataset to itself\nthan in the previous iteration. While this effect likely saturates in real-world settings, it\nprovides the intriguing possibility of obtaining reward models (and hence LLMs) that are\nsuperior to ones that could hav"} {"text":"e been trained from the original human-authored seed data\nalone.\n2\nSelf-Rewarding Language Models\nOur approach first assumes access to a base pretrained language model, and a small amount\nof human-annotated seed data. We then build a model that aims to possess two skills\nsimultaneously:\n1. Instruction following: given a prompt that describes a user request, the ability to\ngenerate a high quality, helpful (and harmless) response.\n2. Self-Instruction creation: the ability to generate and evaluate new instruct"} {"text":"ion-\nfollowing examples to add to its own training set.\nThese skills are used so that the model can perform self-alignment, i.e., they are the\ncomponents used to iteratively train itself using AI Feedback (AIF).\nSelf-instruction creation consists of generating candidate responses and then the model itself\njudging their quality, i.e., it acts as its own reward model, replacing the need for an external\none. This is implemented via the LLM-as-a-Judge mechanism [Zheng et al., 2023b], i.e., by\nformulating the ev"} {"text":"aluation of responses as an instruction following task. This self-created\nAIF preference data is used as a training set.\nOur overall self-alignment procedure is an iterative one, which proceeds by building a series\nof such models, with the aim that each improves over the last. Importantly, because the\nmodel can both improve its generation ability, and it acts as its own reward model through\nthe same generation mechanism, this means the reward model itself can improve through\nthese iterations, deviating from"} {"text":" standard practices where the reward model is fixed [Ouyang\n2\net al., 2022]. We believe this can increase the ceiling of the potential for self-improvement of\nthese learning models going forward, removing a constraining bottleneck.\nWe describe these steps in more detail below. An overview of the approach is illustrated in\nFigure 1.\n2.1\nInitialization\nSeed instruction following data:\nWe are given a seed set of human-authored (instruction\nprompt, response) general instruction following examples that we use fo"} {"text":"r training in a\nsupervised fine-tuning (SFT) manner, starting from a pretrained base language model.\nSubsequently this will be referred to as Instruction Fine-Tuning (IFT) data.\nSeed LLM-as-a-Judge instruction following data:\nWe also assume we are provided\na seed set of (evaluation instruction prompt, evaluation result response) examples which\ncan also be used for training. While this is not strictly necessary, as the model using IFT\ndata will already be capable of training an LLM-as-a-Judge, we show that s"} {"text":"uch training\ndata can give improved results. In this data, the input prompt asks the model to evaluate\nthe quality of a given response to a particular instruction. The provided evaluation result\nresponse consists of chain-of-thought reasoning (a justification), followed by a final score (in\nour experiments out of 5). The format we choose for these prompts is given in Figure 2. This\nthus serves as training data for the LLM to perform the role of a reward model. Subsequently\nthis will be referred to as Evalua"} {"text":"tion Fine-Tuning (EFT) data.\nWe use both these seed sets together during training.\n2.2\nSelf-Instruction Creation\nUsing the model we have trained, we can make it self-modify its own training set. Specifically,\nwe generate additional training data for the next iteration of training.\nThis consists of the following steps:\n1. Generate a new prompt: We generate a new prompt xi using few-shot prompting,\nsampling prompts from the original seed IFT data, following the approach of Wang\net al. [2022] and Honovich et a"} {"text":"l. [2023].\n2. Generate candidate responses: We then generate N diverse candidate responses\n{y1\ni , . . . , yN\ni } for the given prompt xi from our model using sampling.\n3. Evaluate candidate responses: Finally, we use the LLM-as-a-Judge ability of our\nsame model to evaluate its own candidate responses with scores rn\ni \u2208[0, 5] (see\nFigure 2).\n2.3\nInstruction Following Training\nAs previously described, training is initially performed with the seed IFT and EFT data\n(Section 2.1). This is then augmented with ad"} {"text":"ditional data via AI (Self-)Feedback.\nAI Feedback Training\nAfter performing the self-instruction creation procedure, we can\nthen augment the seed data with additional examples for training, which we refer to as AI\nFeedback Training (AIFT) data. We try two variants of such feedback:\n\u2022 Preference pairs: We construct training data of the form (instruction prompt xi,\nwinning response yw\ni , losing response yl\ni). To form the winning and losing pair\nwe take the highest and lowest scoring responses from the N eva"} {"text":"luated candidate\nresponses (see Section 2.2), following Xu et al. [2023], discarding the pair if their\nscores are the same. These pairs can be used for training with a preference tuning\nalgorithm. We use DPO [Rafailov et al., 2023].\n\u2022 Positive examples only: In this variant, we add additional examples of (instruction\nprompt, response) curated by the model to the seed set for supervised fine-tuning,\nfollowing other approaches [Li et al., 2023a, Adolphs et al., 2023, Gulcehre et al.,\n3\nReview the user\u2019s quest"} {"text":"ion and the corresponding response using the additive 5-point\nscoring system described below. Points are accumulated based on the satisfaction of each\ncriterion:\n- Add 1 point if the response is relevant and provides some information related to\nthe user\u2019s inquiry, even if it is incomplete or contains some irrelevant content.\n- Add another point if the response addresses a substantial portion of the user\u2019s question,\nbut does not completely resolve the query or provide a direct answer.\n- Award a third point i"} {"text":"f the response answers the basic elements of the user\u2019s question in a\nuseful way, regardless of whether it seems to have been written by an AI Assistant or if it\nhas elements typically found in blogs or search results.\n- Grant a fourth point if the response is clearly written from an AI Assistant\u2019s perspective,\naddressing the user\u2019s question directly and comprehensively, and is well-organized and\nhelpful, even if there is slight room for improvement in clarity, conciseness or focus.\n- Bestow a fifth point f"} {"text":"or a response that is impeccably tailored to the user\u2019s question\nby an AI Assistant, without extraneous information, reflecting expert knowledge, and\ndemonstrating a high-quality, engaging, and insightful answer.\nUser: \n<\/response>\nAfter examining the user\u2019s instruction and the response:\n- Briefly justify your total score, up to 100 words.\n- Conclude with the score using the format: \u201cScore: \u201d\nRemember to assess from the AI Assistant perspective, utili"} {"text":"zing web search knowledge as\nnecessary. To evaluate the response in alignment with this additive scoring model, we\u2019ll\nsystematically attribute points based on the outlined criteria.\nFigure 2: LLM-as-a-Judge prompt for our LLM to act as a reward model and\nprovide self-rewards for its own model generations. The model is initially trained with seed\ntraining data of how to perform well at this task, and then improves at this task further\nthrough our self-rewarding training procedure.\n2023], rather than construc"} {"text":"ting preference data. In this setup we only add examples\nwhere the candidate response was evaluated to give a perfect score of rn\ni = 5.\nWhile we report the results of both approaches in our experiments, we find that learning\nfrom preference pairs gives superior performance, and hence recommend that approach.\n2.4\nOverall Self-Alignment Algorithm\nIterative Training\nOur overall procedure trains a series of models M1, . . . , MT where\neach successive model t uses augmented training data created by the t \u22121th m"} {"text":"odel. We thus\ndefine AIFT(Mt) to mean AI Feedback Training data created using model Mt.\nModel Sequence\nWe thus define the models, and the training data they use as follows:\nM0 : Base pretrained LLM with no fine-tuning.\nM1 : Initialized with M0, then fine-tuned on the IFT+EFT seed data using SFT.\nM2 : Initialized with M1, then trained with AIFT(M1) data using DPO.\nM3 : Initialized with M2, then trained with AIFT(M2) data using DPO.\nThis iterative training resembles the procedure used in Pairwise Cringe Optim"} {"text":"ization and\nIterative DPO introduced in Xu et al. [2023]; however, an external fixed reward model was\nused in that work.\n4\n3\nExperiments\n3.1\nExperimental Setup\nBase Model\nIn our experiments we use Llama 2 70B [Touvron et al., 2023] as our base\npretrained model.\n3.1.1\nSeed Training Data\nIFT Seed Data\nWe use the human-authored examples provided in the Open Assistant\ndataset [K\u00f6pf et al., 2023] for instruction fine-tuning. Following Li et al. [2023a] we use\n3200 examples, by sampling only first conversational "} {"text":"turns in the English language that are\nhigh-quality, based on their human annotated rank (choosing only the highest rank 0). In\nour experiments, we compare to a model fine-tuned from the base model using only this data\nvia supervised fine-tuning, and refer to it as our SFT baseline.\nEFT Seed Data\nThe Open Assistant data also provides multiple ranked human responses\nper prompt from which we can construct evaluation fine-tuning data. We split this into train\nand evaluation sets, and use it to create LLM-as-a-"} {"text":"Judge data. This is done by placing it in\nthe input format given in Figure 2, which consists of the scoring criteria description, and\nthe given instruction and response to be evaluated.1 For training targets, chain-of-thought\njustifications and final scores out of 5 are not directly provided, so we use the SFT baseline\nto generate such output evaluations for each input, and accept them into the training set if\nthe ranking of their scores agrees with the human rankings in the dataset. This results in\n1775 tr"} {"text":"ain and 531 evaluation examples (which do not overlap with the IFT data).\n3.1.2\nEvaluation Metrics\nWe evaluate the performance of our self-rewarding models in two axes: their ability to follow\ninstructions, and their ability as a reward model (ability to evaluate responses).\nInstruction Following\nWe evaluate head-to-head performance between various models\nusing GPT-4 [Achiam et al., 2023] as an evaluator over 256 test prompts derived from various\nsources following Li et al. [2023a] using the AlpacaEval eval"} {"text":"uation prompt [Li et al., 2023b].\nWe try the prompt in both orders comparing pairwise, and if the GPT-4 evaluations disagree\nwe count the result as a tie. We also report results in the AlpacaEval 2.0 leaderboard format\nwhich is evaluated over 805 prompts, and compute the win rate against the baseline GPT-4\nTurbo model based on GPT-4 judgments.\nReward Modeling\nWe evaluate the correlation with human rankings on the evaluation set\nwe derived from the Open Assistant dataset, as described in Section 3.1.1. Each "} {"text":"instruction\nhas on average 2.85 responses with given rankings. We can thus measure the pairwise\naccuracy, which is how many times the order of the ranking between any given pair agrees\nbetween the model\u2019s evaluation and the human ranking. We also measure the exact match\ncount, which is how often the total ordering is exactly the same for an instruction. We also\nreport the Spearman correlation and Kendall\u2019s \u03c4. Finally, we report how often the responses\nthat the model scores a perfect 5 out of 5 are rated as "} {"text":"the highest ranked by humans.\n3.1.3\nTraining Details\nInstruction following training\nThe training hyperparameters we use are as follows.\nFor SFT we use learning rate 5.5e\u22126 which linearly decays to 1.1e\u22126, batch size 16 and\ndropout 0.1. We only calculate the loss on target tokens instead of the full sequence. For\nDPO we use learning rate 1e\u22126 which linearly decays to 1e\u22127, batch size 16, dropout 0.1,\nand a \u03b2 value of 0.1. We perform early stopping by saving a checkpoint every 200 steps\nand evaluating generat"} {"text":"ions using Claude 2 [Anthropic, 2023] on 253 validation examples\nderived from various sources following Li et al. [2023a]. This is evaluated pairwise against\n1Note, the prompt, derived from Li et al. [2023a], mentions \u201cutilizing web search\u201d, but our model\nis not actually capable of this action.\n5\nthe previous step\u2019s generations using the AlpacaEval evaluation prompt format [Li et al.,\n2023b].\nSelf-Instruction creation\nTo generate new prompts we used a fixed model, Llama 2-Chat\n70B with 8-shot prompting, whe"} {"text":"reas the other parts of the creation pipeline (generating the\nresponse, and evaluating it) use the model being trained. For candidate response generation\nwe sample N = 4 candidate responses with temperature T = 0.7, p = 0.9. When evaluating\ncandidate responses, as there is variance to these scores, in our experiments we also use\nsampled decoding (with the same parameters) and generate these evaluations multiple (3)\ntimes and take the average. We added 3,964 such preference pairs to form the AIFT(M1)\ndataset"} {"text":" used to train M2 via DPO, and 6,942 pairs to form AIFT(M2) used to train M3.\n3.2\nResults\n3.2.1\nInstruction Following Ability\nHead to head performance results are provided in Figure 3.\nEFT+IFT seed training performs similarly to IFT alone\nWe find that adding\nthe Evaluation Fine-Tuning (EFT) task to training does not impact instruction following\nperformance compared to using Instruction Fine-Tuning (IFT) data alone with an almost\nequal head to head (30.5% wins vs. 30.9% wins). This is a positive result becau"} {"text":"se it means\nthe increased capability of a model to self-reward does not affect its other skills. We can\nthus use IFT+EFT training as Iteration 1 (M1) of our Self-Rewarding model, and then run\nfurther iterations.\nIteration 2 (M2) improves over Iteration 1 (M1) and SFT Baseline\nIteration 2\nof Self-Rewarding training (M2) provides superior instruction following to Iteration 1 (M1)\nwith 55.5% wins for M2 compared to only 11.7% for M1 in a head to head evaluation. It\nprovides similar gains over the SFT Baseline "} {"text":"as well (49.2% wins vs. 14.5% wins). Clearly,\nthere is a large jump in performance from M1 to M2 by using the preference data AIFT(M1)\nprovided by the reward model from Iteration 1.\nIteration 3 (M3) improves over Iteration 2 (M2)\nWe see a further gain in Iteration 3\nover Iteration 2, with 47.7% wins for M3 compared to only 12.5% for M2 in a head to head\nevaluation. Similarly, the win rate over the SFT Baseline for M3 increases to 62.5% wins vs.\n9.8%, i.e. winning more often than the M2 model did. Overall, w"} {"text":"e see large gains from M2\nto M3 through training using the preference data AIFT(M2) provided by the reward model\nfrom Iteration 2.\nSelf-Rewarding models perform well on AlpacaEval 2 leaderboard\nWe evaluate\nour models on the AlpacaEval 2.0 leaderboard format, with results given in Table 1. We\nobserve the same findings as in the head-to-head evaluations, that training iterations yield\nimproved win rates over GPT4-Turbo, from 9.94% in Iteration 1, to 15.38% in Iteration 2,\nto 20.44% in Iteration 3. Our Iterati"} {"text":"on 3 model outperforms many existing models in this\nmetric, including Claude 2, Gemini Pro, and GPT4 0613. We show some selected models\nfrom the leaderboard in the table. We note that many of those competing models contain\neither proprietary alignment data (which is typically large, e.g., over 1M annotations in\n[Touvron et al., 2023]) or use targets that are distilled from stronger models. In contrast,\nour Self-Rewarding model starts from a small set of seed data from Open Assistant, and\nthen generates targ"} {"text":"ets and rewards from the model itself for further iterations of training.\nPreference optimization outperforms augmenting with positive examples only\nWe also tried the alternative self-training procedure of adding high-quality self-instruction\ncreation examples to supervised fine-tuning (without preference optimization). Unfortunately\nwe could not find a configuration where this approach helped. For example, adding 11,254\nsuch examples that scored 5 out of 5, and optimizing the mixing weight in training, sti"} {"text":"ll\nyielded a head to head with the SFT Baseline of 29% wins vs 30% wins, i.e., no improvement.\n6\nSelf-Rewarding M_3\nvs.\nSFT Baseline\nSelf-Rewarding M_2\nvs.\nSFT Baseline\nSelf-Rewarding M_1\nvs.\nSFT Baseline\n62.5\n49.2\n30.5\n27.7\n36.3\n38.7\n9.8\n14.5\n30.9\nSelf-Rewarding Wins\nTie\nSFT Baseline Wins\nSelf-Rewarding M_3\nvs.\nM_2\nSelf-Rewarding M_2\nvs.\nM_1\nSelf-Rewarding M_3\nvs.\nM_1\n47.7\n55.5\n68.8\n39.8\n32.8\n22.7\n12.5\n11.7\n8.6\nLeft Wins (in Left vs. Right)\nTie\nRight Wins\nFigure 3: Instruction following ability improves wi"} {"text":"th Self-Training: We evaluate our\nmodels using head-to-head win rates on diverse prompts using GPT-4. The SFT Baseline is\non par with Self-Rewarding Iteration 1 (M1). However, Iteration 2 (M2) outperforms both\nIteration 1 (M1) and the SFT Baseline. Iteration 3 (M3) gives further gains over Iteration 2\n(M2), outperforming M1, M2 and the SFT Baseline by a large margin.\nData distribution analysis\nWe perform a t-SNE [Van der Maaten and Hinton, 2008]\nvisualization of the IFT, EFT and AIFT(M1) data, shown in Sect"} {"text":"ion A.1. We find good\noverlap between the IFT and AIFT(M1) examples, which is desired, while the EFT examples\nlie in a different part of the embedding space. We observe that generations from M1 have\nan average length of 1092, for M2 they are 1552, and for M3 they are 2552, so the model is\nlearning to generate longer responses, which we note may be a factor in relative performance.\n3.2.2\nReward Modeling Ability\nReward modeling evaluation results are provided in Table 2.\nEFT augmentation improves over SFT bas"} {"text":"eline\nFirstly, we find that adding Eval-\nuation Fine-Tuning (EFT) data into training, which gives examples to the model of how\nto act as an LLM-as-a-Judge, naturally improves its performance compared to training\nwith Instruction Fine-Tuning (IFT) data alone. IFT data covers a wide range of general\ninstruction tasks, and so does endow the SFT Baseline with the ability to evaluate responses,\nhowever EFT data gives more examples of this specific task. We find improvements across\nall five metrics measured when "} {"text":"using IFT+EFT vs. IFT alone, e.g. the pairwise accuracy\nagreement with humans increases from 65.1% to 78.7%.\nReward Modeling ability improves with Self-Training\nWe find that performing\na round of self-reward training improves the ability of the model at providing self-rewards\nfor the next iteration, in addition to its improved instruction following ability. Model M2\n(Iteration 2) is trained using the reward model from M1 (Iteration 1), but provides improved\nperformance on all five metrics compared to M1. Fo"} {"text":"r example, pairwise accuracy improves\nfrom 78.7% to 80.4%. Iteration 3 (M3) improves several of these metrics further compared\n7\nTable 1: AlpacaEval 2.0 results (win rate over GPT-4 Turbo evaluated by GPT-4).\nSelf-Rewarding iterations yield improving win rates. Iteration 3 (M3) outperforms many\nexisting models that use proprietary training data or targets distilled from stronger models.\nAlignment Targets\nModel\nWin Rate\nDistilled\nProprietary\nSelf-Rewarding 70B\nIteration 1 (M1)\n9.94%\nIteration 2 (M2)\n15.38%\nI"} {"text":"teration 3 (M3)\n20.44%\nSelected models from the leaderboard\nGPT-4 0314\n22.07%\n\u2713\nMistral Medium\n21.86%\n\u2713\nClaude 2\n17.19%\n\u2713\nGemini Pro\n16.85%\n\u2713\nGPT-4 0613\n15.76%\n\u2713\nGPT 3.5 Turbo 0613\n14.13%\n\u2713\nLLaMA2 Chat 70B\n13.87%\n\u2713\nVicuna 33B v1.3\n12.71%\n\u2713\nHumpback LLaMa2 70B\n10.12%\nGuanaco 65B\n6.86%\nDavinci001\n2.76%\n\u2713\nAlpaca 7B\n2.59%\n\u2713\nTable 2: Reward Modeling ability improves with Self-Training: We evaluate the LLM-\nas-a-Judge via various metrics which measure alignment with held-out human preference data.\nSelf-Rewarding "} {"text":"Iteration 2 (Model M2), which is trained using the self-reward model derived\nfrom its previous iteration M1 outperforms Iteration 1 (M1), while M1 itself outperforms a\nstandard SFT baseline model trained on only Instruction Fine-Tuning (IFT) data. Iteration\n3 (Model M3) gives further improvements over Iteration 2.\nSelf-Rewarding Models\nModel\nSFT Baseline\nIter 1 (M1)\nIter 2 (M2)\nIter 3 (M3)\nTraining data\nIFT\nIFT+EFT\nIFT+EFT\nIFT+EFT\n+AIFT(M1)\n+AIFT(M2)\nPairwise accuracy (\u2191)\n65.1%\n78.7%\n80.4%\n81.7%\n5-best % (\u2191"} {"text":")\n39.6%\n41.5%\n44.3%\n43.2%\nExact Match % (\u2191)\n10.1%\n13.1%\n14.3%\n14.3%\nSpearman corr. (\u2191)\n0.253\n0.279\n0.331\n0.349\nKendall \u03c4 corr. (\u2191)\n0.233\n0.253\n0.315\n0.324\nto M2, for example pairwise accuracy increases from 80.4% to 81.7%. This performance gain\nis achieved despite there being no additional EFT data provided, and the examples created\nduring the Self-Instruction creation loop do not tend to look like LLM-as-a-Judge training\nexamples. We hypothesize that because the model is becoming better at general instruct"} {"text":"ion\nfollowing, it nevertheless also improves at the LLM-as-a-Judge task.\nImportance of the LLM-as-a-Judge Prompt\nIn these experiments we used the LLM-\nas-Judge prompt format shown in Figure 2. In preliminary experiments we also tried various\nother prompts to decide the most effective one to use. For example, we tried the prompt\nproposed in Li et al. [2023a] which also proposes a 5-point scale, but describes the options as\nmultiple choice in a range of quality buckets, see Figure 5. In contrast, our prompt d"} {"text":"escribes\nthe points as additive, covering various aspects of quality. We find a large difference between\n8\nthese two prompts when using the SFT Baseline, e.g. 65.1% pairwise accuracy for ours, and\nonly 26.6% pairwise accuracy for theirs. See Section A.2 for further details.\n4\nRelated Work\nAutomatically improving or self-correcting large language models is becoming a major focus\nof research. A recent survey from Pan et al. [2023] attempts to summarize the topic. However,\nthis is a rapidly moving area, and th"} {"text":"ere are already promising new works not covered there.\nReinforcement Learning from Human Feedback (RLHF)\nPreference learning ap-\nproaches such as in Ziegler et al. [2019], Stiennon et al. [2020], Ouyang et al. [2022], Bai et al.\n[2022a] train a fixed reward model from human preference data, and then use the reward\nmodel to train via reinforcement learning (RL), e.g. via Proximal Policy Optimization (PPO)\n[Schulman et al., 2017]. Thus, the reward signal in a certain sense already comes from a model\neven in t"} {"text":"hese works, but distilled from human data. Nevertheless, this is commonly referred\nto as RL from Human Feedback (RLHF). Methods such as Direct Preference Optimization\n(DPO) [Rafailov et al., 2023] avoid training the reward model entirely, and instead directly\ntrain the LLM using human preferences. Several other such competing methods exist as\nwell [Zhao et al., 2023, Zheng et al., 2023a, Yuan et al., 2023], including Pairwise Cringe\nOptimization (PCO) [Xu et al., 2023], which was shown to outperform DPO and"} {"text":" PPO on\nAlpacaFarm [Dubois et al., 2023]. PCO uses an iterative training approach similar to the\none in our work, except with a fixed reward model, and also showed that Iterative DPO\nimproves over DPO using the same scheme.\nReinforcement Learning from AI Feedback (RLAIF)\nConstitutional AI [Bai et al.,\n2022b] uses an LLM to give feedback and refine responses, and uses this data to train a\n(separate, fixed) reward model. This is then used to perform \u201cRL from AI Feedback\u201d (RLAIF).\nLee et al. [2023] compare RLA"} {"text":"IF and RLHF procedures and find the methods they compare\nperform roughly equally. They use an \u201coff-the-shelf\u201d LLM to perform LLM-as-a-Judge\nprompting to build a training set to train a fixed reward model, which is then used for RL\ntraining. They also experiment with using the fixed but separate LLM-as-a-Judge model\ndirectly, which the authors report is computationally expensive due to using it within PPO\ntraining (rather than the offline step in the iterative approach we use in our work, which\nis relatively"} {"text":" computationally cheap). Finally, Chen et al. [2024] recently showed they can\navoid reward models entirely in an Iterative DPO-like framework by using human labels as\nthe winning response in a pair, and the last iteration\u2019s generations as the losing response in\nthe pair. The authors note this has the limitation that once the model generations reach\nhuman performance, they are bottlenecked. Further, each input prompt is required to have\na human annotated response, in contrast to our work.\nImproving LLMs via "} {"text":"data augmentation (and curation)\nSeveral methods have\nimproved LLMs by (self-)creating training data to augment fine-tuning. Self-Instruct [Wang\net al., 2022] is a method for self-instruction creation of prompts and responses, which can\nbe used to improve a base LLM. We make use of a similar technique in our work, and then\nuse our self-reward model to score them. Several approaches have also created training data\nby distilling from powerful LLMs, and shown a weaker LLM can then perform well. For\nexample, Al"} {"text":"paca [Taori et al., 2023] fine-tuned a Llama 7B model with text-davinci-003\ninstructions created in the style of self-instruct. Alpagasus [Chen et al., 2023] employed a\nstrong LLM-as-a-Judge (ChatGPT) to curate the Alpaca dataset and filter to a smaller set,\nobtaining improved results. Instruction Backtranslation [Li et al., 2023a] similarly augments\nand curates training data, but augmenting via backtranslating from web documents to predict\nprompts. The curation is done by the LLM(-as-a-Judge) itself, so ca"} {"text":"n be seen as an instance\nof a self-rewarding model, but in a specialized setting. Reinforced Self-Training (ReST)\n[Gulcehre et al., 2023] uses a fixed, external reward to curate new high-quality examples to\niteratively add to the training set, improving performance. We note that in our experiments,\nwe found that adding only positive examples in a related manner did not help, whereas\nadding preference pairs did help.\n9\nLLM-as-a-Judge\nUsing LLM-as-a-Judge prompting to evaluate language models has\nbecome a sta"} {"text":"ndard approach [Dubois et al., 2023, Li et al., 2023b, Fernandes et al., 2023,\nBai et al., 2023, Saha et al., 2023], and is being used to train reward models or curate data\nas well, as described above [Lee et al., 2023, Chen et al., 2023, Li et al., 2023a]. While some\nworks such as Kim et al. [2023] create training to data to train an LLM to perform well as a\njudge, to our knowledge it is not common to combine this training with general instruction\nfollowing skills as in our work.\n5\nConclusion\nWe have intro"} {"text":"duced Self-Rewarding Language Models, models capable of self-alignment via\njudging and training on their own generations. The method is trained in an iterative manner,\nwhere in each iteration the model creates its own preference-based instruction training data.\nThis is done by assigning rewards to its own generations via LLM-as-a-Judge prompting,\nand using Iterative DPO to train on the preferences. We showed that this training both\nimproves the instruction following capability of the model, as well as its r"} {"text":"eward-modeling\nability across the iterations. While this is only a preliminary study, we believe this is an\nexciting avenue of research because this means the model is better able to assign rewards\nin future iterations for improving instruction following \u2013 a kind of virtuous circle. While\nthis improvement likely saturates in realistic scenarios, it still allows for the possibility of\ncontinual improvement beyond the human preferences that are typically used to build reward\nmodels and instruction following m"} {"text":"odels today.\n6\nLimitations\nWhile we have obtained promising experimental results, we currently consider them pre-\nliminary because there are many avenues yet to explore, among them the topics of further\nevaluation, including safety evaluation, and understanding the limits of iterative training.\nWe showed that the iterations of training improve both instruction following and reward\nmodeling ability, but only ran three iterations in a single setting. A clear line of further\nresearch is to understand the \u201cscal"} {"text":"ing laws\u201d of this effect both for more iterations, and with\ndifferent language models with more or less capabilities in different settings.\nWhile we have evaluated our models using GPT-4 using head-to-head and AlpacaEval 2\nleaderboard style evaluation, there are many other automatic evaluation benchmarks that\none can measure. Further, we observed an increase in length in model generations, and there\nis a known correlation between length and estimated quality, which is a topic that should be\nunderstood more "} {"text":"deeply in general, and in our results in particular as well. It would also be\ngood to understand if so-called \u201c\u2019reward-hacking\u201d can happen within our framework, and in\nwhat circumstances. As we are using both a language model as the training reward, and\na language model for final evaluation, even if they are different models, this may require\na deeper analysis than we have provided. We conducted a preliminary human (author)\nevaluation, which validated the automatic results that we see, but more detailed hum"} {"text":"an\nevaluation would be beneficial.\nAnother clear further avenue of study is to conduct safety evaluations \u2013 and to explore safety\ntraining within our framework. Reward models have been built exclusively for safety in\nexisting systems [Touvron et al., 2023], and a promising avenue here would be to use the\nLLM-as-a-Judge procedure to evaluate for safety specifically in our self-rewarding training\nprocess. Given that we have shown that reward modeling ability improves over training\niterations, this could mean "} {"text":"that the safety of the model could potentially improve over time\nas well, with later iterations being able to capture more challenging safety situations that\nearlier iterations cannot.\n10\nReferences\nJosh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni\nAleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al.\nGPT-4 technical report. arXiv preprint arXiv:2303.08774, 2023.\nLeonard Adolphs, Tianyu Gao, Jing Xu, Kurt Shuster, Sainbayar Sukhbaatar, and Jason\nW"} {"text":"eston. The CRINGE loss: Learning what language not to model. In Anna Rogers, Jordan\nBoyd-Graber, and Naoaki Okazaki, editors, Proceedings of the 61st Annual Meeting of\nthe Association for Computational Linguistics (Volume 1: Long Papers), pages 8854\u20138874,\nToronto, Canada, July 2023. Association for Computational Linguistics. doi: 10.18653\/\nv1\/2023.acl-long.493. URL https:\/\/aclanthology.org\/2023.acl-long.493.\nAnthropic. Claude 2. https:\/\/www.anthropic.com\/index\/claude-2, 2023.\nYuntao Bai, Andy Jones, Kamal N"} {"text":"dousse, Amanda Askell, Anna Chen, Nova DasSarma,\nDawn Drain, Stanislav Fort, Deep Ganguli, Tom Henighan, et al. Training a helpful\nand harmless assistant with reinforcement learning from human feedback. arXiv preprint\narXiv:2204.05862, 2022a.\nYuntao Bai, Saurav Kadavath, Sandipan Kundu, Amanda Askell, Jackson Kernion, Andy\nJones, Anna Chen, Anna Goldie, Azalia Mirhoseini, Cameron McKinnon, et al. Constitu-\ntional AI: Harmlessness from AI feedback. arXiv preprint arXiv:2212.08073, 2022b.\nYushi Bai, Jiahao Yi"} {"text":"ng, Yixin Cao, Xin Lv, Yuze He, Xiaozhi Wang, Jifan Yu, Kaisheng\nZeng, Yijia Xiao, Haozhe Lyu, Jiayin Zhang, Juanzi Li, and Lei Hou. Benchmarking\nfoundation models with language-model-as-an-examiner. In Thirty-seventh Conference\non Neural Information Processing Systems Datasets and Benchmarks Track, 2023. URL\nhttps:\/\/openreview.net\/forum?id=IiRHQ7gvnq.\nLichang Chen, Shiyang Li, Jun Yan, Hai Wang, Kalpa Gunaratna, Vikas Yadav, Zheng Tang,\nVijay Srinivasan, Tianyi Zhou, Heng Huang, et al. AlpaGasus: Training "} {"text":"a better alpaca\nwith fewer data. arXiv preprint arXiv:2307.08701, 2023.\nZixiang Chen, Yihe Deng, Huizhuo Yuan, Kaixuan Ji, and Quanquan Gu. Self-play fine-tuning\nconverts weak language models to strong language models. arXiv preprint arXiv:2401.01335,\n2024.\nRonan Collobert and Jason Weston. A unified architecture for natural language processing:\nDeep neural networks with multitask learning. In Proceedings of the 25th International\nConference on Machine Learning, pages 160\u2013167, 2008.\nYann Dubois, Xuechen Li,"} {"text":" Rohan Taori, Tianyi Zhang, Ishaan Gulrajani, Jimmy Ba, Carlos\nGuestrin, Percy Liang, and Tatsunori B Hashimoto. Alpacafarm: A simulation framework\nfor methods that learn from human feedback. arXiv preprint arXiv:2305.14387, 2023.\nPatrick Fernandes, Daniel Deutsch, Mara Finkelstein, Parker Riley, Andr\u00e9 FT Martins,\nGraham Neubig, Ankush Garg, Jonathan H Clark, Markus Freitag, and Orhan Firat.\nThe devil is in the errors: Leveraging large language models for fine-grained machine\ntranslation evaluation. arXiv p"} {"text":"reprint arXiv:2308.07286, 2023.\nCaglar Gulcehre, Tom Le Paine, Srivatsan Srinivasan, Ksenia Konyushkova, Lotte Weerts,\nAbhishek Sharma, Aditya Siddhant, Alex Ahern, Miaosen Wang, Chenjie Gu, et al.\nReinforced self-training (rest) for language modeling. arXiv preprint arXiv:2308.08998,\n2023.\nOr Honovich, Thomas Scialom, Omer Levy, and Timo Schick. Unnatural instructions: Tuning\nlanguage models with (almost) no human labor. In Anna Rogers, Jordan Boyd-Graber,\nand Naoaki Okazaki, editors, Proceedings of the 61"} {"text":"st Annual Meeting of the Association for\nComputational Linguistics (Volume 1: Long Papers), pages 14409\u201314428, Toronto, Canada,\nJuly 2023. Association for Computational Linguistics. doi: 10.18653\/v1\/2023.acl-long.806.\nURL https:\/\/aclanthology.org\/2023.acl-long.806.\n11\nSeungone Kim, Jamin Shin, Yejin Cho, Joel Jang, Shayne Longpre, Hwaran Lee, Sangdoo Yun,\nSeongjin Shin, Sungdong Kim, James Thorne, et al. Prometheus: Inducing fine-grained\nevaluation capability in language models. arXiv preprint arXiv:2310.08"} {"text":"491, 2023.\nAndreas K\u00f6pf, Yannic Kilcher, Dimitri von R\u00fctte, Sotiris Anagnostidis, Zhi-Rui Tam,\nKeith Stevens, Abdullah Barhoum, Nguyen Minh Duc, Oliver Stanley, Rich\u00e1rd Nagyfi,\net al. OpenAssistant conversations\u2013democratizing large language model alignment. arXiv\npreprint arXiv:2304.07327, 2023.\nHarrison Lee, Samrat Phatale, Hassan Mansoor, Kellie Lu, Thomas Mesnard, Colton Bishop,\nVictor Carbune, and Abhinav Rastogi. RLAIF: Scaling reinforcement learning from human\nfeedback with ai feedback. arXiv preprint"} {"text":" arXiv:2309.00267, 2023.\nXian Li, Ping Yu, Chunting Zhou, Timo Schick, Luke Zettlemoyer, Omer Levy, Jason\nWeston, and Mike Lewis. Self-alignment with instruction backtranslation. arXiv preprint\narXiv:2308.06259, 2023a.\nXuechen Li, Tianyi Zhang, Yann Dubois, Rohan Taori, Ishaan Gulrajani, Carlos Guestrin,\nPercy Liang, and Tatsunori B. Hashimoto.\nAlpacaeval: An automatic evaluator of\ninstruction-following models. https:\/\/github.com\/tatsu-lab\/alpaca_eval, 2023b.\nLong Ouyang, Jeffrey Wu, Xu Jiang, Diogo Almeida"} {"text":", Carroll Wainwright, Pamela Mishkin,\nChong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, et al. Training language\nmodels to follow instructions with human feedback. Advances in Neural Information\nProcessing Systems, 35:27730\u201327744, 2022.\nLiangming Pan, Michael Saxon, Wenda Xu, Deepak Nathani, Xinyi Wang, and William Yang\nWang. Automatically correcting large language models: Surveying the landscape of diverse\nself-correction strategies. arXiv preprint arXiv:2308.03188, 2023.\nAlec Radford, Jeffrey Wu, R"} {"text":"ewon Child, David Luan, Dario Amodei, Ilya Sutskever, et al.\nLanguage models are unsupervised multitask learners. OpenAI blog, 1(8):9, 2019.\nRafael Rafailov, Archit Sharma, Eric Mitchell, Christopher D Manning, Stefano Ermon, and\nChelsea Finn. Direct preference optimization: Your language model is secretly a reward\nmodel. In Thirty-seventh Conference on Neural Information Processing Systems, 2023.\nURL https:\/\/openreview.net\/forum?id=HPuSIXJaa9.\nSwarnadeep Saha, Omer Levy, Asli Celikyilmaz, Mohit Bansal, Jas"} {"text":"on Weston, and Xian\nLi. Branch-solve-merge improves large language model evaluation and generation. arXiv\npreprint arXiv:2310.15123, 2023.\nJohn Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. Proximal\npolicy optimization algorithms. arXiv preprint arXiv:1707.06347, 2017.\nNisan Stiennon, Long Ouyang, Jeffrey Wu, Daniel Ziegler, Ryan Lowe, Chelsea Voss, Alec\nRadford, Dario Amodei, and Paul F Christiano. Learning to summarize with human\nfeedback. Advances in Neural Information Process"} {"text":"ing Systems, 33:3008\u20133021, 2020.\nRohan Taori, Ishaan Gulrajani, Tianyi Zhang, Yann Dubois, Xuechen Li, Carlos Guestrin,\nPercy Liang, and Tatsunori B. Hashimoto. Stanford alpaca: An instruction-following\nllama model. https:\/\/github.com\/tatsu-lab\/stanford_alpaca, 2023.\nHugo Touvron, Louis Martin, Kevin Stone, Peter Albert, Amjad Almahairi, Yasmine Babaei,\nNikolay Bashlykov, Soumya Batra, Prajjwal Bhargava, Shruti Bhosale, et al. Llama 2:\nOpen foundation and fine-tuned chat models. arXiv preprint arXiv:2307.09"} {"text":"288, 2023.\nLaurens Van der Maaten and Geoffrey Hinton. Visualizing data using t-SNE. Journal of\nmachine learning research, 9(11), 2008.\nYizhong Wang, Yeganeh Kordi, Swaroop Mishra, Alisa Liu, Noah A Smith, Daniel Khashabi,\nand Hannaneh Hajishirzi. Self-instruct: Aligning language model with self generated\ninstructions. arXiv preprint arXiv:2212.10560, 2022.\n12\nJing Xu, Andrew Lee, Sainbayar Sukhbaatar, and Jason Weston. Some things are more\ncringe than others: Preference optimization with the pairwise cring"} {"text":"e loss. arXiv preprint\narXiv:2312.16682, 2023.\nHongyi Yuan, Zheng Yuan, Chuanqi Tan, Wei Wang, Songfang Huang, and Fei Huang.\nRRHF: Rank responses to align language models with human feedback. In Thirty-seventh\nConference on Neural Information Processing Systems, 2023. URL https:\/\/openreview.\nnet\/forum?id=EdIGMCHk4l.\nYao Zhao, Rishabh Joshi, Tianqi Liu, Misha Khalman, Mohammad Saleh, and Peter J\nLiu. SLiC-HF: Sequence likelihood calibration with human feedback. arXiv preprint\narXiv:2305.10425, 2023.\nChujie "} {"text":"Zheng, Pei Ke, Zheng Zhang, and Minlie Huang. Click: Controllable text generation\nwith sequence likelihood contrastive learning. In Anna Rogers, Jordan Boyd-Graber, and\nNaoaki Okazaki, editors, Findings of the Association for Computational Linguistics: ACL\n2023, pages 1022\u20131040, Toronto, Canada, July 2023a. Association for Computational\nLinguistics. doi: 10.18653\/v1\/2023.findings-acl.65. URL https:\/\/aclanthology.org\/\n2023.findings-acl.65.\nLianmin Zheng, Wei-Lin Chiang, Ying Sheng, Siyuan Zhuang, Zhanghao Wu"} {"text":", Yonghao\nZhuang, Zi Lin, Zhuohan Li, Dacheng Li, Eric Xing, Hao Zhang, Joseph E. Gonzalez, and\nIon Stoica. Judging LLM-as-a-judge with MT-bench and chatbot arena. In Thirty-seventh\nConference on Neural Information Processing Systems Datasets and Benchmarks Track,\n2023b. URL https:\/\/openreview.net\/forum?id=uccHPGDlao.\nDaniel M Ziegler, Nisan Stiennon, Jeffrey Wu, Tom B Brown, Alec Radford, Dario Amodei,\nPaul Christiano, and Geoffrey Irving. Fine-tuning language models from human preferences.\narXiv preprint "} {"text":"arXiv:1909.08593, 2019.\n13\nA\nAppendix\nA.1\nDistributions of IFT, EFT and AIFT data\n100\n50\n0\n50\nDimension 1\n75\n50\n25\n0\n25\n50\n75\nDimension 2\nIFT data\nEFT data\nAIFT data\n(a) Instruction distribution of IFT, EFT and\nAIFT data.\n50\n0\n50\nDimension 1\n80\n60\n40\n20\n0\n20\n40\n60\nDimension 2\nIFT data\nEFT data\nAIFT data\n(b) Response distribution of IFT, EFT, and AIFT\ndata.\nFigure 4: Distributions of both instructions and responses for IFT, EFT and AIFT data.\nWe have plotted the distribution of instructions for IFT, EFT and "} {"text":"AIFT data, and the\ndistribution of responses for IFT, EFT and AIFT data in Figure 4. It is clear that the IFT\ndata and EFT data come from very different distributions while the IFT and AIFT data\ncome from similar distributions.\nA.2\nOther EFT prompts we have tried\nAt first, we took the EFT prompt from Li et al. [2023a] as shown in Figure 5. However, we\nfound that this prompt was not as effective as our additive score-counting prompt because\nthe model needed to treat the task as a multiple-choice problem, and"} {"text":" it was difficult for the\nmodel to break down this multiple-choice problem into sub-problems involving evaluating\nvarious aspects of the response. When using the model trained on 3,200 IFT data only, its\nperformance on the EFT test set using our additive score-counting prompt and prompt from\nLi et al. [2023a] is shown in Table 3.\nEFT Prompt\nMultiple Choice prompt\nOurs\nPairwise accuracy (\u2191)\n26.6%\n65.1%\n5-best % (\u2191)\n23.5%\n39.6%\nExact Match % (\u2191)\n1.1%\n10.1%\nSpearman corr. (\u2191)\n-0.18\n0.25\nKendall \u03c4 corr. (\u2191)\n-0."} {"text":"16\n0.23\nTable 3: We tried various LLM-as-Judge prompts using the model trained with 3,200 IFT\ndata only and found that our additive score-counting prompt worked best which demonstrates\nsignificant improvements in EFT performance comparing to the prompt used by Li et al.\n[2023a].\n14\nBelow is a question from an user and a candidate response. Please grade the response on a\n5-point scale using the following criteria:\n1:\nIt means the answer is incomplete, vague, off-topic, controversial, or not ex-\nactly what th"} {"text":"e user asked for. For example, some content seems missing, numbered list\ndoes not start from the beginning, the opening sentence repeats user\u2019s question. Or the\nresponse is from another person\u2019s perspective with their personal experience (e.g. taken\nfrom blog posts), or looks like an answer from a forum. Or it contains promotional text,\nnavigation text, or other irrelevant information.\n2: It means the answer addresses most of the asks from the user. It does not directly\naddress the user\u2019s question. For exam"} {"text":"ple, it only provides a high-level methodology instead\nof the exact solution to user\u2019s question.\n3: It means the answer is helpful but not written by an AI Assistant. It addresses all\nthe basic asks from the user. It is complete and self contained with the drawback that\nthe response is not written from an AI assistant\u2019s perspective, but from other people\u2019s\nperspective. The content looks like an excerpt from a blog post, web page, or web search\nresults.\nFor example, it contains personal experience or opinion"} {"text":", mentions comments\nsection, or share on social media, etc.\n4: It means the answer is written from an AI assistant\u2019s perspective with a clear focus of\naddressing the instruction. It provide a complete, clear, and comprehensive response to\nuser\u2019s question or instruction without missing or irrelevant information. It is well organized,\nself-contained, and written in a helpful tone. It has minor room for improvement, e.g. more\nconcise and focused.\n5: It means it is a perfect answer from an AI Assistant. It has "} {"text":"a clear focus on being a\nhelpful AI Assistant, where the response looks like intentionally written to address the\nuser\u2019s question or instruction without any irrelevant sentences. The answer provides high\nquality content, demonstrating expert knowledge in the area, is very well written, logical,\neasy-to-follow, engaging and insightful.\nUser: \n<\/response>\nPlease first briefly describe your reasoning (in less than 100 words),\nand then\nwrite \u201cScore: \u201d in the la"} {"text":"st line. Answer in the style of an AI Assistant, with\nknowledge from web search if needed. To derive the final score based on the criteria, let\u2019s\nthink step-by-step.\nFigure 5: LLM-as-a-Judge prompt taken from Li et al. [2023a].\n15\n"} {"text":" \n \n \n \nData Sanitization Techniques \n \n \n \n \n \n \n \n \n \nA Net 2000 Ltd. White Paper \n \n \n \n \n \n \n \n \n \n \n \n \nAbstract \n \nData Sanitization is the process of making sensitive information in non-production databases \nsafe for wider visibility. This White Paper is an overview of various techniques which can be \nused to sanitize sensitive production data in test and development databases. \n \nAn initial discussion of the primary motivations for data sanitization is given. The remainder of \nthe paper is devoted "} {"text":"to a generic survey of the various masking techniques and their individual \nbenefits and drawbacks. \n \n \n \nSome keywords which may assist you in finding this document online are: \n \nData Sanitization, Data Sanitisation, Data Masking, Data Obfuscation, Data Security, Data \nCleansing, Data Hiding, Data Protection Act 1998, Hide Data, Disguise Data, Sanitize Data, \nSanitise Data, Gramm-Leach-Bliley Act (GLBA), Data Privacy, Directive 95\/46\/EC of the \nEuropean Parliament \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nAuthor: \n"} {"text":"Dale Edgar \n \nNet 2000 Ltd. \n \nDale.Edgar@Net2000Ltd.com \n \nhttp:\/\/www.Net2000Ltd.com \n \nData Sanitization Techniques \nA Net 2000 Ltd. White Paper \n \n \n Copyright \u00a9 Net 2000 Ltd. 2003-2004 \n \nhttp:\/\/www.Net2000Ltd.com \n \n \n \n \n \n \n \nTable of Contents \n \n \nWhy Sanitize Information in Test and Development Databases? .............................................1 \nProtecting Valuable Information...................................................................."} {"text":"........................1 \nLegal Obligations ...................................................................................................................1 \nData Sanitization Techniques.....................................................................................................2 \nTechnique: NULL\u2019ing Out .....................................................................................................2 \nTechnique: Masking Data.................................................................."