nof-digitise Technical Standards and Guidelines

Size: px
Start display at page:

Download "nof-digitise Technical Standards and Guidelines"

Transcription

1 nof-digitise Technical Standards and Guidelines Version One: June 2000 This document has been developed on behalf of the New Opportunities Fund (NOF) by the UK Office for Library and Information Networking (UKOLN), University of Bath, in association with Resource: The Council for Museums, Archives & Libraries. Acknowledgements This document was prepared by UKOLN staff and edited by Sarah Ormes and Andy Powell. UKOLN would like to thank Bruce Royan, Sandy Buchanan and Mark Bide for their contributions. This document draws on Scientific, Industrial and Cultural Heritage: a shared approach, a research framework for digital libraries, museums and archives written by Lorcan Dempsey for the European Commission s Information Society Directorate General. Scientific, Industrial and Cultural Heritage: a shared approach < The full text of the latest version of this document is available online from: < technicalstandards.html> UKOLN is funded by Resource: The Council for Museums, Archives & Libraries, the Joint Information Systems Committee (JISC) of the Higher and Further Education Funding Councils, as well as by project funding from the JISC and the European Union. UKOLN also receives support from the University of Bath where it is based.

2

3 Table of Contents 1. Introduction The Life Cycle Approach Requirements and Guidelines Vocabulary Other Standards Developments Updates to this Document Creation Requirements File Formats Character Encoding Guidance Data Capture Metadata Preservation Management Requirements Intellectual Property Rights Identification Performance Indicators Security E-Commerce Guidance Preservation Metadata Collection Development Guidance Access Requirements Access To Resources Authenticity Guidance Metadata and Resource Discovery Watermarking and Fingerprinting User Authentication Re-use Guidance Learning Resource Creation...15

4

5 1. Introduction The nof-digitise programme will support the creation of a significant body of digital resources. The promise is of a rich digital fabric of learning materials, cultural artefacts, and civic resources which offer real support for life-long learning in a new cultural network space. This document recommends some agreed approaches to how this resource is created and made available. It incorporates many of the examples of best practise developed by the 15 million UK Electronic Libraries Programme (elib). Without the implementation of agreed approaches throughout nofdigitise the promise of networked information for learning and cultural enrichment will not be realised. Important areas for consideration are: Preservation. It is important to secure the long-term future of materials, so that the benefit of the investment is maximised, and the cultural record is maintained in its historical continuity and media diversity. Interoperability. It is important to be able to share content seamlessly between projects and between projects and users, to be able easily to use content without specialist tools, to be able to discover and interact with content in consistent ways, to be able to manage it effectively. Security. In a network age it is important that the identity of users, content, and projects is established; that intellectual property rights and privacy are protected; that the integrity and authenticity of resources can be established. Accessibility. It is important that materials are as accessible as possible and are made publicly available using open standards and non-proprietary formats. If this material is to be a true national resource it must be accessible to all citizens including those with disabilities. Failure to address these areas will have serious consequences, as the different parties waste their resources: Users - the citizen, the learner, the child. They will waste time and effort as they cannot readily find or use what is most appropriate to their needs, because it is not described, or is formatted in a particular way, or requires specialist tools to exploit, or was never captured in a usable form. Information providers and managers. Their investment may be redundant and wasted as their resources fail to release their value in use, as 1

6 their products reach a part only of the relevant audience, as they invest in non-standard or outmoded practices. Funding agencies. They have to pay for redundant, fragmented effort, for multiple learning curves and reinvention of wheels, for less than optimal projects and techniques, for content that fails to reach users or markets. Creators, authors. Their legacy to the future may be lost The Life Cycle Approach A life-cycle approach has been used in the discussion of standards as decisions taken at any stage in a resource s life may have ramifications for cost-effective use at other stages. The stages in this life cycle are: Creation. The actual creation of an individual digital resource. Management. The digital resource will need to be managed in some way if it is to be accessible and meaningful. Collection Development. The digital resource will typically be placed in a collection with other digital resources. This collection will need to be managed. It should also be capable of growing. Access. Materials need to be made available on the network in accessible, usable, secure, and responsible ways. Repackaging. A digital resource should be able to be used in more than one way. For example, a digitised local history photograph could be created initially to be used as part of an online exhibition but then repackaged to be used as part of a teaching resource. The use of a life cycle approach means that a number of technical standards are revisited through out the document. Metadata, for example, is relevant to several of the stages of the life cycle and is discussed separately at each of these stages Requirements and Guidelines This document outlines technical requirements which projects must meet and also offers guidance on developing technical issues. Requirements are standards which are widely accepted and already in current use. All projects must implement any standards that are identified as requirements. This document also offers guidance. The standards covered in the guidance sections are still in development. It is probable that these standards will become widely accepted during the lifetime of the programme but they cannot be identified as a requirement with full confidence yet. Projects should 2

