Identification: is it an excel document/ what is title/ what software and version used to create it Extract metadata: What metadata do I need to extract in order to understand the context in which the record was created and used?/ who created it and when/ what business activity does it relate to/ is it associated with other records Validate record: How can I confirm this document is the same excel document as indicated by title/ How can I confirm it was created using software it indicates was used/ How do I know the document will still function as same document it was intended when created
Software emulation- re-creating a software package. Eg. Microsoft Windows 2000 would allow documents from this period to be opened in this emulated software package. Time consuming and costly if have to emulate every software package which is anticipated to be needed OS emulation- Re-creating an entire OS so as to avoid the emulation of several software packages. Quite a complicated process Hardware emulation- This reduces the number of emulators required but the level of technical complication increases.
Refreshment is necessary because storage media deteriorates and there are constant developments in storage media technology. Eg. CDs and DVDs are current means of storage but new technology may replace them which will mean that the data will need to be refreshed to move to new storage media
Refreshment is necessary because storage media deteriorates and there are constant developments in storage media technology. Eg. CDs and DVDs are current means of storage but new technology may replace them which will mean that the data will need to be refreshed to move to new storage media
Normalisation- minimises the frequency and complexity of future migration cycles by going straight to an open source format that, ideally, will always be available and accessible - cost-effective- requires fewer resources – financial and otherwise – to ensure that electronic records are maintained and preserved. Avoids issues related to copyright and the use of proprietary software -However, no one normalisation format will meet all the requirements of an organisation. Therefore a combination of approaches may be necessary. Just in time- migrate either to open source/ new file formats etc - dangerous as data may become damaged in aged computer systems reducing integrity Migration on demand- No planning involved.
Security considerations for access: -security controls are needed, such as limitations on user access to computer systems and control over the physical storage of electronic records. -It is critical to ensure that security and access measures are in place when preserving records as authentic evidence for the long term, in order to protect records from unauthorised change or deletion. -Physical infrastructure required to store and manage electronic records must be protected from accidental or deliberate damage. Computer systems should be protected from intrusions by external hackers and other unauthorised users Access and permissions must also be controlled. -It must be possible to ensure the security and protection of records as new material is added, or if records are exported to other locations, updated to capture new metadata or deleted according to established retention schedules and protocols.
Security considerations for access: -security controls are needed, such as limitations on user access to computer systems and control over the physical storage of electronic records. -It is critical to ensure that security and access measures are in place when preserving records as authentic evidence for the long term, in order to protect records from unauthorised change or deletion. -Physical infrastructure required to store and manage electronic records must be protected from accidental or deliberate damage. Computer systems should be protected from intrusions by external hackers and other unauthorised users Access and permissions must also be controlled. -It must be possible to ensure the security and protection of records as new material is added, or if records are exported to other locations, updated to capture new metadata or deleted according to established retention schedules and protocols.