} {"text":"....................................2 \nTechnique: Substitution .........................................................................................................3 \nTechnique: Shuffling Records ................................................................................................4 \nTechnique: Number Variance ................................................................................................4 \nTechnique: Gibberish Generation ......................................................."} {"text":"..................................4 \nTechnique: Encryption\/Decryption........................................................................................5 \nSummary....................................................................................................................................6 \n \n \nData Sanitization Techniques \nA Net 2000 Ltd. White Paper \n \n \n Copyright \u00a9 Net 2000 Ltd. 2003-2004 \n \nhttp:\/\/www.Net2000Ltd.com \nData Sanitization Technique"} {"text":"s \n \n \n \n \n \nData Sanitization is the process of disguising sensitive information in test and \ndevelopment databases by overwriting it with realistic looking but false data of a \nsimilar type. \n \n \nWhy Sanitize Information in Test and Development Databases? \n \nThe data in testing environments should be sanitized in order to protect valuable \nbusiness information and also because there is, in most countries, a legal obligation to \ndo so. \n \n \nProtecting Valuable Information \n \nFundamentally there are two ty"} {"text":"pes of security. The first type is concerned with the \nintegrity of the data. In this case the modification of the records is strictly controlled. \nFor example, you may not wish an account to be credited or debited without specific \ncontrols and auditing. This type of security is not a major concern in test and \ndevelopment databases. The data can be modified at will without any business impact. \n \nThe second type of security is the protection of the information content from \ninappropriate visibility. Names"} {"text":", addresses, phone numbers and credit card details are \ngood examples of this type of data. Unlike the protection from updates, this type of \nsecurity requires that access to the information content is controlled in every \nenvironment. \n \n \nLegal Obligations \n \nThe legal requirements for Data Sanitization vary from country to country and most \ncountries now have regulations of some form. Here are some examples: \n \nUnited States \nThe Gramm-Leach-Bliley Act requires institutions to protect the \nconfidential"} {"text":"ity and integrity of personal consumer information. The Right to \nFinancial Privacy Act of 1978 creates statutory Fourth Amendment protection \nfor financial records and there are a host of individual state laws \n \nThe European Union \nDirective 95\/46\/EC of the European Parliament which provides strict \nguidelines regarding individual rights to data privacy, and the responsibilities \nof data holders to guard against misuse. \n \nData Sanitization Techniques \nA Ne"} {"text":"t 2000 Ltd. White Paper \n \n \n Copyright \u00a9 Net 2000 Ltd. 2003-2004 \n \nhttp:\/\/www.Net2000Ltd.com \nThe United Kingdom \nThe United Kingdom Data Protection Act of 1998 extends the European \nParliament directive and places further statutory obligations on the holders of \npersonal, private or sensitive data. \n \nAs with most things legal, the details are open to argument. In reality though, if data \nfor which your organization is responsible gets loose and appropriate steps were not \ntaken to prevent that release, "} {"text":"then your organizations lawyers could well find \nthemselves in court trying to put their best spin on the matter. However large the legal \nliabilities are, they could seem trivial in comparison to the losses associated with the \ncatastrophic loss of business confidence caused by a large scale privacy breach. \n \nAny organization that outsources test and development operations needs to be very \nconscious of the specific laws regulating the transmission of information across \nnational borders. \n \n \n \n \nData Sa"} {"text":"nitization Techniques \n \nTest and development teams need to work with databases which are structurally \ncorrect functional copies of the live environments. However, they do not necessarily \nneed to be able to view security sensitive information. For test and development \npurposes, as long as the data looks real, the actual record content is usually irrelevant. \nThere are a variety of Data Sanitization techniques available \u2013 the pro\u2019s and con\u2019s of \nsome of the most useful are discussed below. \n \n \nTechnique:"} {"text":" NULL\u2019ing Out \n \nSimply deleting a column of data by replacing it with NULL values is an effective \nway of ensuring that it is not inappropriately visible in test environments. \nUnfortunately it is also one of the least desirable options from a test database \nstandpoint. Usually the test teams need to work on the data or at least a realistic \napproximation of it. For example, it is very hard to write and test customer account \nmaintenance forms if the customer name, address and contact details are all NULL "} {"text":"\nvalues. \n \nVerdict: The NULL\u2019ing Out technique is useful in certain specific circumstances but \nrarely useful as the entire Data Sanitization strategy. \n \n \nTechnique: Masking Data \n \nMasking data means replacing certain fields with a Mask character (such as an X). \nThis effectively disguises the data content while preserving the same formatting on \nfront end screens and reports. For example, a column of credit card numbers might \nlook like: \n \nData Sanitization Techniques "} {"text":" \nA Net 2000 Ltd. White Paper \n \n \n Copyright \u00a9 Net 2000 Ltd. 2003-2004 \n \nhttp:\/\/www.Net2000Ltd.com \n4346 6454 0020 5379 \n4493 9238 7315 5787 \n4297 8296 7496 8724 \n \nand after the masking operation the information would appear as: \n \n4346 XXXX XXXX 5379 \n4493 XXXX XXXX 5787 \n4297 XXXX XXXX 8724 \n \nThe masking characters effectively remove much of the sensitive content from the \nrecord while still preserving the look and feel. Take care to ensure that enough of the \ndata is masked to preserv"} {"text":"e security. It would not be hard to regenerate the original \ncredit card number from a masking operation such as: 4297 8296 7496 87XX \nsince the numbers are generated with a specific and well known checksum algorithm. \nAlso care must be taken not to mask out potentially required information. A masking \noperation such as XXXX XXXX XXXX 5379 would strip the card issuer details \nfrom the credit card number. This may, or may not, be desirable. \n \nVerdict: If the data is in a specific, invariable format, then Ma"} {"text":"sking is a powerful and \nfast Data Sanitization option. If numerous special cases must be dealt with then \nmasking can be slow, extremely complex to administer and can potentially leave some \ndata items inappropriately masked. \n \n \nTechnique: Substitution \n \nThis technique consists of randomly replacing the contents of a column of data with \ninformation that looks similar but is completely unrelated to the real details. For \nexample, the surnames in a customer database could be sanitized by replacing the re"} {"text":"al \nlast names with surnames drawn from a largish random list. \n \nSubstitution is very effective in terms of preserving the look and feel of the existing \ndata. The downside is that a largish store of substitutable information must be \nmaintained for each column to be substituted. For example, to sanitize surnames by \nsubstitution, a list of random last names must be available. Then to sanitize telephone \nnumbers, a list of phone numbers must be available. Frequently, the ability to \ngenerate known invalid"} {"text":" data (phone numbers that will never work) is a nice-to-have \nfeature. \n \nSubstitution data can sometimes be very hard to find in large quantities. For example, \nif a million random street addresses are required, then just obtaining the substitution \ndata can be a major exercise in itself. \n \nVerdict: Substitution is quite powerful, reasonably fast and preserves the look and feel \nof the data. Finding the required random data to substitute and developing the \nprocedures to accomplish the substitution can "} {"text":"be a major effort. \n \n \n \nData Sanitization Techniques \nA Net 2000 Ltd. White Paper \n \n \n Copyright \u00a9 Net 2000 Ltd. 2003-2004 \n \nhttp:\/\/www.Net2000Ltd.com \nTechnique: Shuffling Records \n \nShuffling is similar to substitution except that the substitution data is derived from the \ncolumn itself. Essentially the data in a column is randomly moved between rows until \nthere is no longer any reasonable correlation with the remaining information in the \nrow. \n \nTh"} {"text":"ere is a certain danger in the shuffling technique. It does not prevent people from \nasking questions like \u201cI wonder if so-and-so is on the supplier list?\u201d In other words, \nthe original data is still present and sometimes meaningful questions can still be asked \nof it. Another consideration is the algorithm used to shuffle the data. If the shuffling \nmethod can be determined, then the data can be easily \u201cunshuffled\u201d. For example, if \nthe shuffle algorithm simply ran down the table swapping the column data i"} {"text":"n between \nevery group of two rows it would not take much work from an interested party to \nrevert things to their unshuffled state. \n \nShuffling is rarely effective when used on small amounts of data. For example, if \nthere are only 5 rows in a table it probably will not be too difficult to figure out which \nof the shuffled data really belongs to which row. \n \nOn the other hand, if a column of numeric data is shuffled, the sum and average of the \ncolumn still work out to the same amount. This can sometime"} {"text":"s be useful. \n \nVerdict: Shuffle rules are best used on large tables and leave the look and feel of the \ndata intact. They are fast and relatively simple to implement since no new data needs \nto be found, but great care must be taken to use a sophisticated algorithm to \nrandomise the shuffling of the rows. \n \n \nTechnique: Number Variance \n \nThe Number Variance technique is useful on numeric data. Simply put, the algorithm \ninvolves modifying each number value in a column by some random percentage of its \nre"} {"text":"al value. This technique has the nice advantage of providing a reasonable disguise \nfor the numeric data while still keeping the range and distribution of values in the \ncolumn within viable limits. For example, a column of sales data might have a \nrandom variance of 10% placed on it. Some values would be higher, some lower but \nall would be not too far from their original range. \n \nVerdict: The number variance technique is occasionally useful and can prevent \nattempts to correlate true records using known "} {"text":"numeric data. This type of Data \nSanitization really does need to be used in conjunction with other options though. \n \n \nTechnique: Gibberish Generation \n \nIn general, when sanitizing data, one must take great care to remove all imbedded \nreferences to the real data. For example, it is pointless to carefully remove real \ncustomer names and addresses while still leaving intact in stored copies of \nData Sanitization Techniques \nA Net 2000 Ltd. White Paper \n \n \n"} {"text":" Copyright \u00a9 Net 2000 Ltd. 2003-2004 \n \nhttp:\/\/www.Net2000Ltd.com \ncorrespondence in another table. This is especially true if the original record can be \ndetermined via a simple join on a unique key. \n \nSanitizing \u201cformless\u201d non specific data such as letters, memos and notes is one of the \nhardest techniques in Data Sanitization. Usually these types of fields are just \nsubstituted with a random quantity of equivalently sized gibberish or random words. \nIf real looking data is required, either an elaborate "} {"text":"substitution exercise must be \nundertaken or a few carefully hand built examples must be judiciously substituted to \nprovide some representative samples. \n \nVerdict: Occasionally it is useful to be able to substitute quantities of random text. \nGibberish Generation is useful when needed but is not a very widely applicable \ntechnique. \n \n \nTechnique: Encryption\/Decryption \n \nThis technique offers the option of leaving the data in place and visible to those with \nthe appropriate key while remaining effectivel"} {"text":"y useless to anybody without the key. \nThis would seem to be a very good option \u2013 yet, as with all techniques, it has its \nstrengths and weaknesses. \n \nThe big plus is that the real data is available to anybody with the key \u2013 for example \nadministration personnel might be able to see the personal details on their front end \nscreens but no one else would have this capability. This \u201coptional\u201d visibility is also \nthis techniques biggest weakness. The encryption password only needs to escape once \nand all of t"} {"text":"he data is compromised. Of course, you can change the key and regenerate \nthe test instances \u2013 but stored or saved copies of the data are immediately available \nunder the old password. \n \nEncryption also destroys the formatting and look and feel of the data. Encrypted data \nrarely looks meaningful, in fact, it usually looks like binary data. This sometimes \nleads to NLS character set issues when manipulating encrypted varchar fields. Certain \ntypes of encryption impose constraints on the data format as well"} {"text":". For example, the \nOracle Obfuscation toolkit requires that all data to be encrypted should have a length \nwhich is a multiple of 8 characters. In effect, this means that the fields must be \nextended with a suitable padding character which must then be stripped off at \ndecryption time. \n \nThe strength of the encryption is also an issue. Some encryption is more secure than \nothers. According to the experts, most encryption systems can be broken \u2013 it is just a \nmatter of time and effort. In other words, not "} {"text":"very much will keep the national \nsecurity agencies of largish countries from reading your files should they choose to do \nso. This may not be a big worry if the requirement is to protect proprietary business \ninformation. \n \nVerdict: The security is dependent on the strength of the encryption used. It may not \nbe suitable for high security requirements or where the encryption key cannot be \nsecured. Encryption also destroys the look and feel of the sanitized data. The big plus \nis the selective access it p"} {"text":"resents. \nData Sanitization Techniques \nA Net 2000 Ltd. White Paper \n \n \n Copyright \u00a9 Net 2000 Ltd. 2003-2004 \n \nhttp:\/\/www.Net2000Ltd.com \n \n \n \nSummary \n \nGiven the legal and business operating environment of today, most test and \ndevelopment databases will require some form of Data Sanitization. There are a \nvariety of techniques available and usually several will be required as the format, size \nand structure of the data dictates. \n \nOne key issue not dis"} {"text":"cussed above is repeatability. When designing the Data \nSanitization routines it should be realized that they will eventually become a \nproduction process \u2013 even if the data is only destined for test environments. In other \nwords, the data will need to be sanitized each and every time a test database is \nrefreshed from production. This means that Data Sanitization routines that are easy to \nrun and simple to maintain will soon recover any extra development effort or costs. \n \n \n \nAbout the Author \nDale Edga"} {"text":"r in his many years of experience as a DBA has built numerous test and \ndevelopment environments. He is one of the creative influences behind the Data \nMasker - software which provides an automated solution to the sanitization of data in \ntest and development environments. Dale can be reached at \nDale.Edgar@DataMasker.com \n"} {"text":" \n \n \n \n \n \nTitle: \nA Framework of Principles for the \nDevelopment of Policies, Strategies and \nStandards for the Long-term Preservation of \nDigital Records \n \n \n \nStatus: \nFinal (public) \n \nVersion: \n1.2 \n Submission Date: \nJune 2005 \n \nRelease Date: \nMarch 2008 \n \nAuthor: \nThe InterPARES 2 Project \n \nWriter(s): \nLuciana Duranti, Jim Suderman and Malcolm Todd \n \nProject Unit: \nPolicy Cross-domain \n \nURL: \nhttp:\/\/www.interpares.org\/display_file.cfm?doc= \nip2(pub)policy_framework_document.pdf \n \nPolicy Frame"} {"text":"work, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nTable of Contents \nINTRODUCTION ............................................................................................................................... \n1 \nSTRUCTURE OF THE PRINCIPLES \n..................................................................................................... \n3 \nPRINCIPLES FOR RECORDS CREATORS ........................................................................................... \n4 \n(C1) \nDigital objects m"} {"text":"ust have a stable content and a fixed documentary form to be considered records \nand to be capable of being preserved over time. (P5) ..................................................................................... \n4 \n(C2) \nRecord creation procedures should ensure that digital components of records can be separately \nmaintained and reassembled over time. (P4) .................................................................................................. \n5 \n(C3) \nRecord creation and maintenance r"} {"text":"equirements should be formulated in terms of the purposes the \nrecords are to fulfil, rather than in terms of the available or chosen record-making or recordkeeping \ntechnologies. (P6) \n............................................................................................................................................ \n5 \n(C4) \nRecord creation and maintenance policies, strategies and standards should address the issues of \nrecord reliability, accuracy and authenticity expressly and separately. (P2)"} {"text":" .................................................... \n6 \n(C5) \nA trusted record-making system should be used to generate records that can be presumed reliable. ............ \n7 \n(C6) \nA trusted recordkeeping system should be used to maintain records that can be presumed accurate \nand authentic. (P11, P12) ................................................................................................................................ \n8 \n(C7) \nPreservation considerations should be embedded in all activities "} {"text":"involved in record creation and \nmaintenance if a creator wishes to maintain and preserve accurate and authentic records beyond its \noperational business needs. (P7) .................................................................................................................... \n9 \n(C8) \nA trusted custodian should be designated as the preserver of the creator\u2019s records. (P1) .............................. \n9 \n(C9) \nAll business processes that contribute to the creation and\/or use of the same records sho"} {"text":"uld be \nexplicitly documented. (P10) \n.......................................................................................................................... \n10 \n(C10) \nThird-party intellectual property rights attached to the creator\u2019s records should be explicitly identified \nand managed in the record-making and recordkeeping systems. (P8) \n.......................................................... \n11 \n(C11) \nPrivacy rights and obligations attached to the creator\u2019s records should be explicitly identi"} {"text":"fied and \nprotected in the record-making and recordkeeping systems. (P9) \n................................................................. \n11 \n(C12) \nProcedures for sharing records across different jurisdictions should be established on the basis of \nthe legal requirements under which the records are created. (P13) .............................................................. \n12 \n(C13) \nReproductions of a record made by the creator in its usual and ordinary course of business and for \nits purposes an"} {"text":"d use, as part of its recordkeeping activities, have the same effects as the first \nmanifestation, and each is to be considered at any given time the record of the creator. (P3) \n...................... \n12 \nPRINCIPLES FOR RECORDS PRESERVERS ..................................................................................... \n13 \n(P1) \nA designated records preserver fulfils the role of trusted custodian. (C8) \n...................................................... \n13 \n(P2) \nRecords preservation policies, "} {"text":"strategies and standards should address the issues of record \naccuracy and authenticity expressly and separately. (C4) \n............................................................................. \n14 \n(P3) \nReproductions of a creator\u2019s records made for purposes of preservation by their trusted custodian \nare to be considered authentic copies of the creator\u2019s records. (C13) \n........................................................... \n15 \n(P4) \nRecords preservation procedures should ensure that the digit"} {"text":"al components of records can be \nseparately preserved and reassembled over time. (C2) ................................................................................ \n15 \n(P5) \nAuthentic copies should be made for preservation purposes only from the creator\u2019s records; that is, \nfrom digital objects that have a stable content and a fixed documentary form. (C1) \n...................................... \n16 \n(P6) \nPreservation requirements should be articulated in terms of the purpose or desired outcome of \np"} {"text":"reservation, rather than in terms of the specific technologies available. (C3) .............................................. \n17 \n(P7) \nPreservation considerations should be embedded in all activities involved in each phase of the \nrecords lifecycle if their continuing authentic existence over the long term is to be ensured. (C7) ................ \n18 \n(P8) \nThird-party intellectual property rights attached to the creator\u2019s records should be explicitly identified \nand managed in the preservation system. ("} {"text":"C10) ........................................................................................... \n19 \n(P9) \nPrivacy rights and obligations attached to the creator\u2019s records should be explicitly identified and \nprotected in the preservation system. (C11) .................................................................................................. \n19 \n(P10) \nArchival appraisal should identify and analyze all the business processes that contribute to the \ncreation and\/or use of the same records. (C9) \n"} {"text":"............................................................................................... \n20 \n(P11) \nArchival appraisal should assess the authenticity of the records. (C6) .......................................................... \n20 \n(P12) \nArchival description should be used as a collective authentication of the records in an archival \nfonds. (C6) ..................................................................................................................................................... \n"} {"text":"20 \n(P13) \nProcedures for providing access to records created in one jurisdiction to users in other jurisdictions \nshould be established on the basis of the legal environment in which the records were created. (C13) ....... \n21\u00a0\n \nInterPARES 2 Project, Policy Cross-domain \n \ni \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 1 of 1 \nA Framework of Principles for the Development of Policies, Strategies \nand Standards for the Long-te"} {"text":"rm Preservation of Digital Records1 \nIntroduction \nThe InterPARES research projects have examined the creation, maintenance and \npreservation of digital records. A major finding of the research is that, to preserve trustworthy \ndigital records (i.e., records that can be demonstrated to be reliable, accurate and authentic), \nrecords creators must create them in such a way that it is possible to maintain and preserve \nthem. This entails that a relationship between a records creator2 and its designated preserv"} {"text":"er3 \nmust begin at the time the records are created.4 \nThe InterPARES 1 research (1999-2001) was undertaken from the viewpoint of the \npreserver. Three central findings emerged from it: 1) there are several requirements that should \nbe in place in any recordkeeping environment aiming to create reliable and accurate digital \nrecords and to maintain authentic records;5 2) it is not possible to preserve digital records but \nonly the ability to reproduce them;6 and 3) the preserver needs to be involved with th"} {"text":"e records \nfrom the beginning of their lifecycle to be able to assert that the copies that will be selected for \npermanent preservation are indeed authentic copies of the creator\u2019s records. \nThe InterPARES 2 research (2002-2006) took the records creator\u2019s perspective. The \nresearchers carried out case studies of records creation and maintenance in the arts, sciences \nand e-government; they modeled the many functions that make up records creation and \nmaintenance and records preservation according to both t"} {"text":"he lifecycle and the continuum \nmodels; they reviewed and compared legislation and government policies from a number of \ndifferent countries and at different levels of government, from the national to the municipal; they \nanalyzed many metadata initiatives and developed a tool to identify the strengths and \nweaknesses of existing metadata schemas in relation to questions of reliability, accuracy and \nauthenticity; and, once again, they studied the concept of trustworthiness and its components, \nreliability,"} {"text":" accuracy and authenticity and how it is understood, not just in the traditional legal and \nadministrative environments, but in the arts, in the sciences and in the developing areas of e-\ngovernment. \n \n1 The term initially used in the InterPARES Project is \u201celectronic records.\u201d In fact, the book resulting from InterPARES 1 is named \nThe Long-term Preservation of Authentic Electronic Records: Findings of the InterPARES Project (Luciana Duranti, ed.; San \nMini"} {"text":"ato, Archilab, 2005), and the formal title of InterPARES 2 carries that terminology forward. However, in the course of the \nresearch, the term \u201celectronic record\u201d began to be gradually replaced by the term \u201cdigital record,\u201d which has a less generic meaning, \nand by the end of the research cycle, the research team had developed separate definitions for the two terms and decided to use \nthe latter as the one that better describes the object of InterPARES research. The definition for \u201celectronic record\u201d reads:"} {"text":" \u201cAn \nanalogue or digital record that is carried by an electrical conductor and requires the use of equipment to be intelligible by a person.\u201d \nThe definition for \u201cdigital record\u201d reads: \u201cA record whose content and form are encoded using discrete numeric values (such as the \nbinary values 0 and 1) rather than a continuous spectrum of values (such as those generated by an analogue system).\u201d See the \nInterPARES 2 Terminology Database, available at http:\/\/www.interpares.org\/ip2\/ip2_terminology_db.cfm. \n2 Recor"} {"text":"ds creator is the physical or juridical person (i.e., a collection or succession of physical persons, such as an organization, a \ncommittee, or a position) who makes or receives and sets aside the records for action or reference. As such, the term includes all \nofficers who work for a juridical person, such as records managers, records keepers and preservers. \n3 Records preserver is a generic term that refers more to the function than to the professional designation of the physical or juridical \nperson in q"} {"text":"uestion. Thus, the preserver might be a unit in an organization, a stand-alone institution, an archivist or anyone else who \nhas as primary responsibility the long-term preservation of records. \n4 Records are created when they are made or received and set aside or saved for action or reference. \n5 See Authenticity Task Force (2002). \u201cAppendix 2: Requirements for Assessing and Maintaining the Authenticity of Electronic \nRecords,\u201d in The Long-term Preservation of Authentic Electronic Records: Findings of the "} {"text":"InterPARES Project, Luciana Duranti, ed. \n(San Miniato, Italy: Archilab, 2005), 204\u2013219. PDF version available at \nhttp:\/\/www.interpares.org\/book\/interpares_book_k_app02.pdf. \n6 See Kenneth Thibodeau et al., \u201cPart Three \u2013 Trusting to Time: Preserving Authentic Records in the Long Term: Preservation Task \nForce Report,\u201d ibid, 99\u2013116. PDF version available at http:\/\/www.interpares.org\/book\/interpares_book_f_part3.pdf. \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Proj"} {"text":"ect, Policy Cross-domain \n \nPage 2 of 2 \nThe case studies showed that record creation in the digital environment is almost never \nguided by considerations of preservation over the long term. As a result, the reliability, accuracy \nand authenticity of digital records can either not be established in the first place or not be \ndemonstrated over periods of time relevant to the \u201cbusiness\u201d7 requirements for the records. \nThese records cannot therefore support the creator\u2019s accountability requirements, nor can th"} {"text":"ey \nbe effectively relied upon either by the creator for reference or later action or by external users \nas sources. Furthermore, they cannot be understood within an historical context, thereby \nundermining the traditional role of preserving organizations such as public archival institutions. \nThe research undertaken in records and information-related legislation showed that no level \nof government in any country to date has taken a comprehensive view of the records lifecycle, \nand that, in some cases, leg"} {"text":"islation has established significant barriers to the effective \npreservation of digital records over the long term, most notably that regarding copyright. \nIt was the responsibility of the InterPARES 2 Policy Cross-domain research team \n(hereinafter \u201cthe Policy team\u201d) to determine whether it was possible to establish a framework of \nprinciples that could guide the creation of policies, strategies and standards, and that would be \nflexible enough to be useful in differing national environments, and consiste"} {"text":"nt enough to be \nadopted in its entirety as a solid basis for any such document. In particular, such a framework \nhad to balance different cultural, social and juridical perspectives on the issues of access to \ninformation, data privacy and intellectual property. \nThe findings of the InterPARES 1 research were confirmed by the research conducted by \nthe InterPARES 2 Policy team, which further concluded that it is possible to develop such a \nframework of principles to support record creation, maintenance an"} {"text":"d preservation, regardless of \njurisdiction. This document, in combination with other products of the Project, especially the \n\u201cChain of Preservation model,\u201d8 reflects this conclusion, while emphasizing the need to make \nexplicit the nature of the relationship between records creators and preservers. \nThe Policy team developed two complementary sets of principles, one for records creators \nand one for records preservers, which are intended to support the establishment of the \nrelationship between creators "} {"text":"and preservers by demonstrating the nature of that relationship.9 \nThe principles for records creators are directed to the persons responsible for developing \npolicies and strategies for the creation, maintenance and use of digital records within any kind of \norganization, and to national and international standards bodies. The principles for records \npreservers are directed to the persons responsible for developing policies and strategies for the \nlong-term preservation of digital records within administra"} {"text":"tive units or institutions that have as \ntheir core mandate the preservation of the bodies of records created by persons, administrative \nunits or organizations external to them, selected for permanent preservation under their \njurisdiction for reasons of legal, administrative or historical accountability. They are therefore \nintended for administrative units (e.g., a bank, a city or a university archives) or institutions (e.g., \na community archives or a state archives) with effective knowledge of records "} {"text":"and records \npreservation. \n \n7 The term \u201cbusiness\u201d is used in its most general sense, since the object of the InterPARES research includes works of art and \nscientific data as well as standard types of business records. \n8 The model is available at http:\/\/www.interpares.org\/ip2\/ip2_models.cfm. \n9 The initial draft of the principles relied heavily on the contributions of three research assistants: Fiorella Foscarini, Emily O\u2019Neill and \nSherry Xie. \nPolicy Fram"} {"text":"ework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nStructure of the Principles \nThe principles are similarly presented, with the principle statement followed by an \nexplanatory narrative, sometimes with illustrative examples. The principles are more often \nphrased as recommendations (\u201cshould\u201d) rather than imperatives (\u201cmust\u201d), because some of \nthem might not be relevant to some records creators or preservers. Each principle statement is \nfollowed by an indication of the corresponding principle i"} {"text":"n the other set (C stands for Creator, P \nstands for Preserver; the number is the principle number in the C or the P set). The reason why \nthe principle numbers do not correspond in the two sets (C1=P1) is that the principles are listed \nin each set in order of relative importance. \nInterPARES 2 Project, Policy Cross-domain \n \nPage 3 of 3 \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 4 of 4 \nPrinciples for Records Creators \n(C1) "} {"text":"Digital objects must have a stable content and a fixed documentary form to \nbe considered records and to be capable of being preserved over time. (P5) \nThe InterPARES Project has defined a record as \u201ca document made or received in the \ncourse of a practical activity as an instrument or a by-product of such activity, and set aside for \naction or reference,\u201d10 adopting the traditional archival definition. This definition implies that, to \nbe considered as a record, a digital object generated by the creator mu"} {"text":"st first be a document; \nthat is, must have stable content and fixed documentary form. Only digital objects possessing \nboth are capable of serving the record\u2019s memorial function. \nThe concept of stable content is self-explanatory, as it simply refers to the fact that the data \nand the information in the record (i.e., the message the record is intended to convey) are \nunchanged and unchangeable. This implies that data or information cannot be overwritten, \naltered, deleted or added to. Thus, if one has a s"} {"text":"ystem that contains fluid, ever-changing data or \ninformation, one has no records in such a system until one decides to make one and to save it \nwith its unalterable content. \nThe concept of fixed form is more complex. A digital object has a fixed form when its binary \ncontent is stored so that the message it conveys can be rendered with the same documentary \npresentation it had on the screen when first saved. Because the same documentary \npresentation of a record can be produced by a variety of digital fo"} {"text":"rmats or presentations,11 fixed \nform does not imply that the bitstreams must remain intact over time. It is possible to change the \nway a record is contained in a computer file without changing the record; for example, if a digital \nobject generated in \u2018.doc\u2019 format is later saved in \u2018.pdf\u2019 format, the way it manifests itself on the \nscreen\u2014its documentary presentation, or \u201cdocumentary form\u201d\u2014has not changed, so one can \nsay that the object has a fixed form. \nOne can also produce digital information that c"} {"text":"an take several different documentary forms. \nThis means that the same content can be presented on the screen in several different ways, the \nvarious types of graphs available in spreadsheet software being one example. In this case, each \npresentation of such a digital object in the limited series of possibilities allowed by the system is \nto be considered as a different view of the same record having stable content and fixed form. \nIn addition, one has to consider the concept of \u201cbounded variability,\u201d whic"} {"text":"h refers to changes \nto the form and\/or content of a digital record that are limited and controlled by fixed rules, so that \nthe same query, request or interaction always generates the same result.12 In such cases, \nvariations in the record\u2019s form and content are either caused by technology, such as different \noperating systems or applications used to access the document, or by the intention of the author \nor writer of the document. Where content is concerned, the same query will always return the \nsame sub"} {"text":"set, while, as mentioned, its presentation might vary within an allowed range, such as \nimage magnification. In consideration of the fact that what causes these variations also limits \nthem, they are not considered to be violations of the requirements of stable content and fixed \nform. \n \n10 See InterPARES 2 Terminology Database, op. cit. \n11 Digital format is defined as \u201cThe byte-serialized encoding of a digital object that defines the syntactic and semantic"} {"text":" rules for the \nmapping from an information model to a byte stream and the inverse mapping from that byte stream back to the original information \nmodel\u201d (InterPARES 2 Terminology Database, op. cit.). In most contexts, digital format is used interchangeably with digital file-\nrelated concepts such as file format, file wrapper, file encoding, etc. However, there are some contexts, \u201csuch as the network \ntransport of formatted content streams or consideration of content streams at a level of granularity finer "} {"text":"than that of an entire file, \nwhere specific reference to \u201cfile\u201d is inappropriate\u201d (Stephen L. Abrams (2005), \u201cEstablishing a Global Digital Format Registry,\u201d \nLibrary Trends 54(1): 126. Available at http:\/\/muse.jhu.edu\/demo\/library_trends\/v054\/54.1abrams.pdf). \n12 See Luciana Duranti and Kenneth Thibodeau (2006). \u201cThe Concept of Record in Interactive, Experiential and Dynamic \nEnvironments: the View of InterPARES,\u201d Archival Science 6(1): 13-68. \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman "} {"text":"and M. Todd \nOrganizations should establish criteria for determining which digital objects need to be \nmaintained as records and what methods should be employed to fix their form and content if \nthey are fluid when generated. The criteria should be based on business needs but should \nrespect as well the requirements of legal, administrative and historical accountability. \n(C2) Record creation procedures should ensure that digital components of \nrecords can be separately maintained and reassembled over time."} {"text":" (P4) \nEvery digital record is composed of one or more digital components. A digital component is \na digital object that is part of one or more digital records, including any metadata necessary to \norder, structure or manifest content, and that requires a given preservation action. For example, \nan e-mail that includes a picture and a digital signature will have at least four digital components \n(the header, the text, the picture and the digital signature). Reports with attachments in different \nformats wil"} {"text":"l consist of more than one digital component, whereas a report with its attachments \nsaved in one PDF file will consist of only one digital component. Although digital components \nare each stored separately, each digital component exists in a specific relationship to the other \ndigital components that make up the record. \nPreservation of digital records requires that all the digital components of a record be \nconsistently identified, linked and stored in a way that they can be retrieved and reconstituted \n"} {"text":"into a record having the same documentary presentation it manifested when last closed. Each \ndigital component requires one or more specific methods for decoding the bitstream and for \npresenting it for use over time. The bitstream can be altered, as a result of conversion for \nexample, as long as it continues to be able to fulfil its original role in the reproduction of the \nrecord. All digital components must be able to work together after they are altered; therefore, all \nchanges need to be assessed by t"} {"text":"he creator for the effects they may have on the record. \nOrganizations should establish policies and procedures that stipulate the identification of \ndigital components at the creation stage and that ensure they can be maintained, transmitted, \nreproduced, upgraded and reassembled over time. \n(C3) Record creation and maintenance requirements should be formulated in \nterms of the purposes the records are to fulfil, rather than in terms of the \navailable or chosen record-making or recordkeeping technologies."} {"text":" (P6) \nDigital records rely, by definition, on computer technology and any instance of a record \nexists within a specific technological environment. For this reason, it may seem useful to \nestablish record creation and maintenance requirements in terms of the technological \ncharacteristics of the records or the technological applications in which the records may reside. \nHowever, not only do technologies change, sometimes very frequently, but they are also \ngoverned by proprietary considerations established"} {"text":" and modified at will by their developers. \nBoth these factors can significantly affect the accessibility of records over time. For these \nreasons, references to specific technologies should not be included in records policies, \nstrategies and standards governing the creation and maintenance of an organization\u2019s records. \nOnly the business requirements and obligations that the records are designed to support should \nbe explicitly kept in consideration at such a high regulatory level. At the level of impleme"} {"text":"ntation, \nthe characteristics of specific technologies should be taken into account to support the \nestablished business requirement and make possible its realization. \nTechnological solutions to record creation and maintenance are dynamic, meaning that they \nwill evolve as the technology evolves. New technologies will enable new ways of creating \nrecords that meet an organization\u2019s business requirements. The rapid adoption of Web \ntechnologies to support business communication and transaction illustrates "} {"text":"this. Specific \nactivities for maintaining records will therefore require continuing adaptation to new situations \nInterPARES 2 Project, Policy Cross-domain \n \nPage 5 of 5 \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \ndrawing on expertise from a number of disciplines. To extend the example of the use of Web \ntechnologies, organizations creating and maintaining transactional records in a mainframe \nenvironment need to draw on knowledge of the new Web technologies from both connec"} {"text":"tivity \n(i.e., how to connect the mainframe to the Web) and security standpoints (i.e., how to protect \nthe records from remote, Web-based attacks). As new technologies are used to create records, \nreference to new archival knowledge will continue to be required. \nTechnological solutions need to be specific to be effective. Although the general theory and \nmethodology of digital preservation applies to all digital records, the maintenance solutions for \ndifferent types of records require different methods."