7 maintain and demonstrate awareness of these standards and their potential applications Vocabulary The words must, should and may when printed in bold text have precise meanings in the context of this document. Must: This word indicates an absolute technical requirement with which all projects must comply. Should: This word indicates that there may be valid reasons not to treat this point of guidance as an absolute requirement, but the full implications should be understood and the case carefully weighed before it is disregarded. Should has been used in conjunction with technical standards that are likely to become widely implemented during the lifetime of the project but currently are still gaining widespread use. May: This word indicates that the topic deserves attention, but projects are not bound by New Opportunities Fund advice. May has therefore been used to refer to standards that are currently still being developed. This vocabulary is based on terminology used in Internet Engineering Task Force (IETF) documentation. IETF < Other Standards Developments This document builds on existing published technical standards developed for e-government services. Additional standards for use in e-government services are currently being prepared and it is probable that they will be very influential. The nof-digitise standards may be realigned at some point to conform with the updated e-government standards, however, it is not expected that this will have a major impact on project applications in the short term. Projects should maintain awareness of ongoing standards developments for e- government services. Projects should also maintain an awareness of the University for Industry (UFI) guidelines on standards. Information Age Government Champions < UFI Qualified Suppliers Content Development Standards < 3

8 1.5. Updates to this Document This document will be developed over the lifetime of the programme in order to reflect the most recent developments in standards. The latest version of this document will be available from: < technicalstandards.html> 2. Creation This section covers the actual creation of digital resources by nof-digitise funded projects. Technical standards decisions made at this stage will have a fundamental impact on the manageability, accessibility and viability of the resources created Requirements File Formats Projects must use open standard file formats when creating digital records in order to maximise access to resources. (Please note that file formats for the delivery of digital records to users are outlined in ). The use of open file formats will help with interoperability, ensuring that resources are reusable and can be created and modified by a variety of applications. It will also help to avoid dependency on a particular supplier. Text based content must be created and managed in a structured format suitable for delivery as HTML. In most cases storing text-based content as HTML, XHTML or XML, either in plain files or within a database of some kind, will be the most appropriate option. Where HTML is chosen as the storage format, the latest version recommended by the World Wide Web Consortium (W3C), currently HTML 4, or the latest version of XHTML, currently 1.0, must be used. HTML and XML documents should be validated against a published Document Type Definition (DTD). Images, video, sound and music should initially be created and stored using appropriate open or de facto standard formats as outlined below. Images must be created and stored using the TIFF, PNG or SPIFF formats. (SPIFF is the official format for storing JPEG images ). Video must be created and stored using MPG, Microsoft AVI, ASF or QuickTime formats. Sound must be created and stored using MP3, RealAudio, Microsoft WAV or Sun AU formats. 4

9 W3C HTML < Character Encoding Projects must store and deliver text-based content in a way that is compatible with the Unicode UTF-8 encoding form. Unicode is a standard for representing characters, letters and numbers. Most modern office software products support UTF-8 by default. If appropriate, the UTF-16 encoding form may be used in preference. The Unicode Standard - A Technical Introduction < principles.html> 2.2. Guidance Data Capture Standards for initial data capture are still developing and it is difficult to identify specific technical requirements at this time. However, projects should demonstrate that they have considered the implications of the following three issues: the selection of materials for digitisation, the physical preparation of materials for digitisation, the digitisation process. The JISC Image Digitisation Initiative (JIDI), the Arts and Humanities Data Service (AHDS) and the Technical Advisory Service for Images (TASI) all provide further guidance on this topic. A Feasibility Study for the JISC Image Digitisation Initiative (JIDI) < jidi_fs.html> AHDS: Guides to Good Practice in the Creation and Use of Digital Resources < AHDS < TASI < 5

