SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Furthering the Community:
Integrating Archivematica and Islandora
Preservation Planning

METS Fedora
EXT 1.1

ABSTRACT In response to a series of pragmatic problems
surrounding long-term digital object management, our library is
creating an automated workflow for receiving, structuring,
ingesting, handling, and preserving dissertation content. This
specific workflow will be enabled through two well regarded
digital preservation softwares: Archivematica for ingesting and
bagging OAIS compliant information packages, and Fedora
Commons for managing and handling digital objects within
distributed systems. This project is similar to other
dissertation-repository projects in that it details the software stack,
infrastructure map, and baseline workflow; and innovative in that
it provides a use case for the integration of Archivematica and
Fedora Commons.

METS

ProQuest
Humans
XSL

METS 1.8
AIP
DIP

Staging
12TB

METS

● mets:mets “http://www.loc.gov/METS/:”
► ● mets:metsHdr “A”
► ● mets:dmdSecFedora “PQ_DATA”
► ● mets:dmdSecFedora “DC1”
► ● mets:dmdSecFedora “MODS1”
► ● mets:amdSec “PREMIS_RIGHTS1”
► ● mets:amdSec “PREMIS_OBJECT1”
► ● mets:amdSec “PREMIS_DIGIPROV1”
► ● mets:amdSec “PREMIS_DIGIPROV2”
► ● mets:amdSec “PREMIS_DIGIPROV3”
► ● mets:amdSec “PREMIS_DIGIPROV4”
► ● mets:amdSec “PREMIS_DIGIPROV5”
► ● mets:amdSec “PREMIS_DIGIPROV6”
► ● mets:amdSec “PREMIS_DIGIPROV7”
► ● mets:amdSec “PREMIS_DIGIPROV8”
► ● mets:amdSec “PREMIS_DIGIPROV9”
▼ ● mets:fileSec
► ● mets:fileGrp “DATASTREAMS”

3.0 Data Management

Persistant ID
(PID)

Level 2
(Know your data)

- n/a
- n/a

- n/a
- For heterogeneous media,
get content off medium
and into storage system
- n/a

- n/a
- Obsolescence monitoring
process for your storage
system(s) and media

- n/a
- Have a comprehensive
plan in place that will keep
files and metadata on
currently accesible media
or systems

- Check file fixity on ingest
if it has been provided
with the content
- Create fixity info if it
wasn’t provided with the
content

- Check fixity on all ingests
- Use write-blockers when
working with original
media
- Virus check high risk
content

- Check fixity of content at
fixed intervals
- Maintain logs of fixity info;
supply audit on demand
- Ability to detect corrupt
data
-Virus-check all content

- Check fixity of all content
in response to specific
events or activities
- Ability to replace/repair
corrupted data
-Ensure no one user has
write access to all copies

-Identify who has read,
write, move and delete
authorization to individual
files
-Restrict who has those
authorizations to
individual files

-Document access
restrictions for content

-Maintain logs of who
performed what actions
on files, include deletions
and preservation actions

MODS
PREMIS

Metadata

-Inventory of content and
its storage location
-Ensure backup and
non-collocation of
inventory

-Store administrative
metadata
-Store transformative
metadata and log events

-Store standard technical
and descriptive metadata

File Formats

-When you can give input
into the creation of digital
files encourage use of a
limited set of known open
formats and codecs

-Inventory of file formats in
use

-Monitor file format
obsolescence issues

-Perform format
migrations, emulation and
similar activities as needed

Information
Security

SIP

Response

METS
DIP

DI

P

AIP

1.0 Archival Storage

● mets:fileGrp “METS1”
► ● mets:fileGrp “DIP”
► ● mets:fileGrp “AIP”
►

NDSA Levels of Preservation
Storage and
Geographic
Location

-Store standard
preservation metadata

File Fixity and
Data Integrity

Queries

4.0 Access

(...)