} {"text":" Therefore, they should be based on the \nspecific juridical-administrative context in which the records are created and maintained, the \nmandate, mission or goals of their creator, the functions and activities in which the records \nparticipate and the technologies employed in their creation to ensure the best solutions are \nadopted for their maintenance. \nRecord policies that are expressed in terms of business requirements rather than \ntechnologies will need to be periodically updated as the organization\u2019s"} {"text":" business requirements \nchange, rather than as the technology changes. It is the role of a specific action plan to identify \nappropriate technological solutions for the maintenance of specific aggregations of records. The \nidentified solutions must be monitored with regard to the possible need for modifying and \nupdating. This requires the records creating body to be aware of new research developments in \nthe archival and records management fields and to collaborate with interdisciplinary efforts to \ndevelo"} {"text":"p appropriate methods for the management of digital records. \n(C4) Record creation and maintenance policies, strategies and standards should \naddress the issues of record reliability, accuracy and authenticity expressly and \nseparately. (P2) \nIn the management of digital records, reliability, accuracy and authenticity are three vital \nconsiderations for any organization that wishes to sustain its business competitiveness and to \ncomply with legislative and regulatory requirements. These considerations shoul"} {"text":"d be directly \nand separately addressed in records policies and promulgated throughout the organization. The \nconcept of reliability refers to the authority and trustworthiness of a record as a representation of \nthe fact(s) it is about; that is, to its ability to stand for what it speaks of. In other words, reliability \nis the trustworthiness of a record\u2019s content. It can be inferred from two things: the degree of \ncompleteness of a record\u2019s documentary form and the degree of control exercised over the \npr"} {"text":"ocedure (or workflow) in the course of which the record is generated. Reliability is then \nexclusively linked to a record\u2019s authorship and is the sole responsibility of the individual or \norganization that makes the record. Because, by definition, the content of a reliable record is \ntrustworthy, and trustworthy content is, in turn, predicated on accurate data, it follows that a \nreliable record is also an accurate record. \nAn accurate record is one that contains correct, precise and exact data. Accuracy of"} {"text":" a \nrecord may also indicate the absoluteness of the data it reports or its perfect or exclusive \npertinence to the matter in question. The accuracy of a record is assumed when the record is \ncreated and used in the course of business processes to carry out business functions, based on \nthe assumption that inaccurate records harm business interests. However, when records are \ntransmitted across systems, refreshed, converted or migrated for continuous use, or the \ntechnology in which the record resides is up"} {"text":"graded, the data contained in the record must be \nverified to ensure their accuracy was not harmed by technical or human errors occurring in the \ntransmission or transformation processes. The accuracy of the data must also be verified when \nrecords are created by importing data from other records systems. This verification of accuracy \nis the responsibility of the physical or juridical person receiving the data; however, such person \nis not responsible for the correctness of the data value, for which the se"} {"text":"nding person is \nInterPARES 2 Project, Policy Cross-domain \n \nPage 6 of 6 \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 7 of 7 \naccountable. Thus, the receiving person should issue a disclaimer regarding accuracy of \nrecords using other persons\u2019 data. \nThe concept of authenticity refers to the fact that a record is what it purports to be and has \nnot been tampered with or otherwise corrupted. In other words, authenticity is the \n"} {"text":"trustworthiness of a record as a record. An authentic record is as reliable and accurate as it was \nwhen first generated. Authenticity depends upon the record\u2019s transmission and the manner of its \nmaintenance and custody. Authenticity is maintained and verifiable by maintaining the identity \nand integrity of a record. The identity of a record is established and maintained by indicating at a \nminimum the names of the persons participating in the creation of the record (e.g., author, \naddressee); the action o"} {"text":"r matter to which the record pertains; the date(s) of compilation, filing or \ntransmission; the record\u2019s documentary form; the record\u2019s digital presentation (or format); the \nrelationship of the record to other records through a classification code or a naming convention; \nand the existence of attachments. The integrity of a record is established and maintained by \nidentifying the responsibility for the record through time by naming the handling person or \noffice(s)13 and the trusted records officer14 or th"} {"text":"e recordkeeping office,15 identifying access \nprivileges16 and access restrictions17 and indicating any annotations or any modifications \n(technical or otherwise) made to the record by the persons having access to it. \nThus, record reliability is a quality that is established when a record is created and implies \naccuracy of the data contained in the record, while record accuracy and authenticity are \nqualities that are connected with the transmission and maintenance of the record. The latter are \ntherefor"} {"text":"e the responsibility of both the records creator and any legitimate successor. \nAuthenticity is protected and guaranteed through the adoption of methods that ensure the \nrecord is not manipulated, altered, or otherwise falsified after its creation, either during its \ntransmission or in the course of its handling and preservation, within the recordkeeping \nsystem.18 \n(C5) A trusted record-making system should be used to generate records that can \nbe presumed reliable.19 \nA trusted record-making system consi"} {"text":"sts of a set of rules governing the making of records \nand a set of tools and mechanisms used to implement these rules. To generate reliable records, \nevery record-making system should include in its design integrated business and documentary \nprocedures, record metadata schemes, records forms, record-making access privileges and \nrecord-making technological requirements. \nIntegrated business and documentary procedures are business procedures linked to \ndocumentation procedures and to the classification sy"} {"text":"stem (i.e., the file management plan or \ntaxonomy) established in the organization. This integration reinforces the control over record-\nmaking procedures: it supports the reliability of records by explicitly connecting records to the \n \n13 Handling office (or person) is defined as \u201cThe office (or officer) formally competent for carrying out the action to which the record \nrelates or for the matter to which the record pertains\u201d (InterPARES 2 Terminology Databa"} {"text":"se, op. cit.). \n14 Trusted records officer (also called records keeper or records manager) is defined as \u201can individual or a unit within the creating \norganization who is responsible for keeping and managing the creator\u2019s records, who has no reason to alter the kept records or \nallow others to alter them and who is capable of implementing all of the benchmark requirements for authentic records\u201d (Ibid.). \nThese are listed in The Long-term Preservation of Authentic Electronic Records, cit., \u201cAuthenticity Task"} {"text":" Force Report,\u201d available at \nhttp:\/\/www.interpares.org\/book\/interpares_book_d_part1.pdf and, more specifically, the already cited \u201cRequirements for Assessing \nand Maintaining the Authenticity of Electronic Records,\u201d available at http:\/\/www.interpares.org\/book\/interpares_book_k_app02.pdf.\u201d \n15 Recordkeeping office is defined as \u201cThe office given the formal competence for designing, implementing and maintaining the \ncreator\u2019s trusted recordkeeping system\u201d (InterPARES 2 Terminology Database, op. cit.). \n16 Ac"} {"text":"cess privileges is defined as \u201cThe authority to access a system to compile, classify, register, retrieve, annotate, read, transfer or \ndestroy records, granted to a person, position or office within an organization or agency\u201d (Ibid.). \n17 Access restrictions is defined as \u201cThe authority to read a record, granted to a person, position or office within an organization or \nagency\u201d (Ibid.). \n18 See MacNeil et al., \u201cAuthenticity Task Force Report,\u201d op. cit. \n19 There is no corresponding Preserver Principle. \nPol"} {"text":"icy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nactivities in which they participate and to the records organization system, thereby standardizing \nthe procedures for creating and managing those records. The integration of business and \ndocumentary procedures also establishes the basis and central means to demonstrate \nownership of and responsibility for the records. A record-making metadata scheme is a list of all \nmetadata elements that need to be documented in the course of record-"} {"text":"making processes for \nthe purposes of uniquely identifying each record and enabling the maintenance of its integrity \nand the presumption of its authenticity. Such a scheme can also be used later to verify \nauthenticity when questioned. Records forms are specifications of the documentary forms for \nthe various types of records generated in the record-making system. Access privileges refer to \nthe authority to compile, edit, annotate, read, retrieve, transfer and\/or destroy records in the \nrecord-making syst"} {"text":"em, granted to officers and employees by the records creator on the basis of \nposition duties and business needs. Access privileges control access to the record-making \nsystem and are established in the course of integrating business and documentary procedures \nthrough connecting specific classes of records to the office of primary responsibility for a \nbusiness function or activity. The establishment and implementation of access privileges is the \nmost important step towards ensuring that the reliability o"} {"text":"f records can be presumed. Record-\nmaking technological requirements include the hardware and software specifications for the \nrecord-making system that have a direct impact on the documentary form of records. \n(C6) A trusted recordkeeping system should be used to maintain records that can \nbe presumed accurate and authentic. (P11, P12) \nA trusted recordkeeping system consists of a set of rules governing the keeping of records \nand a set of tools and mechanisms used to implement these rules. Every recordke"} {"text":"eping system \nshould include in its design a recordkeeping metadata scheme, a classification scheme, a \nretention schedule, a registration system, a recordkeeping retrieval system, recordkeeping \ntechnological requirements, recordkeeping access privileges and procedures for maintaining \naccurate and authentic records. \nA recordkeeping metadata scheme is the list of all necessary metadata to be attached to \neach record to ensure its continuing identity and integrity in the recordkeeping system. A \nclassific"} {"text":"ation scheme is a plan for the systematic identification and arrangement of business \nactivities and related records into categories according to logically structured conventions, \nmethods and procedural rules. A retention schedule is a document specifying and authorizing \nthe disposition of aggregations of records as identified in the classification scheme. A \nregistration system is a method for assigning a unique identifier to each created record, linked to \nits identity and integrity metadata. Recordkeep"} {"text":"ing access privileges refer to the authority to \nclassify, annotate, read, retrieve, transfer and\/or destroy records in the recordkeeping system, \ngranted to officers and employees by the records creator based on position duties and business \nneeds. Typically, access to records for purposes of classification, transfer and destruction is \ngiven only to the trusted records officer of the organization. A recordkeeping retrieval system is \na set of rules governing the searching and finding of records and\/or inf"} {"text":"ormation about records in \na recordkeeping system and the tools and mechanisms used to implement these rules. \nRecordkeeping technological requirements include the hardware and software specifications for \nthe recordkeeping system. The procedures for maintaining accurate and authentic records are \nthe procedures designed to ensure that the data in the records and the identity and integrity of \nthe records in the recordkeeping system are protected from accidental or malicious corruption or \nloss. \nTo improve"} {"text":" efficiency and reduce the potential for human-induced error, the record-making \nand recordkeeping systems should be designed to automate, as much as possible, the creation \nof the identity and integrity metadata both at the point of records creation or modification (e.g., \nwhen migrated to a new system or file format), and whenever the aggregations to which the \nInterPARES 2 Project, Policy Cross-domain \n \nPage 8 of 8 \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 P"} {"text":"roject, Policy Cross-domain \n \nPage 9 of 9 \nrecords belong are created or modified\u2014every record unit should automatically inherit the \nmetadata of the higher level in the classification at the point of creation as well as whenever \nthere are updates to the metadata of the higher level. \nA records creator should indicate in its records management policy that it is the trusted \nrecords officer\u2019s responsibility to manage the recordkeeping system. The role of the trusted \nrecords officer is analogous to that of"} {"text":" a trusted custodian; thus, the trusted records officer \nshould have the qualifications for a trusted custodian as stated in principle C8. \nA recordkeeping system that complies with the above requirements and procedures in its \ndesign and management is capable of ensuring the accuracy and authenticity of records after \ntheir creation, since these requirements and procedures establish the maximum degree of \ncontrol with regard to the maintenance and use of the records. \n(C7) Preservation considerations sho"} {"text":"uld be embedded in all activities involved in \nrecord creation and maintenance if a creator wishes to maintain and preserve \naccurate and authentic records beyond its operational business needs. (P7) \nThe concept of the records lifecycle in archival science refers to the theory that records go \nthrough distinct phases, including creation, use and maintenance and disposition (i.e., \ndestruction or permanent preservation). \nIt is essential for records creators dealing with records in digital form to understan"} {"text":"d that, \ndifferently from what is the case with traditional records, preservation is a continuous process \nthat begins with the creation of the records. Traditionally, records are appraised for preservation \nat the disposition stage, when they are no longer needed for business purposes. With digital \nrecords, decisions regarding preservation must be made as close as possible to the creation \nstage because of the ease with which they can be manipulated and deleted or lost to \ntechnological obsolescence. \nTh"} {"text":"e notion that records preservation starts at the creation stage requires that preservation \nconsiderations be incorporated and manifested in the design of record-making and \nrecordkeeping systems. Each aggregation of records appraised for preservation should be \nidentified in accordance with the classification scheme and records retention schedule \nestablished by the records creator, and this identification should be indicated among the records \nmetadata. The aggregations of records so identified should be "} {"text":"monitored throughout their \nlifecycle so that appraisal decisions and preservation considerations can be updated and\/or \nmodified to accommodate any possible change occurring after they are first made. To monitor \nand implement appraisal decisions and preservation considerations, the designated preserver \nshould be given access to the organization\u2019s recordkeeping system. Policies and procedures \nshould be established to facilitate constant interaction between the records creator and its \ndesignated preserve"} {"text":"r. \n(C8) A trusted custodian should be designated as the preserver of the creator\u2019s \nrecords. (P1) \nThe designated records preserver is the entity responsible for taking physical and legal \ncustody of and preserving20 (i.e., protecting and ensuring continuous access to) a creator\u2019s \ninactive records.21 Be it an outside organization or an in-house unit, the role of the designated \n \n20 The term \u201cpreservation\u201d is defined as \u201cThe whole of the principles, policie"} {"text":"s, and strategies that controls the activities designed to \nensure materials\u2019 (data, documents, or records) physical and technological stabilization and protection of intellectual content\u201d \n(InterPARES 2 Terminology Database, op. cit.). \n21 An inactive record is defined as \u201cA record that is no longer needed by the creator for day-to-day activity, but that may be \npreserved and occasionally used for legal, historical or operational purposes\u201d (Ibid.). \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suder"} {"text":"man and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 10 of 10 \npreserver should be that of a trusted custodian for a creator\u2019s records. To be considered as a \ntrusted custodian, the preserver must: \n\u2022 \nact as a neutral third party; that is, demonstrate that it has no stake in the content of the \nrecords and no reason to alter records under its custody and that it will not allow \nanybody to alter the records either accidentally or on purpose; \n\u2022 \nbe equipped with the knowledge and skills neces"} {"text":"sary to fulfil its responsibilities, which \nshould be acquired through formal education in records and archives administration; and \n\u2022 \nestablish a trusted preservation system that is capable of ensuring that accurate and \nauthentic copies of the creator\u2019s records are acquired and preserved. \nFor as long as the records are maintained by the creator in its recordkeeping system, they \nare active or semi-active records,22 although under the responsibility of a trusted records officer. \nA records custodian tru"} {"text":"sted by the records creator as its designated preserver should maintain \nrecords that have been removed from the recordkeeping system for long-term or indefinite \npreservation. This trusted custodian will establish and maintain a preservation system to receive \nand preserve the creator\u2019s digital records. This involves ensuring that the accuracy and \nauthenticity of the records received from the creator are assessed and maintained. Within the \ncontext of the preservation system, the designated preserver iden"} {"text":"tifies appropriate preservation \nstrategies and procedures, drawing on expertise from various disciplines, including archival \nscience, computer science and law. The preservation procedures are implemented within the \npreservation system. \nOnly preservers that satisfy the requirements for trusted custodian are capable of fulfilling \ntheir duties of preserving authentic records over time and enabling a presumption of authenticity \nof the authentic copies they make for preservation purposes. \n(C9) All busin"} {"text":"ess processes that contribute to the creation and\/or use of the same \nrecords should be explicitly documented. (P10) \nRecords created in the course of carrying out one business function or one business \nprocess are often also used in the course of conducting other business functions or processes. \nIn cases like this, records used in separate activities may be associated only with one activity in \nthe records creator\u2019s record-making or recordkeeping system, or with none in some central \n\u201cinformation\u201d system "} {"text":"or application. This practice creates difficulties for the records creator in \nidentifying aggregations of records for accountability purposes and for its designated preserver \nin conducting appraisal and preservation activities. \nIt is recommended that policies and procedures be established that require detailed \ndocumentation of all business functions and processes contributing to the creation and use of \nthe same records in any records creator\u2019s application or system and an explicit linkage between \neac"} {"text":"h record and the related workflow. Procedural manuals with such descriptions are effective \nin increasing the awareness of the impact of record-making and recordkeeping on the \nmanagement of an organization. A subsequent different use of records after their creation can \nbe captured by metadata, which are also capable of tracing the contexts in which records are \ngenerated. \n \n22 An active record is defined as \u201cA record needed by the creator for the purpose o"} {"text":"f carrying out the actions for which it was created \nor for frequent reference\u201d (Ibid). A semi-active record is defined as \u201cA record that is no longer needed for the purpose of carrying out \nthe actions for which it was created, but which is needed by the records creator for infrequent reference\u201d (Ibid.). \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \n(C10) Third-party intellectual property rights attached to the creator\u2019s records \nshould be explicitly identified and managed in t"} {"text":"he record-making and \nrecordkeeping systems. (P8) \nEvery records creator is usually aware that the records that it creates, or which are under its \ncontrol or custody, contain information covered by intellectual property legislation. However, \ncreators should also be aware that in some cases the intellectual property rights linked to a \nrecord may belong to a party other than the author and addressee. \nAll intellectual property rights attached to a record need to be documented in the metadata \naccompanying"} {"text":" such record at the time that it is made or received and set aside. Intellectual \nproperty issues can significantly influence the reproduction of records, which is central to the \nprocesses of refreshing, converting and migrating records for either continuous use or \npreservation purposes. Subject to variations among different legislative environments, \nreproductions of records with intellectual property rights held by third parties may violate \nlegislation that protects such rights. These issues must be id"} {"text":"entified and addressed at the stage \nof designing the record-making and recordkeeping systems. In the case of records identified for \nlong-term preservation, long-term clearance of such rights should be addressed explicitly in the \ncreator\u2019s record policy. \n(C11) Privacy rights and obligations attached to the creator\u2019s records should be \nexplicitly identified and protected in the record-making and recordkeeping \nsystems. (P9) \nPrivacy legislation protects the rights of individuals with reference to personal"} {"text":" data that may \nbe part of any record used and maintained by a records creator with whom they have interacted. \nThe limits of privacy depend on the legislative framework in which the records creator operates. \nThe framework may be in conflict with the access policy linked to the mandate of the records \ncreator and even with the access to information legislation in the same jurisdiction. \nThe presence of personal information within the records should be identified and \ndocumented within the metadata schema "} {"text":"linked to the records in the record-making and \nrecordkeeping systems of the creator. Metadata schemas that note and administer the use of \npersonal information contained within the records must be embedded in record-making and \nrecordkeeping systems. This will enable the protection of personal information through the \nestablishment of system-wide access privileges. In cases where records are to be preserved \nindefinitely, privacy issues relating to access to records must be expressly resolved (i.e., explic"} {"text":"it \npermissions must be sought from the individuals concerned), ideally prior to record creation. \nThis is the best way to ensure that the records are managed in accordance with privacy \nlegislation and that the preserver will be able to effectively include the privacy issues relevant to \nthe records in the preservation feasibility study during appraisal. The designated preserver for \neach records creator should, as a trusted custodian, be granted access to records containing \npersonal information to perfor"} {"text":"m preservation activities. Processing of personal information for \nmaintenance or preservation purposes is different from the use of it for research or business \npurposes. Regardless of the legislative framework, the records creator should be able to \ndemonstrate that processing of records containing personal information does not put such \ninformation at risk of unauthorized access. \nResponsibility for processing records containing personal data for maintenance and \npreservation purposes must reside with th"} {"text":"e records creator and its legitimate successors. \nAlthough the practice of outsourcing these functions to specialized commercial operators is \nauthorized and regulated under most existing privacy legislation, the practice should still be \navoided whenever possible to minimize the number of individuals authorized to access and\/or \nprocess the records, thus reducing the risk of unauthorized disclosure of personal information in \nInterPARES 2 Project, Policy Cross-domain \n \nPage 11 of 11 \nPolicy Framework, v1."} {"text":"2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nthe records and of jeopardizing the ability to obtain permission to process personal information \nfor maintenance or preservation purposes. \nIn the case of records that are not yet designated for permanent preservation, appraisal \ndecisions should be taken before the initial mandate for processing personal information has \nexpired to ensure that the legal basis for retaining such records is still in force. \n(C12) Procedures for sharing records across diff"} {"text":"erent jurisdictions should be \nestablished on the basis of the legal requirements under which the records are \ncreated. (P13) \nRecords creators with branches in geographically separate areas (i.e., areas that are \ncovered by different legislation), must be aware that different access, privacy and intellectual \nproperty laws may have an impact on their records-sharing activities. Such sharing activities \nencompass records exchange within the records creator or with outside organizations, such as \ngovernments"} {"text":" or business partners. This includes providing records to a trusted preserver, where \nthe latter operates in a legal environment different from that of the records creator. \nThe fact that records are freely accessible in one jurisdiction does not imply that they can be \naccessed in the same way in other jurisdictions. Records creators must investigate such issues \nand address them in their policies. \n(C13) Reproductions of a record made by the creator in its usual and ordinary \ncourse of business and for i"} {"text":"ts purposes and use, as part of its recordkeeping \nactivities, have the same effects as the first manifestation, and each is to be \nconsidered at any given time the record of the creator. (P3) \nIn the digital environment, the first manifestation of a record, be it a draft, an original or a \ncopy, only exists when first composed in the creator\u2019s record-making system, if it is an internal \nrecord, or when first received in the creator\u2019s recordkeeping system, if it is transmitted from the \noutside. When the re"} {"text":"cord is closed and saved into the record-making or recordkeeping system, \nits first manifestation technically disappears, as the saving action decomposes it into its digital \ncomponents. Any later manifestation of the digital record is a reproduction resulting from an \nassembly of its digital components. Conceptually, however, records creators can use any \nreproduction of a record\u2019s first manifestation as if it were the record\u2019s first manifestation, as long \nas the reproduction is made in the usual and ordi"} {"text":"nary course of carrying out business activities \nand used for such activities. This means that each reproduction in sequence should have the \nsame admissibility in court as the record\u2019s first manifestation and be given the same weight. \nTo establish that a record is reproduced in the usual and ordinary course of business, it is \nnecessary to set out routine procedures in writing. In effect, if reliable records have been \ngenerated in a trusted record-making system and their accuracy and authenticity have be"} {"text":"en \nmaintained together with that of the received records in the creator\u2019s recordkeeping system, \nthen all records should have the same authority and effects as their first manifestation. \nAlthough, according to the theory of the record (i.e., diplomatics), an \u201coriginal\u201d record in a \ndigital system is the first manifestation of a received record and, if after closing such \nmanifestation the original no longer exists, it might be useful to look at three examples of \nstatutory laws pertaining to the meaning o"} {"text":"f \u201coriginal.\u201d Common to all three variations is the \nprinciple that it is the relationship of a record to the business of the creator that determines \nwhether the record in question has the authority and effects of an original. \nInterPARES 2 Project, Policy Cross-domain \n \nPage 12 of 12 \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 13 of 13 \nExample 1: The U.S. Federal Rules of Evidence distinguishes between originals and \nduplic"} {"text":"ates, with greater value as evidence given to originals. For digital records, it is \nnoteworthy that if \u201cdata are stored in a computer or similar device, any printout or \nother output readable by sight, shown to reflect the data accurately, is an \u2018original.\u2019\u201d23 \nExample 2: The quality of being original is acknowledged in Italian legislation in \nterms of adding weight or greater trustworthiness to records. Italian legislation \nemphasizes the difference between digital data (original) and any kind of output "} {"text":"of \nthose data (copy), by establishing that \u201cany data or document electronically created \nby any public administration represents a primary and original source of information \nthat may be used to make copies on any kind of medium for all legal purposes.\u201d24 \nExample 3: The Electronic Signatures Law of the People\u2019s Republic of China regards \na digital record as an original if it meets the two following qualifications: it must be 1) \ncapable of presenting the content effectively and of being retrieved and con"} {"text":"sulted at \nany moment, and 2) capable of unfailingly showing the integrity of the content from \nthe moment of its completion. However, annotations made to a data electronic \ndocument [digital record] and changes of presentation occurring in the process of \ndata exchanging, storing and displaying are not considered to affect its integrity.25 \nPrinciples for Records Preservers \n(P1) A designated records preserver fulfils the role of trusted custodian. (C8) \nThe designated records preserver is the entity respo"} {"text":"nsible for taking physical and legal \ncustody of and preserving (i.e., protecting and ensuring continuous access to) a creator\u2019s \ninactive records. Be it an outside organization or an in-house unit, the role of the designated \npreserver should be that of a trusted custodian for a creator\u2019s records. To be considered as a \ntrusted custodian, the preserver must: \n\u2022 \nact as a neutral third party; that is, demonstrate that it has no stake in the content of the records \nand no reason to alter records under its cu"} {"text":"stody and that it will not allow anybody to alter the \nrecords either accidentally or on purpose; \n\u2022 \nbe equipped with the knowledge and skills necessary to fulfil its responsibilities, which should be \nacquired through formal education in records and archives administration; and \n\u2022 \nestablish a trusted preservation system that is capable of ensuring that accurate and authentic \ncopies of the creator\u2019s records are acquired and preserved. \nThe acquisition of a creator\u2019s records is undertaken by the preserv"} {"text":"er, who, after having \nassessed the accuracy and authenticity of the records, produces an authentic copy of them from \nthe creator\u2019s recordkeeping system. Records that are acquired this way are authentic copies of \nthe records of the creator identified for long-term preservation, because they are made by the \ndesignated preserver in its role of trusted custodian. \nThe authentic copies of the creator\u2019s records are then kept by the trusted custodian in a \ntrusted preservation system, which should include in "} {"text":"its design a description and a retrieval \nsystem. This trusted preservation system must also have in place rules and procedures for the \n \n23 United States House of Representatives, Federal Rules of Evidence, Article X. Contents of Writings, Recordings, and \nPhotographs: Rule 1001. Definitions, Committee on the Judiciary, Committee Print No. 8 (December 31, 2004). Available at \nhttp:\/\/judiciary.house.gov\/media\/pdfs\/printers\/108th\/evid2004.pdf. The same rule ge"} {"text":"neralizes that \u201cany counterpart\u201d to the writing or \nrecording \u201cintended to have the same effect by a person executing or issuing it\u201d is an original. \n24 Italy, DPR 445\/2000, art. 9, par. 1. Available at http:\/\/www.parlamento.it\/parlam\/leggi\/deleghe\/00443dla.htm. \n25 China. Electronic Signatures Law of the People\u2019s Republic of China, art. 5. Translated by Sherry Xie. See also Sherry Xie (2005). \n\u201cInterPARES 2 Project \u2013 Policy Cross-domain: Supplements to the Study of Archival Legislation in China (Report I),"} {"text":"\u201d 3. Available at \nhttp:\/\/www.interpares.org\/display_file.cfm?doc=ip2(policy)archival_legislation_CHINA_SUPPLEMENT.pdf. \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 14 of 14 \nongoing production of authentic copies as the existing system becomes obsolete and the \ntechnology is upgraded. This requirement is consistent with the final recommendations of \nInterPARES 1, which developed the Baseline Requirements Supporting the Producti"} {"text":"on of \nAuthentic Copies of Electronic Records,26 a set of requirements to be implemented by the \npreserver. It should be noted that the simple fact of reproducing records in the preserver\u2019s \npreservation system does not make the results authentic copies; such designation must be \nprovided by the preserver\u2019s authority. \nA sustainable preservation strategy requires close collaboration between a records creator \nand its designated preserver as trusted custodian. It is the preserver\u2019s responsibility to take the"} {"text":" \ninitiative in collaborating with the creator to establish acquisition and preservation procedures \nand in advising the creator in any records management activities essential to the preserver\u2019s \nacquisition and preservation activities. \n(P2) Records preservation policies, strategies and standards should address the \nissues of record accuracy and authenticity expressly and separately. (C4) \nAn accurate record is one that contains correct, precise and exact data. The accuracy of a \nrecord is assumed when the"} {"text":" record is created and used in the course of business processes to \ncarry out business functions, based on the assumption that inaccurate records harm business \ninterests. However, when records are transmitted across systems, refreshed, converted or \nmigrated for preservation purposes, or the technology in which the record resides is upgraded, \nthe data contained in the record must be verified to ensure their accuracy was not harmed by \ntechnical or human errors occurring in the transmission or transformati"} {"text":"on processes. This \nverification of accuracy is the responsibility of the preserver who carries out the transmission or \ntransformation process; however, such person is not responsible for the correctness of the data \nvalue, for which the creator remains accountable, just as is the case for the reliability of the \nrecords containing the data. \nThe concept of authenticity refers to the fact that a record is what it purports to be and has \nnot been tampered with or otherwise corrupted. In other words, authen"} {"text":"ticity is the \ntrustworthiness of a record as a record. A record is authentic if it can be demonstrated that it is \nas it was when created. An authentic record is as reliable and accurate as it was when first \ngenerated. Authenticity depends upon the record transmission and the manner of its \npreservation and custody. Thus, it is a responsibility of both the records creator and its \nlegitimate successor (i.e., either the person or organization acquiring the function(s) from which \nthe records in question re"} {"text":"sult and the records themselves, or a designated records preserver). \nAuthenticity is protected and is verifiable by ensuring that the identity and the integrity of a \nrecord are maintained. The identity of a record is what distinguishes it from all other records. It \nis declared at the moment of creation by indicating at a minimum the following attributes: the \nnames of the persons participating in the creation of the record (e.g., author, addressee); the \naction or matter to which the record pertains; the"} {"text":" date(s) of compilation, filing or transmission; \nthe record\u2019s documentary form; the record\u2019s digital presentation (or format); the relationship of \nthe record to other records through a classification code or a naming convention; and the \nexistence of attachments. The record identity so declared must be maintained intact through \ntime first by the creator and its trusted records officer while the record is in active or semi-active \nuse, and subsequently by the designated records preserver when the record i"} {"text":"s designated as \ninactive. The integrity of a record is its wholeness and soundness and can only be inferred from \ncircumstantial evidence related to the person who held responsibility for the record through time, \nfrom access privileges and access restrictions and from the indication of any annotation or \nmodification (technical or otherwise) that such person(s) with access to record might have made \n \n26 See MacNeil et al., \u201cAuthenticity Task Force Report,\u201d "} {"text":"op. cit., and, more specifically, Authenticity Task Force, \u201cAppendix 2.\u201d \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 15 of 15 \nto it. Thus, the establishment and maintenance of record integrity are supported by declaring the \nfollowing record attributes: the names of the handling office(s), the office of primary \nresponsibility27 for the record over time and\/or the recordkeeping office and the designated \npreserver; the access "} {"text":"privileges code28 and the access restriction code;29 and the list of \nannotations30 and of format changes.31 \nAuthenticity is not a quality that can be bestowed on records after their creation and \nmaintenance by any preservation process. A preserver can only protect and maintain what was \ntransferred under its responsibility. Authenticity is protected and maintained through the \nadoption of methods that ensure that the record is not manipulated, altered, or otherwise \nfalsified after its transfer. It is t"} {"text":"he preserver\u2019s responsibility to assess the authenticity of records \nconsidered for acquisition into a preservation system and to ensure that it remains intact after \nthe transfer to such system by respecting within the preserving unit or organization the same \nBenchmark Requirements that bind the creator (e.g., access privileges, measure against \ncorruption or loss) and the Baseline Requirements for preservers. \n(P3) Reproductions of a creator\u2019s records made for purposes of preservation by \ntheir trusted "} {"text":"custodian are to be considered authentic copies of the creator\u2019s \nrecords. (C13) \nReproductions of digital records in the creator\u2019s record-making and recordkeeping systems \nmade in the usual and ordinary course of activity for either action or reference purposes can be \nconsidered to have the same authority and effects as the first manifestation of the same \nrecords. Reproductions of a creator\u2019s records for preservation purposes rather than in response \nto a creator\u2019s business need are considered authentic "} {"text":"copies of the records of the creator, \nbecause they are never used in their present manifestation for action or reference by the creator \nitself. The creator\u2019s records and their authentic preservation copies are the same records but at \ndifferent phases in their lifecycle and thus at a different status of transmission.32 The former are \nused by their creator to achieve business goals, while the latter are made by the preservers for \npreservation purposes. \nCopies of records in the preserver\u2019s preservation "} {"text":"system may not be designated authentic if \nthe preserver has made them for purposes other than preservation; for example, a copy from \nwhich personal identifiers are removed may be made for access purposes. Ultimately, only the \npreserver has the authority to designate a copy as authentic. \n(P4) Records preservation procedures should ensure that the digital components \nof records can be separately preserved and reassembled over time. (C2) \nEvery digital record is composed of one or more digital components. "} {"text":"A digital component is \na digital object that is part of one or more digital records, including any metadata necessary to \norder, structure or manifest content and that requires a given preservation action. For example, \nan e-mail that includes a picture and a digital signature will have at least four digital components \n \n27 Office of primary responsibility is defined as \u201cThe office given the formal competence for maintaining the authoritative version or \ncop"} {"text":"y of records belonging to a given class within a classification scheme\u201d (InterPARES 2 Terminology Database, op. cit.). \n28 Access privileges code is defined as \u201cThe indication of the person, position or office authorized to annotate a record, delete it, or \nremove it from the system\u201d (Ibid.). \n29 Access restriction code is defined as \u201cThe indication of the person, position or office authorized to read a record\u201d (Ibid.). \n30 List of annotations is defined as \u201cRecorded information about additions made to a re"} {"text":"cord after it has been created\u201d (Ibid.). \n31 List of format changes is defined as \u201cRecorded Information about modifications to a record\u2019s documentary form or digital format \nafter it has been created\u201d (Ibid.). \n32 In diplomatics, the status of transmission is the degree of perfection of record. There are three possible statuses of transmission: \ndraft, original and copy. Copies are than further categorized according to their authority, and the most authoritative among the \ncopies is the authentic copy; that"} {"text":" is, a reproduction that is declared conforming to the reproduced entity by an officer having the \nauthority to do so. Professional archivists are among such officers. \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 16 of 16 \n(the header, the text, the picture and the digital signature). Reports with attachments in different \nformats will consist of more than one digital component, whereas a report with its attachments \nsaved in on"} {"text":"e PDF file will consist of only one digital component. Although digital components \nare each stored separately, each digital component exists in a specific relationship to the other \ndigital components that make up the record. \nPreservation of digital records requires that all the digital components of a record be \nconsistently identified, linked and stored in a way that they can be retrieved and reconstituted \ninto a record having the same presentation it manifested when last closed. Each digital \ncomponen"} {"text":"t requires one or more specific methods for decoding the bitstream and for presenting \nit for use over time. The bitstream can be altered, as a result of conversion, for example, as long \nas it continues to be able to fulfil its original role in the reproduction of the record. All digital \ncomponents must be able to work together after they are altered; therefore, all changes need to \nbe assessed by the preserver for the effects they may have on the record. \nThe preserver must be prepared to advise the cre"} {"text":"ator, directly or through development of \nrecommended standards, on the types of digital components that the preserver\u2019s system is able \nto sustain. Where standards governing the types and formats of digital components are \ncommon to both the record-making and recordkeeping systems and the record preservation \nsystem, the preserver can directly influence the creator towards those standards that will \nfacilitate meeting the preservation requirements. Where no common standards exist or can \nreasonably be adop"} {"text":"ted, the preserver must understand the degree of interoperability of certain \ntypes and formats of digital components. This understanding will provide a basis for the \npreserver to assess the capability of the preservation system to preserve the digital components \nand their relationships as they emerge from the creator\u2019s record-making and recordkeeping \nsystems. \nHighly interoperable formats\u2014that is, formats that are not tied to specific applications or \nversions of applications\u2014are generally seen to prov"} {"text":"ide a better basis for preservation work. It is \nimportant, however, not to focus exclusively on the interoperability of formats at the expense of \nthe relationships between them that also must be preserved. For example, an HTML-based \nWeb page may be comprised of digital components that are highly interoperable, but the version \nof HTML coding used to structure the components may be an old version with many deprecated \nterms (i.e., terms that are not recognized by current software browsers that may be used"} {"text":" to \nreproduce the Web page). \n(P5) Authentic copies should be made for preservation purposes only from the \ncreator\u2019s records; that is, from digital objects that have a stable content and a \nfixed documentary form. (C1) \nA record is defined by InterPARES, following the traditional archival definition, as \u201ca \ndocument made or received in the course of a practical activity as an instrument or a by-product \nof such activity and set aside for action or reference.