10 Metadata Metadata is structured data about data. Typically, the term refers to any data used to aid the identification, description, location or use of networked electronic resources. Any digital object will benefit from the addition of metadata, as it will ensure that it can be more easily identified, understood and utilised. The use of metadata will be needed through the whole lifecycle of a digital resource and is consequently referred to throughout this document. Initial guidance on the types of metadata that may need to be recorded during the digitisation process has been produced by the RLG Working Group on Preservation Issues of Metadata and also by projects like the Making of America II Testbed Project. RLG Working Group on Preservation Issues of Metadata < Making of America II Testbed Project < Preservation Preservation concerns apply both to the information object being digitised and to the surrogate digital object when it has been created. Wherever possible, those responsible for the project must weigh-up the risks of exposing original material to any digitisation process, especially where the items are unique, valuable or fragile. More guidance on this topic can be found in Guidelines for digital imaging. Preservation issues should be considered an integral part of the digital creation process. Preservation will depend upon documenting all of the technological procedures that led to the creation of an object, and this - in many cases - can only be done at the point of creation. Projects should consider the value in creating a fully documented high-quality digital master from which all other versions (e.g. compressed versions for accessing via the Web) can be derived. This will help with the periodic migration of data and with the development of new products and resources. Guidelines for digital imaging: papers < 3. Management In the same way that physical collections are managed, digital collections will also need to be managed. Issues that will need to be addressed include preservation of the data, copyright issues, security and e-commerce. Again, 6

11 standards decisions made at this stage will have long term implications for the accessibility and usability of the data Requirements Intellectual Property Rights The contract that any funded project will be expected to sign with the New Opportunities Fund will hold the Fund harmless in any dispute over Intellectual Property Rights (IPR). Projects must therefore only digitise material of which they own the IPR or have clear permission to use from the rights holder, or for which it can be shown that all reasonable steps to establish IPR have been taken. Care is particularly advisable in the circumstances below: Published material. Publishers are unlikely to give permission to digitise incopyright material unless this is of some advantage to them. Older material may be out of copyright but the project is responsible for confirming this. Copyright restrictions cease 70 years after the death of the material s creator. In-house productions. The rights in any work undertaken by an institution s staff, as part of their normal duties, remains the property of that institution. In some academic institutions these rights may not have been asserted, and authors may have assigned them to external publishers. Unpaid volunteers retain the copyright of their work unless they sign away their rights. Institutions commissioning work. This work, for example photography, will normally have secured reproduction rights, but this may not have extended to digitisation unless specifically stated in the agreement. Projects will only have copyright on digitised material if this is permission is secured. Gifts, bequests and loans. These may have particular conditions attached to them that affect their availability for digitisation. Copyright and the Networked Environment Issue Paper from Networked Services Policy Taskgroup < copyright.html> Creating Digital Resources for the Visual Arts: Standards and Good Practice < contents.html> Identification Digitised resources should be unambiguously identified and uniquely addressable directly from a user s Web browser. It is important, for example, 7

12 that the end user has the capability to directly and reliably cite an individual resource, rather than having to link to the Web site of a whole project. Projects may also want to ensure that logical sets within the resources they are providing are uniquely and persistently addressable. Projects should make use of the Uniform Resource Identifier (URI) for this purpose. For the moment, the only widely deployed form of URI is the Uniform Resource Locator (URL). Projects may wish to consider assigning a Digital Object Identifier to resources where appropriate. Uniform Resource Identifiers < Digital Object Identifier < Performance Indicators Performance indicators can be used to provide objective measures of the usage of a Web service. The most popular performance indicator makes use of Web server log files. Analysis of server log files can provide valuable information on the growth of a service and usage patterns, although reports need to be interpreted carefully. Web projects must maintain server log files and must use them to provide regular reports which must be made publicly available Security The machines used to deliver projects must be operated in as secure a manner as possible. The advice in operating system manuals concerning security must be followed. All known security patches must be applied. Machines should be configured to run only the minimum number of network services. Machines should be placed behind a firewall if possible, with access to the Internet only on those ports that are required for the project being delivered. Projects should be managed in accordance with the Information Security Management guidelines laid out in BS7799: Part 1. The management and use of any personal information must conform to the Data Protection Act Where sensitive information is being passed from a client to a server across the network, projects must use Secure Sockets Layer (SSL) to encrypt the data. This includes the transfer of usernames and passwords, credit card details and other personal information. Note that the use of SSL also provides the end-user with an increased level of confidence in the authenticity of the service. 8