Level 3
Level 4
(Monitor your data) (Repair your data)

Level 2
(Know your data)

Level 3
(Monitor your data)

Level 4
(Repair your data)

- At least three complete
copies
-At least one copy in a
different geographic
location

- Two complete copies that
are not collocated
- For heterogeneous media,
get content off medium
and into storage system
- Document your storage
system and storage media

- At least one copy in a
geographic location with a
different disaster thread
- Obsolescence monitoring
process for your storage
system(s) and media

- At least three copies in
geographic locations
- Have a comprehensive
plan in place that will keep
files and metadata on
currently accesible media
or systems

- Check file fixity on ingest
if it has been provided
with the content
- Create fixity info if it
wasn’t provided with the
content

- Check fixity on all ingests
- Use write-blockers when
working with original
media
- Virus check high risk
content

- Check fixity of content at
fixed intervals
- Maintain logs of fixity info;
supply audit on demand
- Ability to detect corrupt
data
-Virus-check all content

- Check fixity of all content
in response to specific
events or activities
- Ability to replace/repair
corrupted data
-Ensure no one user has
write access to all copies

Information
Security

Metadata

File Formats

Does already or low
hanging fruit
Feasible based on current
status or future roadmap
Not currently supported;
extensive new feature

Islandora

-Inventory of content and
its storage location
-Ensure backup and
non-collocation of
inventory

-When you can give input
into the creation of digital
files encourage use of a
limited set of known open
formats and codecs

-Document access
restrictions for content

-Store administrative
metadata
-Store transformative
metadata and log events

-Inventory of file formats in
use

-Maintain logs of who
performed what actions
on files, include deletions
and preservation actions

-Store standard technical
and descriptive metadata

-Monitor file format
obsolescence issues

-Perform audit of logs

Level 2
(Know your data)

- n/a
- n/a

- n/a
- n/a
- n/a

- n/a
- n/a

- Check file fixity on ingest
if it has been provided
with the content
- Create fixity info if it
wasn’t provided with the
content

- Check fixity on all ingests
- Use write-blockers when
working with original
media
- Virus check high risk
content

- Check fixity of content at
fixed intervals
- Maintain logs of fixity info;
supply audit on demand
- Ability to detect corrupt
data
-Virus-check all content

-Identify who has read,
write, move and delete
authorization to individual
files
-Restrict who has those
authorizations to
individual files

-Document access
restrictions for content

-Maintain logs of who
performed what actions
on files, include deletions
and preservation actions

-Perform audit of logs

-Inventory of content and
its storage location
-Ensure backup and
non-collocation of
inventory

-Store administrative
metadata
-Store transformative
metadata and log events

-Store standard technical
and descriptive metadata

-Store standard
preservation metadata

File Formats

-Identify who has read,
write, move and delete
authorization to individual
files
-Restrict who has those
authorizations to
individual files

Level 1
(Protect your data)

Metadata

-Perform audit of logs

Storage and
Geographic
Location

2.0 Ingest

DC

Administration

File Fixity and
Data Integrity
Level 1
(Protect your data)

P

D

PQ_DATA

Level 1
(Protect your data)

Archivematica

DI

IP

-When you can give input
into the creation of digital
files encourage use of a
limited set of known open
formats and codecs

-Inventory of file formats in
use

- n/a

- n/a

Storage and
Geographic
Location

File Fixity and
Data Integrity

-Store standard
preservation metadata

-Perform format
migrations, emulation and
similar activities as needed

This Red, Amber, Green or RAG chart is a conceptual map that indicates the proposed benefits of
an Archivematica and Islandora integration with attention given to extant strengths, feasibility,
and future development roadmaps. Green indicates an area in which there already exists features
to support the applicable preservation activities; yellow indicates activities which could be
supported given current status or development indicated on a future roadmap; red indicates
activities which are not currently supported by existing features and would require significant
development.

Information
Security

Level 3
(Monitor your data)

Aaron Collie•••••••••••collie@mail.lib.msu.edu
Devin Higgins•••••• higgi135@mail.lib.msu.edu
Lucas Mak•••••••••••• makw@mail.lib.msu.edu
Shawn Nicholson••nicho147@mail.lib.msu.edu

Level 4
(Repair your data)
- n/a
- n/a

- Check fixity of all content
in response to specific
events or activities
- Ability to replace/repair
corrupted data
-Ensure no one user has
write access to all copies