\u201d33 This definition implies that, to be \nconsid"} {"text":"ered as a record, a digital object generated by the creator must first be a document; that \nis, must have stable content and fixed documentary form. Only digital objects possessing both \nare capable of serving the record\u2019s memorial function. \nThe concept of stable content is self-explanatory, as it simply refers to the fact that the data \nand the information in the record (i.e., the message the record is intended to convey) are \nunchanged and unchangeable. This implies that data or information cannot be ov"} {"text":"erwritten, \naltered, deleted or added to. Thus, if one has a system that contains fluid, ever-changing data or \ninformation, one has no records in such a system until one decides to make one and to save it \nwith its unalterable content. \n \n33 See the InterPARES 2 Terminology Database, op. cit. \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 17 of 17 \nThe concept of fixed form is mor"} {"text":"e complex. A digital object has a fixed form when its binary \ncontent is stored so that the message it conveys can be rendered with the same documentary \npresentation it had on the screen when first saved. Because the same documentary \npresentation of a record can be produced by a variety of digital presentations, fixed form does \nnot imply that the bitstreams must remain intact over time. It is possible to change the way a \nrecord is contained in a computer file without changing the record; for example, if"} {"text":" a digital object \ngenerated in \u2018.doc\u2019 format is later saved in \u2018.pdf\u2019 format, the way it manifests itself on the \nscreen\u2014its documentary presentation, or \u201cdocumentary form\u201d\u2014has not changed, so one can \nsay that the object has a fixed form. \nOne can also produce digital information that can take several different documentary forms. \nThis means that the same content can be presented on the screen in several different ways, the \nvarious types of graphs available in spreadsheet software being one example. In "} {"text":"this case, each \npresentation of such a digital object in the limited series of possibilities allowed by the system is \nto be considered as a different view of the same record having stable content and fixed form. \nIn addition, one has to consider the concept of \u201cbounded variability,\u201d34 which refers to \nchanges to the form and\/or content of a digital record that are limited and controlled by fixed \nrules, so that the same query, request or interaction always generates the same result. In such \ncases, variat"} {"text":"ions in the record\u2019s form and content are either caused by technology, such as \ndifferent operating systems or applications used to access the document, or by the intention of \nthe author or writer of the document. Where content is concerned, while, as mentioned, the \nsame query will always return the same subset, its presentation might vary within an allowed \nrange, such as image magnification. In consideration of the fact that what causes these \nvariations also limits them, they are not considered to be v"} {"text":"iolations of the requirements of stable \ncontent and fixed form. \nBased on this understanding, any preservation policy should clearly state that reproductions \nof authentic copies for preservation purposes can only be made from the creator\u2019s records, as \nidentified by the creator.35 \nThe preserver should know (or help establish) the creator\u2019s criteria for identifying the digital \nobjects that are maintained as records and the methods employed to stabilize their content and \nfix their form. This is consiste"} {"text":"nt with the preserver\u2019s responsibility to advise the creator on its \nrecord creation processes and technologies. This advising activity will also provide the \npreserver with the critical information needed to understand the business activities and \nprocesses that caused the records to come into being and with the ability to assess their \ncontinuing identity and integrity. \n(P6) Preservation requirements should be articulated in terms of the purpose or \ndesired outcome of preservation, rather than in terms "} {"text":"of the specific technologies \navailable. (C3) \nDigital records rely, by definition, on computer technology, and any instance of a record \nexists within a specific technological environment. For this reason, it may seem useful to \nestablish record preservation requirements in terms of the technological characteristics of the \nrecords or the technological applications in which the records may reside. However, not only do \ntechnologies change, sometimes very frequently, but they also are governed by proprietar"} {"text":"y \nconsiderations established and modified at will by their developers. Both these factors can \nsignificantly affect the continued accessibility of digital records over time. For these reasons, \nreferences to specific technologies should not be included in preservation policies and \nstandards. Only the requirements and obligations that the records are designed to support \n \n34 See Duranti and Thibodeau, \u201cThe Concept of Record,\u201d op. cit. \n35 See principle C1 in"} {"text":" the Principles for Creators regarding the identification of records. \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nshould be explicit within record preservation policies and standards. It is only at the level of \nimplementation that specific technologies should, indeed must, be named. \nTechnological solutions to record preservation issues are dynamic, meaning that they will \nevolve as the technology evolves. This affects record preservation in two ways. First, it makes it \npos"} {"text":"sible to adopt new strategies to meet preservation needs, as happened with the use of XML \nto support the long-term preservation of structured records. Second, it creates opportunities for \ndrawing on expertise from a number of disciplines. These two issues are interconnected. Thus, \nfor example, while utilization of XML is, by itself, only one activity for preservation, it might be \nmatched with using data grid technology as a stable and enduring platform to support XML-\nbased records. By experimenting wit"} {"text":"h these combinations, new archival knowledge will continue \nto be both acquired and required. \nTechnological solutions also need to be specific to be effective. Although the general theory \nand methodology of digital preservation applies to all digital records, the preservation solutions \nfor different types of records require different methods. These should be based on the specific \ncontext in which the records are created and maintained, the functions and activities to which \nthe records are linked and t"} {"text":"he technologies employed for record-making and recordkeeping to \nensure the best solutions are designed for preserving each type of record. \nPreservation policies that are expressed in terms of record requirements rather than \ntechnologies will be more stable, needing updates only if the record requirements change, \nrather than as the technology changes. Preservation action plans will likely need to be updated \nmore frequently to identify appropriate technological solutions for the digital preservation of "} {"text":"\nspecific aggregations of records. The identified solutions must be monitored with regard to the \npossible need for modifying and updating. \n(P7) Preservation considerations should be embedded in all activities involved in \neach phase of the records lifecycle if their continuing authentic existence over \nthe long term is to be ensured. (C7) \nThe concept of the records lifecycle in archival science refers to the theory that records go \nthrough distinct phases, including creation, use and maintenance and dis"} {"text":"position (destruction or \npermanent preservation). \nIt is essential for preservers who acquire digital records to understand that, differently from \nwhat is the case with traditional records, preservation is a continuous process that begins with \nthe creation of the records. Analogue records are appraised for preservation at the disposition \nstage, when they are no longer needed by the creator for business purposes. With digital \nrecords, decisions relevant to preservation must be made as close as possible "} {"text":"to the creation \nstage because of the ease and the speed with which digital objects can be manipulated, deleted \nby accident or on purpose, or lost to technological obsolescence. \nThe notion that records preservation starts at the creation stage requires that preservation \nconsiderations be incorporated and manifested in the design of record-making and \nrecordkeeping systems. Each aggregation of records appraised for preservation should be \nidentified in accordance with the classification scheme and the re"} {"text":"cords retention schedule \nestablished by the records creator in collaboration with the preserver, and this identification \nshould be indicated in the records metadata. The records so identified should be monitored \nthroughout their lifecycle by the preserver, so that appraisal decisions and preservation \nconsiderations can be updated to accommodate any possible changes occurring after they are \nfirst made. Appraisal decisions need to be reviewed to ensure that the information about the \nappraised records is"} {"text":" still valid, that changes to the records and their context have not adversely \naffected their identity or integrity and that the details of the process of carrying out disposition \nare still workable and applicable to the records. To monitor and implement appraisal decisions \nand preservation considerations, the designated preserver should obtain continuing access to \nInterPARES 2 Project, Policy Cross-domain \n \nPage 18 of 18 \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nthe re"} {"text":"cords creator\u2019s recordkeeping system within limits agreed upon with the creator and \nreflected in the preserver\u2019s access privileges. The preserver should establish procedures to \nfacilitate constant interaction with the records creator. \n(P8) Third-party intellectual property rights attached to the creator\u2019s records \nshould be explicitly identified and managed in the preservation system. (C10) \nPreservers know that records under records creators\u2019 control usually contain information \ncovered by intellectual"} {"text":" property legislation. They should also be aware that, in some cases, the \nintellectual property rights attached to records belong to a party other than the author; that is, \nthe intellectual property rights reside with a third party. Third-party intellectual property rights \nshould be documented in the metadata accompanying such records because they influence the \nprocesses of refreshing, converting and migrating them for either continuous use or \npreservation purposes. Subject to variations in different l"} {"text":"egislative environments, reproductions \nof records with third-party intellectual property rights attached to them may violate legislation \nthat protects such rights. In the case of records identified for long-term preservation, long-term \nclearance of such rights should be addressed explicitly with the records creator. \nBecause preservation in a digital environment involves making copies, intellectual property \nrights have become an issue, not just for access as in the past, but for preservation. It is the"} {"text":" \npreserver\u2019s responsibility; first, to advise the creator on how to address intellectual property \nissues in its record-making and recordkeeping systems, and, second, to ensure that intellectual \nproperty issues are addressed in the design of the preservation system. In particular, any issues \nrelevant to third-party intellectual property rights should be cleared before the transfer of records \nto be preserved from the creator to the preserver. The latter must consider these issues as a \npart of the assess"} {"text":"ment of feasibility of preservation. \n(P9) Privacy rights and obligations attached to the creator\u2019s records should be \nexplicitly identified and protected in the preservation system. (C11) \nPrivacy legislation protects the rights of individuals with reference to personal data that may \nbe part of any record used and maintained by a records creator with whom they have interacted. \nThe limits of privacy depend on the legislative framework in which the records creator operates. \nIt may be in conflict with the "} {"text":"access policy linked to the mandate of the records creator and even \nwith the access to information legislation in the same jurisdiction. Besides lobbying for \nexceptions, the designated preserver should ensure that the consequences of the existing \nsituation for preservation and access are clearly understood. \nThe presence of personal information within the records should be identified and \ndocumented among the metadata linked to the records in the record-making and recordkeeping \nsystems of the creators. "} {"text":"This is the best way to ensure that the records are managed in \naccordance with privacy legislation and that the preserver will be able to effectively include the \nprivacy issues relevant to the records in the preservation feasibility study during appraisal. The \ndesignated preserver for each creator should, as a trusted custodian, obtain access to records \ncontaining personal information to perform preservation activities. Archival processing of \npersonal information for preservation purposes is different "} {"text":"from the use of it for research or \nbusiness purposes. Regardless of the legislative framework, the creator and the preserver \nshould be able to demonstrate that archival processing of records containing personal \ninformation does not put such information at risk of unauthorized access. \nPreservers should also insist that responsibility for processing records containing personal \ndata for preservation purposes must reside with the records creator and its legitimate \nsuccessors. Although the practice of outs"} {"text":"ourcing these preservation functions to specialized \ncommercial operators may be authorized and regulated under most existing privacy legislation, \nInterPARES 2 Project, Policy Cross-domain \n \nPage 19 of 19 \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, Policy Cross-domain \n \nPage 20 of 20 \nthe practice should still be avoided whenever possible to minimize the number of individuals \nauthorized to access and\/or process the records, thus reducing the risk of u"} {"text":"nauthorized \ndisclosure of personal information in the records and of jeopardizing the ability to obtain \npermission to process personal information for preservation purposes. \nIn the case of records that are not yet designated for permanent preservation, appraisal \ndecisions should be taken before the initial mandate for processing personal information has \nexpired to ensure that the legal basis for retaining such records is still in force. \n(P10) Archival appraisal should identify and analyze all the busi"} {"text":"ness processes \nthat contribute to the creation and\/or use of the same records. (C9) \nA record may be created for one purpose and then subsequently used for different purposes \nby different persons. Any appraisal decision should consider all uses of the record and be aware \nof the business processes behind them. This is necessary to make an informed decision about \nwhat to preserve as well as to be able to dispose effectively of all possible copies of the records \nthat have not been selected for preservatio"} {"text":"n. \nThe use of records or information within records by different business processes may be \ndesirable from the creator\u2019s standpoint in terms of providing a degree of interoperability among \nthe creator\u2019s information and record systems. In such situations, the preserver should advise the \ncreator that metadata attached to records used by many business processes must identify each \nrelevant business process. This is critical for the creator because it ensures the authenticity of \nthe records by establishing "} {"text":"their identity and integrity in each context. It is also critical for the \npreserver who must understand all contexts in which the records were used to effectively \nundertake appraisal and also to meet the baseline requirements for maintaining authenticity for \nany records acquired into the preservation system. \n(P11) Archival appraisal should assess the authenticity of the records. (C6) \nAppraisal decisions should be made by compiling information about kept records and their \ncontext(s), assessing their va"} {"text":"lue and determining the feasibility of their preservation.36 \nAs part of the assessment of value, preservers must establish the grounds for presuming \nthat the records being appraised are authentic. This means that preservers must ensure that \neach record identity has been documented and maintained as documented and must ascertain \nthe degree to which the records\u2019 creator has guaranteed their integrity by making sure that its \nrecords are intact and uncorrupted. The evidence supporting the presumption of au"} {"text":"thenticity \nmust be measured against the InterPARES Benchmark Requirements.37 \n(P12) Archival description should be used as a collective authentication of the \nrecords in an archival fonds. (C6) \nArchival description of a fonds emerges from the comprehensive analysis of the various \nrelationships interwoven in the course of the formation and accumulation of records and \ntherefore is the most reliable means of establishing the continued authenticity of a body of \ninterrelated records. While the authenticity "} {"text":"of individual records can be in part established \nthrough their metadata, the authenticity of aggregations of records (i.e., file, series or fonds), \ncan only be proved through archival description. \nIt has always been the function, either explicit or implicit, of archival description to \nauthenticate the records by perpetuating their administrative and documentary relationships; \n \n36 See Terry Eastwood et al., \u201cPart Two \u2013 Choosing to Preserve: The Selection"} {"text":" of Electronic Records: Appraisal Task Force Report,\u201d \nin The Long-term Preservation of Authentic Electronic Records: Findings of the InterPARES Project, Luciana Duranti, ed. (San \nMiniato, Italy: Archilab, 2005), 67\u201398. PDF version available at http:\/\/www.interpares.org\/book\/interpares_book_e_part2.pdf. \n37 See the already cited benchmark requirements in MacNeil et al., \u201cAppraisal Task Force Report,\u201d op. cit. \nPolicy Framework, v1.2 (March 2008) \nL. Duranti, J. Suderman and M. Todd \nInterPARES 2 Project, P"} {"text":"olicy Cross-domain \n \nPage 21 of 21 \nbut, with digital records, this function has moved to the forefront. In fact, as original digital \nrecords disappear and an interminable chain of non-identical reproductions follows them, the \nresearchers looking at the last of those reproductions will not find in it any information regarding \nprovenance, authority, context or authenticity. \nThe authentication function of archival description is different from that of a certificate of \nauthenticity, because it is not si"} {"text":"mply an attestation of the authenticity of individual records, but a \ncollective attestation of the authenticity of the records of a fonds and of all their \ninterrelationships as made explicit by their administrative, custodial and technological history \n(including a description of the recordkeeping system(s) within which they have been maintained \nand used), the scope and content and the hierarchical representation of the records aggregates. \nIt is also different both from the identity and integrity metada"} {"text":"ta attached to individual records, \nwhich are part of the record itself and are reproduced time after time with it and from the \nadditional metadata attached to records aggregations (e.g., file, series) within the recordkeeping \nsystem to identify them and document their technological transformations. \nThe unique function of archival description is to provide an historical view of the records and \nof their becoming, while presenting them as a universality in which each member\u2019s individuality \nis subject to"} {"text":" the bond of a common provenance and destination. \n(P13) Procedures for providing access to records created in one jurisdiction to \nusers in other jurisdictions should be established on the basis of the legal \nenvironment in which the records were created. (C13) \nDifferent jurisdictions may have different laws and regulations with regard to access rights in \nrelation to the protection of privacy, intellectual property and any other kind of public or private \ninterests (e.g., market sensitive records). Prese"} {"text":"rvers who are a unit of a records creator (e.g., \nin-house archival programs or archives) that has geographically separated branches falling \nunder different legislation must be aware of the impact of such diverse legal contexts on their \nrecords-sharing activities. This will affect access policies relevant to both internal and external \nsharing activities. \n \n"} {"text":" \n \n \nTop Threats Working Group \nThe Notorious Nine \nCloud Computing Top Threats in 2013 \nFebruary 2013 \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n2 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \nThe permanent and official location for Cloud Security Alliance Top Threats research is \nhttp:\/\/www.cloudsecurityalliance.org\/topthreats. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\u00a9 2013 Cloud Security Alliance \u2013 All Rights Reserved \nAll rights reserved. You may d"} {"text":"ownload, store, display on your computer, view, print, and link to The Notorious Nine: \nCloud Computing Threats in 2013 at http:\/\/www.cloudsecurityalliance.org\/topthreats\/, subject to the following: (a) the \nReport may be used solely for your personal, informational, non-commercial use; (b) the Report may not be modified or \naltered in any way; (c) the Report may not be redistributed; and (d) the trademark, copyright or other notices may not \nbe removed. You may quote portions of the Report as permitted b"} {"text":"y the Fair Use provisions of the United States \nCopyright Act, provided that you attribute the portions to The Notorious Nine: Cloud Computing Threats in 2013. \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n3 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \nContents \nAcknowledgments \n................................................................................................................................................................... 5 \nExecutive S"} {"text":"ummary \n................................................................................................................................................................. 6 \n1.0 Top Threat: Data Breaches \n................................................................................................................................................ 8 \n1.1 Implications \n.............................................................................................................................................."} {"text":"..................... 8 \n1.2 Controls ......................................................................................................................................................................... 8 \n1.3 Links .............................................................................................................................................................................. 8 \n2.0 Top Threat: Data Loss ......................................................................................."} {"text":"................................................................ 9 \n2.1 Implications \n................................................................................................................................................................... 9 \n2.2 Controls ......................................................................................................................................................................... 9 \n2.3 Links ..............................................................."} {"text":"............................................................................................................... 9 \n3.0 Top Threat: Account or Service Traffic Hijacking ............................................................................................................ 10 \n3.1 Implications \n................................................................................................................................................................. 10 \n3.2 Controls .................................."} {"text":"..................................................................................................................................... 10 \n3.3 Links ............................................................................................................................................................................ 10 \n4.0 Top Threat: Insecure Interfaces and APIs ....................................................................................................................... 12 \n4.1 Implications \n"} {"text":"................................................................................................................................................................. 12 \n4.2 Controls ....................................................................................................................................................................... 12 \n4.3 Links ......................................................................................................................................................."} {"text":"..................... 12 \n5.0 Top Threat: Denial of Service .......................................................................................................................................... 14 \n5.1 Implications \n................................................................................................................................................................. 14 \n5.2 Controls ................................................................................................................"} {"text":"....................................................... 14 \n5.3 Links ............................................................................................................................................................................ 14 \n6.0 Top Threat: Malicious Insiders ........................................................................................................................................ 16 \n6.1 Implications \n......................................................................."} {"text":".......................................................................................... 16 \n6.2 Controls ....................................................................................................................................................................... 16 \n6.3 Links ............................................................................................................................................................................ 17 \n7.0 Top Threat: Abuse of Cloud Services ....."} {"text":"......................................................................................................................... 18 \n7.1 Implications \n................................................................................................................................................................. 18 \n7.2 Controls ....................................................................................................................................................................... 18 \n7.3 Links ......."} {"text":"..................................................................................................................................................................... 18 \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n4 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n8.0 Top Threat: Insufficient Due Diligence \n............................................................................................................................ 19 \n8.1 Implications \n....."} {"text":"............................................................................................................................................................ 19 \n8.2 Controls ....................................................................................................................................................................... 19 \n8.3 Links ............................................................................................................................................................"} {"text":"................ 20 \n9.0 Top Threat: Shared Technology Vulnerabilities .............................................................................................................. 21 \n9.1 Implications \n................................................................................................................................................................. 21 \n9.2 Controls ................................................................................................................................."} {"text":"...................................... 21 \n9.3 Links ............................................................................................................................................................................ 21 \n \n \n \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n5 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \nAcknowledgments \nCo-Chairs \nRafal Los, HP \nDave Shackleford, Voodoo Security \nBryan Sullivan, Microsoft \n \nCSA Global Staff \nAlex "} {"text":"Ginsburg, Copywriter \nLuciano JR Santos, Research Director \nEvan Scoboria, Webmaster \nKendall Scoboria, Graphic Designer \nJohn Yeoh, Research Analyst \n \nThe CSA Top Threats to Cloud Computing Survey in 2012 was assisted by the extended CSA Top Threats Working Group, \nled by committee members: Aaron Alva, Olivier Caleff, Greg Elkins, Allen Lum, Keith Pasley, Satheesh Sudarsan, Vinoth \nSivasubramanian, and Rajeev Venkitaraman \n \n \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n6 \n \n \nCLOUD SECURIT"} {"text":"Y ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \nExecutive Summary \nAt an unprecedented pace, cloud computing has simultaneously transformed business and government, and created \nnew security challenges. The development of the cloud service model delivers business-supporting technology more \nefficiently than ever before. The shift from server to service-based thinking is transforming the way technology \ndepartments think about, design, and deliver computing technology and applications. "} {"text":" Yet these advances have created \nnew security vulnerabilities, including security issues whose full impact is still emerging. \n \nAmong the most significant security risks associated with cloud computing is the tendency to bypass information \ntechnology (IT) departments and information officers. Although shifting to cloud technologies exclusively is affordable \nand fast, doing so undermines important business-level security policies, processes, and best practices. In the absence \nof these standards, busin"} {"text":"esses are vulnerable to security breaches that can quickly erase any gains made by the switch \nto SaaS. \n \nRecognizing both the promise of cloud computing, and the risks associated with it, the Cloud Security Alliance (CSA) has \npioneered the creation of industry-wide standards for effective cloud security. In recent years, CSA released the \n\u201cSecurity Guidance for Critical Areas in Cloud Computing\u201d and the \u201cSecurity as a Service Implementation Guidance.\u201d \nThese documents have quickly become the industry-s"} {"text":"tandard catalogue of best practices to secure cloud computing, \ncomprehensively addressing this within the thirteen domains of CSA Guidance and ten categories of service associated \nwith the SecaaS Implementation Guidance series. Already, many businesses, organizations, and governments have \nincorporated this guidance into their cloud strategies. \n \nHowever, CSA recognizes that a central component of managing risks in cloud computing is to understand the nature of \nsecurity threats. The purpose of the \u201c"} {"text":"The Notorious Nine: Cloud Computing Top Threats in 2013\u201d report is to provide \norganizations with an up-to-date, expert-informed understanding of cloud security threats in order to make educated \nrisk-management decisions regarding cloud adoption strategies. \n \nThe top threats report reflects the current consensus among experts about the most significant threats to cloud security. \nWhile there are many vulnerabilities to cloud security, this report focuses on threats specifically related to the shared, \non"} {"text":"-demand nature of cloud computing. \n \nTo identify the top threats, CSA conducted a survey of industry experts to compile professional opinion on the greatest \nvulnerabilities within cloud computing. The Top Threats working group used these survey results alongside their \nexpertise to craft the final 2013 report. The survey methodology validated that the threat listing reflects the most \ncurrent concerns of the industry. In this most recent edition of this report, experts identified the following nine c"} {"text":"ritical \nthreats to cloud security (ranked in order of severity): \n1. Data Breaches \n2. Data Loss \n3. Account Hijacking \n4. Insecure APIs \n5. Denial of Service \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n7 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n6. Malicious Insiders \n7. Abuse of Cloud Services \n8. Insufficient Due Diligence \n9. Shared Technology Issues \n \nWith descriptions and analysis of these threats, this report serves as an up-to-date threat "} {"text":"identification guide that will \nhelp cloud users and providers make informed decisions about risk mitigation within a cloud strategy. This threat \nresearch document should be utilized in conjunction with the best practices guides, \u201cSecurity Guidance for Critical Areas \nin Cloud Computing V.3\u201d and \u201cSecurity as a Service Implementation Guidance.\u201d Together, these documents will offer \nvaluable guidance during the formation of comprehensive, appropriate cloud security strategies.\n \n\u00a9 2013, Cloud Security Alli"} {"text":"ance. All rights reserved. \n8 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n1.0 Top Threat: Data Breaches \nIt\u2019s every CIO\u2019s worst nightmare: the organization\u2019s sensitive internal data falls \ninto the hands of their competitors. While this scenario has kept executives \nawake at night long before the advent of computing, cloud computing \nintroduces significant new avenues of attack. In November 2012, researchers \nfrom the University of North Carolina, the University "} {"text":"of Wisconsin and RSA \nCorporation released a paper describing how a virtual machine could use side \nchannel timing information to extract private cryptographic keys being used in \nother virtual machines on the same physical server. However, in many cases \nan attacker wouldn\u2019t even need to go to such lengths. If a multitenant cloud \nservice database is not properly designed, a flaw in one client\u2019s application \ncould allow an attacker access not only to that client\u2019s data, but every other \nclient\u2019s data as "} {"text":"well. \n1.1 Implications \nUnfortunately, while data loss and data leakage are both serious threats to \ncloud computing, the measures you put in place to mitigate one of these \nthreats can exacerbate the other. You may be able to encrypt your data to \nreduce the impact of a data breach, but if you lose your encryption key, you\u2019ll \nlose your data as well. Conversely, you may decide to keep offline backups of \nyour data to reduce the impact of a catastrophic data loss, but this increases \nyour exposure to dat"} {"text":"a breaches. \n1.2 Controls \nCCM DG-04: Data Governance - Retention Policy \nCCM DG-05: Data Governance - Secure Disposal \nCCM DG-06: Data Governance - Non-Production Data \nCCM DG-07: Data Governance - Information Leakage \nCCM DG-08: Data Governance - Risk Assessments \nCCM IS-18: Information Security - Encryption \nCCM IS-19: Information Security - Encryption Key Management \nCCM SA-02: Security Architecture - User ID Credentials \nCCM SA-03: Security Architecture - Data Security\/Integrity \nCCM SA-06: Security Ar"} {"text":"chitecture - Production\/Non-Production Environments \nCCM SA-07: Security Architecture - Remote User Multi-Factor Authentication \n1.3 Links \n1. Cross-VM Side Channels and Their Use to Extract Private Keys \nhttp:\/\/www.cs.unc.edu\/~yinqian\/papers\/crossvm.pdf \n2. Multi-Tenant Data Architecture \nhttp:\/\/msdn.microsoft.com\/en-us\/library\/Aa479086 \nSERVICE MODEL \n \nRISK ANALYSIS \nCIANA: Confidentiality \nSTRIDE: Information Disclosure \nCSA REFERENCE \nDomain 5: Information Management \nand Data Security \nDomain 10: App"} {"text":"lication Security \nDomain 12: Identity, Entitlement \nand Access Management \nDomain 13: Virtualization \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n9 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n2.0 Top Threat: Data Loss \nFor both consumers and businesses, the prospect of permanently losing one\u2019s \ndata is terrifying. Just ask Mat Ho"} {"text":"nan, writer for Wired magazine: in the \nsummer of 2012, attackers broke into Mat\u2019s Apple, Gmail and Twitter accounts. \nThey then used that access to erase all of his personal data in those accounts, \nincluding all of the baby pictures Mat had taken of his 18-month-old daughter. \nOf course, data stored in the cloud can be lost due to reasons other than \nmalicious attackers. Any accidental deletion by the cloud service provider, or \nworse, a physical catastrophe such as a fire or earthquake, could lead to t"} {"text":"he \npermanent loss of customers\u2019 data unless the provider takes adequate \nmeasures to backup data. Furthermore, the burden of avoiding data loss does \nnot fall solely on the provider\u2019s shoulders. If a customer encrypts his or her \ndata before uploading it to the cloud, but loses the encryption key, the data \nwill be lost as well. \n2.1 Implications \nUnder the new EU data protection rules, data destruction and corruption of \npersonal data are considered forms of data breaches and would require \nappropriate "} {"text":"notifications. \nAdditionally, many compliance policies require organizations to retain audit \nrecords or other documentation. If an organization stores this data in the \ncloud, loss of that data could jeopardize the organization\u2019s compliance status. \n2.2 Controls \nCCM DG-04: Data Governance - Retention Policy \nCCM DG-08: Data Governance - Risk Assessments \nCCM RS-05: Resiliency - Environmental Risks \nCCM RS-06: Resiliency - Equipment Location \n2.3 Links \n1. Cloud Computing Users Are Losing Data, Syma"} {"text":"ntec Finds \nhttp:\/\/news.investors.com\/technology\/011613-640851-cloud-computing-data-\nloss-high-in-symantec-study.htm \n2. Kill the Password: Why a String of Characters Can\u2019t Protect Us Anymore \nhttp:\/\/www.wired.com\/gadgetlab\/2012\/11\/ff-mat-honan-password-hacker\/ \n \nRISK ANALYSIS \nCIANA: Availability, Non-Repudiation \nSTRIDE: Repudiation, Denial of \nService \nCSA REFERENCE \nDomain 5: Information Management \nand Data Security \nDomain 10: Application Security \nDomain 12: Identity, Entitlement \nand Access"} {"text":" Management \nDomain 13: Virtualization \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING\n \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n10 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n3.0 Top Threat: Account or Service \nTraffic Hijacking \nAccount or service hijacking is not new. Attack methods such as phishing, \nfraud, and exploitation of software vulnerabilities s"} {"text":"till achieve results. \nCredentials and passwords are often reused, which amplifies the impact of \nsuch attacks. Cloud solutions add a new threat to the landscape. If an attacker \ngains access to your credentials, they can eavesdrop on your activities and \ntransactions, manipulate data, return falsified information, and redirect your \nclients to illegitimate sites. Your account or service instances may become a \nnew base for the attacker. From here, they may leverage the power of your \nreputation to lau"} {"text":"nch subsequent attacks. \nIn April 2010, Amazon experienced a Cross-Site Scripting (XSS) bug that allowed \nattackers to hijack credentials from the site. In 2009, numerous Amazon \nsystems were hijacked to run Zeus botnet nodes. \n3.1 Implications \nAccount and service hijacking, usually with stolen credentials, remains a top \nthreat. With stolen credentials, attackers can often access critical areas of \ndeployed cloud computing services, allowing them to compromise the \nconfidentiality, integrity and availab"} {"text":"ility of those services. Organizations \nshould be aware of these techniques as well as common defense in depth \nprotection strategies to contain the damage (and possible litigation) resulting \nfrom a breach. Organizations should look to prohibit the sharing of account \ncredentials between users and services, and leverage strong two-factor \nauthentication techniques where possible. \n3.2 Controls \nCCM IS-07: Information Security - User Access Policy \nCCM IS-08: Information Security - User Access Restriction"} {"text":"\/Authorization \nCCM IS-09: Information Security - User Access Revocation \nCCM IS-10: Information Security - User Access Reviews \nCCM IS-22: Information Security - Incident Management \nCCM SA-02: Security Architecture - User ID Credentials \nCCM SA-07: Security Architecture - Remote User Multi-Factor Authentication \nCCM SA-14: Security Architecture - Audit Logging \/ Intrusion Detection \n3.3 Links \n1. Amazon purges account hijacking threat from site \nhttp:\/\/www.theregister.co.uk\/2010\/04\/20\/amazon_website"} {"text":"_treat\/ \nRISK ANALYSIS \nCIANA: Authenticity, Integrity, \nConfidentiality, Non-repudiation, \nAvailability \nSTRIDE: Tampering with Data, \nRepudiation, Information Disclosure, \nElevation of Privilege, Spoofing \nIdentity \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING\n \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n11 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n2. "} {"text":" Zeus bot found using Amazon\u2019s EC2 as C&C Server \nhttp:\/\/www.theregister.co.uk\/2009\/12\/09\/amazon_ec2_bot_control_channel\/ \n \n \nCSA REFERENCE \nDomain 2: Governance and \nEnterprise Risk Management \nDomain 5: Information Management \nand Data Security \nDomain 7: Traditional Security, \nBusiness Continuity, and Disaster \nRecovery \nDomain 9: Incident Response \nDomain 11: Encryption and Key \nManagement \nDomain 12: Identity, Entitlement, \nand Access Management \n \n\u00a9 2013, Cloud Security Alliance. All rights rese"} {"text":"rved. \n12 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n4.0 Top Threat: Insecure Interfaces and \nAPIs \nCloud computing providers expose a set of software interfaces or APIs that \ncustomers use to manage and interact with cloud services. Provisioning, \nmanagement, orchestration, and monitoring are all performed using these \ninterfaces. The security and availability of general cloud services is dependent \nupon the security of these basic APIs. From authentication and"} {"text":" access control \nto encryption and activity monitoring, these interfaces must be designed to \nprotect against both accidental and malicious attempts to circumvent policy. \nFurthermore, organizations and third parties often build upon these interfaces \nto offer value-added services to their customers. This introduces the \ncomplexity of the new layered API; it also increases risk, as organizations may \nbe required to relinquish their credentials to third-parties in order to enable \ntheir agency. \n4.1 Implica"} {"text":"tions \nWhile most providers strive to ensure security is well integrated into their \nservice models, it is critical for consumers of those services to understand the \nsecurity implications associated with the usage, management, orchestration \nand monitoring of cloud services. Reliance on a weak set of interfaces and APIs \nexposes organizations to a variety of security issues related to confidentiality, \nintegrity, availability and accountability. \n4.2 Controls \nCCM IS-08: Information Security - User Access"} {"text":" Restriction\/Authorization \nCCM SA-03: Security Architecture - Data Security\/Integrity \nCCM SA-04: Security Architecture - Application Security \n4.3 Links \n1. Insecure API Implementations Threaten Cloud \nhttp:\/\/www.darkreading.com\/cloud-security\/167901092\/security\/application-\nsecurity\/232900809\/insecure-api-implementations-threaten-cloud.html \n2. Web Services Single Sign-On Contains Big Flaws \nhttp:\/\/www.darkreading.com\/authentication\/167901072\/security\/news\/2326\n02844\/web-services-single-sign"} {"text":"-on-contain-big-flaws.html \n \n \nRISK ANALYSIS \nCIANA: Authenticity, Integrity, \nConfidentiality \nSTRIDE: Tampering with Data, \nRepudiation, Information Disclosure, \nElevation of Privilege \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING\n \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n13 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n \n \n \n \n \n \nCSA REFERENCE \nDomain 5"} {"text":": Information Management \nand Data Security \nDomain 6: Interoperability and \nPortability \nDomain 9: Incident Response \nDomain 10: Application Security \nDomain 11: Encryption and Key \nManagement \nDomain 12: Identity, Entitlement, \nand Access Management \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n14 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n5.0 Top Threat: Denial of Service \nSimply put, denial-of-service attacks are attacks meant to prevent users of a"} {"text":" \ncloud service from being able to access their data or their applications. By \nforcing the victim cloud service to consume inordinate amounts of finite \nsystem resources such as processor power, memory, disk space or network \nbandwidth, the attacker (or attackers, as is the case in distributed denial-of-\nservice (DDoS) attacks) causes an intolerable system slowdown and leaves all \nof the legitimate service users confused and angry as to why the service isn\u2019t \nresponding. \nWhile DDoS attacks tend to genera"} {"text":"te a lot of fear and media attention \n(especially when the perpetrators are acting out of a sense of political \n\u201chactivism\u201d), they are by no means the only form of DoS attack. Asymmetric \napplication-level DoS attacks take advantage of vulnerabilities in web servers, \ndatabases, or other cloud resources, allowing a malicious individual to take out \nan application using a single extremely small attack payload \u2013 in some cases \nless than 100 bytes long. \n5.1 Implications \nExperiencing a denial-of-service atta"} {"text":"ck is like being caught in rush-hour traffic \ngridlock: there\u2019s no way to get to your destination, and nothing you can do \nabout it except sit and wait. As a consumer, service outages not only frustrate \nyou, but also force you to reconsider whether moving your critical data to the \ncloud to reduce infrastructure costs was really worthwhile after all. Even \nworse, since cloud providers often bill clients based on the compute cycles and \ndisk space they consume, there\u2019s the possibility that an attacker may"} {"text":" not be \nable to completely knock your service off of the net, but may still cause it to \nconsume so much processing time that it becomes too expensive for you to run \nand you\u2019ll be forced to take it down yourself. \n5.2 Controls \nCCM IS-04: Information Security - Baseline Requirements \nCCM OP-03: Operations Management - Capacity\/Resource Planning \nCCM RS-07: Resiliency - Equipment Power Failures \nCCM SA-04: Security Architecture - Application Security \n5.3 Links \n1. As Cloud Use Grows, So Will Rate of "} {"text":"DDoS Attacks \nhttp:\/\/www.infoworld.com\/d\/cloud-computing\/cloud-use-grows-so-will-rate-\nof-ddos-attacks-211876 \n \nRISK ANALYSIS \nCIANA: Availability \nSTRIDE: Denial of Service \nCSA REFERENCE \nDomain 8: Data Center Operations \nDomain 9: Incident Response \nDomain 10: Application Security \nDomain 13: Virtualization \nDomain 14: Security as a Service \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING\n \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n \n\u00a9 2013, Cloud Securit"} {"text":"y Alliance. All rights reserved. \n15 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n2. Computerworld: DDoS is Cloud\u2019s security Achilles heel (September 16, \n2011) \nhttp:\/\/www.computerworld.com.au\/article\/401127\/ddos_cloud_security_achil\nles_heel\/ \n \n3. OWASP: Application Denial of Service \nhttps:\/\/www.owasp.org\/index.php\/Application_Denial_of_Service \n \n4. Radware DDoSpedia \nhttp:\/\/security.radware.com\/knowledge-center\/DDoSPedia\/ \n \n \n \n\u00a9 2013, Cloud"} {"text":" Security Alliance. All rights reserved. \n16 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n6.0 Top Threat: Malicious Insiders \nThe risk of malicious insiders has been debated in the security industry. While \nthe level of threat is left to debate, the fact that the insider threat is a real \nadversary is not. \nCERN defines an insider threat as such:1 \n\u201cA malicious insider threat to an organization is a current or former employee, \ncontractor, or other business partner"} {"text":" who has or had authorized access to an \norganization's network, system, or data and intentionally exceeded or misused \nthat access in a manner that negatively affected the confidentiality, integrity, \nor availability of the organization's information or information systems.