13 Information Security Management (BS7799) < Data Protection Act 1998 < Introduction to SSL < /sslin/index.htm> E-Commerce Material digitised or content created with nof-digitise funding must be made available for educational purposes, free at the point of use. The New Opportunities Fund recognises that there is a continuing cost in making this material available and the project may therefore charge provider institutions for such a delivery service, or may deposit materials with delivery services which themselves make such charges. Even if the project decides to absorb the costs of delivery of nof-digitise funded content from its own funding, it will have been created with public money and its IPR must be protected. Whereas public domain delivery on the Web of some resources (e.g. thumbnail images) will be encouraged, the New Opportunities Fund will expect the more valuable resources to be made available only to users and through institutions that have signed a licence restricting them to non-profit, non-proliferation, educational use. The New Opportunities Fund will require projects to use some form of protection to ensure valuable resources neither leak into the public domain nor are appropriated for unauthorised commercial use Guidance Preservation Once a digital surrogate has been created, its own preservation then becomes an issue. There is (as yet) no standardised way of ensuring the long-term preservation of any digital information, but all projects should be aware of, and demonstrate that they are aware of the need for preserving their digital resources Metadata Digitised resources need to be described at a sufficient level of detail to support their management and access. At a minimum, metadata should conform to developing e-government and UfI metadata standards and should be capable of supporting the delivery of Dublin Core (DC) descriptions of all project resources. 9

14 In the network environment, every transaction that involves intellectual property is by its nature a rights transaction. The expression of these Terms of Availability or Business Rules is dependent on rights metadata data which identifies unambiguously and securely the intellectual property itself, the specific rights which are being granted (for example to read, to print, to copy, to modify) and the users or potential users. There is no standardised way (of which we are aware) of expressing rights management data. The <indecs> project has created the necessary foundation (in the form of a metadata dictionary for the relatively static area of descriptive data) to enable the essential work on (dynamic) rights description to take place. It is currently expected (June 2000) that the rights elements of the <indecs> metadata dictionary will be published within the next 12 months. Projects should therefore maintain data about the rights that they hold and acquire in an internally consistent form, so that they can be converted as efficiently as possible into a standard format when one becomes available. The type of information that is likely to be required includes: The identification of the resource itself. The name of the person or organisation granting the rights. The precise right or rights which are being granted (including, for example, whether modification is permitted) and any specific exclusions. The period of time for which rights are granted. The user group or groups permitted to use the resource. Any obligations (including but not limited to financial obligations) that users of the resource may incur. Dublin Core < DC-dot < <indecs> < 10

15 4. Collection Development 4.1. Guidance The material digitised by each nof-digitise-funded project should be developed as a digital collection which will continue to grow and be added to beyond the lifetime of the nof-digitise project. Digital collections depend for their usefulness on critical mass. This in turn depends on a strategic approach to collection development, which encompasses a view of user needs and the wider availability of resources. All projects should demonstrate awareness of these issues. 5. Access It is expected that end-user access will be through the People s Network and the National Grid for Learning and consequently will operate using Internet Protocols. All projects will need to follow similar standards if they are to be accessible across the whole of this network Requirements Access To Resources Projects must be accessible using a Web browser. This will normally be achieved using HTML and the HTTP protocol. If other protocols are used (e.g. Z39.50) gateways must be available to provide access by a Web browser. Projects must be accessible by a variety of browsers, hardware systems, automated programs and end-users. All materials must be available 24 hours a day, 7 days a week and must be accessible to all. Projects must implement W3C Web Accessibility Initiative Recommendations and so ensure a high degree of accessibility for people with disabilities. Web services must be accessible to a wide range of browsers and hardware devices (e.g. Personal Digital Assistants (PDAs) as well as PCs). Web services must be usable by browsers that support W3C recommendations such as HTML, Cascading Style Sheets (CSS) and the Document Object Model (DOM). Projects that make use of proprietary file formats and browser plug-in technologies must ensure that they are still usable on browsers that do not have the plug-ins. The appearance of a Web site should be controlled by use of style sheets in line with W3C architecture and accessibility recommendations. The latest version of CSS recommended by W3C (currently CSS 2) should be used, 11