Más contenido relacionado

La actualidad más candente

Acquiring Born-Digital Material at the Canadian Centre for Architecture
Acquiring Born-Digital Material at the Canadian Centre for ArchitectureAcquiring Born-Digital Material at the Canadian Centre for Architecture
Acquiring Born-Digital Material at the Canadian Centre for ArchitectureDavid Stevenson
 
150618 tryggve update
150618 tryggve update150618 tryggve update
150618 tryggve updateanttipursula
 
Hypatia for dlf 2011
Hypatia for dlf 2011Hypatia for dlf 2011
Hypatia for dlf 2011DLFCLIR
 
151111 tryggve-nordic biobank
151111 tryggve-nordic biobank151111 tryggve-nordic biobank
151111 tryggve-nordic biobankanttipursula
 
Safe use of personal data in research
Safe use of personal data in researchSafe use of personal data in research
Safe use of personal data in researchanttipursula
 
Tryggve support for-research
Tryggve support for-researchTryggve support for-research
Tryggve support for-researchanttipursula
 
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...WiLS
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
160905 tryggve-at-eccb pursula
160905 tryggve-at-eccb pursula160905 tryggve-at-eccb pursula
160905 tryggve-at-eccb pursulaanttipursula
 
SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013ssleuropa
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteriasabin kafle
 
Sameer Mitter - Access Control in Cloud Security
Sameer Mitter - Access Control in Cloud SecuritySameer Mitter - Access Control in Cloud Security
Sameer Mitter - Access Control in Cloud SecuritySameer Mitter
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
 

La actualidad más candente (15)

Acquiring Born-Digital Material at the Canadian Centre for Architecture
Acquiring Born-Digital Material at the Canadian Centre for ArchitectureAcquiring Born-Digital Material at the Canadian Centre for Architecture
Acquiring Born-Digital Material at the Canadian Centre for Architecture
 
150618 tryggve update
150618 tryggve update150618 tryggve update
150618 tryggve update
 
Hypatia for dlf 2011
Hypatia for dlf 2011Hypatia for dlf 2011
Hypatia for dlf 2011
 
151111 tryggve-nordic biobank
151111 tryggve-nordic biobank151111 tryggve-nordic biobank
151111 tryggve-nordic biobank
 
Safe use of personal data in research
Safe use of personal data in researchSafe use of personal data in research
Safe use of personal data in research
 
Tryggve support for-research
Tryggve support for-researchTryggve support for-research
Tryggve support for-research
 
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Andrew waugh
Andrew waughAndrew waugh
Andrew waugh
 
160905 tryggve-at-eccb pursula
160905 tryggve-at-eccb pursula160905 tryggve-at-eccb pursula
160905 tryggve-at-eccb pursula
 
SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
 
Darwin
DarwinDarwin
Darwin
 
Sameer Mitter - Access Control in Cloud Security
Sameer Mitter - Access Control in Cloud SecuritySameer Mitter - Access Control in Cloud Security
Sameer Mitter - Access Control in Cloud Security
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 

Destacado

Focus on research workshop
Focus on research workshopFocus on research workshop
Focus on research workshopbellalli
 
EPrints Update, Les Carr, University of Southampton
EPrints  Update, Les Carr, University of SouthamptonEPrints  Update, Les Carr, University of Southampton
EPrints Update, Les Carr, University of SouthamptonRepository Fringe
 
Webinar on OpenAIRE compatibility for repositories: EPrints repository platform
Webinar on OpenAIRE compatibility for repositories: EPrints repository platform Webinar on OpenAIRE compatibility for repositories: EPrints repository platform
Webinar on OpenAIRE compatibility for repositories: EPrints repository platform OpenAIRE
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservationsmtcd
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introductionMichael Day
 
Impada O2-A3 - O2-A3 - Quality Improvement Action Plan
Impada O2-A3 - O2-A3 - Quality Improvement Action Plan Impada O2-A3 - O2-A3 - Quality Improvement Action Plan
Impada O2-A3 - O2-A3 - Quality Improvement Action Plan Andrea Ciantar
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentationelliehood
 

Destacado (8)

Focus on research workshop
Focus on research workshopFocus on research workshop
Focus on research workshop
 
EPrints Update, Les Carr, University of Southampton
EPrints  Update, Les Carr, University of SouthamptonEPrints  Update, Les Carr, University of Southampton
EPrints Update, Les Carr, University of Southampton
 