\u201d \n6.1 Implications \nA malicious insider, such as a system administrator, in an improperly designed \ncloud scenario can have access to potentially sensitive information. \nFrom IaaS to PaaS and SaaS, the malicious insider has increasing l"} {"text":"evels of \naccess to more critical systems, and eventually to data. Systems that depend \nsolely on the cloud service provider (CSP) for security are at great risk here. \nEven if encryption is implemented, if the keys are not kept with the customer \nand are only available at data-usage time, the system is still vulnerable to \nmalicious insider attack. \n6.2 Controls \nCCM CO-03: Compliance - Third Party Audits \nCCM DG-01: Data Governance - Ownership \/ Stewardship \nCCM DG-03: Data Governance - Handling \/ Label"} {"text":"ing \/ Security Policy \nCCM DG-07: Data Governance - Information Leakage \nCCM FS-02: Facility Security - User Access \nCCM FS-05: Facility Security - Unauthorized Persons Entry \nCCM FS-06: Facility Security - Off-Site Authorization \nCCM HR-01: Human Resources Security - Background Screening \nCCM IS-06: Information Security - Policy Enforcement \nCCM IS-08: Information Security - User Access Restriction \/ Authorization \nCCM IS-10: Information Security - User Access Reviews \nCCM IS-13: Information Security - Rol"} {"text":"es \/ Responsibilities \nCCM IS-15: Information Security - Segregation of Duties \nCCM IS-18: Information Security - Encryption \n \n \n1 http:\/\/www.cert.org\/insider_threat\/ \nRISK ANALYSIS \nSTRIDE: Spoofing, Tampering, \nInformation Disclosure \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING\n \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n17 \n \n \nCLOUD SECU"} {"text":"RITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \nCCM IS-19: Information Security - Encryption Key Management \nCCM IS-29: Information Security - Audit Tools Access \nCCM RI-02: Risk Management - Assessments \nCCM SA-09: Security Architecture - Segmentation \n6.3 Links \n1. Insider threats to cloud computing \nhttp:\/\/www.cloudtweaks.com\/2012\/10\/insider-threats-to-cloud-computing\/ \n2. Cloud\u2019s privileged identity gap intensifies insider threats \nhttp:\/\/www.darkreading.com\/insider-"} {"text":"\nthreat\/167801100\/security\/news\/240146276\/cloud-s-privileged-identity-gap-\nintensifies-insider-threats.html \n \n \nCSA REFERENCE \nDomain 2: Governance and \nEnterprise Risk Management \nDomain 5: Information \nManagement and Data Security \nDomain 11: Encryption and Key \nManagement \nDomain 12: Identity, Entitlement \nand Access Management \n \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n18 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n7.0 Top Threat: Abuse of Cl"} {"text":"oud Services \nOne of cloud computing\u2019s greatest benefits is that it allows even small \norganizations access to vast amounts of computing power. It would be difficult \nfor most organizations to purchase and maintain tens of thousands of servers, \nbut renting time on tens of thousands of servers from a cloud computing \nprovider is much more affordable. However, not everyone wants to use this \npower for good. It might take an attacker years to crack an encryption key \nusing his own limited hardware, but usi"} {"text":"ng an array of cloud servers, he might \nbe able to crack it in minutes. Alternately, he might use that array of cloud \nservers to stage a DDoS attack, serve malware or distribute pirated software. \n7.1 Implications \nThis threat is more of an issue for cloud service providers than cloud \nconsumers, but it does raise a number of serious implications for those \nproviders. How will you detect people abusing your service? How will you \ndefine abuse? How will you prevent them from doing it again? \n7.2 Control"} {"text":"s \nCCM IS-24: Information Security - Incident Response Legal Preparation \nCCM IS-26: Information Security - Acceptable Use \n7.3 Links \n1. Cross-VM Side Channels and Their Use to Extract Private Keys \nhttp:\/\/www.cs.unc.edu\/~yinqian\/papers\/crossvm.pdf \n2. Pirate Bay Ditches Servers and Switches to the Cloud \nhttp:\/\/news.cnet.com\/8301-1023_3-57534707-93\/pirate-bay-ditches-servers-\nand-switches-to-the-cloud\/ \n \n \nRISK ANALYSIS \nCIANA: N\/A \nSTRIDE: N\/A \nCSA REFERENCE \nDomain 2: Governance and \nEnte"} {"text":"rprise Risk Management \nDomain 9: Incident Response \n \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING\n \n \nRISK MATRIX \nN\/A \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n19 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n8.0 Top Threat: Insufficient Due \nDiligence \nCloud computing has brought with it a gold rush of sorts, with many \norganizations rushing into the promise of cost reductions, operational \nefficiencies and "} {"text":"improved security. While these can be realistic goals for \norganizations that have the resources to adopt cloud technologies properly, \ntoo many enterprises jump into the cloud without understanding the full scope \nof the undertaking. \nWithout a complete understanding of the CSP environment, applications or \nservices being pushed to the cloud, and operational responsibilities such as \nincident response, encryption, and security monitoring, organizations are \ntaking on unknown levels of risk in ways they ma"} {"text":"y not even comprehend, but \nthat are a far departure from their current risks. \n8.1 Implications \nAn organization that rushes to adopt cloud technologies subjects itself to a \nnumber of issues. Contractual issues arise over obligations on liability, \nresponse, or transparency by creating mismatched expectations between the \nCSP and the customer. Pushing applications that are dependent on \u201cinternal\u201d \nnetwork-level security controls to the cloud is dangerous when those controls \ndisappear or do not match th"} {"text":"e customer\u2019s expectation. Unknown operational \nand architectural issues arise when designers and architects unfamiliar with \ncloud technologies are designing applications being pushed to the cloud. \nThe bottom line for enterprises and organizations moving to a cloud \ntechnology model is that they must have capable resources, and perform \nextensive internal and CSP due-diligence to understand the risks it assumes by \nadopting this new technology model. \n8.2 Controls \nCCM DG-08: Data Governance - Risk Assess"} {"text":"ments \nCCM IS-04: Information Security - Baseline Requirements \nCCM IS-12: Information Security - Industry Knowledge \/ Benchmarking \nCCM OP-03: Operations Management - Capacity \/ Resource Planning \nCCM RI-01: Risk Management - Program \nCCM RI-02: Risk Management - Assessments \nCCM RS-01: Resiliency - Management Program \nCCM RS-02: Resiliency - Impact Analysis \nCCM RS -03: Resiliency - Business Continuity Planning \nCCM SA-03: Security Architecture - Data Security \/ Integrity \nCCM SA-04: Security Architecture"} {"text":" - Application Security \nRISK ANALYSIS \nSTRIDE: All \nCSA REFERENCE \nDomain 2: Governance and \nEnterprise Risk Management \nDomain 3: Legal and Electronic \nDiscovery \nDomain 8: Data Center \nOperations \nDomain 9: Incident Response, \nNotification and Remediation \nIS THREAT STILL RELEVANT?\n \nTOP THREAT RANKING\n \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n20 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: C"} {"text":"loud Computing Top Threats in 2013 \nCCM SA-08: Security Architecture - Network Security \nCCM SA-09: Security Architecture - Segmentation \n8.3 Links \n1. Perfecting the unknown: Cloud Computing \nhttp:\/\/www.mysanantonio.com\/business\/article\/Perfecting-the-Unknown-\nCloud-Computing-4157844.php \n \n \n \n\u00a9 2013, Cloud Security Alliance. All rights reserved. \n21 \n \n \nCLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 \n9.0 Top Threat: Shared Technology \nVulnerabilities \nCloud servi"} {"text":"ce providers deliver their services in a scalable way by sharing \ninfrastructure, platforms, and applications. Whether it\u2019s the underlying \ncomponents that make up this infrastructure (e.g. CPU caches, GPUs, etc.) that \nwere not designed to offer strong isolation properties for a multi-tenant \narchitecture (IaaS), re-deployable platforms (PaaS), or multi-customer \napplications (SaaS), the threat of shared vulnerabilities exists in all delivery \nmodels. A defensive in-depth strategy is recommended and shou"} {"text":"ld include \ncompute, storage, network, application and user security enforcement, and \nmonitoring, whether the service model is IaaS, PaaS, or SaaS. The key is that a \nsingle vulnerability or misconfiguration can lead to a compromise across an \nentire provider\u2019s cloud. \n9.1 Implications \nA compromise of an integral piece of shared technology such as the hypervisor, \na shared platform component, or an application in a SaaS environment exposes \nmore than just the compromised customer; rather, it exposes the "} {"text":"entire \nenvironment to a potential of compromise and breach. This vulnerability is \ndangerous because it potentially can affect an entire cloud at once. \n9.2 Controls \nCCM DG-03: Data Governance - Handling \/ Labeling \/ Security Policy \nCCM IS-04: Information Security - Baseline Requirements \nCCM IS-07: Information Security - User Access Policy \nCCM IS-15: Information Security - Segregation of Duties \nCCM IS-18: Information Security - Encryption \nCCM IS-20: Information Security - Vulnerability \/ Patch Manag"} {"text":"ement \nCCM SA-02: Security Architecture - User ID Credentials \nCCM SA-09: Security Architecture - Segmentation \nCCM SA-11: Security Architecture - Shared Networks \nCCM SA-14: Security Architecture - Audit Logging \/ Intrusion Detection \n9.3 Links \n1. New virtualization vulnerability allows escape to hypervisor attacks \nhttp:\/\/www.informationweek.com\/security\/application-security\/new-\nvirtualization-vulnerability-allows\/240001996 \nRISK ANALYSIS \nSTRIDE: Information Disclosure, \nElevation of Privilege \nCSA"} {"text":" REFERENCE \nDomain 1: Cloud computing \narchitectural framework \nDomain 5: Information \nmanagement and data security \nDomain 11: Encryption and key \nmanagement \nDomain 12: Identity, entitlement, \nand access management \nDomain 13: Virtualization \nIS THREAT STILL RELEVANT? \n \nTOP THREAT RANKING \n \nSERVICE MODEL \n \nIaaS \nPaaS \nSaaS \nRISK MATRIX \n \n \n \n \n \n \nPerceived Risk \nActual Risk \n"} {"text":"Recommendation for Space Data System Practices \nMAGENTA BOOK \nAUDIT AND \nCERTIFICATION OF \nTRUSTWORTHY DIGITAL \nREPOSITORIES\nRECOMMENDED PRACTICE\nCCSDS 652.0-M-1\nSeptember 2011\n \nRecommendation for Space Data System Practices \nAUDIT AND \nCERTIFICATION OF \nTRUSTWORTHY DIGITAL \nREPOSITORIES \nRECOMMENDED PRACTICE \nCCSDS 652.0-M-1 \nMAGENTA BOOK \nSeptember 2011 \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage i \nSeptember 2011 \nAUTHORITY \n \n \n \n \n \n \n \nIssue: \nRecommended Pract"} {"text":"ice, Issue 1 \n \n \nDate: \nSeptember 2011 \n \n \nLocation: \nWashington, DC, USA \n \n \n \n \n \nThis document has been approved for publication by the Management Council of the \nConsultative Committee for Space Data Systems (CCSDS) and represents the consensus \ntechnical agreement of the participating CCSDS Member Agencies. The procedure for \nreview and authorization of CCSDS documents is detailed in the Procedures Manual for the \nConsultative Committee for Space Data Systems, and the record of Agency participation"} {"text":" in \nthe authorization of this document can be obtained from the CCSDS Secretariat at the \naddress below. \n \n \nThis document is published and maintained by: \n \nCCSDS Secretariat \nSpace Communications and Navigation Office, 7L70 \nSpace Operations Mission Directorate \nNASA Headquarters \nWashington, DC 20546-0001, USA \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage ii \nSeptember 2011 \nSTATEMENT OF INTENT \nThe Consultative Committee for Space Data Systems (CCSDS) is an organ"} {"text":"ization officially \nestablished by the management of its members. The Committee meets periodically to address \ndata systems problems that are common to all participants, and to formulate sound technical \nsolutions to these problems. Inasmuch as participation in the CCSDS is completely \nvoluntary, the results of Committee actions are termed Recommendations and are not in \nthemselves considered binding on any Agency. \nCCSDS Recommendations take two forms: Recommended Standards that are prescriptive \nand are "} {"text":"the formal vehicles by which CCSDS Agencies create the standards that specify how \nelements of their space mission support infrastructure shall operate and interoperate with \nothers; and Recommended Practices that are more descriptive in nature and are intended to \nprovide general guidance about how to approach a particular problem associated with space \nmission support. This Recommended Practice is issued by, and represents the consensus of, \nthe CCSDS members. Endorsement of this Recommended Practice is "} {"text":"entirely voluntary \nand does not imply a commitment by any Agency or organization to implement its \nrecommendations in a prescriptive sense. \nNo later than five years from its date of issuance, this Recommended Practice will be \nreviewed by the CCSDS to determine whether it should: (1) remain in effect without change; \n(2) be changed to reflect the impact of new technologies, new requirements, or new \ndirections; or (3) be retired or canceled. \nIn those instances when a new version of a Recommended Practi"} {"text":"ce is issued, existing \nCCSDS-related member Practices and implementations are not negated or deemed to be non-\nCCSDS compatible. It is the responsibility of each member to determine when such Practices \nor implementations are to be modified. Each member is, however, strongly encouraged to \ndirect planning for its new Practices and implementations towards the later version of the \nRecommended Practice. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage iii \nSeptember 2011 "} {"text":"\nFOREWORD \nThis document is a technical Recommendation to use as the basis for providing audit and \ncertification of the trustworthiness of digital repositories. It provides a detailed specification \nof criteria by which digital repositories shall be audited. \nThe OAIS Reference Model (reference [1]) contained a roadmap which included the need for \na certification standard. The initial work was to be carried out outside CCSDS and then \nbrought back into CCSDS to take into the standard. \nIn 2003, Research "} {"text":"Libraries Group (RLG) and the National Archives and Records \nAdministration (NARA) created a joint task force to specifically address digital repository \ncertification. That task force published Trustworthy Repositories Audit & Certification: \nCriteria and Checklist (TRAC\u2014reference [B3]), on which this Recommended Practice is \nbased. \nThrough the process of normal evolution, it is expected that expansion, deletion, or \nmodification of this document may occur. This Recommended Practice is therefore subject"} {"text":" \nto CCSDS document management and change control procedures, which are defined in the \nProcedures Manual for the Consultative Committee for Space Data Systems. Current \nversions of CCSDS documents are maintained at the CCSDS Web site: \nhttp:\/\/www.ccsds.org\/ \nQuestions relating to the contents or status of this document should be addressed to the \nCCSDS Secretariat at the address indicated on page i. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage iv \nSeptember 2011 \nAt "} {"text":"time of publication, the active Member and Observer Agencies of the CCSDS were: \nMember Agencies \n\u2013 Agenzia Spaziale Italiana (ASI)\/Italy. \n\u2013 Canadian Space Agency (CSA)\/Canada. \n\u2013 Centre National d\u2019Etudes Spatiales (CNES)\/France. \n\u2013 China National Space Administration (CNSA)\/People\u2019s Republic of China. \n\u2013 Deutsches Zentrum f\u00fcr Luft- und Raumfahrt e.V. (DLR)\/Germany. \n\u2013 European Space Agency (ESA)\/Europe. \n\u2013 Federal Space Agency (FSA)\/Russian Federation. \n\u2013 Instituto Nacional de Pesquisas Espaciais (INPE)\/B"} {"text":"razil. \n\u2013 Japan Aerospace Exploration Agency (JAXA)\/Japan. \n\u2013 National Aeronautics and Space Administration (NASA)\/USA. \n\u2013 UK Space Agency\/United Kingdom. \nObserver Agencies \n\u2013 Austrian Space Agency (ASA)\/Austria. \n\u2013 Belgian Federal Science Policy Office (BFSPO)\/Belgium. \n\u2013 Central Research Institute of Machine Building (TsNIIMash)\/Russian Federation. \n\u2013 China Satellite Launch and Tracking Control General, Beijing Institute of Tracking \nand Telecommunications Technology (CLTC\/BITTT)\/China. \n\u2013 Chinese Academ"} {"text":"y of Sciences (CAS)\/China. \n\u2013 Chinese Academy of Space Technology (CAST)\/China. \n\u2013 Commonwealth Scientific and Industrial Research Organization (CSIRO)\/Australia. \n\u2013 CSIR Satellite Applications Centre (CSIR)\/Republic of South Africa. \n\u2013 Danish National Space Center (DNSC)\/Denmark. \n\u2013 Departamento de Ci\u00eancia e Tecnologia Aeroespacial (DCTA)\/Brazil. \n\u2013 European Organization for the Exploitation of Meteorological Satellites \n(EUMETSAT)\/Europe. \n\u2013 European Telecommunications Satellite Organization (EUTELSAT)\/Eu"} {"text":"rope. \n\u2013 Geo-Informatics and Space Technology Development Agency (GISTDA)\/Thailand. \n\u2013 Hellenic National Space Committee (HNSC)\/Greece. \n\u2013 Indian Space Research Organization (ISRO)\/India. \n\u2013 Institute of Space Research (IKI)\/Russian Federation. \n\u2013 KFKI Research Institute for Particle & Nuclear Physics (KFKI)\/Hungary. \n\u2013 Korea Aerospace Research Institute (KARI)\/Korea. \n\u2013 Ministry of Communications (MOC)\/Israel. \n\u2013 National Institute of Information and Communications Technology (NICT)\/Japan. \n\u2013 National Ocea"} {"text":"nic and Atmospheric Administration (NOAA)\/USA. \n\u2013 National Space Agency of the Republic of Kazakhstan (NSARK)\/Kazakhstan. \n\u2013 National Space Organization (NSPO)\/Chinese Taipei. \n\u2013 Naval Center for Space Technology (NCST)\/USA. \n\u2013 Scientific and Technological Research Council of Turkey (TUBITAK)\/Turkey. \n\u2013 Space and Upper Atmosphere Research Commission (SUPARCO)\/Pakistan. \n\u2013 Swedish Space Corporation (SSC)\/Sweden. \n\u2013 United States Geological Survey (USGS)\/USA. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL RE"} {"text":"POSITORIES \nCCSDS 652.0-M-1 \nPage v \nSeptember 2011 \nDOCUMENT CONTROL \n \nDocument \nTitle \nDate \nStatus \nCCSDS \n652.0-M-1 \nAudit and Certification of \nTrustworthy Digital Repositories, \nRecommended Practice, \nIssue 1 \nSeptember \n2011 \nOriginal issue \n \n \n \n \n \n \n \n \n \n \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage vi \nSeptember 2011 \nCONTENTS \nSection \nPage \n1 INTRODUCTION \n.................................................................................................."} {"text":"........ 1-1 \n \n1.1 \nPURPOSE AND SCOPE \n........................................................................................ 1-1 \n1.2 \nAPPLICABILITY \n................................................................................................... 1-1 \n1.3 \nRATIONALE \n.......................................................................................................... 1-1 \n1.4 \nSTRUCTURE OF THIS DOCUMENT.................................................................. 1-2 \n1.5 \nDEFINITIONS \n...."} {"text":".................................................................................................... 1-3 \n1.6 \nCONFORMANCE \n.................................................................................................. 1-6 \n1.7 \nREFERENCES ....................................................................................................... 1-6 \n \n2 OVERVIEW OF AUDIT AND CERTIFICATION CRITERIA .............................. 2-1 \n \n2.1 \nA TRUSTWORTHY DIGITAL REPOSITORY \n................................."} {"text":"................... 2-1 \n2.2 \nEVIDENCE ............................................................................................................ 2-1 \n2.3 \nRELEVANT STANDARDS, BEST PRACTICES, AND CONTROLS ............... 2-1 \n \n3 ORGANIZATIONAL INFRASTRUCTURE \n.............................................................. 3-1 \n \n3.1 \nGOVERNANCE AND ORGANIZATIONAL VIABILITY ................................. 3-1 \n3.2 \nORGANIZATIONAL STRUCTURE AND STAFFING \n....................................... 3-3 \n3.3 \nP"} {"text":"ROCEDURAL ACCOUNTABILITY AND PRESERVATION POLICY \nFRAMEWORK ...................................................................................................... 3-5 \n3.4 \nFINANCIAL SUSTAINABILITY ....................................................................... 3-10 \n3.5 \nCONTRACTS, LICENSES, AND LIABILITIES................................................ 3-11 \n \n4 DIGITAL OBJECT MANAGEMENT \n......................................................................... 4-1 \n \n4.1 \nINGEST: ACQUISITION OF "} {"text":"CONTENT \n............................................................. 4-1 \n4.2 \nINGEST: CREATION OF THE AIP \n...................................................................... 4-6 \n4.3 \nPRESERVATION PLANNING ........................................................................... 4-16 \n4.4 \nAIP PRESERVATION ......................................................................................... 4-19 \n4.5 \nINFORMATION MANAGEMENT \n..................................................................... "} {"text":"4-23 \n4.6 \nACCESS MANAGEMENT ................................................................................. 4-24 \n \n5 INFRASTRUCTURE AND SECURITY RISK MANAGEMENT ........................... 5-1 \n \n5.1 \nTECHNICAL INFRASTRUCTURE RISK MANAGEMENT \n.............................. 5-1 \n5.2 \nSECURITY RISK MANAGEMENT ................................................................... 5-12 \n \nANNEX A SECURITY CONSIDERATIONS (NORMATIVE) ................................. A-1 \nANNEX B REFERENCES (INFORMATIVE) \n...."} {"text":"..........................................................B-1 \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 1-1 \nSeptember 2011 \n1 INTRODUCTION \n1.1 \nPURPOSE AND SCOPE \nThe main purpose of this document is to define a CCSDS Recommended Practice on which \nto base an audit and certification process for assessing the trustworthiness of digital \nrepositories. The scope of application of this document is the entire range of digital \nrepositories. \n1.2 \nAPPLICABILITY \nThis do"} {"text":"cument is meant primarily for those responsible for auditing digital repositories and \nalso for those who work in or are responsible for digital repositories seeking objective \nmeasurement of the trustworthiness of their repository. Some institutions may also choose to \nuse these metrics during a design or redesign process for their digital repository. \n1.3 \nRATIONALE \nIn 1996 the Task Force on Archiving of Digital Information (reference [B1]) declared, \u2018a \ncritical component of digital archiving infrastruc"} {"text":"ture is the existence of a sufficient number \nof trusted organizations capable of storing, migrating, and providing access to digital \ncollections\u2019. The task force saw that \u2018trusted\u2019 or trustworthy organizations could not simply \nidentify themselves. To the contrary, the task force declared, \u2018a process of certification for \ndigital archives is needed to create an overall climate of trust about the prospects of \npreserving digital information\u2019. \nWork in articulating responsible digital archiving infrastructu"} {"text":"re was furthered by the \ndevelopment of the Open Archival Information System (OAIS) Reference Model \n(reference [1]). Designed to create a consensus on \u2018what is required for an archive to provide \npermanent or indefinite long-term preservation of digital information\u2019, the OAIS addressed \nfundamental questions regarding the long-term preservation of digital materials that cut \nacross domain-specific implementations. The reference model (ISO 14721) provides a \ncommon conceptual framework describing the enviro"} {"text":"nment, functional components, and \ninformation objects within a system responsible for the long-term preservation of digital \nmaterials. Long before it became an approved standard in 2002, many in the cultural heritage \ncommunity had adopted OAIS as a model to better understand what would be needed from \ndigital preservation systems. \nInstitutions began to declare themselves \u2018OAIS-compliant\u2019 to underscore the trustworthiness \nof their digital repositories. However, there was no established understanding of "} {"text":"\u2018OAIS-\ncompliance\u2019 beyond being able to apply OAIS terminology to describe their archive, despite \nthere being a compliance section in OAIS which specifies the need to support the model of \ninformation and fulfilling the mandatory responsibilities. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 1-2 \nSeptember 2011 \nClaims of trustworthiness are easy to make but are thus far difficult to justify or objectively \nprove. Establishing more clear criteria detailing what a trus"} {"text":"tworthy repository is and is not \nhas become vital. \nIn 2002, Research Libraries Group (RLG) and Online Computer Library Center (OCLC) \njointly \npublished \nTrusted \nDigital \nRepositories: \nAttributes \nand \nResponsibilities \n(reference [B2]), which further articulated a framework of attributes and responsibilities for \ntrusted, reliable, sustainable digital repositories capable of handling the range of materials \nheld by large and small cultural heritage and research institutions. The framework was broad \nen"} {"text":"ough to accommodate different situations, technical architectures, and institutional \nresponsibilities while providing a basis for the expectations of a trusted repository. The \ndocument has proven to be useful for institutions grappling with the long-term preservation \nof cultural heritage resources and has been used in combination with the OAIS as a digital \npreservation planning tool. As a framework, this document concentrated on high-level \norganizational and technical attributes and discussed potential"} {"text":" models for digital repository \ncertification. It refrained from being prescriptive about the specific nature of rapidly \nemerging digital repositories and archives and instead reiterated the call for certification of \ndigital repositories, recommending the development of certification program and articulation \nof auditable criteria. \nOAIS included a Roadmap for follow-on standards which included \u2018standard(s) for \naccreditation of archives\u2019. It was agreed that RLG and National Archives and Records \nAdminist"} {"text":"ration (NARA) would take this particular topic forward and the later published the \nTRAC (reference [B3]) document which combined ideas from OAIS (reference [1]) and \nTrusted Digital Repositories: Attributes and Responsibilities (TDR\u2014reference [B2]). \nThe current document follows on from TRAC in order to produce an ISO standard. \n1.4 \nSTRUCTURE OF THIS DOCUMENT \nThis document is divided into informative and normative sections and annexes. \nSections 1-2 of this document are informative and give a high-level "} {"text":"view of the rationale, the \nconceptual environment, some of the important design issues, and an introduction to the \nterminology and concepts. \n\u2013 Section 1 gives purpose and scope, rationale, a view of the overall document \nstructure, and the acronym list, glossary, and reference list for this document. \n\u2013 Section 2 provides an overview of audit and certification criteria, ideas about \nevidence to support claims, and a discussion of related standards. \n \nMetrics are empirically derived and consistent measur"} {"text":"es of effectiveness. When \nevaluated together, metrics can be used to judge the overall suitability of a repository \nto be trusted to provide a preservation environment that is consistent with the goals of \nthe OAIS. Separately, individual metrics or measures can be used to identify possible \nweaknesses or pending declines in repository functionality. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 1-3 \nSeptember 2011 \n\u2013 Sections 3 to 5 provide the normative metrics agai"} {"text":"nst which a digital repository may \nbe judged. These sections provide metrics grouped as follows: \n\u2022 \ncovers Organizational Infrastructure; \n\u2022 \ncovers Digital Object Management; \n\u2022 \ncovers Infrastructure and Security Risk Management. \n \nEach section groups metrics into one or more subsections. \n\u2013 Security considerations are discussed in annex A. \n\u2013 Annex B provides Informative References. \n1.5 \nDEFINITIONS \n1.5.1 ACRONYMS AND ABBREVIATIONS \nAIP \nArchival Information Package (defined in reference [1]) \nCCSDS"} {"text":" \nConsultative Committee for Space Data Systems \nDEDSL \nData Entity Specification Language (see reference [B7]) \nDIP \nDissemination Information Package (defined in reference [1]) \nFITS \nFlexible Image Transport System \nGIS \nGeographic Information System \nISO \nInternational Organization for Standardization \nOAIS \nOpen Archival Information System (see reference [1]) \nPDI \nPreservation Description Information (defined in reference [1]) \nSIP \nSubmission Information Package (defined in reference [1]) \nTEI \nText "} {"text":"Encoding Initiative \nUML \nUnified Modeling Language \nXML \nExtensible Markup Language \n1.5.2 TERMINOLOGY \nDigital preservation interests a range of different communities, each with a distinct \nvocabulary and local definitions for key terms. A glossary is included in this document, but it \nis important to draw attention to the usage of several key terms. \nIn general, key terms in this document have been adopted from the OAIS Reference Model. \nOne of the great strengths of the OAIS Reference Model has been to "} {"text":"provide a common \nterminology made up of terms \u2018not already overloaded with meaning so as to reduce \nconveying unintended meanings\u2019 (reference [1]). Because the OAIS has become a \nfoundational document for digital preservation, the common terms are well understood and \nare therefore used within this document. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 1-4 \nSeptember 2011 \nThe OAIS Reference Model uses \u2018digital archive\u2019 to mean the organization responsible for \ndigita"} {"text":"l preservation. In this document, the term \u2018repository\u2019 or phrase \u2018digital repository\u2019 is \nused to convey the same concept in all instances except when quoting from the OAIS. It is \nimportant to understand that in all instances in this document, \u2018repository\u2019 and \u2018digital \nrepository\u2019 are used to convey digital repositories and archives that have, or contribute to, \nlong-term preservation responsibilities and functionality. This document uses the OAIS \nconcept of the \u2018Designated Community\u2019. A repository may "} {"text":"have a single, generalized \n\u2018Designated Community\u2019 (e.g., every citizen of a country), while other repositories may have \nseveral, distinct Designated Communities with highly specialized needs, each requiring \ndifferent functionality or support from the repository; this document uses the term \nDesignated Community to cover this second case also. \nFinally, this document names criteria that, combined, evaluate the trustworthiness of digital \nrepositories and archives. \n1.5.2.1 Glossary \nUnless otherwise indic"} {"text":"ated, other definitions are taken from the OAIS Reference Model \n(reference [1]). \nAccess Policy: Written statement, authorized by the repository management, that describes \nthe approach to be taken by the repository for providing access to objects accessioned into \nthe repository. The Access Policy may distinguish between different types of access rights, \nfor example between system administrators, Designated Communities, and general users. \nPractice: Actions conducted to execute procedures. Practices are "} {"text":"measured by logs or other \nevidence that record actions completed. \nPreservation Implementation Plan: A written statement, authorized by the management of \nthe repository, that describes the services to be offered by the repository for preserving \nobjects accessioned into the repository in accordance with the Preservation Policy. \nNOTE \u2013 The relationship between these terms is motivated as follows. A repository is \nassumed to have an overall Repository Mission Statement, part of which will be \nconcerned wi"} {"text":"th preservation. The Preservation Strategic Plan states how the \nmission will be achieved, in general terms with goals and objectives. The \nPreservation Policy then declares the range of approaches that the repository will \nemploy to ensure preservation (that is, to implement the Preservation Strategic \nPlan), and finally the Preservation Implementation Plan translates those into \nservices that the repository must carry out. This is an abstract documentary \nmodel that, in reality, can result in different"} {"text":" documents, a different distribution of \nsubjects between documents, different document names, etc. \nPreservation Policy: Written statement, authorized by the repository management, that \ndescribes the approach to be taken by the repository for the preservation of objects \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 1-5 \nSeptember 2011 \naccessioned into the repository. The Preservation Policy is consistent with the Preservation \nStrategic Plan. \nPreservation Strategic "} {"text":"Plan: A written statement, authorized by the management of the \nrepository, that states the goals and objectives for achieving that part of the mission of the \nrepository concerned with preservation. Preservation Strategic Plans may include long-term \nand short-term plans. \nProcedure: A written statement that specifies actions required to complete a service or to \nachieve a specific state or condition. Procedures specify how various aspects of the relevant \nPreservation Implementation Plans are to be fulfil"} {"text":"led. \nProvider (or Submitter): A person or system that submits a digital object to the repository. \nThe Provider can be the Producer. \nRepository Mission Statement: A written statement, authorized by the management of the \nrepository, that, among other things, describes the commitment of the organization for the \nstewardship of digital objects in its custody. \n1.5.3 NOMENCLATURE \nThe following conventions apply for the normative specifications in this Recommended \nPractice: \na) the words \u2018shall\u2019 and \u2018must\u2019 "} {"text":"imply a binding and verifiable specification; \nb) the word \u2018should\u2019 implies an optional, but desirable, specification; \nc) the word \u2018may\u2019 implies an optional specification; \nd) the words \u2018is\u2019, \u2018are\u2019, and \u2018will\u2019 imply statements of fact. \nNOTE \u2013 These conventions do not imply constraints on diction in text that is clearly \ninformative in nature. \n1.5.4 CONVENTIONS \nThe following conventions apply: \n\u2013 The term Designated Community may include multiple Designated Communities. \n\u2013 Sub-metrics for any section are"} {"text":" intended to help clarify and elucidate their superior \nitem. Satisfaction of the sub-metrics provides evidence supporting a claim of \ncompliance with the hierarchically superior items. \n\u2013 Each metric has one or more of the following informative pieces of text associated \nwith it: \n\u2022 \nSupporting Text: giving an explanation of why the metric is important; \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 1-6 \nSeptember 2011 \n\u2022 \nExamples of Ways the Repository Can Demonstrate"} {"text":" It Is Meeting This \nRequirement: providing examples of the evidence which might be examined to \ntest whether the repository satisfies the metric; \n\u2022 \nDiscussion: clarifications about the intent of the metric. \n1.6 \nCONFORMANCE \nAn archive that conforms to this Recommended Practice shall have satisfied the auditor on \neach of the requirements. \nConformance to these metrics, as with all other such standards, is a matter of judgment. The \nsupporting organization and practice of auditing will lead to the crea"} {"text":"tion of auditors\u2019 \nguidelines, as described in the draft ISO 16919. \nAs described in the referenced ISO documents, the aim of the audit process is to create a \nprocess of continuous improvement. Thus the outcome of the audit will not be a simple \nyes\/no but rather a judgment about areas that need improvement. \n1.7 \nREFERENCES \nThe following documents contain provisions which, through reference in this text, constitute \nprovisions of this Recommended Practice. At the time of publication, the editions indica"} {"text":"ted \nwere valid. All documents are subject to revision, and users of this Recommended Practice \nare encouraged to investigate the possibility of applying the most recent editions of the \ndocuments indicated below. The CCSDS Secretariat maintains a register of currently valid \nCCSDS documents. \n[1] \nReference Model for an Open Archival Information System (OAIS). Recommendation \nfor Space Data System Standards, CCSDS 650.0-B-1. Blue Book. Issue 1. \nWashington, D.C.: CCSDS, January 2002. [Also published"} {"text":" as ISO 14721:2003.] \nNOTE \u2013 Informative references are listed in annex B. \n \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 2-1 \nSeptember 2011 \n2 OVERVIEW OF AUDIT AND CERTIFICATION CRITERIA \nThis section provides an overview of some of the key concepts that are incorporated in the \ndesign of the metrics in this Recommended Practice. \n2.1 \nA TRUSTWORTHY DIGITAL REPOSITORY \nAt the very basic level, the definition of a trustworthy digital repository must start with \u2018a \nmi"} {"text":"ssion to provide reliable, long-term access to managed digital resources to its Designated \nCommunity, now and into the future\u2019 (reference [B2]). Expanding the definition has caused \ngreat discussion both within and across various groups, from the broad digital preservation \ncommunity to the data archives or institutional repository communities. \nA trustworthy digital repository will understand threats to and risks within its systems. \nConstant monitoring, planning, and maintenance, as well as conscious act"} {"text":"ions and strategy \nimplementation will be required of repositories to carry out their mission of digital \npreservation. All of these present an expensive, complex undertaking that depositors, \nstakeholders, funders, the Designated Community, and other digital repositories will need to \nrely on in the greater collaborative digital preservation environment that is required to \npreserve the vast amounts of digital information generated now and into the future. \nCommunicating audit results to the public\u2014transpa"} {"text":"rency\u2014will engender more trust, and \nadditional objective audits, potentially leading towards certification, will promote further \ntrust in the repository and the system that supports it. Finally, attaining trustworthy status is \nnot a one-time accomplishment, achieved and forgotten. To retain trustworthy status, a \nrepository will need to undertake a regular cycle of audit and\/or certification. \n2.2 \nEVIDENCE \nAs noted in 1.5.4 each metric has associated with it informative text under the heading \nExamples"} {"text":" of Ways the Repository Can Demonstrate It Is Meeting This Requirement: \nproviding examples of the evidence which might be examined to test whether the repository \nsatisfies the metric. These examples are illustrative rather than prescriptive, and the lists of \npossible evidence are not exhaustive. \n2.3 \nRELEVANT STANDARDS, BEST PRACTICES, AND CONTROLS \nNumerous documents and standards include pieces that are applicable or related to this work. \nThese standards are important to acknowledge and embrace as c"} {"text":"omplementary audit tools. A \nfew examples: \n\u2013 The ISO 9000 family of standards (e.g., Quality Management Systems\u2014\nFundamentals and Vocabulary\u2014reference [B9]) addresses quality assurance \ncomponents within an organization and system management that, while valuable, \nwere not specifically developed to gauge the trustworthiness of organizations \noperating digital repositories. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 2-2 \nSeptember 2011 \n\u2013 Similarly, ISO 17799:2005 (r"} {"text":"eference [B10]) was developed specifically to address \ndata security and information management systems. Like ISO 9000, it has some very \nvaluable components to it but it was not designed to address the trustworthiness of \ndigital repositories. Its requirements for information security seek data security \ncompliance to a very granular level, but do not address organizational, procedural, \nand preservation planning components necessary for the long-term management of \ndigital resources. \n\u2013 ISO 15489-1:2001 a"} {"text":"nd ISO 15489-2:2001 (references [B11] and [B12]) define a \nsystematic and process-driven approach that governs the practice of records managers \nand any person who creates or uses records during their business activities, treats \ninformation contained in records as a valuable resource and business asset, and \nprotects\/preserves records as evidence of actions. Conformance to ISO 15489 \nrequires an organization to establish, document, maintain, and promulgate policies, \nprocedures, and practices for records m"} {"text":"anagement, but, by design, addresses records \nmanagement specifically rather than applying to all types of repositories and archives. \n\u2013 Finally, ISO 14721:2003, the Open Archival Information System Reference Model, \nprovides a high-level reference model or framework identifying the participants in \ndigital preservation, their roles and responsibilities, and the kinds of information to be \nexchanged during the course of deposit and ingest into and dissemination from a \ndigital repository. \nIt is important t"} {"text":"o acknowledge that there is real value in knowing whether an institution is \ncertified to related standards or meets other controls that would be relevant to an audit. \nCertainly, an institution that has undertaken any kind of certification process\u2014even if none \nof the evaluated components overlap with a digital repository audit\u2014will be better prepared \nfor digital repository certification. And those that have achieved certification in related \nstandards will be able to use those certifications as evidence "} {"text":"during the digital repository \naudit. \n \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-1 \nSeptember 2011 \n3 ORGANIZATIONAL INFRASTRUCTURE \n3.1 \n GOVERNANCE AND ORGANIZATIONAL VIABILITY \n3.1.1 The repository shall have a mission statement that reflects a commitment to the \npreservation of, long term retention of, management of, and access to digital \ninformation. \nSupporting Text \nThis is necessary in order to ensure commitment to preservation, retention, management and"} {"text":" \naccess at the repository\u2019s highest administrative level. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nMission statement or charter of the repository or its parent organization that specifically \naddresses or implicitly calls for the preservation of information and\/or other resources under \nits purview; a legal, statutory, or government regulatory mandate applicable to the repository \nthat specifically addresses or implicitly requires the preservation, retention, managem"} {"text":"ent and \naccess to information and\/or other resources under its purview. \nDiscussion \nThe repository\u2019s or its parent organization\u2019s mission statement should explicitly address \npreservation. If preservation is not among the primary purposes of an organization that \nhouses a digital repository then preservation may not be essential to the organization\u2019s \nmission. In some instances a repository pursues its preservation mission as an outgrowth of \nthe larger goals of an organization in which it is housed, such"} {"text":" as a university or a government \nagency, and its narrower mission may be formalized through policies explicitly adopted and \napproved by the larger organization. Government agencies and other organizations may have \nlegal mandates that require they preserve materials, in which case these mandates can be \nsubstituted for mission statements, as they define the purpose of the organization. Mission \nstatements should be kept up to date and continue to reflect the common goals and practices \nfor preservation. \n"} {"text":"3.1.2 The repository shall have a Preservation Strategic Plan that defines the \napproach the repository will take in the long-term support of its mission. \nSupporting Text \nThis is necessary in order to help the repository make administrative decisions, shape \npolicies, and allocate resources in order to successfully preserve its holdings. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nPreservation Strategic Plan; meeting minutes; documentation of administrative decisions \n"} {"text":"which have been made. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-2 \nSeptember 2011 \nDiscussion \nThe strategic plan should be based on the organization\u2019s established mission, and on its \ndefined values, vision and goals. Strategic plans typically cover a particular finite time \nperiod, normally in the 3-5 year range. \n3.1.2.1 The repository shall have an appropriate succession plan, contingency plans, \nand\/or escrow arrangements in place in case the repository cease"} {"text":"s to operate or the \ngoverning or funding institution substantially changes its scope. \nSupporting Text \nThis is necessary in order to preserve the information content entrusted to the repository by \nhanding it on to another custodian in the case that the repository ceases to operate. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nWritten and credible succession and contingency plan(s); explicit and specific statement \ndocumenting the intent to ensure continuity of the repo"} {"text":"sitory, and the steps taken and to be \ntaken to ensure continuity; escrow of critical code, software, and metadata sufficient to \nenable reconstitution of the repository and its content in the event of repository failure; \nescrow and\/or reserve funds set aside for contingencies; explicit agreements with successor \norganizations documenting the measures to be taken to ensure the complete and formal \ntransfer of responsibility for the repository\u2019s digital content and related assets, and granting \nthe requisit"} {"text":"e rights necessary to ensure continuity of the content and repository services. \nDiscussion \nA repository\u2019s failure threatens the long-term sustainability of a repository\u2019s information \ncontent. It is not sufficient for the repository to have an informal plan or policy regarding \nwhere its data goes should a failure occur. A formal plan with identified procedures needs to \nbe in place. \n3.1.2.2 The repository shall monitor its organizational environment to determine \nwhen to execute its succession plan, con"} {"text":"tingency plans, and\/or escrow arrangements. \nSupporting Text \nThis is necessary in order to ensure that the repository can recognize when it is necessary to \nexecute those plans. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nAdministrative policies, procedures, protocols, requirements; budgets and financial analysis \ndocuments; fiscal calendars; business plan(s); any evidence of active monitoring and \npreparedness. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORI"} {"text":"ES \nCCSDS 652.0-M-1 \nPage 3-3 \nSeptember 2011 \nDiscussion \nThe management of a repository should have formal procedures in place to periodically \ncheck on the viability of the repository. This periodic check should be used to determine if, \nor when, to execute the repository\u2019s formal succession plan, contingency plans, and\/or \nescrow arrangements. \n3.1.3 The repository shall have a Collection Policy or other document that specifies \nthe type of information it will preserve, retain, manage, and provide acce"} {"text":"ss to. \nSupporting Text \nThis is necessary in order that the repository has guidance on acquisition of digital content it \nwill preserve, retain, manage and provide access to. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nCollection policy and supporting documents; Preservation Policy, mission, goals and vision \nof the repository. \nDiscussion \nThe collection policy can be used to understand what the repository holds, what it does not \nhold, and why. The collection policy "} {"text":"supports the broader mission of the repository. Without \nsuch a policy the repository is likely to collect in a haphazard manner, or store large amounts \nof low-value digital content. The collection policy helps the organization to identify what \ndigital content it will and will not accept for ingestion. In an organization with a broader \nmission than preservation of digital content the collection policy helps to define the role of \nthe repository within the larger organizational context. \n3.2 \nORGANIZATION"} {"text":"AL STRUCTURE AND STAFFING \n3.2.1 The repository shall have identified and established the duties that it needs to \nperform and shall have appointed staff with adequate skills and experience to fulfill \nthese duties. \nDiscussion \nStaffing of the repository should be by personnel with the required training and skills to carry \nout the activities of the repository. The repository should be able to document through \ndevelopment plans, organizational charts, job descriptions, and related policies and \nprocedures"} {"text":" that the repository is defining and maintaining the skills and roles that are \nrequired for the sustained operation of the repository. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-4 \nSeptember 2011 \n3.2.1.1 The repository shall have identified and established the duties that it needs to \nperform. \nSupporting Text \nThis is necessary in order to ensure that the repository can complete all tasks associated with \nthe long-term preservation and management of the data obj"} {"text":"ects. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nA staffing plan; competency definitions; job descriptions; staff professional development \nplans; certificates of training and accreditation; plus evidence that the repository reviews and \nmaintains these documents as requirements evolve. \nDiscussion \nPreservation depends upon a range of activities from maintaining hardware and software to \nmigrating content and storage media to negotiating intellectual property rights ag"} {"text":"reements. In \norder to ensure long-term sustainability, a repository must be aware of all required activities \nand demonstrate that it can successfully complete them. The repository can achieve these \naims by, for example, identifying the competencies and skill sets required to carry out its \nactivities over time\u2014e.g., archival training, technical skills, and legal expertise. \n3.2.1.2 The repository shall have the appropriate number of staff to support all \nfunctions and services. \nSupporting Text \nThis is "} {"text":"necessary in order to ensure repository staffing levels are adequate for preserving the \ndigital content and providing a secure, quality repository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nOrganizational charts; definitions of roles and responsibilities; comparison of staffing levels \nto industry benchmarks and standards. \nDiscussion \nThe repository should determine the appropriate number and level of staff that corresponds \nto requirements and commitments. The repos"} {"text":"itory should also demonstrate how it evaluates \nstaff effectiveness and suitability to support its functions and services. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-5 \nSeptember 2011 \n3.2.1.3 The repository shall have in place an active professional development program \nthat provides staff with skills and expertise development opportunities. \nSupporting Text \nThis is necessary to ensure that staff skill sets evolve as the repository technology and \npreservation pr"} {"text":"ocedures change. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nProfessional development plans and reports; training requirements and training budgets, \ndocumentation of training expenditures (amount per staff); performance goals and \ndocumentation of staff assignments and achievements, copies of certificates awarded. \nDiscussion \nTechnology and general practices for digital preservation will continue to change, as will the \nrequirements of its Designated Community, so the "} {"text":"repository must ensure that its staff\u2019s skill \nsets evolve. Ideally the repository will meet this requirement through a lifelong learning \napproach to developing and retaining staff. \n3.3 \nPROCEDURAL ACCOUNTABILITY AND PRESERVATION POLICY \nFRAMEWORK \nDocumentation assures stakeholders (consumers, producers, and contributors of digital \ncontent) that the repository is meeting its requirements and fully performing its role as a \ntrustworthy digital repository. A repository must create documentation that refl"} {"text":"ects its \nMission Statement and Strategic Plan and captures its normal activities. This entails \ndocumenting all repository processes, decision-making, and goal setting. Documentation is \nprovided so that the activities of the repository will be understood by stakeholders and \nmanagement. It ensures that repository policies and procedures are carried out in approved, \nconsistent ways, resulting in long-term preservation and access to digital content in its care. \nCertification, the clearest indicator of a r"} {"text":"epository\u2019s sound and standards-based practice, is \nfacilitated by procedural accountability and documentation. \n3.3.1 The repository shall have defined its Designated Community and associated \nknowledge base(s) and shall have these definitions appropriately accessible. \nSupporting Text \nThis is necessary in order that it is possible to test that the repository meets the needs of its \nDesignated Community. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nA written definition "} {"text":"of the Designated Community. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-6 \nSeptember 2011 \nDiscussion \nThe Designated Community is defined as \u2018an identified group of potential Consumers who \nshould be able to understand a particular set of information. The Designated Community \nmay be composed of multiple user communities. A Designated Community is defined by the \narchive and this definition may change\/evolve over time\u2019 (OAIS Glossary, reference [1]). \nExamples of"} {"text":" Designated Community definitions include: \n\u2013 General English-reading public educated to high school and above, with access to a \nWeb Browser (HTML 4.0 capable). \n\u2013 For Geographic Information System (GIS) data: GIS researchers\u2014undergraduates \nand above\u2014having an understanding of the concepts of Geographic data and having \naccess to current (2005, USA) GIS tools\/computer software, e.g., ArcInfo (2005). \n\u2013 Astronomer (undergraduate and above) with access to Flexible Image Transport \nSystem (FITS) software suc"} {"text":"h as FITSIO, familiar with astronomical spectrographic \ninstruments. \n\u2013 Student of Middle English with an understanding of Text Encoding Initiative (TEI) \nencoding and access to an XML rendering environment. \n\u2022 \nVariant 1: Cannot understand TEI; \n\u2022 \nVariant 2: Cannot understand TEI and no access to XML rendering environment; \n\u2022 \nVariant 3: No understanding of Middle English but does understand TEI and \nXML. \n\u2013 The repository has defined the external parties, and its assets, owners, and uses. Two \ngroups: t"} {"text":"he publishers of scholarly journals and their readers, each of whom have \ndifferent rights to access material and different services offered to them. \nSome repositories may call themselves, for example, a \u2018dark archive\u2019, an archive that has a \npolicy not to allow consumers to get access to its contents for a certain period of time, but \nthey would nevertheless need a Designated Community. \n3.3.2 The repository shall have Preservation Policies in place to ensure its \nPreservation Strategic Plan will be met. "} {"text":"\nSupporting Text \nThis is necessary in order to ensure that the repository can fulfill that part of its mission \nrelated to preservation. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nPreservation Policies; Repository Mission Statement. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-7 \nSeptember 2011 \nDiscussion \nRepository policies show how the repository fulfills the requirements of the repository\u2019s \npreservation strategic plan. For"} {"text":" example, a preservation strategic plan may contain a \nrequirement that the repository \u2018comply with current preferred preservation standards\u2019. The \npreservation policy might then require that the repository \u2018monitor current preservation \nstandards and ensure repository compliance with the preferred preservation standards\u2019. In \nanother example the repository may be required by the strategic plan to keep its data \nunderstandable. The preservation policy might then include information about the expected \nlevel"} {"text":" of understandability by the repository\u2019s Designated Community for each Archival \nInformation Package. \n3.3.2.1 The repository shall have mechanisms for review, update, and ongoing \ndevelopment of its Preservation Policies as the repository grows and as technology and \ncommunity practice evolve. \nSupporting Text \nThis is necessary in order that the repository has up-to-date, complete policies and \nprocedures in place that reflect the current requirements and practices of its community(ies) \nfor preservation"} {"text":". \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nCurrent and past written documentation in the form of Preservation Policies, Preservation \nStrategic Plans and Preservation Implementation Plans, procedures, protocols, and \nworkflows; specifications of review cycles for documentation; documentation detailing \nreviews, surveys and feedback. If documentation is embedded in system logic, functionality \nshould demonstrate the implementation of policies and procedures. \nDiscussio"} {"text":"n \nPreservation Policies capture organizational commitments and intents for staffing, security \nand other preservation-related concerns. Preservation Implementation Plans address \npreservation activities and practices such as transfer, submission, quality control, storage \nmanagement, metadata management, and access and rights management. The repository may \nfind it beneficial to maintain all versions of the preservation policies (e.g., outdated versions \nare clearly identified and maintained in some organ"} {"text":"ized way) in order to document the results \nof monitoring for new developments, showing the repository\u2019s responsiveness to prevailing \nstandards and practice, emerging requirements, and standards that are specific to the domain, \nif appropriate, and similar developments. Qualified staff and peers are an important part of \nthe review process, as they help to update and expand these documents. The policies should \nbe understandable by the repository staff in order for them to carry out their work. \nPreservat"} {"text":"ion Policies and procedures must be demonstrated to be understandable and \nimplementable. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-8 \nSeptember 2011 \n3.3.3 The repository shall have a documented history of the changes to its operations, \nprocedures, software, and hardware. \nSupporting Text \nThis is necessary in order to provide an \u2018audit trail\u2019 through which stakeholders can identify \nand trace decisions made by the repository. \nExamples of Ways the Repository Ca"} {"text":"n Demonstrate It Is Meeting This Requirement \nCapital equipment inventories; documentation of the acquisition, implementation, update, \nand retirement of critical repository software and hardware; file retention and disposal \nschedules and policies, copies of earlier versions of policies and procedures; minutes of \nmeetings. \nDiscussion \nThis documentation may include decisions about the organizational and technical \ninfrastructure. Documentation of or interviews with appropriate staff who can explain \nrepo"} {"text":"sitory practices and workflow should be available. \n3.3.4 The repository shall commit to transparency and accountability in all actions \nsupporting the operation and management of the repository that affect the preservation \nof digital content over time. \nSupporting Text \nThis is necessary because transparency, in the sense of being available to anyone who wishes \nto know, is the best assurance that the repository operates in accordance with accepted \nstandards and practices. \nExamples of Ways the Repositor"} {"text":"y Can Demonstrate It Is Meeting This Requirement \nReports of financial and technical audits and certifications; disclosure of governance \ndocuments, independent program reviews, and contracts and agreements with providers of \nfunding and critical services. \nDiscussion \nIf the repository uses software to capture information about its history, it should be able to \ndemonstrate these tracking tools. Where appropriate, the history is linked to relevant \npreservation strategies and describes potential effects on"} {"text":" preserving digital content. This \nrequirement does not mean that the organization must make information which would make \nit vulnerable to competitors available, but rather that the organization commits to disclosing \nits methods for preserving digital content at least to the Designated Community or other \nappropriate stakeholder in order to demonstrate that it is meeting all current preservation \nrequirements. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-9 \nSeptemb"} {"text":"er 2011 \n3.3.5 The repository shall define, collect, track, and appropriately provide its \ninformation integrity measurements. \nSupporting Text \nThis is necessary in order to provide documentation that it has developed or adapted \nappropriate measures for ensuring the integrity of its holding. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nWritten definition or specification of the repository\u2019s integrity measures (for example, \ncomputed checksum or hash value); documentatio"} {"text":"n of the procedures and mechanisms for \nmonitoring integrity measurements and for responding to results of integrity measurements \nthat indicate digital content is at risk; an audit process for collecting, tracking, and presenting \nintegrity measurements; Preservation Policy and workflow documentation. \nDiscussion \nThe mechanisms to measure integrity will evolve as technology evolves. The repository may \nprovide documentation that it has developed or adapted appropriate measures for ensuring \nthe integrity "} {"text":"of its holdings. If protocols, rules and mechanisms are embedded in the \nrepository software, there should be some way to demonstrate the implementation of \nintegrity measures. \n3.3.6 The repository shall commit to a regular schedule of self-assessment and \nexternal certification. \nSupporting Text \nThis is necessary in order to ensure the repository continues to be trustworthy and there is no \nthreat to its content. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nCompleted, "} {"text":"dated checklists from self-assessments and\/or third-party audits; certificates \nawarded for compliance with relevant ISO standards; timetables and evidence of adequate \nbudget allocations for future certification. \nDiscussion \nA one-time check on trustworthiness is not adequate because many things will change over \ntime. A longer term commitment should be demonstrated. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-10 \nSeptember 2011 \n3.4 \nFINANCIAL SUSTAINABILITY \n3."} {"text":"4.1 The repository shall have short- and long-term business planning processes in \nplace to sustain the repository over time. \nSupporting Text \nThis is necessary in order to ensure the viability of the repository over the period of time it \nhas promised to provide access to its contents for its Designated Community. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nUp-to-date, multi-year strategic, operating and\/or business plans; audited annual financial \nstatements; financia"} {"text":"l forecasts with multiple budget scenarios; contingency plans; market \nanalysis. \nDiscussion \nAn annual business planning process is commonly accepted as the standard for most \norganizations. \n3.4.2 The repository shall have financial practices and procedures which are \ntransparent, compliant with relevant accounting standards and practices, and audited \nby third parties in accordance with territorial legal requirements. \nSupporting Text \nThis is necessary in order to guard against malfeasance or other unto"} {"text":"ward activity that might \nthreaten the economic viability of the repository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDemonstrated dissemination requirements for business planning and practices; citations to \nand\/or examples of accounting and audit requirements, standards, and practice; audited \nannual financial statements. \nDiscussion \nThe repository cannot simply claim transparency, but should show that it adjusts its business \npractices to keep them transparent, co"} {"text":"mpliant, and auditable. Confidentiality requirements \nmay prohibit making information about the repository\u2019s finances public, but the repository \nshould be able to demonstrate that it is satisfying the needs of its Designated Community. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-11 \nSeptember 2011 \n3.4.3 The repository shall have an ongoing commitment to analyze and report on \nfinancial risk, benefit, investment, and expenditure (including assets, licenses, and \nli"} {"text":"abilities). \nSupporting Text \nThis is necessary in order to demonstrate that the repository has identified and documented \nthese categories, and actively manages them, including identifying and responding to risks, \ndescribing and leveraging benefits, specifying and balancing investments, and anticipating \nand preparing for expenditures. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nRisk management documents that identify perceived and potential threats and planned or \nimp"} {"text":"lemented responses (a risk register); technology infrastructure investment planning \ndocuments; cost\/benefit analyses; financial investment documents and portfolios; \nrequirements for and examples of licenses, contracts, and asset management; evidence of \nrevision based on risk. \nDiscussion \nThe repository should have a goal of maintaining an appropriate balance between risk and \nbenefits, investment and return. \n3.5 \nCONTRACTS, LICENSES, AND LIABILITIES \n3.5.1 The repository shall have and maintain appropr"} {"text":"iate contracts or deposit \nagreements for digital materials that it manages, preserves, and\/or to which it provides \naccess. \nSupporting Text \nThis is necessary in order to ensure that the repository has the rights and authorizations \nneeded to enable it to collect and preserve digital content over time, make that information \navailable to its Designated Community, and defend those rights when challenged. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nProperly signed and ex"} {"text":"ecuted deposit agreements and licenses in accordance with local, \nnational, and international laws and regulations; policies on third-party deposit arrangements; \ndefinitions of service levels and permitted uses; repository policies on the treatment of \n\u2018orphan works\u2019 and copyright dispute resolution; reports of independent risk assessments of \nthese policies; procedures for regularly reviewing and maintaining agreements, contracts, and \nlicenses. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES"} {"text":" \nCCSDS 652.0-M-1 \nPage 3-12 \nSeptember 2011 \nDiscussion \nRepositories may need to show evidence that their contracts are being followed. This is \nespecially important for those with third-party deposit arrangements. These arrangements \nmay require the repository to guarantee that relevant contracts, licenses, or deposit \nagreements express rights, responsibilities, and expectations of each party. Contracts and \nformal deposit agreements should be legitimate; that is, they need to be countersigned and \ncurr"} {"text":"ent. When the relationship between depositor and repository is less formal (e.g., a faculty \nmember depositing work in an academic institution\u2019s preservation repository), \ndocumentation articulating the repository\u2019s capabilities and commitments should be provided \nto each depositor. Repositories engaged in Web harvesting may find this requirement \ndifficult because of the way in which Web-based information is harvested\/captured for long-\nterm preservation, and so contracts or deposit agreements are rarely r"} {"text":"equired. Some \nrepositories capture, manage, and preserve access to this material without written permission \nfrom the content creators. Others go through the very time-consuming and costly process of \ncontacting content owners before capturing and ingesting information. Ideally, agreements \nare tracked, linked, managed, and made accessible in a contracts database. \n3.5.1.1 The repository shall have contracts or deposit agreements which specify and \ntransfer all necessary preservation rights, and those righ"} {"text":"ts transferred shall be \ndocumented. \nSupporting Text \nThis is necessary in order to have sufficient control of the information for preservation and \nlimit the repository\u2019s exposure to liability or legal and financial harm. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nContracts, deposit agreements; specification(s) of rights transferred for different types of \ndigital content (if applicable); policy statements on requisite preservation rights. \nDiscussion \nBecause the rig"} {"text":"ht to change or alter digital information is often restricted by law to the \ncreator, it is important that digital repository contracts and agreements address the need to be \nable to work with and potentially modify digital objects to keep them accessible. Repository \nagreements with depositors must specify and\/or transfer to the repository certain rights \nenabling appropriate and necessary preservation actions for the digital objects within the \nrepository. Because legal negotiations can take time, potenti"} {"text":"ally preventing or slowing the \ningest of digital objects at risk, it is acceptable for a digital repository to take in or accept \ndigital objects even with only minimal preservation rights using an open-ended agreement \nand then deal with expanding to detailed rights later. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-13 \nSeptember 2011 \n3.5.1.2 The repository shall have specified all appropriate aspects of acquisition, \nmaintenance, access, and withdrawal in writte"} {"text":"n agreements with depositors and other \nrelevant parties. \nSupporting Text \nThis is necessary in order to ensure that the respective roles of repository, producers, and \ncontributors in the depositing of digital content and transfer of responsibility for preservation \nare understood and accepted by all parties. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nProperly executed submission agreements, deposit agreements, and deeds of gift; written \nstandard operating procedures"} {"text":". \nDiscussion \nThe deposit agreement specifies all aspects of these issues that are necessary for the \nrepository to carry out its function. There may be a single agreement covering all deposits, or \nspecific agreements for each deposit, or a standard agreement supplemented by special \nconditions for some deposits. These special conditions may add to the standard agreement or \noverride some aspects of the standard agreement. Agreements may need to cover restrictions \non access and will need to cover all pro"} {"text":"perty rights in the digital objects. Agreements may \nplace responsibilities on depositors, such as ensuring that Submission Information Packages \n(SIPs) conform to some pre-agreed standards, and may allow repositories to refuse SIPs that \ndo not meet these standards. Other repositories may take responsibility for fixing errors in \nSIPs. The division of responsibilities must always be clear. Agreements, written or \notherwise, may not always be necessary. The burden of proof is on the repository to \ndemonstra"} {"text":"te that it does not need such agreements because, for instance, it has a legal \nmandate for its activities. An agreement should include, at a minimum, property rights, \naccess rights, conditions for withdrawal, level of security, level of finding aids, SIP \ndefinitions, time, volume, and content of transfers. One example of a standard to follow for \nthis is the CCSDS\/ISO Producer-Archive Interface Methodology Abstract Standard \n(reference [B4]). \n3.5.1.3 The repository shall have written policies that indic"} {"text":"ate when it accepts \npreservation responsibility for contents of each set of submitted data objects. \nSupporting Text \nThis is necessary in order to avoid misunderstandings between the repository and \nproducer\/depositor as to when and how the transfer of responsibility for the digital content \noccurs. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-14 \nSeptember 2011 \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nProperly executed submi"} {"text":"ssion agreements, deposit agreements, and deeds of gift; \nconfirmation receipt sent back to producer\/depositor. \nDiscussion \nIf this requirement is not met, there is a risk that, for example, the original is erased before \nthe repository has taken responsibility for the submitted data objects. Without the \nunderstanding that the repository has already taken preservation responsibility for the SIP, \nthere is the risk that the producer\/depositor may make changes to the data and these would \nnot be properly pr"} {"text":"eserved since they had already been ingested by the repository. For \nexample, for convenience the repository could receive a copy of raw science data from the \ninstrument at the same time the science team gets it, but the science team would have \nresponsibility for it until they turn over responsibility to the final repository. Repositories \nthat report back to their depositors generally will mark this acceptance with some form of \nnotification (for example, confirmation receipts) to the depositor. (This ma"} {"text":"y depend on \nrepository responsibilities as designated in the depositor agreement.) A repository may mark \nthe transfer by sending a formal document, often a final signed copy of the transfer \nagreement, back to the depositor signifying the completion of the transformation from SIP to \nAIP process. Other approaches are equally acceptable. Brief daily updates may be generated \nby a repository that only provides annual formal transfer reports. \n3.5.1.4 The repository shall have policies in place to address li"} {"text":"ability and challenges to \nownership\/rights. \nSupporting Text \nThis is necessary in order to minimize potential liability and challenges to the rights of the \nrepository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nA definition of rights, licenses, and permissions to be obtained from producers and \ncontributors of digital content; citations to relevant laws and regulations; policy on \nresponding to challenges; documented track record for responding to challenges in ways "} {"text":"that \ndo not inhibit preservation; records of relevant legal advice sought and received. \nDiscussion \nThe repository\u2019s Preservation Policies and Preservation Implementation Plans and \nmechanisms should be vetted by appropriate institutional authorities and\/or legal experts to \nensure that responses to challenges adhere to relevant laws and requirements, and that the \npotential liability for the repository is minimized. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 3-15 "} {"text":"\nSeptember 2011 \n3.5.2 The repository shall track and manage intellectual property rights and \nrestrictions on use of repository content as required by deposit agreement, contract, or \nlicense. \nSupporting Text \nThis is necessary in order to allow the repository to track, act on, and verify rights and \nrestrictions related to the use of the digital objects within the repository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nA Preservation Policy statement that defines and "} {"text":"specifies the repository\u2019s requirements and \nprocess for managing intellectual property rights; depositor agreements; samples of \nagreements and other documents that specify and address intellectual property rights; \ndocumentation of monitoring by repository over time of changes in status and ownership of \nintellectual property in digital content held by the repository; results from monitoring, \nmetadata that captures rights information. \nDiscussion \nThe repository should have a mechanism for tracking licen"} {"text":"ses and contracts to which it is \nobligated. Whatever the format of the tracking system, it must be sufficient for the institution \nto track, act on, and verify rights and restrictions related to the use of the digital objects \nwithin the repository. \n \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-1 \nSeptember 2011 \n4 DIGITAL OBJECT MANAGEMENT \n4.1 \nINGEST: ACQUISITION OF CONTENT \n4.1.1 The repository shall identify the Content Information and the Information \nPropert"} {"text":"ies that the repository will preserve. \nSupporting Text \nThis is necessary in order to make it clear to funders, depositors, and users what \nresponsibilities the repository is taking on and what aspects are excluded. It is also a \nnecessary step in defining the information which is needed from the information producers or \ndepositors. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nMission statement; submission agreements\/deposit agreements\/deeds of gift; workflow and \nPrese"} {"text":"rvation Policy documents, including written definition of properties as agreed in the \ndeposit agreement\/deed of gift; written processing procedures; documentation of properties \nto be preserved. \nDiscussion \nThis process begins in general with the repository\u2019s mission statement and may be further \nspecified in pre-accessioning agreements with producers or depositors (e.g., producer-archive \nagreements) and made very specific in deposit or transfer agreements for specific digital \nobjects and their related "} {"text":"documentation. For example, one repository may only commit to \npreserving the textual content of a document and not its exact appearance on a screen. \nAnother may wish to preserve the exact appearance and layout of textual documents, while \nothers may choose to keep the units of the measurement of data fields and to normalize the \ndata during the ingest process. If unique identifiers are associated with digital objects before \ningest, they may also be properties that need to be preserved. \n4.1.1.1 The repos"} {"text":"itory shall have a procedure(s) for identifying those Information \nProperties that it will preserve. \nSupporting Text \nThis is necessary to establish a clear understanding with depositors, funders, and the \nrepository\u2019s Designated Communities how the repository determines and checks what the \ncharacteristics and properties of preserved items will be over the long term. These procedures \nwill be necessary to confirm authenticity or to identify erroneous claims of authenticity of the \npreserved digital record"} {"text":". \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-2 \nSeptember 2011 \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDefinitions of the Information Properties which should be preserved; submission \nagreements\/deposit agreements, Preservation Policies, written processing procedures, \nworkflow documentation. \nDiscussion \nThese procedure(s) document the methods and factors a repository uses to determine the \naspects of different types of Con"} {"text":"tent Information for which it accepts preservation \nresponsibility to its designated communities. For example, a repository\u2019s procedure may be \nto use file formats in order to determine the properties it will preserve unless otherwise \nspecified in a deposit agreement. In this case, the repository would be able to demonstrate \nprovenance for objects that may have been the same file format when received but are \npreserved differently over the long term. \n4.1.1.2 The repository shall have a record of the Cont"} {"text":"ent Information and the \nInformation Properties that it will preserve. \nSupporting Text \nThis is necessary in order to identify in writing the Content Information of the records for \nwhich it has taken preservation responsibility and the Information Properties it has \ncommitted to preserve for those records based on their Content Information. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nPreservation Policies, processing manuals, collection inventories or surveys, logs of "} {"text":"Content \nInformation types, acquired preservation strategies, and action plans. \nDiscussion \nThe repository must demonstrate that it establishes and maintains an understanding of its \ndigital collections sufficient to carry out the preservation necessary to persist the properties \nto which it has committed. The repository can use this information to determine the \neffectiveness of its preservation activities over time. \n4.1.2 The repository shall clearly specify the information that needs to be associated \n"} {"text":"with specific Content Information at the time of its deposit. \nSupporting Text \nThis is necessary in order that there is a clear understanding of what needs to be acquired \nfrom the Producer. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-3 \nSeptember 2011 \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nTransfer requirements; producer-archive agreements; workflow plans to produce the AIP. \nDiscussion \nFor most types of digital objects t"} {"text":"o be ingested, the repository should have written criteria, \nprepared by the repository on its own or in conjunction with other parties, that specify \nexactly what digital object(s) are transferred, what documentation is associated with the \nobject(s), and any restrictions on access, whether technical, regulatory, or donor-imposed. \nThese criteria document what information the repository and its designated communities may \nexpect for digital object(s) upon deposit. The depositor may be a harvesting process"} {"text":" created \nby the repository. The level of precision in these specifications will vary with the nature of \nthe repository\u2019s collection policy and its relationship with creators. For instance, repositories \nengaged in Web harvesting, or those that rescue digital materials long after their creators \nhave abandoned them, cannot impose conditions on the creators of material, since they are \nnot \u2018depositors\u2019 in the usual sense of the word. But Web harvesters can, for instance, decide \nwhich metadata elements from"} {"text":" the HTTP transactions that captured a site are to be preserved \nalong with the site\u2019s files, and this still constitutes \u2018information associated with the digital \nmaterial\u2019. They may also choose to record the information or decisions\u2014whether taken by \nhumans or by automated algorithms\u2014that led to the site\u2019s being captured. The repository can \ncheck what it receives from the producer based on the specifications. \n4.1.3 The repository shall have adequate specifications enabling recognition and \nparsing of the"} {"text":" SIPs. \nSupporting Text \nThis is necessary in order to be sure that the repository is able to extract information from the \nSIPs. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nPackaging Information for the SIPs; Representation Information for the SIP Content Data, \nincluding documented file format specifications; published data standards; documentation of \nvalid object construction. \nDiscussion \nThe repository must be able to determine what the contents of a SIP are with r"} {"text":"egard to the \ntechnical construction of its components. For example, the repository needs to be able to \nrecognize a TIFF file and confirm that it is not simply a file with a filename ending in \n\u2018TIFF\u2019. Another example, would be a website for which the repository would need to be able \nto recognize and test the validity of the variety of file types (e.g., HTML, images, audio, \nvideo, CSS, etc.) that are part of the website. This is necessary in order to confirm: 1) the SIP \nAUDIT AND CERTIFICATION OF TRUSTW"} {"text":"ORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-4 \nSeptember 2011 \nis what the repository expected; 2) the Content Information is correctly identified; and 3) the \nproperties of the Content Information to be preserved have been appropriately selected. \n4.1.4 The repository shall have mechanisms to appropriately verify the identity of the \nProducer of all materials. \nSupporting Text \nThis is necessary in order to avoid providing erroneous provenance to the information which \nis preserved. \nExamples of Wa"} {"text":"ys the Repository Can Demonstrate It Is Meeting This Requirement \nLegally binding submission agreements\/deposit agreements\/deeds of gift, evidence of \nappropriate technological measures; logs from procedures and authentications. \nDiscussion \nThe repository\u2019s written standard operating procedures and actual practices must ensure the \ndigital objects are obtained from the expected depositor. Examples of a Producer include \npersons, organizations, corporate entities, or harvesting processes. Different reposit"} {"text":"ories will \nadopt different levels of proof needed; the Designated Community should have the \nopportunity to review the evidence. \n4.1.5 The repository shall have an ingest process which verifies each SIP for \ncompleteness and correctness. \nSupporting Text \nThis is necessary in order to detect and correct errors in the SIP when created and potential \ntransmission errors between the depositor and the repository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nAppropriate Pres"} {"text":"ervation Policy and Preservation Implementation Plan documents and \nsystem log files from system(s) performing ingest procedure(s); logs or registers of files \nreceived during the transfer and ingest process; documentation of standard operating \nprocedures, detailed procedures, and\/or workflows; format registries; definitions of \ncompleteness and correctness. \nDiscussion \nInformation collected during the ingest process must be compared with information from \nsome other source to verify the correctness of t"} {"text":"he data transfer and ingest process. Other \nsources will include technical and descriptive metadata obtained prior to ingest and may also \ninclude expectations set by the depositor, the object producer, a format registry, or the \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-5 \nSeptember 2011 \nrepository\u2019s own expectations. The extent to which a repository can determine correctness \nwill depend on what it knows about the SIP and what tools are available for verifying \n"} {"text":"correctness. It can mean simply checking that file formats are what they claim to be (TIFF \nfiles are valid TIFF format, for instance), or can imply checking the content. This might \ninvolve human checking in some cases, such as confirming that the description of a picture \nmatches the image. This allows the repository to demonstrate that its preserved objects have \ncompletely and correctly copied what it intended to copy from the SIPs. It also allows the \nrepository to document reasons for other SIP-relate"} {"text":"d actions such as rejecting the transfer, \nsuspending processing until the missing information is received, or simply reporting the \nerrors. Similarly, the definition of \u2018completeness\u2019 should be appropriate to a repository\u2019s \nactivities. If an inventory of files was provided by a producer as part of pre-ingest \nnegotiations, one would expect checks to be carried out against that inventory. Whatever \nchecks are carried out must be consistent with the repository\u2019s own documented definition \nand understanding "} {"text":"of completeness and correctness. One thing that a repository might want \nto do is check for network drop out or other corruption during the transmission process. \n4.1.6 The repository shall obtain sufficient control over the Digital Objects to preserve \nthem. \nSupporting Text \nThis is necessary in order to ensure that the preservation can be accomplished, with physical \ncontrol, and is authorized, with legal control. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocuments"} {"text":" showing the level of physical control the repository actually has. A separate \ndatabase\/metadata catalog listing all of the digital objects in the repository and metadata \nsufficient to validate the integrity of those objects (file size, checksum, hash, location, \nnumber of copies, etc.) \nDiscussion \nThe repository must obtain complete control of the bits of the digital objects conveyed with \neach SIP. Sufficient physical and legal control is necessary for the archives to make any \nchanges required by thei"} {"text":"r Preservation Implementation Plan for that data and to distribute it \nto their consumers. For example, in cases where SIPs only reference digital objects, the \nrepository must also reference the digital objects or preserve them if the current repository is \nnot committed to such preservation. \n4.1.7 The repository shall provide the producer\/depositor with appropriate responses \nat agreed points during the ingest processes. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage"} {"text":" 4-6 \nSeptember 2011 \nSupporting Text \nThis is necessary in order to ensure that the producer can verify that there are no inadvertent \nlapses in communication which might otherwise allow loss of SIPs. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nSubmission agreements\/deposit agreements\/deeds of gift; workflow documentation; standard \noperating procedures; evidence of \u2018reporting back\u2019 such as reports, correspondence, memos, \nor emails. \nDiscussion \nBased on the initial pr"} {"text":"ocessing plan and agreement between the repository and the \nproducer\/depositor, the repository must provide the producer\/depositor with progress reports \nat agreed points throughout the ingest process. Repository responses can range from nothing \nat all to predetermined, periodic reports of the ingest completeness and correctness, error \nreports and any final transfer of custody document. Producers\/Depositors can request further \ninformation on an ad hoc basis when the previously agreed upon reports are ins"} {"text":"ufficient. \n4.1.8 The repository shall have contemporaneous records of actions and \nadministration processes that are relevant to content acquisition. \nSupporting Text \nThis is necessary to ensure that such documentation, which may be needed in an audit, is \ncaptured and is accurate and authentic. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nWritten documentation of decisions and\/or action taken; preservation metadata logged, \nstored, and linked to pertinent digital objec"} {"text":"ts, confirmation receipts sent back to providers. \nDiscussion \nThese records should be created on or about the time of the actions they refer to and are \nrelated to actions taken during the Ingest: Acquisition of Content process (4.1). The records \nmay be automated or may be written by individuals, depending on the nature of the actions \ndescribed. Where community or international standards are used, the repository must \ndemonstrate that all relevant actions are carried through. \n4.2 \nINGEST: CREATION OF TH"} {"text":"E AIP \n4.2.1 The repository shall have for each AIP or class of AIPs preserved by the \nrepository an associated definition that is adequate for parsing the AIP and fit for long-\nterm preservation needs. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-7 \nSeptember 2011 \nSupporting Text \nThis is necessary to ensure that the AIP and its associated definition, including appropriate \nPackaging Information, can always be found, processed and managed within the archive. \n4.2.1"} {"text":".1 The repository shall be able to identify which definition applies to which AIP. \nSupporting Text \nThis is necessary to ensure that the appropriate definition is used when parsing\/interpreting \nan AIP. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation clearly linking each AIP, or class of AIPs, to its definition. \nDiscussion \nThe repository may use any method for associating the definitions and the AIPs that provides \nfor the continued and continuous linkage of"} {"text":" the two entities. \n4.2.1.2 The repository shall have a definition of each AIP that is adequate for long-\nterm preservation, enabling the identification and parsing of all the required \ncomponents within that AIP. \nSupporting Text \nThis is necessary in order to explicitly show that the AIPs are fit for their intended purpose, \nthat each component of an AIP has been adequately conceived and executed and the plans for \nthe maintenance of each AIP are in place. (See 4.3, Preservation Planning, below.) \nExample"} {"text":"s of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDemonstration of the use of the definitions to extract Content Information and PDI \n(Provenance, Access Rights, Context, Reference, and Fixity Information) from AIPs. It \nshould be noted that the Provenance of a digital object, for example, may be extended over \ntime to reflect additional preservation actions. \nDiscussion \nDocumentation should identify each class of AIP and describe how each is implemented \nwithin the repository. Imple"} {"text":"mentations may, for example, involve some combination of files, \ndatabases, and\/or documents. Documentation shall relate the AIP component\u2019s contents to \nthe related preservation needs of the repository, with enough detail for the repository\u2019s \nproviders and consumers to be confident that the significant properties of AIPs will be \npreserved. Documentation should clearly show that AIP components such as Representation \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-8 \nS"} {"text":"eptember 2011 \nInformation and Provenance can be managed and kept up to date. The repository should \nclearly identify when new versions of AIPs need to be created in order to keep them fit for \npurpose. The external dependencies of the AIP should also be recorded. \nDefinitions should exist for each AIP, or class of AIP if there are many instances of the same \ntype. Repositories that store a wide variety of object types may need a specific definition for \neach AIP they hold, but it is expected that most repo"} {"text":"sitories will establish class descriptions \nthat apply to many AIPs. It must be possible to determine which definition applies to which \nAIP. It may also be necessary for the definitions to say something about the semantics or \nintended use of the AIPs if this could affect long-term preservation decisions. For example, \ntwo repositories might both preserve only digital still images, both using multi-image TIFF \nfiles as their preservation format. Repository 1 consists entirely of real-world photographic \nim"} {"text":"ages intended for viewing by people and has a single definition covering all of its AIPs. \n(The definition may refer to a local or external definition of the TIFF format.) Repository 2 \ncontains some images, such as medical x-rays, that are intended for computer analysis rather \nthan viewing by the human eye, and other images that are like those in Repository 1. \nRepository 2 should perhaps define two classes of AIPs, even though it only uses one storage \nformat for both. A future preservation action may de"} {"text":"pend on the intended use of the image\u2014\nan action that changes the bit-depth of the image in a way that is not perceivable to the \nhuman eye may be satisfactory for real-world photographs but not for medical images, for \nexample. An AIP contains these key components: the primary data object to be preserved, its \nsupporting Representation Information (format and meaning of the format elements), and the \nvarious categories of Preservation Description Information (PDI) that also need to be \nassociated with the "} {"text":"primary data object: Fixity, Provenance, Context, and Reference. There \nshould be a definition of how these categories of information are linked. \n4.2.2 The repository shall have a description of how AIPs are constructed from SIPs. \nSupporting Text \nThis is necessary in order to ensure that the AIP(s) adequately represents the information in \nthe SIP(s). \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nProcess description documents; documentation of the SIP-AIP relationship; "} {"text":"clear \ndocumentation of how AIPs are derived from SIPs. \nDiscussion \nIn some cases, the AIP and SIP will be almost identical apart from packaging and location, \nand the repository need only state this. In other cases, complex transformations (e.g., data \nnormalization) may be applied to objects during the ingest process, and a precise description \nof these actions may be necessary to reflect how the AIP(s) has been adequately transformed \nfrom the information in the SIP(s). The AIP construction description "} {"text":"should include \ndocumentation that gives a detailed description of the ingest process for each SIP to AIP \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-9 \nSeptember 2011 \ntransformation, typically consisting of an overview of general processing being applied to all \nsuch transformations, augmented with description of different classes of such processing and, \nwhen applicable, with special transformations that were needed. \nSome repositories may need to produce these c"} {"text":"omplex descriptions case by case. Under such \ncircumstances case diaries or logs of actions taken to produce each AIP should be created \nand maintained. In these cases, documentation should be mapped to individual AIPs, and the \nmapping should be available for examination. Other repositories that can run a more \nproduction-line approach may have a description for how each class of incoming objects is \ntransformed to produce the AIP. It must be clear which definition applies to which AIP. If, to \ntake a simp"} {"text":"le example, two separate processes each produce a TIFF file, it must be clear \nwhich process was applied to produce a particular TIFF file. \n4.2.3 The repository shall document the final disposition of all SIPs. \nIn particular the following aspect must be checked. \n4.2.3.1 The repository shall follow documented procedures if a SIP is not incorporated \ninto an AIP or discarded and shall indicate why the SIP was not incorporated or \ndiscarded. \nSupporting Text \nThis is necessary in order to ensure that the SI"} {"text":"Ps received have been dealt with appropriately, \nand in particular have not been accidentally lost. \nExamples of Ways the Repository can Demonstrate it is Meeting these Requirements \nSystem processing files; disposal records; donor or depositor agreements\/deeds of gift; \nprovenance tracking system; system log files; process description documents; documentation \nof SIP relationship to AIP; clear documentation of how AIPs are derived from SIPs; \ndocumentation of standard\/process against which normalization oc"} {"text":"curs; documentation of \nnormalization outcome and how the resulting AIP is different from the SIP(s). \nDiscussion \nThe timescale of this process will vary between repositories from seconds to many months, \nbut SIPs must not remain in an unprocessed limbo-like state forever. The accessioning \nprocedures and the internal processing and audit logs should maintain records of all internal \ntransformations of SIPs to demonstrate that they either become AIPs (or part of AIPs) or are \ndisposed of. Appropriate descr"} {"text":"iptive information should also document the provenance of all \ndigital objects. \n4.2.4 The repository shall have and use a convention that generates persistent, unique \nidentifiers for all AIPs. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-10 \nSeptember 2011 \nIn particular the following aspects must be checked. \n4.2.4.1 The repository shall uniquely identify each AIP within the repository. \n4.2.4.1.1 The repository shall have unique identifiers. \n4.2.4.1.2 The reposi"} {"text":"tory shall assign and maintain persistent identifiers of the AIP and \nits components so as to be unique within the context of the repository. \n4.2.4.1.3 Documentation shall describe any processes used for changes to such \nidentifiers. \n4.2.4.1.4 The repository shall be able to provide a complete list of all such identifiers \nand do spot checks for duplications. \n4.2.4.1.5 The system of identifiers shall be adequate to fit the repository\u2019s current and \nforeseeable future requirements such as numbers of objec"} {"text":"ts. \nSupporting Text \nThis is necessary in order to ensure that each AIP can be unambiguously found in the future. \nThis is also necessary to ensure that each AIP can be distinguished from all other AIPs in the \nrepository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation describing naming convention and physical evidence of its application (e.g., \nlogs). \n4.2.4.2 The repository shall have a system of reliable linking\/resolution services in \norder to find the un"} {"text":"iquely identified object, regardless of its physical location. \nSupporting Text \nThis is necessary in order that actions relating to AIPs can be traced over time, over system \nchanges, and over storage changes. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation describing naming convention and physical evidence of its application (e.g., \nlogs). \nDiscussion \nA repository needs to ensure that there is in place an accepted, standard naming convention \nthat identifies"} {"text":" its materials uniquely and persistently for use both in and outside the \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-11 \nSeptember 2011 \nrepository. The \u2018visibility\u2019 requirement here means \u2018visible\u2019 to repository managers and \nauditors. It does not imply that these unique identifiers need to be visible to end users or that \nthey serve as the primary means of access to digital objects. Ideally, the unique ID lives as \nlong as the AIP; if it does not, there must be tr"} {"text":"aceability. Subsection 4.2.1 requires that the \ncomponents of an AIP be suitably bound and identified for long-term management, but \nplaces no restrictions on how AIPs are identified with files. Thus, in the general case, an AIP \nmay be distributed over many files, or a single file may contain more than one AIP. \nTherefore identifiers and filenames may not necessarily correspond to each other. \nDocumentation must represent these relationships. \n4.2.5 The repository shall have access to necessary tools and r"} {"text":"esources to provide \nauthoritative Representation Information for all of the digital objects it contains. \nIn particular the following aspects must be checked. \n4.2.5.1 The repository shall have tools or methods to identify the file type of all \nsubmitted Data Objects. \n4.2.5.2 The repository shall have tools or methods to determine what Representation \nInformation is necessary to make each Data Object understandable to the Designated \nCommunity. \n4.2.5.3 The repository shall have access to the requisite Re"} {"text":"presentation Information. \n4.2.5.4 The repository shall have tools or methods to ensure that the requisite \nRepresentation Information is persistently associated with the relevant Data Objects. \nSupporting Text \nThis is necessary in order to ensure that the repository\u2019s digital objects are understandable to \nthe Designated Community. \nExamples of Ways the Repository can Demonstrate it is Meeting these Requirements \nSubscription or access to registries of Representation Information (including format \nregistr"} {"text":"ies); viewable records in local registries (with persistent links to digital objects); \ndatabase records that include Representation Information and a persistent link to relevant \ndigital objects. \nDiscussion \nThese tools and resources can be held internally or can be shared via, for example, a trusted \nset of registries. However, this requirement does not demand that each repository has such \ntools and resources, merely that it has access to them. For example a repository may access \nAUDIT AND CERTIFICATIO"} {"text":"N OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-12 \nSeptember 2011 \nexternal registries.1 Any such registry is a specialized type of repository, which itself must be \ncertified\/trustworthy. The repository may use these types of standardized, authoritative \ninformation sources to identify and\/or verify the Representation Information components of \nContent Information and PDI. This will reduce the long-term maintenance costs to the \nrepository and improve quality control. Sometimes there is bot"} {"text":"h general Representation \nInformation (e.g., format information) and specific Representation Information (e.g., \nmeanings of individual fields within a dataset). Often the general information will be \navailable in an external repository, but the local repository may need to maintain the \ninstance-specific information. It is likely that many repositories would wish to keep local \ncopies of relevant Representation Information; however, this may not be practical in all \ncases. Even where a repository strives t"} {"text":"o keep all such information locally there may be, for \nexample, a schedule of updates which means that until an update is performed, the local \nRepresentation Information is incomplete. This may be regarded as a kind of local caching \nof, for example, the Representation Information held in registries. Alternatively one may say \nthat in these cases, the use of international registries is not meant to replace local registries \nbut instead serve as a resource to verify or obtain independent, authoritative info"} {"text":"rmation \nabout any and all Representation Information. Good practice suggests that any locally held \nRepresentation Information should also be made available to other repositories via a trusted \nregistry. In addition any item of Representation Information should itself have adequate \nRepresentation Information to ensure that the Designated Community can understand and use \nthe data object being preserved. \n4.2.6 The repository shall have documented processes for acquiring Preservation \nDescription Informati"} {"text":"on (PDI) for its associated Content Information and acquire PDI \nin accordance with the documented processes. \nIn particular the following aspects must be checked. \n4.2.6.1 The repository shall have documented processes for acquiring PDI. \n4.2.6.2 The repository shall execute its documented processes for acquiring PDI. \n4.2.6.3 The repository shall ensure that the PDI is persistently associated with the \nrelevant Content Information. \nSupporting Text \nThis is necessary in order to ensure that an auditable t"} {"text":"rail to support claims of authenticity is \navailable, that unauthorized changes to the digital holdings can be detected, and that the \ndigital objects can be identified and placed in their appropriate context. \n \n1 The Unified Digital Formats Registry (UDFR, http:\/\/www.gdfr.info\/udfr.html) and the UK \nDigital Curation Centre\u2019s Registry Repository of Representation Information (RRORI, \nhttp:\/\/registry.dcc.ac.uk) are two emerging examples. \nAUDIT AND CERTIFICATI"} {"text":"ON OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-13 \nSeptember 2011 \nExamples of Ways the Repository can Demonstrate it is Meeting these Requirements \nStandard operating procedures; manuals describing ingest procedures; viewable \ndocumentation on how the repository acquires and manages Preservation Description \nInformation (PDI); creation of checksums or digests, consulting with Designated Community \nabout Context. \nDiscussion \nPDI is needed not only by the repository to help ensure the Conte"} {"text":"nt Information is not \ncorrupted (Fixity) and is findable (Reference Information), but to help ensure the Content \nInformation is adequately understandable by providing a historical perspective (Provenance \nInformation) and by providing relationships to other information (Context Information). The \nextent of such information needs is best addressed by members of the Designated \nCommunity(ies). The PDI must be permanently associated with Content Information. \n4.2.7 The repository shall ensure that the Conten"} {"text":"t Information of the AIPs is \nunderstandable for their Designated Community at the time of creation of the AIP. \nIn particular the following aspects must be checked. \n4.2.7.1 Repository shall have a documented process for testing understandability for \ntheir Designated Communities of the Content Information of the AIPs at their creation. \n4.2.7.2 The repository shall execute the testing process for each class of Content \nInformation of the AIPs. \n4.2.7.3 The repository shall bring the Content Information of"} {"text":" the AIP up to the \nrequired level of understandability if it fails the understandability testing. \nSupporting Text \nThis is necessary in order to ensure that one of the primary tests of preservation, namely that \nthe digital holdings are understandable by their Designated Community, can be met. (See 4.3 \nfor additional requirements for understandability beyond ingest.) \nExamples of Ways the Repository can Demonstrate it is Meeting these Requirements \nTest procedures to be run against the digital holdings t"} {"text":"o ensure their understandability to the \ndefined Designated Community; records of such tests being performed and evaluated; \nevidence of gathering or identifying Representation Information to fill any intelligibility gaps \nwhich have been found; retention of individuals with the discipline expertise. \nDiscussion \nThis requirement is concerned with the understandability of the AIP. If the ingested material \nis not understandable, the repository needs to ingest or make available additional information \nAUDIT "} {"text":"AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-14 \nSeptember 2011 \nto make sure that the AIPs are understandable to the Designated Community(ies). For \nexample, if documents are written in a dying language and the Designated Community is no \nlonger able to understand the language the documents are written in, the repository would \nneed to provide additional documentation that would allow the Designated Community to \nunderstand the documents (e.g., translations of the document"} {"text":"s in a language the Designated \nCommunity could understand or dictionaries that would allow the Designated Communities \nto translate the documents into a language its members understand). \n4.2.8 The repository shall verify each AIP for completeness and correctness at the \npoint it is created. \nSupporting Text \nThis is necessary in order to ensure that what is maintained over the long term is as it should \nbe and can be traced to the information provided by the Producers. \nExamples of Ways the Repository Can"} {"text":" Demonstrate It Is Meeting This Requirement \nDescription of the procedure that verifies completeness and correctness of the AIPs; logs of \nthe procedure. \nDiscussion \nThe repository should be sure that the AIPs it creates are as they are expected to be by \nchecking them against the associated definition for each AIP or class of AIP (see 4.2.1) and \nthe description of how AIPs are constructed from SIPs (see 4.2.2). If the repository has a \nstandard process to verify SIPs for both completeness and correctness"} {"text":" and a demonstrably \ncorrect process for transforming SIPs into AIPs, then it simply needs to demonstrate that the \ninitial checks were carried out successfully and that the transformation process was carried \nout without indicating errors. On the other hand repositories that must create unique \nprocesses for many of their AIPs will also need to generate unique methods for validating the \ncompleteness and correctness of AIPs. This may include performing tests of some sort on the \ncontent of the AIP that can"} {"text":" be compared with tests on the SIP. Such tests might be simple \n(counting the number of records in a file, or performing some simple statistical measure), but \nthey might be complex. Documentation should describe how the completeness and \ncorrectness of AIPs is ensured, starting with receipt from the producer and continuing \nthrough AIP creation and supporting long-term preservation. Example approaches include \nthe use of checksums, testing that checksums are still correct at various points during ingest \na"} {"text":"nd preservation, logs that such checks have been made, and any special tests that may be \nrequired for a particular AIP instance or class. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-15 \nSeptember 2011 \n4.2.9 The repository shall provide an independent mechanism for verifying the \nintegrity of the repository collection\/content. \nSupporting Text \nThis is necessary to enable the audit of the integrity of the collection as a whole. \nExamples of Ways the Repository Can "} {"text":"Demonstrate It Is Meeting This Requirement \nDocumentation provided for 4.2.1 through 4.2.4; documented agreements negotiated between \nthe producer and the repository (see 4.1.1-4.1.8); logs of material received and associated \naction (receipt, action, etc.) dates; logs of periodic checks. \nDiscussion \nIt is the responsibility of the repository to choose the appropriate mechanism for checking the \ncompleteness and correctness of its collections. In general, it is likely that a repository that \nmeets all the "} {"text":"previous criteria will satisfy this one without needing to demonstrate anything \nmore. As a separate requirement, it demonstrates the importance of being able to audit the \nintegrity of the collection as a whole. For example, if a repository claims to have all e-mail \nsent or received by The Yoyodyne Corporation between 1985 and 2005, it has been required \nto show that: \n\u2013 the content it holds came from Yoyodyne\u2019s e-mail servers; \n\u2013 it is all correctly transformed into a preservation format; \n\u2013 each monthly"} {"text":" SIP of e-mail has been correctly preserved, including original unique \nidentifiers such as Message-IDs. \nHowever, it may still have no way of showing whether this really represents all of \nYoyodyne\u2019s email. For example, if there is a three-day period with no messages in the \nrepository, is this because Yoyodyne was shut down for those three days, or because the e-\nmail was lost before the SIP was constructed? This case could be resolved by the repository\u2019s \namending its description of the collection, but o"} {"text":"ther cases may not be so straightforward. A \nfamiliar mechanism from the world of traditional materials in libraries and archives is an \naccessions or acquisitions register that is independent of other catalog metadata. A repository \nshould be able to show, for each item in its accessions register, which AIP(s) contain content \nfrom that item. Alternatively, it may need to show that there is no AIP for an item, either \nbecause ingest is still in progress, or because the item was rejected for some reason. \nC"} {"text":"onversely, any AIP should be able to be related to an entry in the acquisitions register. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-16 \nSeptember 2011 \n4.2.10 The repository shall have contemporaneous records of actions and \nadministration processes that are relevant to AIP creation. \nSupporting Text \nThis is necessary in order to ensure that there is omitted from the record nothing relevant that \nmight be needed to provide an independent means to verify that all "} {"text":"AIPs have been properly \ncreated in accord with the documented procedures (see 4.2.1 through 4.2.9). It is the \nresponsibility of the repository to justify its practice in this respect. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nWritten documentation of decisions and\/or action taken with timestamps; preservation \nmetadata logged, stored, and linked to pertinent digital objects. \nDiscussion \nThese records must be created on or about the time of the actions they refer to "} {"text":"and are related \nto actions associated with AIP creation. The records may be automated or may be written by \nindividuals, depending on the nature of the actions described. Where community or \ninternational standards are used, the repository must demonstrate that all relevant actions are \ncarried through. \n4.3 \nPRESERVATION PLANNING \n4.3.1 The repository shall have documented preservation strategies relevant to its \nholdings. \nSupporting Text \nThis is necessary in order that it is clear how the repository p"} {"text":"lans to ensure the information \nwill remain available and usable for future generations and to provide a means to check and \nvalidate the preservation work of the repository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation identifying each preservation risk identified and the strategy for dealing with \nthat risk. \nDiscussion \nThese documented preservation strategies will describe how the repository will act upon \nidentified risks, as part of the preservation st"} {"text":"rategic plan. These preservation strategies and \nthe preservation strategic plan will typically address the degradation of storage media, the \nobsolescence of media drives, and the obsolescence or inadequacy of Representation \nInformation (including formats) as the knowledge base of the Designated Community \nchanges, and safeguards against accidental or intentional digital corruption. For example, if \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-17 \nSeptember 2011 \nmi"} {"text":"gration is the chosen approach to some of these issues, there also needs to be Preservation \nPolicies on what triggers a migration and what types of migration are expected to solve the \npreservation risk identified. The preservation strategy will describe the range of activities \nthat need to be done in case of a migration. \n4.3.2 The repository shall have mechanisms in place for monitoring its preservation \nenvironment. \nSupporting Text \nThis is necessary so that the repository can react to changes and the"} {"text":"reby ensure that the \npreserved information remains understandable and usable by the Designated Community. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nSurveys of the Designated Community of the repository. \nDiscussion \nThe repository should show that it has some active mechanism to ensure that the preserved \ninformation remains understandable and usable by the Designated Community and that it has \nmechanisms in place for monitoring and notification when Representation In"} {"text":"formation \n(including formats) approaches obsolescence or is no longer viable. For most repositories, \nthe concern will be with the Representation Information used to preserve information, which \nmay include information on how to deal with a file format or software that can be used to \nrender or process it. Sometimes the format needs to change because the repository can no \nlonger deal with it. Sometimes the format is retained and the information about what \nsoftware is needed to process it needs to change."} {"text":" If the mechanism depends on an external \nregistry, the repository must demonstrate how it uses the information from that registry. \n4.3.2.1 The repository shall have mechanisms in place for monitoring and notification \nwhen Representation Information is inadequate for the Designated Community to \nunderstand the data holdings. \nSupporting Text \nThis is necessary in order to ensure that the preserved information remains understandable \nand usable by the Designated Community. \nExamples of Ways the Repository "} {"text":"Can Demonstrate It Is Meeting This Requirement \nSubscription to a Representation Information registry service; subscription to a technology \nwatch service, surveys amongst its Designated Community members, relevant working \nprocesses to deal with this information. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-18 \nSeptember 2011 \nDiscussion \nThe repository must show that it has some active mechanism to warn of impending \nobsolescence. Obsolescence is determined largely"} {"text":" in terms of the knowledge base of the \nDesignated Community. \n4.3.3 The repository shall have mechanisms to change its preservation plans as a \nresult of its monitoring activities. \nSupporting Text \nThis is necessary in order for the repository to be prepared for changes in the external \nenvironment that may make its current preservation plans a bad choice as the time to \nimplement draws near. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nPreservation Plans tied to formal"} {"text":" or informal technology watch(es); preservation planning or \nprocesses that are timed to shorter intervals (e.g., not more than five years); proof of frequent \nPreservation Policies and Preservation Plans updates; sections of Preservation Policies that \naddress how plans may be updated and that address how often the plans are required to be \nreviewed and reaffirmed or updated. \nDiscussion \nThe repository should demonstrate or describe how it reacts to information from monitoring, \nwhich sometimes requires a"} {"text":" repository to change how it deals with the material it holds in \nways that could not have been anticipated at an earlier stage. The repository should \nperiodically review its preservation plans and the technology environment and, if necessary, \nmakes changes to those plans to ensure their continued effectiveness. Another possible \nresponse to information gathered by monitoring is for the repository to update and create \nadditional Representation Information and\/or PDI. \n4.3.3.1 The repository shall have me"} {"text":"chanisms for creating, identifying or gathering \nany extra Representation Information required. \nSupporting Text \nThis is necessary in order to ensure that the preserved information remains understandable \nand usable by the Designated Community. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nSubscription to a format registry service; subscription to a technology watch service; \npreservation plans. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1"} {"text":" \nPage 4-19 \nSeptember 2011 \nDiscussion \nThe repository should have mechanisms in place for monitoring and notification when \nRepresentation Information (including formats) approaches obsolescence or is no longer \nviable, and it should be able to show that it has mechanisms to address such notifications. \n4.3.4 The repository shall provide evidence of the effectiveness of its preservation \nactivities. \nSupporting Text \nThis is necessary in order to assure the Designated Community that the repository will be"} {"text":" \nable to make the information available and usable over the mid-to-long-term. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nCollection of appropriate preservation metadata; proof of usability of randomly selected \ndigital objects held within the system; demonstrable track record for retaining usable digital \nobjects over time; Designated Community polls. \nDiscussion \nThe repository should be able to demonstrate the continued preservation, including \nunderstandability, of "} {"text":"its holdings. This could be evaluated at a number of degrees and \ndepends on the specificity of the Designated Community. If a Designated Community is \nfairly broad, an auditor could represent the test subject in the evaluation. More specific \nDesignated Communities could require significant efforts. \n4.4 \nAIP PRESERVATION \n4.4.1 The repository shall have specifications for how the AIPs are stored down to the \nbit level. \nSupporting Text \nThis is necessary in order to ensure that the information can be extr"} {"text":"acted from the AIP over \nthe long-term. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation of the format of AIPs; EAST and Data Entity Dictionary Specification \nLanguage (DEDSL) descriptions of the data components (see references [B6] and [B7]). \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-20 \nSeptember 2011 \nDiscussion \nThe repository should specify the Representation information down to the bit level of each \nAIP componen"} {"text":"t and must specify how the separate components are packaged together. The \nRepresentation Information must be available for each AIP and must be appropriately linked \nto the AIP. Often, repositories are tempted to describe AIP content only down to a level \nwhere a program will then be used to convert the information to a form understandable to \ntheir Designated Communities. However, if those programs ever fail to operate, then the \ninformation would be lost in all the AIPs that relied on that program. \n4.4."} {"text":"1.1 The repository shall preserve the Content Information of AIPs. \nSupporting Text \nThis is necessary because it is the fundamental mission of a repository to preserve the \nContent Information for its Designated Communities. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nPreservation workflow procedure documentation; workflow procedure documentation; \nPreservation Policy documents specifying treatment of AIPs and under what circumstances \nthey may ever be deleted; ability "} {"text":"to demonstrate the sequence of conversions for an AIP for \nany particular digital object or group of objects ingested; documentation linking ingested \nobjects and the current AIPs. \nDiscussion \nThe repository should be able to demonstrate that the AIPs faithfully reflect the information \nthat was captured during ingest and that any subsequent or future planned transformations \nwill continue to preserve all the required Information Properties of the Content Information. \nOne approach to this requirement assu"} {"text":"mes that the repository has a policy specifying that \nAIPs cannot be deleted at any time. This particularly simple and robust implementation \npreserves links between what was originally ingested, as well as new versions that have been \ntransformed or changed in any way. Depending upon implementation, these newer objects \nmay be completely new AIPs or merely updated AIPs. Either way, persistent links between \nthe ingested object and the resulting AIP should be maintained. \n4.4.1.2 The repository shall active"} {"text":"ly monitor the integrity of AIPs. \nSupporting Text \nThis is necessary in order to protect the integrity of the archival objects over time. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-21 \nSeptember 2011 \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nFixity information (e.g., checksums) for each ingested digital object\/AIP; logs of fixity \nchecks; documentation of how AIPs and Fixity information are kept separate; documentation \nof ho"} {"text":"w AIPs and accession registers are kept separate. \nDiscussion \nA repository should have logs that show actions taken to check the integrity of archival \nobjects in order to assure funders, producers, and users\u2014and to allow them to \naudit\/validate\u2014that the repository is taking the necessary steps to ensure the long-term \nintegrity of the digital objects. The repository should also document that integrity checks are \ncarried out on a regular basis, in order to catch any changes in AIPs as soon as possible so"} {"text":" \nthat corrective action can be taken as soon as possible. The repository should allow interested \nparties to verify that this is the case. \nAt present, most repositories deal with this at the level of individual information objects by \nusing a checksum of some form, such as MD5. In this case, the repository should be able, \nand may want to demonstrate that, the Fixity Information (checksums, and the information \nthat ties them to AIPs) are stored separately or protected separately from the AIPs \nthemselves"} {"text":", so that accidental alteration of the AIP would not also damage the Fixity \nInformation. Also, someone who can maliciously alter an AIP would not likely be able as \neasily to alter the Fixity Information as well. \n4.4.2 The repository shall have contemporaneous records of actions and \nadministration processes that are relevant to storage and preservation of the AIPs. \nSupporting Text \nThis is necessary in order to ensure documentation is not omitted or erroneous or of \nquestionable authenticity. \nExamples "} {"text":"of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nWritten documentation of decisions and\/or action taken; preservation metadata logged, \nstored, and linked to pertinent digital objects. \nDiscussion \nThe records may be automated or may be written by individuals, depending on the nature of \nthe actions described. Where community or international standards are used, the repository \nmust demonstrate that all relevant actions are appropriately performed. \nAUDIT AND CERTIFICATION OF TRUSTWORT"} {"text":"HY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-22 \nSeptember 2011 \n4.4.2.1 The repository shall have procedures for all actions taken on AIPs. \nSupporting Text \nThis is necessary in order to ensure that any actions performed against an AIP do not alter \nthe AIP information in a manner unacceptable to its Designated Communities. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nWritten documentation describing all actions that can be performed against an AIP. \nDiscussion \nThi"} {"text":"s documentation is normally created during design of the repository. It should detail the \nnormal handling of AIPs, all actions that can be performed against the AIPs, including \nsuccess and failure conditions and details of how these processes can be monitored. \n4.4.2.2 The repository shall be able to demonstrate that any actions taken on AIPs \nwere compliant with the specification of those actions. \nSupporting Text \nThis is necessary in order to ensure that any actions performed against an AIP do not alte"} {"text":"r \nthe AIP information in a manner unacceptable to its Designated Communities. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nPreservation metadata logged, stored, and linked to pertinent digital objects and \ndocumentation of that action; procedural audits of the repository showing that all actions \nconform to the documented processes. \nDiscussion \nSuccessful preservation of information in the archive is strongly linked to following \nestablished and documented procedures to"} {"text":" complete any actions that affect the repository \ndata. The more often \u2018special handling\u2019 of repository data occurs and the more often this \n\u2018special handling\u2019 is not overseen in a consistent manner, the more likely that the data held \nby the repository will be compromised. When procedures are regularly followed, any \ndeviation from procedures that would be likely to cause an alteration in the data will more \nlikely be noticed or, if not noticed, may more likely be able to be corrected, or the timing and \nl"} {"text":"ikely change could be identified in the future. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-23 \nSeptember 2011 \n4.5 \nINFORMATION MANAGEMENT \n4.5.1 The repository shall specify minimum information requirements to enable the \nDesignated Community to discover and identify material of interest. \nSupporting Text \nThis is necessary in order to enable discovery of the repository\u2019s holdings. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nRe"} {"text":"trieval and descriptive information, discovery metadata, such as Dublin Core, and other \ndocumentation describing the object. \nDiscussion \nThe repository should be able to deal with the types of requests that will come from a typical \nuser from the Designated Community. A repository does not necessarily have to satisfy every \npossible request. Retrieval metadata is distinct from descriptive information that describes \nwhat has been found. \n4.5.2 The repository shall capture or create minimum descriptive inf"} {"text":"ormation and \nensure that it is associated with the AIP. \nSupporting Text \nThis is required in order to ensure that descriptive information is associated with the AIP. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDescriptive metadata; internal or external persistent, unique identifier or locator that is \nassociated with the AIP (see also 4.2.4 about persistent, unique identifier); system \ndocumentation and technical architecture; depositor agreements; metadata policy \ndoc"} {"text":"umentation, incorporating details of metadata requirements and a statement describing \nwhere responsibility for its procurement falls; process workflow documentation. \nDiscussion \nThe repository should show that it associates with each AIP, minimum descriptive \ninformation that was either received from the producer or created by the repository. \nAssociating the descriptive information with the object is important, although it does not \nrequire one-to-one correspondence, and may not necessarily be stored wit"} {"text":"h the AIP. \nHierarchical schemes of description can allow some descriptive elements to be associated \nwith many items. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-24 \nSeptember 2011 \n4.5.3 The repository shall maintain bi-directional linkage between each AIP and its \ndescriptive information. \nSupporting Text \nThis is necessary to ensure that all AIPs can be located and retrieved. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDescri"} {"text":"ptive metadata; unique, persistent identifier or locator associated with the AIP; \ndocumented relationship between the AIP and its metadata; system documentation and \ntechnical architecture; process workflow documentation. \nDiscussion \nRepositories must implement procedures to establish and maintain relationships to associate \ndescriptive information for each AIP, and should ensure that every AIP has some descriptive \ninformation associated with it and that all descriptive information must point to at least"} {"text":" one \nAIP. \n4.5.3.1 The repository shall maintain the associations between its AIPs and their \ndescriptive information over time. \nSupporting Text \nThis is necessary to ensure that all AIPs can continue to be located and retrieved. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nLog detailing ongoing maintenance or checking of the integrity of the data and its \nrelationships to the associated descriptive information, especially following repair or \nmodification of the AIP; l"} {"text":"egacy descriptive information; persistence of identifier or locator; \ndocumented relationship between AIP and its descriptive information; system documentation \nand technical architecture; process workflow documentation. \nDiscussion \nRepositories must implement procedures that let them know when the relationship between \nthe data and the associated descriptive information is temporarily broken to ensure that it can \nbe restored. \n4.6 \nACCESS MANAGEMENT \nThe term \u2018access\u2019 has a number of different senses, in"} {"text":"cluding access by users to the \nrepository system, for example, physical security and user authentication, and the different \nstages of accessing records (making a request, verifying the rights of the requester, and \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-25 \nSeptember 2011 \npreparing and sending a Dissemination Information Package [DIP]). This subsection is \nconcerned with all of these. It is divided into two main requirements, one concerned with the \nexistence"} {"text":" and implementation of access policies, and one with the capacity of the repository \nto provide demonstrably authentic objects as DIPs. Thus the first requirement relates to \nrequests initiated by a user and how the repository handles them to ensure that rights and \nagreements are respected, that security is monitored, that requests are fulfilled, etc. The \nsecond requirement relates to what is delivered to the Consumer and the trust that can be \nplaced in it. \nIt must be understood that the capabilities an"} {"text":"d sophistication of the access system will vary \ndepending on the repository\u2019s Designated Community and the access mandates of the \nrepository. Because of the variety of repositories and access mandates, these criteria may be \nsubject to questions about applicability and interpretation at a local level. \n4.6.1 The repository shall comply with Access Policies. \nSupporting Text \nThis is necessary in order to ensure the repository has fully addressed all aspects of usage \nwhich might affect the trustworthiness"} {"text":" of the repository, particularly with reference to \nsupport of the user community. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nStatements of policies that are available to the user communities; information about user \ncapabilities (authentication matrices); logs and audit trails of access requests; explicit tests of \nsome types of access. \nDiscussion \nDepending on the nature of the repository, the Access Policies may cover: \n\u2013 statements of what is accessible to which co"} {"text":"mmunity, and on what conditions; \n\u2013 requirements for authentication and authorization of accessors; \n\u2013 enforcement of agreements applicable to access conditions; \n\u2013 recording of access actions. \nAccess may be managed partly by computers and partly by humans; checking passports, for \ninstance, before issuing a user ID and password may be an appropriate part of access \nmanagement for some institutions. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-26 \nSeptember 2011 \n4."} {"text":"6.1.1 The repository shall log and review all access management failures and \nanomalies. \nSupporting Text \nThis is necessary in order to identify security threats and access management system failures. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nAccess logs, capability of the system to use automated analysis\/monitoring tools and \ngenerate problem\/error messages; notes of reviews undertaken or action taken as a result of \nreviews. \nDiscussion \nA repository should have som"} {"text":"e automated mechanism to note anomalous or unusual denials \nand use them to identify either security threats or failures in the access management system, \nsuch as valid users\u2019 being denied access. This does not mean looking at every denied access. \n4.6.2 The repository shall follow policies and procedures that enable the dissemination \nof digital objects that are traceable to the originals, with evidence supporting their \nauthenticity. \nSupporting Text \nThis is necessary to establish an auditable chain of a"} {"text":"uthenticity from the AIP to disseminated \ndigital objects. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nSystem design documents; work instructions (if DIPs involve manual processing); process \nwalkthroughs; production of a sample copy with evidence of authenticity; documentation of \ncommunity requirements for evidence of authenticity. \nDiscussion \nAuthenticity is not an \u2018all or nothing\u2019 concept, but is a matter of degree, judged on the basis \nof evidence. Thus the adequac"} {"text":"y of the evidence is of key importance in assessing this \nrequirement. \nThis requirement ensures that ingest, preservation, and transformation actions do not lose \ninformation that would support an auditable trail of authenticity between the original \ndeposited object and the eventual disseminated object. \nA repository should record the processes to construct the DIPs from the relevant AIPs. This \nis a key part of establishing that DIPs reflect the content of AIPs, and hence of original \nmaterial, in a trus"} {"text":"tworthy and consistent fashion. DIPs may simply be a copy of AIPs, or may \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 4-27 \nSeptember 2011 \nresult from a simple format transformation of an AIP. But in other cases, they may be derived \nin complex ways. A user may request a DIP consisting of the title pages from all e-books \npublished in a given period, for instance, which will require these to be extracted from many \ndifferent AIPs. Or a repository may disseminate auto"} {"text":"matically generated transcripts of voice \nrecordings. A repository that allows requests for such complex DIPs will need to put more \neffort into demonstrating how it meets this requirement than a repository that only allows \nrequests for DIPs that correspond to an entire AIP. \nThis requirement is concerned only with the relation between DIPs and the AIPs from which \nthey are derived; elsewhere the link between the originals SIPs and the AIPs is considered. \n4.6.2.1 The repository shall record and act upon p"} {"text":"roblem reports about errors in data \nor responses from users. \nSupporting Text \nThis is necessary in order for the users to consider the repository to be a trustworthy source \nof information. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nSystem design documents; work instructions (if DIPs involve manual processing); process \nwalkthroughs; logs of orders and DIP production; documentation of error reports and the \nactions taken. \nDiscussion \nThe objective of access managemen"} {"text":"t is to ensure that a user receives a usable and correct \nversion of the digital object(s) (i.e., DIP) that he or she requested. A repository should show \nthat any problems that do occur and are brought to its attention are investigated and acted on. \nSuch responsiveness is essential for the repository to be considered trustworthy. \n \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-1 \nSeptember 2011 \n5 INFRASTRUCTURE AND SECURITY RISK MANAGEMENT \n5.1 \nTECHNICAL INFRASTRU"} {"text":"CTURE RISK MANAGEMENT \n5.1.1 The repository shall identify and manage the risks to its preservation operations \nand goals associated with system infrastructure. \nSupporting Text \nThis is necessary to ensure a secure and trustworthy infrastructure. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nInfrastructure inventory of system components; periodic technology assessments; estimates \nof system component lifetime; export of authentic records to an independent system; use of \n"} {"text":"strongly community supported software e.g., Apache, iRODS, Fedora); re-creation of \narchives from backups. \nDiscussion \nThe repository should conduct or contract assessments of the risks related to hardware and \nsoftware infrastructure, and operational procedures. The repository should provide \nmechanisms that minimize risk from dependencies on proprietary or obsolete system \ninfrastructure and from operational error. The degree of support required relates to the \ncriticality of the subsystem(s) involved in"} {"text":" long-term preservation. The repository should \nmaintain a system that is scalable (e.g., able to handle anticipated future volumes of both \nbytes and files) without a major disruption of the system. The repository should maintain a \nsystem that is evolvable. That is, the system should be designed in such a way that major \ncomponents of the system can be replaced with newer technologies without major disruption \nof the system as a whole. The repository system should be extensible. That is, the system \nshoul"} {"text":"d be designed to accommodate future formats (media and files) without major \ndisruption of the system as a whole. The repository should be able to export its holdings to a \nfuture custodian. The repository should be able to re-create the archives after an operational \nerror that overwrites or deletes digital holdings. \n5.1.1.1 The repository shall employ technology watches or other technology \nmonitoring notification systems. \nSupporting Text \nThis is necessary to track when hardware or software components "} {"text":"will become obsolete and \nmigration is needed to new infrastructure. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nManagement of periodic technology assessment reports. Comparison of existing technology \nto each new assessment. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-2 \nSeptember 2011 \nDiscussion \nThe objective is to understand when any subsystem poses a risk of obsolescence, and enable \nplanning migration to new technology bef"} {"text":"ore interoperability mechanisms are no longer \navailable. This can be driven by proprietary software dependencies (the vendor no longer \nsupports the subsystem component), and by emergence of new protocols (the mechanism for \naccessing the system has become obsolete and is no longer supported). \n5.1.1.1.1 The repository shall have hardware technologies appropriate to the services \nit provides to its designated communities. \nSupporting Text \nThis is necessary to provide expected, contracted, secure, and pers"} {"text":"istent levels of service \nincluding: ease of ingest and dissemination through appropriate depositor and user interfaces \nand technologies such as upload mechanisms; on-going digital object management; \npreservation approaches and solutions, such as migration; and system security. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nMaintenance of up-to-date Designated Community technology, expectations, and use \nprofiles; provision of bandwidth adequate to support ingest and use "} {"text":"demands; systematic \nelicitation of feedback regarding hardware and service adequacy; maintenance of a current \nhardware inventory. \nDiscussion \nThe repository should be aware of the types of storage, file management, preservation and \naccess services expected by its Designated Community, including where applicable, the \ntypes of media to be delivered, and needs to make sure its hardware capabilities can support \nthese services. The objective is to track when changes in service requirements by the \ndesignat"} {"text":"ed communities require a corresponding change in the hardware technology, when \nchanges in ingestion policies require expanded capabilities, and when changes in \npreservation policies require new preservation capabilities. This can be driven by changes in \ncapacity requirements (the time needed to read all media is longer than the media lifetime), \nby changes in delivery mechanisms (new clients for displaying authentic records), and \nchanges in the number and size of archived records. \n5.1.1.1.2 The reposit"} {"text":"ory shall have procedures in place to monitor and receive \nnotifications when hardware technology changes are needed. \nSupporting Text \nThis is necessary to ensure expected, contracted, secure, and persistent levels of service. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-3 \nSeptember 2011 \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nAudits of capacity versus actual usage; audits of observed error rates; audits of performance \nbott"} {"text":"lenecks that limit ability to meet user community access requirements; documentation of \ntechnology watch assessments; documentation of technology updates from vendors. \nDiscussion \nThe repository should conduct or contract frequent environmental scans regarding hardware \nstatus, sources of failure, and interoperability among hardware components. The repository \nshould also be in contact with its hardware vendors regarding technology updates, points of \nlikely failure, and how new components may affect syst"} {"text":"em integration and performance. The \nobjective is to track when changes in service requirements by the designated communities \nrequire a corresponding change in the hardware technology, when changes in ingestion \npolicies require expanded capabilities, and when changes in preservation policies require \nnew preservation capabilities. This can be driven by changes in capacity requirements (the \ntime needed to read all media is longer than the media lifetime), by changes in delivery \nmechanisms (new clients fo"} {"text":"r displaying authentic records), and changes in the number and \nsize of archived records. \n5.1.1.1.3 The repository shall have procedures in place to evaluate when changes are \nneeded to current hardware. \nSupporting Text \nThis is necessary to ensure that the repository has the capacity to make informed and timely \ndecisions when information indicates the need for new hardware. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nEvaluation procedures in place; documented staff e"} {"text":"xpertise in each technology subsystem. \nDiscussion \nGiven information from technology watches or other technology monitoring notification \nsystems, the repository should have procedures and expertise to evaluate this data and make \nsound decisions regarding the need for new hardware. The objective is to track when \ntechnology providers have developed subsystems that minimize risk, or that minimize cost, \nor that improve performance. This is necessary to track emerging technologies and plan for \nupgrades bef"} {"text":"ore capacity limits occur. The evaluation should identify when the risk of using \nnew technology outweighs the expected benefit, and when the new technology is sufficiently \nmature to minimize risk. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-4 \nSeptember 2011 \n5.1.1.1.4 The repository shall have procedures, commitment and funding to replace \nhardware when evaluation indicates the need to do so. \nSupporting Text \nThis is necessary to ensure hardware replacement in a"} {"text":" timely fashion so as to avert system \nfailure or performance inadequacy. Without such a commitment, and more importantly, \nwithout escrowed financial resources or a secure funding stream, technology watches and \nnotifications are of little value. The repository must have mechanisms for evaluating the \nefficacy of the new systems before implementation in the production system. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nStatement of commitment to provide expected and con"} {"text":"tracted levels of service; evidence of \nongoing financial assets set aside for hardware procurement; demonstration of cost savings \nthrough amortized cost of new system. \nDiscussion \nThe objective is to demonstrate that the repository has the ability to incorporate new \ntechnology, both financially through funding commitments or cost reduction, and \noperationally through verification of the capabilities of the new systems. \n5.1.1.1.5 The repository shall have software technologies appropriate to the service"} {"text":"s it \nprovides to its designated communities. \nSupporting Text \nThis is necessary to provide expected, contracted, secure, and persistent levels of service \nincluding: ease of ingest and dissemination through appropriate depositor and user interfaces \nand technologies such as upload mechanisms; on-going digital object management; \npreservation approaches and solutions, such as migration; and system security. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nMaintenance of up-t"} {"text":"o-date Designated Community technology, expectations, and use \nprofiles; provision of software systems adequate to support ingest and use demands; \nsystematic elicitation of feedback regarding software and service adequacy; maintenance of a \ncurrent software inventory. \nDiscussion \nThe objective is to track when changes in service requirements by the designated \ncommunities require a corresponding change in the software components, when changes in \ningestion policies require support for new data formats and"} {"text":" when changes in software \ntechnology require new format migration capabilities. This can be driven by changes in \naccess requirements (new clients that require new data formats become preferred), by \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-5 \nSeptember 2011 \nchanges in delivery mechanisms (new data transfer mechanisms), and changes in the number \nand size of archived records that require more scalable software. \n5.1.1.1.6 The repository shall have procedures in "} {"text":"place to monitor and receive \nnotifications when software changes are needed. \nSupporting Text \nThis is necessary to ensure expected, contracted, secure, and persistent levels of service. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nAudits of capacity versus actual usage; audits of observed error rates; audits of performance \nbottlenecks that limit ability to meet user community access requirements; documentation of \ntechnology watch assessments; documentation of software"} {"text":" updates from vendors. \nDiscussion \nThe objective is to track when changes in service requirements by the designated \ncommunities require a corresponding change in the software technology, when changes in \ningestion policies require expanded capabilities, and when changes in preservation policies \nrequire new preservation capabilities. This can be driven by security updates (vendor \nsupplied corrections to newly identified vulnerabilities), by changes in delivery mechanisms \n(new software clients for displa"} {"text":"ying authentic records), and changes in the number and size \nof archived records (expanded database requirements). The repository should conduct or \ncontract frequent environmental scans regarding software evolution, likely points of failure, \nand interoperability among the software and hardware components. The repository should \nalso be in contact with its software vendors regarding technology updates, points of likely \nfailure, and how new programs may affect system integration and performance. \n5.1.1.1.7"} {"text":" The repository shall have procedures in place to evaluate when changes are \nneeded to current software. \nSupporting Text \nThis is necessary to ensure that the repository has the capacity to make informed and timely \ndecisions when information indicates the need for new software. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nEvaluation procedures in place; documented staff expertise in each software technology \nsubsystem. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REP"} {"text":"OSITORIES \nCCSDS 652.0-M-1 \nPage 5-6 \nSeptember 2011 \nDiscussion \nGiven information from technology watches or other technology monitoring notification \nsystems, the repository should have procedures and expertise to evaluate this data and make \nsound decisions regarding the need for new software. The objective is to track when \ntechnology providers have developed software infrastructure that minimizes risk, or that \nminimizes cost, or that improves performance. This is necessary to track emerging \ntechnolo"} {"text":"gies, and plan for upgrades before capacity limits occur. The evaluation should \nidentify when the risk of using new technology outweighs the expected benefit, and when the \nnew technology is sufficiently mature to minimize risk. \n5.1.1.1.8 The repository shall have procedures, commitment, and funding to replace \nsoftware when evaluation indicates the need to do so. \nSupporting Text \nThis is necessary to ensure software replacement in a timely fashion so as to avert system \nfailure or performance inadequacy"} {"text":". Without such a commitment, and more importantly, \nwithout escrowed financial resources or a secure funding stream, technology watches and \nnotifications are of little value. The repository must have mechanisms for evaluating the \nefficacy of the new systems before implementation in the production system. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nStatement of commitment to provide expected and contracted levels of service; evidence of \nongoing financial assets set asi"} {"text":"de for software procurement; demonstration of cost savings \nthrough amortized cost of new system. \nDiscussion \nThe objective is to demonstrate that the repository has the ability to incorporate new \ntechnology, both financially through funding commitments or cost reduction, and \noperationally through verification of the capabilities of the new systems. \n5.1.1.2 The repository shall have adequate hardware and software support for backup \nfunctionality sufficient for preserving the repository content and trac"} {"text":"king repository \nfunctions. \nSupporting Text \nThis is necessary in order to ensure continued access to and tracking of preservation \nfunctions applied to the digital objects in their custody. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-7 \nSeptember 2011 \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation of what is being backed up and how often; audit log\/inventory of backups; \nvalidation of completed backups; disaster reco"} {"text":"very plan, policy and documentation; fire \ndrills; testing of backups; support contracts for hardware and software for backup \nmechanisms; demonstrated preservation of system metadata such as access controls, location \nof replicas, audit trails, checksum values. \nDiscussion \nThe repository should be able to demonstrate the adequacy of the processes, hardware, and \nsoftware for its backup systems and the full range of ingest, preservation, and dissemination \nfunctions required of a repository entrusted with "} {"text":"long-term preservation. Simple backup \nmechanisms must preserve not only the repository main content, but also the system \nmetadata generated by the preservation functions. Repositories need to develop backup plans \nthat ensure their continuity of operations across all failure modes. \n5.1.1.3 The repository shall have effective mechanisms to detect bit corruption or loss. \nSupporting Text \nThis is necessary in order to ensure that AIPs and metadata are uncorrupted or any data \nlosses are detected and fall w"} {"text":"ithin the tolerances established by repository policy (see 3.3.5). \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocuments that specify bit error detection and correction mechanisms used; risk analysis; \nerror reports; threat analysis; periodic analysis of the integrity of repository holdings. \nDiscussion \nThe objective is a comprehensive treatment of the sources of data loss and their real-world \ncomplexity. Any data or metadata that is (temporarily) lost should be recove"} {"text":"rable from \nbackups. Routine systematic failures must not be allowed to accumulate and cause data loss \nbeyond the tolerances established by the repository policies. Mechanisms such as checksums \n(MD5 signatures) or digital signatures should be recognized for their effectiveness in \ndetecting bit loss and incorporated into the overall approach of the repository for validating \nintegrity. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-8 \nSeptember 2011 \n5.1.1.3.1 The re"} {"text":"pository shall record and report to its administration all incidents of \ndata corruption or loss, and steps shall be taken to repair\/replace corrupt or lost data. \nSupporting Text \nThis is necessary in order to ensure the repository administration is being kept informed of \nincidents and recovery actions, and to enable identification of sources of data corruption or \nloss. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nProcedures related to reporting incidents to administra"} {"text":"tors; preservation metadata (e.g., PDI) \nrecords; comparison of error logs to reports to administration; escalation procedures related \nto data loss; tracking of sources of incidents; remediation actions taken to remove sources of \nincidents. \nDiscussion \nHaving effective mechanisms to detect bit corruption and loss within a repository system is \ncritical but it is only the initial step of a larger process. In addition to recording, reporting, \nand repairing as soon as possible all violations of data integr"} {"text":"ity, these incidents and the \nrecovery actions and their results must be reported to administrators and made available to all \nrelevant staff. Given identification of the sources of data loss, an assessment of revisions to \nsoftware and hardware systems, or operational procedures, or management policies is needed \nto minimize future risk of data loss. \n5.1.1.4 The repository shall have a process to record and react to the availability of \nnew security updates based on a risk-benefit assessment. \nSupporting "} {"text":"Text \nThis is necessary in order to protect the integrity of the archival objects from unauthorized \nchanges or deletions. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nRisk register (list of all patches available and risk documentation analysis); evidence of \nupdate processes (e.g., server update manager daemon); documentation related to the update \ninstallations. \nDiscussion \nDecisions to apply security updates are likely to be the outcome of a risk-benefit assessment; \n"} {"text":"security patches are frequently responsible for upsetting alternative aspects of system \nfunctionality or performance. It may not be necessary for a repository to implement all \nsoftware patches, and the application of any must be carefully considered. Each security \nupdate implemented by the repository must be documented with details about how it is \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-9 \nSeptember 2011 \ncompleted; both automated and manual updates are accep"} {"text":"table. Significant security updates \nmight pertain to software other than core operating systems, such as database applications \nand Web servers, and these should also be documented. Security updates are not limited to \nsoftware security updates. Updates to actual hardware or to the hardware system\u2019s firmware \nare included. Over time it is likely that security updates will also be needed for the repository \nprocesses and for its physical security. Although security updates can be considered as a part \nof th"} {"text":"e change control, they are identified separately here because there are often outside \nservices that compile and circulate information on security issues and updates. At a \nminimum, repositories should be monitoring these services to ensure that repository-held \ndata is not subject to compromise by identified threats. \n5.1.1.5 The repository shall have defined processes for storage media and\/or \nhardware change (e.g., refreshing, migration). \nSupporting Text \nThis is necessary in order to ensure that data i"} {"text":"s not lost when either the media fail or the \nsupporting hardware can no longer be used to access the data. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation of migration processes; policies related to hardware support, maintenance, \nand replacement; documentation of hardware manufacturer\u2019s expected support life cycles; \npolicies related to migration of records to alternate hardware systems. \nDiscussion \nThe repository should have estimates of the access speed an"} {"text":"d the quantity of information for \neach type of storage media. Then with estimates of the reliable lifetime of the storage media \nand information of system loading, etc., the repository can estimate the time required for \nstorage media migration, or refreshing or copying between media without reformatting the \nbit stream. The repository can then set triggers for initiating the action at an appropriate time \nso the actions will be completed before data is lost. Copying large quantities of data can take \na lo"} {"text":"ng time and can affect other system performance metrics. Repositories should also \nconsider the obsolescence of any and all hardware components within the repository system \nas potential trigger events for migration. Increasingly, long-term, appropriate support for \nsystem hardware components is difficult to obtain, exposing repositories to risks and \nliabilities should they choose to continue to operate the hardware beyond the manufacturer or \nthird-party support warranties. Repositories will likely need t"} {"text":"o perform media migration off \nof some types of media onto better supported media based on the estimated lifetime of \nhardware support rather than on the longer life expected from the media. It is important that \nthe process include a check that the copying has happened correctly. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-10 \nSeptember 2011 \n5.1.1.6 The repository shall have identified and documented critical processes that \naffect its ability to comply with its m"} {"text":"andatory responsibilities. \nSupporting Text \nThis is necessary in order to ensure that the critical processes can be monitored to ensure that \nthey continue to meet the mandatory responsibilities and to ensure that any changes to those \nprocesses are examined and tested. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nTraceability matrix between processes and mandatory requirements. \nDiscussion \nExamples of critical processes include data management, access, archival storage"} {"text":", ingest, and \nsecurity processes. Traceability makes it possible to understand which repository processes \nare required to meet each of the mandatory responsibilities. \n5.1.1.6.1 The repository shall have a documented change management process that \nidentifies changes to critical processes that potentially affect the repository\u2019s ability to \ncomply with its mandatory responsibilities. \nSupporting Text \nThis is necessary in order to ensure that the repository can specify not only the current \nprocesses, but"} {"text":" the prior processes that were applied to the repository holdings. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumentation of change management process; assessment of risk associated with a process \nchange; analysis of the expected impact of a process change; comparison of logs of actual \nchanges to processes versus associated analyses of their impact and criticality. \nDiscussion \nExamples of this would include changes to processes for data management, access, archival"} {"text":" \nstorage, ingest, and security. The really important thing is to be able to know what changes \nwere made and when they were made. Traceability makes it possible to understand what was \naffected by particular changes to the systems. If unintended consequences are later \ndiscovered, then having this record may make it possible to reverse the changes or at least to \ndocument the changes that were introduced. Change management is a component of the \nbroader topic of configuration management described by ISO 10"} {"text":"007:2003 which includes \nconfiguration \nmanagement \nplanning, \nconfiguration \nidentification, \nchange \ncontrol, \nconfiguration status accounting and configuration audit. Configuration Management efforts \nshould result in a complete audit trail of decisions and design modifications. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-11 \nSeptember 2011 \n5.1.1.6.2 The repository shall have a process for testing and evaluating the effect of \nchanges to the repository\u2019s critica"} {"text":"l processes. \nSupporting Text \nThis is necessary in order to protect the integrity of the repository\u2019s critical processes such \nthat they continue in their ability to meet the repository\u2019s mandatory requirements. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nDocumented testing procedures; documentation of results from prior tests and proof of \nchanges made as a result of tests; analysis of the impact of a process change. \nDiscussion \nChanges to critical systems should be, "} {"text":"where possible, pre-tested separately, the expected \nbehaviors documented, and roll-back procedures prepared. After changes, the systems should \nbe monitored for unexpected and unacceptable behavior. If such behavior is discovered the \nchanges and their consequences should be reversed. Whole-system testing or unit testing can \naddress this requirement; complex safety-type tests are not required. Testing can be very \nexpensive, but there should be some recognition of the fact that a completely open regime \nw"} {"text":"here no changes are ever evaluated or tested will have problems. \n5.1.2 The repository shall manage the number and location of copies of all digital \nobjects. \nSupporting Text \nThis is necessary in order to assert that the repository is providing an authentic copy of a \nparticular digital object. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nRandom retrieval tests; validation of object existence for each registered location; validation \nof a registered location for each ob"} {"text":"ject on storage systems; provenance and fixity checking \ninformation; location register\/log of digital objects compared to the expected number and \nlocation of copies of particular objects. \nDiscussion \nA repository can have different preservation policies for different classes of objects, \ndepending on factors such as the producer, the information type, or its value. Repositories \nmay require a different number of copies for each class, or manage versions needed to meet \naccess requirements. There may be a"} {"text":"dditional identification requirements if the data integrity \nmechanisms use alternative copies to replace failed copies. The location of each digital \nobject must be described such that the object can be located precisely, without ambiguity. \nThe location can be an absolute physical location or a logical location within a storage media \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-12 \nSeptember 2011 \nor a storage subsystem. Provenance information about copying and mov"} {"text":"ing the data must be \nmaintained\/updated, including the identification of those responsible. This is necessary in \norder to track chain of custody and assert that the repository is providing an authentic copy of \na particular digital object. The repository must be able to distinguish between versions of \nobjects or copies and identical copies. This is necessary in order that a repository can assert \nthat it is providing an authentic copy of the correct version of an object. \n5.1.2.1 The repository shall hav"} {"text":"e mechanisms in place to ensure any\/multiple copies of \ndigital objects are synchronized. \nSupporting Text \nThis is necessary in order to ensure that multiple copies of a digital object remain identical, \nwithin a time established as acceptable by the repository, and that a copy can be used to \nreplace a corrupted copy of the object. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nSynchronization workflows; system analysis of how long it takes for copies to synchronize; \npro"} {"text":"cedures\/documentation of synchronization processes. \nDiscussion \nThe disaster recovery plan should address what to do should a disaster and an update \ncoincide. For example, if one copy of an object is altered and a disaster occurs while the \nsecond is being updated, there needs to be a mechanism to assure that the copy will be \nupdated at the first available opportunity. The mechanisms to synchronize copies of digital \nobjects should be able to detect bit corruption and validate fixity checks before \nsynch"} {"text":"ronization is attempted. \n5.2 \nSECURITY RISK MANAGEMENT \n5.2.1 The repository shall maintain a systematic analysis of security risk factors \nassociated with data, systems, personnel, and physical plant. \nSupporting Text \nThis is necessary to ensure ongoing and uninterrupted service to the Designated Community. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nRepository employs the codes of practice found in the ISO 27000 series of standards system \ncontrol list; risk, threat,"} {"text":" or control analysis. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-13 \nSeptember 2011 \nDiscussion \nThe repository should conduct regular risk assessments and maintain adequate security \nprotection in order to provide expected and contracted levels of service, following codes of \npractice such as ISO 27000. \n\u2018System\u2019 here refers to more than IT systems, such as hardware, software, communications \nequipment and facilities, and firewalls. Fire protection and flood detec"} {"text":"tion systems are also \nsignificant, as are means to assess personnel, management, and administration procedures, \nresources, as well as operations and service delivery. Loss of income, budget and reputation \nare significant threats to overall operations as is loss of mandate. On-going internal and \nexternal evaluation should be conducted to assess quality of service and relevance to user \ncommunity served and periodic financial audits should be secured to ascertain ethical and \nlegal practice and maintenanc"} {"text":"e of required operating funds. Intellectual property rights \npractices should also be reviewed regularly as well as the repository\u2019s liability for regulatory \nnon-compliance as applicable. The repository should assess its staff\u2019s skills against those \nrequired in the evolving digital repository environment and ensure acquisition of new staff or \nretraining of existing staff as necessary. Regular risk assessment should also address external \nthreats and denial of service attacks and loss of or unacceptable q"} {"text":"uality of third party \nservices. The repository may conduct overall risk assessments with tools such as \nDRAMBORA.2 \n5.2.2 The repository shall have implemented controls to adequately address each of \nthe defined security risks. \nSupporting Text \nThis is necessary in order to ensure that controls are in place to meet the security needs of the \nrepository. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nRepository employs the codes of practice found in the ISO 27000 series of"} {"text":" standards; system \ncontrol list; risk, threat, or control analyses; and addition of controls based on ongoing risk \ndetection and assessment. Repository maintains ISO 17799 certification. \nDiscussion \nThe repository should show how it has dealt with its security requirements. If some types of \nmaterial are more likely to be attacked, the repository will need to provide more protection, \nfor instance. Repositories that have experienced incidents could record such instances, \nincluding the times when systems"} {"text":" or content were affected and describe procedures that have \nbeen put in place to prevent similar occurrences in the future. Repositories may also conduct \n \n2 See http:\/\/www.repositoryaudit.eu\/. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-14 \nSeptember 2011 \na variety of disaster drills that may involve their parent organization or the community at \nlarge. Contingency plans are especially important and need to be test"} {"text":"ed, updated, and revised \non a regular basis. \n5.2.3 The repository staff shall have delineated roles, responsibilities, and \nauthorizations related to implementing changes within the system. \nSupporting Text \nThis is necessary in order to ensure that individuals have the authority to implement changes, \nthat adequate resources have been assigned for the effort, and that the responsible individuals \nwill be accountable for implementing such changes. \nExamples of Ways the Repository Can Demonstrate It Is Mee"} {"text":"ting This Requirement \nRepository employs the codes of practice found in the ISO 27000 series of standards; \norganizational chart; system authorization documentation. Repository maintains ISO 17799 \ncertification. \nDiscussion \nAuthorizations are about who can do what: who can add users, who has access to change \nmetadata, who can access audit logs. It is important that authorizations are justified, that staff \nunderstand what they are authorized to do, that staff have required skills associated with \nvariou"} {"text":"s roles and authorizations, and that there is a consistent view of this across the \norganization. \n5.2.4 The repository shall have suitable written disaster preparedness and recovery \nplan(s), including at least one off-site backup of all preserved information together with \nan offsite copy of the recovery plan(s). \nSupporting Text \nThis is necessary in order to ensure that sufficient backup and recovery capabilities are in \nplace to facilitate continuing preservation of and access to systems and their cont"} {"text":"ent with \nlimited disruption of services. \nExamples of Ways the Repository Can Demonstrate It Is Meeting This Requirement \nRepository employs the codes of practice found in the ISO 27000 series of standards; disaster \nand recovery plans; information about and proof of at least one off-site copy of preserved \ninformation; service continuity plan; documentation linking roles with activities; local \ngeological, geographical, or meteorological data or threat assessments. Repository maintains \nISO 17799 certific"} {"text":"ation. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage 5-15 \nSeptember 2011 \nDiscussion \nThe level of detail in a disaster plan, and the specific risks addressed need to be appropriate \nto the repository\u2019s location and service expectations. Fire is an almost universal concern, but \nearthquakes may not require specific planning at all locations. The disaster plan must, \nhowever, deal with unspecified situations that would have specific consequences, such as \nlack of access"} {"text":" to a building or widespread illness among critical staff. In the event of a \ndisaster at the repository, the repository may want to contact local and\/or national disaster \nrecovery bodies for assistance. Repositories may also conduct a variety of disaster drills that \nmay involve their parent organization or the community at large. \n \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage A-1 \nSeptember 2011 \nANNEX A \n \nSECURITY CONSIDERATIONS \n \n(INFORMATIVE) \nA1 INTRODUCTION \n"} {"text":"The use of the Audit and Certification Recommended Practice has several potential areas of \nsecurity concern. \nOne security concern is the possibility that the repository is fooled into undergoing an audit \nby someone unqualified or even malicious. \nAnother concern involves the possible release of confidential information which is collected \nas evidence by the auditor. \nA2 SECURITY CONCERNS WITH RESPECT TO THE CCSDS DOCUMENT \nThe repository may ask someone to perform an audit using this Recommended Practic"} {"text":"e. \nThere is a possibility that the person contacted is not in fact the person that the repository \nbelieves him or her to be. Alternatively the correct person may be contacted but in fact \nanother, possibly malicious, person may turn up to perform the audit. \nIn the process of collecting evidence for the various metrics the auditor may collect \ninformation which is confidential or sensitive, for example details of security weaknesses. \nThere is a danger that such information may fall into the wrong hands"} {"text":" and expose the \nrepository to increased risk. Alternatively in the process of collecting evidence the repository \nsystem may be damaged. \nWhile these are all valid security concerns, they fall outside the purview of this \nRecommended Practice, which applies only to the metrics which an auditor should use for \nauditing a repository. \nA3 POTENTIAL THREATS AND ATTACK SCENARIOS \nImpersonation of an auditor and\/or release of confidential information could both result in \nexposing the repository and its holdings"} {"text":" to increased risk and loss of reputation of the \nrepository. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage A-2 \nSeptember 2011 \nA4 CONSEQUENCES OF NOT APPLYING SECURITY TO THE TECHNOLOGY \nWhile these security issues are of concern, they are out of scope with respect to this \ndocument. This document aims to provide the basis for an audit and certification process for \nassessing the trustworthiness of digital repositories. Providing protection against false \nauditors mus"} {"text":"t rely on the repository\u2019s identification and authorization systems. Protection \nagainst loss of confidential information in the possession of the auditor must be provided by \nthe security system of that auditor and the method of transmission of information which is \nagreed between the repository and auditor. Protection against damage to the repository or its \nholdings during an audit must rely on the security and safety systems of the repository. \n \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITO"} {"text":"RIES \nCCSDS 652.0-M-1 \nPage B-1 \nSeptember 2011 \nANNEX B \n \nREFERENCES \n \n(INFORMATIVE) \n[B1] D. Waters and J. Garrett. Preserving Digital Information. Report of the Task Force \non Archiving of Digital Information. Washington, DC: CLIR, May 1996. \n[B2] Trusted Digital Repositories: Attributes and Responsibilities. An RLG-OCLC Report. \nMountain View, CA: RLG, May 2002. \n[B3] Trustworthy Repositories Audit & Certification: Criteria and Checklist. Version 1.0. \nChicago: CRL, February 2007. \n[B4] Produce"} {"text":"r-Archive Interface Methodology Abstract Standard. Recommendation for \nSpace Data System Standards, CCSDS 651.0-M-1. Magenta Book. Issue 1. \nWashington, D.C.: CCSDS, May 2004. \n[B5] XML \nFormatted \nData \nUnit \n(XFDU) \nStructure \nand \nConstruction \nRules. \nRecommendation for Space Data System Standards, CCSDS 661.0-B-1. Blue Book. \nIssue 1. Washington, D.C.: CCSDS, September 2008. \n[B6] The Data Description Language EAST Specification (CCSD0010). Recommendation \nfor Space Data System Standards, CCSD"} {"text":"S 644.0-B-3. Blue Book. Issue 3. \nWashington, D.C.: CCSDS, July 2009. \n[B7] Data Entity Dictionary Specification Language (DEDSL)\u2014Abstract Syntax \n(CCSD0011). Recommendation for Space Data System Standards, CCSDS 647.1-B-\n1. Blue Book. Issue 1. Washington, D.C.: CCSDS, June 2001. \n[B8] \u201cDigital Preservation Management: Implementing Short-Term Strategies for Long-\nTerm Problems.\u201d Digital Preservation Management Resources. Cornell University. \n[B9] Quality Management Systems\u2014Fundamentals and Vocabula"} {"text":"ry. International \nStandard, ISO 9000:2005. 3rd edition. Geneva: ISO, 2005. \n[B10] Information Technology\u2014Security Techniques\u2014Code of Practice for Information \nSecurity Management. International Standard, ISO\/IEC 17799:2005. 2nd edition. \nGeneva: ISO, 2005. \n[B11] Information \nand \nDocumentation\u2014Records \nManagement\u2014Part \n1: \nGeneral. \nInternational Standard, ISO 15489-1:2001. Geneva: ISO, 2001. \n[B12] Information and Documentation\u2014Records Management\u2014Part 2: Guidelines. \nInternational Standard, I"} {"text":"SO\/TR 15489-2:2001. Geneva: ISO, 2001. \nAUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES \nCCSDS 652.0-M-1 \nPage B-2 \nSeptember 2011 \n[B13] Trustworthy Information Systems Handbook. Version 4. Saint Paul, Minnesota: \nMinnesota Historical Society, July 2002. \n[B14] Ron Ross, et al. Guide for Assessing the Security Controls in Federal Information \nSystems. National Institute of Standards and Technology Special Publication 800-\n53A. Gaithersburg, Maryland: NIST, July 2008. \n[B15] Susanne Dobra"} {"text":"tz, Astrid Schoger, and Stefan Strathmann. \u201cThe nestor Catalogue of \nCriteria for Trusted Digital Repository Evaluation and Certification.\u201d Journal of \nDigital Information 8, no. 2 (2007). \n \n"}