16 although, due to incomplete support by browsers, not all features defined in CSS 2 may be usable. Text-based content must be delivered as HTML or XHTML in most cases, though the use of other XML DTDs may sometimes be appropriate. Where HTML is chosen as the delivery format, the latest version recommended by W3C (currently HTML 4) or the latest version of XHTML (currently 1.0) must be used. HTML and XML documents must be validated against a published DTD. In some cases, delivery in proprietary formats such as PDF, RTF or Microsoft Word may be appropriate. Images, video and sound must be delivered using appropriate open or de facto standard formats as outlined below. Images must be provided on the Web as GIF (for line-drawings) or JPEG (for photographs) formats. PNG may be an alternative format to GIF. Video must be delivered using MPG, Microsoft AVI, ASF or Quicktime formats. Sound must be delivered using MP3, RealAudio, Microsoft WAV or Sun AU formats. W3C WAI recommendations < Authenticity Project specific domain names should be registered in the Domain Name System (DNS). The domain name forms part of the project branding and will help end-users identify the authenticity of the content being delivered. Domain names should therefore be clearly branded with either the name of the project or the organisation delivering the project. In some situations it may be appropriate to secure the network connection between the client and the server using Secure Sockets Layer (SSL) to give end-users increased confidence that they are exchanging information with the correct project Web site Guidance Metadata and Resource Discovery The body of resources created through nof-digitise funding will be significant, with the corpus as a whole potentially far more valuable than the individual holdings of each funded project. All projects should be capable of delivering summary descriptions of all the resources that they make available. Item-level descriptions should be based on the Dublin Core and should be in line with 12

17 developing e-government and UfI metadata standards. In order to facilitate searching across this corpus, and to enable integration of nof-digitise funded collections into the wider body of digital collections available in the UK, some consideration should also be given to the creation of collection level descriptions. The purpose of collection description is to: allow users to discover, locate and access collections of interest, allow users to perform searches across multiple collections in a controlled way, allow software to perform such tasks on behalf of users based on known user preferences. There are no agreed standards for collection level description, but nof-digitise funded projects should take into account work under progress within the UK library and HE sectors such as Research Support Libraries Programme (RSLP) and the National Preservation Office. Projects may also need to display awareness of Z39.50, a network protocol that allows searching of (usually remote) heterogeneous databases and retrieval of data, via one user interface. It is most often used for retrieving bibliographic records, although there are also some non-bibliographic implementations. Z39.50 Maintenance Agency < Z39.50 for All < RSLP Collection Description Metadata work at UKOLN < National Preservation Office < Watermarking and Fingerprinting Projects should give consideration to watermarking and fingerprinting the digital material they produce. Watermarking is the embedding of a permanent mark within a file that can subsequently be used to prove image origination or image copyright. This is normally achieved by integrating the watermark with the image data in such a way that it is virtually impossible to remove. Watermarks can be visible, 13

18 invisible or a combination of both. In all cases the watermark is introduced in such a way that there is minimum distortion of the original image. Watermarks must be able to withstand the image being cropped, rotated, compressed or transformed. Digimarc Watermarking software < Signum Technologies, Suresign Watermarking software < As well as watermarking images before they are distributed, images can be fingerprinted dynamically at delivery time i.e. as the image is downloaded from a Web site. When this is done, other information such as username, date, time, IP address etc. can be encoded as part of the watermark. This makes each instance of download unique and traceable through a transaction database enabling tracking of who is downloading images. This dynamic watermarking and fingerprinting is used by SCRAN. Similar techniques can be used in audio and video media. SCRAN < User Authentication Some projects may wish to limit access to their resources to authenticated users only. User authentication is an important tool for ensuring that only legitimate users can access the project s online resources. If projects choose to implement user authentication it should be based on a username and password combination. In the case of Web-based projects, HTTP Basic Authentication must be used to pass the username/password combination from the browser to the server. In some cases IP-based authentication (comparing the IP address of the client against a list of known IP addresses) may be an appropriate alternative to usernames and passwords. However, the use of this authentication method is strongly discouraged. Projects may choose to make use of third party authentication services, for example the UK Higher Education Athens service, to manage usernames and passwords on their behalf, if appropriate. Hypertext Transfer Protocol HTTP/1.0 < Athens Access Management < 14