Webinar on OpenAIRE compatibility for repositories: EPrints repository platform
Webinar on OpenAIRE compatibility for repositories: EPrints repository platform Webinar on OpenAIRE compatibility for repositories: EPrints repository platform
Webinar on OpenAIRE compatibility for repositories: EPrints repository platform
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Digital preservation: an introduction
Digital preservation: an introductionDigital preservation: an introduction
Digital preservation: an introduction
 
Impada O2-A3 - O2-A3 - Quality Improvement Action Plan
Impada O2-A3 - O2-A3 - Quality Improvement Action Plan Impada O2-A3 - O2-A3 - Quality Improvement Action Plan
Impada O2-A3 - O2-A3 - Quality Improvement Action Plan
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a Islandora & Archivematica combined NDSA RAG poster for LITA

Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageAccenture
 
Analytics with unified file and object
Analytics with unified file and object Analytics with unified file and object
Analytics with unified file and object Sandeep Patil
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0Paul Hampton
 
UNIT7-FileMgmt.pptx
UNIT7-FileMgmt.pptxUNIT7-FileMgmt.pptx
UNIT7-FileMgmt.pptxNavyaKumar22
 
Using Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchiveUsing Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchivePhil Cryer
 
File Management
File ManagementFile Management
File ManagementNajma Alam
 
OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...
OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...
OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...OpenAIRE
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big dataUlf Mattsson
 
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...Artefactual Systems - Archivematica
 

Similar a Islandora & Archivematica combined NDSA RAG poster for LITA (20)

NISO Two-Part Webinar: Sustainable Information Part 1: Digital Preservation f...
NISO Two-Part Webinar: Sustainable Information Part 1: Digital Preservation f...NISO Two-Part Webinar: Sustainable Information Part 1: Digital Preservation f...
NISO Two-Part Webinar: Sustainable Information Part 1: Digital Preservation f...
 
Archivematica presentation to SJSU iSchool Colloquia series
Archivematica presentation to SJSU iSchool Colloquia seriesArchivematica presentation to SJSU iSchool Colloquia series
Archivematica presentation to SJSU iSchool Colloquia series
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storage
 
Analytics with unified file and object
Analytics with unified file and object Analytics with unified file and object
Analytics with unified file and object
 
NogaLogic
NogaLogicNogaLogic
NogaLogic
 
Digital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An IntroductionDigital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An Introduction
 
Andrew waugh
Andrew waughAndrew waugh
Andrew waugh
 
Andrew Waugh presentation
Andrew Waugh   presentationAndrew Waugh   presentation
Andrew Waugh presentation
 
File system
File systemFile system
File system
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0
 
UNIT7-FileMgmt.pptx
UNIT7-FileMgmt.pptxUNIT7-FileMgmt.pptx
UNIT7-FileMgmt.pptx
 
Using Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchiveUsing Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent Archive
 
File Management
File ManagementFile Management
File Management
 
OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...
OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...
OpenAIRE webinar: Principles of Research Data Management, with S. Venkatarama...
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
Archivematica and the digital archival chain of custody
Archivematica and the digital archival chain of custodyArchivematica and the digital archival chain of custody
Archivematica and the digital archival chain of custody
 
Presentation 16 may keynote karin bredenberg
Presentation 16 may keynote karin bredenbergPresentation 16 may keynote karin bredenberg
Presentation 16 may keynote karin bredenberg
 
Ch10 file system interface
Ch10   file system interfaceCh10   file system interface
Ch10 file system interface
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...
 

Más de aaroncollie

UIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data WeekUIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data Weekaaroncollie
 
Data as a Library Aquisition
Data as a Library AquisitionData as a Library Aquisition
Data as a Library Aquisitionaaroncollie
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Managementaaroncollie
 
Role confusion, change transfusions and standards intrusion in the digital re...
Role confusion, change transfusions and standards intrusion in the digital re...Role confusion, change transfusions and standards intrusion in the digital re...
Role confusion, change transfusions and standards intrusion in the digital re...aaroncollie
 
Data management for TA's
Data management for TA'sData management for TA's
Data management for TA'saaroncollie
 
Data Management for Research (New Faculty Orientation)
Data Management for Research (New Faculty Orientation)Data Management for Research (New Faculty Orientation)
Data Management for Research (New Faculty Orientation)aaroncollie
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Managementaaroncollie
 

Más de aaroncollie (7)

UIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data WeekUIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data Week
 
Data as a Library Aquisition
Data as a Library AquisitionData as a Library Aquisition
Data as a Library Aquisition
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Role confusion, change transfusions and standards intrusion in the digital re...
Role confusion, change transfusions and standards intrusion in the digital re...Role confusion, change transfusions and standards intrusion in the digital re...
Role confusion, change transfusions and standards intrusion in the digital re...
 
Data management for TA's
Data management for TA'sData management for TA's
Data management for TA's
 
Data Management for Research (New Faculty Orientation)
Data Management for Research (New Faculty Orientation)Data Management for Research (New Faculty Orientation)
Data Management for Research (New Faculty Orientation)
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 

Islandora & Archivematica combined NDSA RAG poster for LITA

  • 1. Furthering the Community: Integrating Archivematica and Islandora Preservation Planning METS Fedora EXT 1.1 ABSTRACT In response to a series of pragmatic problems surrounding long-term digital object management, our library is creating an automated workflow for receiving, structuring, ingesting, handling, and preserving dissertation content. This specific workflow will be enabled through two well regarded digital preservation softwares: Archivematica for ingesting and bagging OAIS compliant information packages, and Fedora Commons for managing and handling digital objects within distributed systems. This project is similar to other dissertation-repository projects in that it details the software stack, infrastructure map, and baseline workflow; and innovative in that it provides a use case for the integration of Archivematica and Fedora Commons. METS ProQuest Humans XSL METS 1.8 AIP DIP Staging 12TB METS ● mets:mets “http://www.loc.gov/METS/:” ► ● mets:metsHdr “A” ► ● mets:dmdSecFedora “PQ_DATA” ► ● mets:dmdSecFedora “DC1” ► ● mets:dmdSecFedora “MODS1” ► ● mets:amdSec “PREMIS_RIGHTS1” ► ● mets:amdSec “PREMIS_OBJECT1” ► ● mets:amdSec “PREMIS_DIGIPROV1” ► ● mets:amdSec “PREMIS_DIGIPROV2” ► ● mets:amdSec “PREMIS_DIGIPROV3” ► ● mets:amdSec “PREMIS_DIGIPROV4” ► ● mets:amdSec “PREMIS_DIGIPROV5” ► ● mets:amdSec “PREMIS_DIGIPROV6” ► ● mets:amdSec “PREMIS_DIGIPROV7” ► ● mets:amdSec “PREMIS_DIGIPROV8” ► ● mets:amdSec “PREMIS_DIGIPROV9” ▼ ● mets:fileSec ► ● mets:fileGrp “DATASTREAMS” 3.0 Data Management Persistant ID (PID) Level 2 (Know your data) - n/a - n/a - n/a - For heterogeneous media, get content off medium and into storage system - n/a - n/a - Obsolescence monitoring process for your storage system(s) and media - n/a - Have a comprehensive plan in place that will keep files and metadata on currently accesible media or systems - Check file fixity on ingest if it has been provided with the content - Create fixity info if it wasn’t provided with the content - Check fixity on all ingests - Use write-blockers when working with original media - Virus check high risk content - Check fixity of content at fixed intervals - Maintain logs of fixity info; supply audit on demand - Ability to detect corrupt data -Virus-check all content - Check fixity of all content in response to specific events or activities - Ability to replace/repair corrupted data -Ensure no one user has write access to all copies -Identify who has read, write, move and delete authorization to individual files -Restrict who has those authorizations to individual files -Document access restrictions for content -Maintain logs of who performed what actions on files, include deletions and preservation actions MODS PREMIS Metadata -Inventory of content and its storage location -Ensure backup and non-collocation of inventory -Store administrative metadata -Store transformative metadata and log events -Store standard technical and descriptive metadata File Formats -When you can give input into the creation of digital files encourage use of a limited set of known open formats and codecs -Inventory of file formats in use -Monitor file format obsolescence issues -Perform format migrations, emulation and similar activities as needed Information Security SIP Response METS DIP DI P AIP 1.0 Archival Storage ● mets:fileGrp “METS1” ► ● mets:fileGrp “DIP” ► ● mets:fileGrp “AIP” ► NDSA Levels of Preservation Storage and Geographic Location -Store standard preservation metadata File Fixity and Data Integrity Queries 4.0 Access (...) Level 3 Level 4 (Monitor your data) (Repair your data) Level 2 (Know your data) Level 3 (Monitor your data) Level 4 (Repair your data) - At least three complete copies -At least one copy in a different geographic location - Two complete copies that are not collocated - For heterogeneous media, get content off medium and into storage system - Document your storage system and storage media - At least one copy in a geographic location with a different disaster thread - Obsolescence monitoring process for your storage system(s) and media - At least three copies in geographic locations - Have a comprehensive plan in place that will keep files and metadata on currently accesible media or systems - Check file fixity on ingest if it has been provided with the content - Create fixity info if it wasn’t provided with the content - Check fixity on all ingests - Use write-blockers when working with original media - Virus check high risk content - Check fixity of content at fixed intervals - Maintain logs of fixity info; supply audit on demand - Ability to detect corrupt data -Virus-check all content - Check fixity of all content in response to specific events or activities - Ability to replace/repair corrupted data -Ensure no one user has write access to all copies Information Security Metadata File Formats Does already or low hanging fruit Feasible based on current status or future roadmap Not currently supported; extensive new feature Islandora -Inventory of content and its storage location -Ensure backup and non-collocation of inventory -When you can give input into the creation of digital files encourage use of a limited set of known open formats and codecs -Document access restrictions for content -Store administrative metadata -Store transformative metadata and log events -Inventory of file formats in use -Maintain logs of who performed what actions on files, include deletions and preservation actions -Store standard technical and descriptive metadata -Monitor file format obsolescence issues -Perform audit of logs Level 2 (Know your data) - n/a - n/a - n/a - n/a - n/a - n/a - n/a - Check file fixity on ingest if it has been provided with the content - Create fixity info if it wasn’t provided with the content - Check fixity on all ingests - Use write-blockers when working with original media - Virus check high risk content - Check fixity of content at fixed intervals - Maintain logs of fixity info; supply audit on demand - Ability to detect corrupt data -Virus-check all content -Identify who has read, write, move and delete authorization to individual files -Restrict who has those authorizations to individual files -Document access restrictions for content -Maintain logs of who performed what actions on files, include deletions and preservation actions -Perform audit of logs -Inventory of content and its storage location -Ensure backup and non-collocation of inventory -Store administrative metadata -Store transformative metadata and log events -Store standard technical and descriptive metadata -Store standard preservation metadata File Formats -Identify who has read, write, move and delete authorization to individual files -Restrict who has those authorizations to individual files Level 1 (Protect your data) Metadata -Perform audit of logs Storage and Geographic Location 2.0 Ingest DC Administration File Fixity and Data Integrity Level 1 (Protect your data) P D PQ_DATA Level 1 (Protect your data) Archivematica DI IP -When you can give input into the creation of digital files encourage use of a limited set of known open formats and codecs -Inventory of file formats in use - n/a - n/a Storage and Geographic Location File Fixity and Data Integrity -Store standard preservation metadata -Perform format migrations, emulation and similar activities as needed This Red, Amber, Green or RAG chart is a conceptual map that indicates the proposed benefits of an Archivematica and Islandora integration with attention given to extant strengths, feasibility, and future development roadmaps. Green indicates an area in which there already exists features to support the applicable preservation activities; yellow indicates activities which could be supported given current status or development indicated on a future roadmap; red indicates activities which are not currently supported by existing features and would require significant development. Information Security Level 3 (Monitor your data) Aaron Collie•••••••••••collie@mail.lib.msu.edu Devin Higgins•••••• higgi135@mail.lib.msu.edu Lucas Mak•••••••••••• makw@mail.lib.msu.edu Shawn Nicholson••nicho147@mail.lib.msu.edu Level 4 (Repair your data) - n/a - n/a - Check fixity of all content in response to specific events or activities - Ability to replace/repair corrupted data -Ensure no one user has write access to all copies