19 6. Re-use Users will want to repackage and re-purpose material that has been developed for the nof-digitise programme. In order to facilitate this re-use the implementation of standards will be important Guidance Learning Resource Creation Projects should consider the potential re-use of the resources they create, and recognise that end users or third parties may wish to extract elements of a given resource and repackage them with parts of other resources from nofdigitise and elsewhere. An important area in which this is likely to happen is the educational sector, where learners and teachers are both liable to draw heavily upon nof-digitise resources throughout the learning process. In the wider global educational community, a number of initiatives are underway to create tools for managing educational resources. Some of this effort is concentrating upon the description of content such as that which might arise from nof-digitise. Projects may wish to stay abreast of work on the Instructional Management System, the work of the Dublin Core Metadata Initiative s Education working group, as well as the plethora of UK initiatives from various public sector institutions. Work is currently underway to harmonise approaches in the UK, and further advice may be issued in due course. Instructional Management System < 15

Collection Policy. Policy Number: PP1 April 2015

Collection Policy. Policy Number: PP1 April 2015 Policy Number: PP1 April 2015 Collection Policy The Digital Repository of Ireland is an interactive trusted digital repository for Ireland s contemporary and historical social and cultural data. The repository

More information

Digitisation Standards

Digitisation Standards Digitisation Standards Jeannette Frey, Alexandre Lopes BCU Lausanne LIBER-EBLIDA Digitization Workshop 2011 The Hague, October 5-7, 2011 Standards which standards? Standards are set by experts (not by

More information

Technical Guidelines for Digital Cultural Content Creation Programmes

Technical Guidelines for Digital Cultural Content Creation Programmes Technical Guidelines for Digital Cultural Content Creation Programmes Working Draft Version 0.06: Revised 25 November 2003 This document has been developed on behalf of the Minerva Project by UKOLN, University

More information

GETTING STARTED WITH DIGITAL COMMONWEALTH

GETTING STARTED WITH DIGITAL COMMONWEALTH GETTING STARTED WITH DIGITAL COMMONWEALTH Digital Commonwealth (www.digitalcommonwealth.org) is a Web portal and fee-based repository service for online cultural heritage materials held by Massachusetts

More information

GUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES

GUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES GUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES October 2018 INTRODUCTION This document provides guidelines for the creation and preservation of digital files. They pertain to both born-digital

More information

7.3. In t r o d u c t i o n to m e t a d a t a

7.3. In t r o d u c t i o n to m e t a d a t a 7. Standards for Data Documentation 7.1. Introducing standards for data documentation Data documentation has several functions. It records where images, text, and other forms of digital data are from,

More information

DIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM

DIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM OMB No. 3137 0071, Exp. Date: 09/30/2015 DIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM Introduction: IMLS is committed to expanding public access to IMLS-funded research, data and other digital products:

More information

Robin Wilson Director. Digital Identifiers Metadata Services

Robin Wilson Director. Digital Identifiers Metadata Services Robin Wilson Director Digital Identifiers Metadata Services Report Digital Object Identifiers for Publishing and the e-learning Community CONTEXT elearning the the Publishing Challenge elearning the the

More information

Different Aspects of Digital Preservation

Different Aspects of Digital Preservation Different Aspects of Digital Preservation DCH-RP and EUDAT Workshop in Stockholm 3rd of June 2014 Börje Justrell Table of Content Definitions Strategies The Digital Archive Lifecycle 2 Digital preservation

More information

Sustainable File Formats for Electronic Records A Guide for Government Agencies

Sustainable File Formats for Electronic Records A Guide for Government Agencies Sustainable File Formats for Electronic Records A Guide for Government Agencies Electronic records are produced and kept in a wide variety of file formats, often dictated by the type of software used to

More information

PRINCIPLES AND FUNCTIONAL REQUIREMENTS

PRINCIPLES AND FUNCTIONAL REQUIREMENTS INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER

More information

The SPECTRUM 4.0 Acquisition Procedure

The SPECTRUM 4.0 Acquisition Procedure The SPECTRUM 4.0 Acquisition Procedure Contents 1. What is the SPECTRUM 4.0 Acquisition Procedure? 2. The Acquisition Procedure and Accreditation 3. Why is the Acquisition Procedure important? 4. When

More information

SQA Advanced Unit specification. General information for centres. Unit title: Web Development Fundamentals. Unit code: HR7M 47

SQA Advanced Unit specification. General information for centres. Unit title: Web Development Fundamentals. Unit code: HR7M 47 SQA Advanced Unit specification General information for centres Unit title: Web Development Fundamentals Unit code: HR7M 47 Unit purpose: This Unit is designed to enable candidates to develop websites

More information

Guidelines for Developing Digital Cultural Collections

Guidelines for Developing Digital Cultural Collections Guidelines for Developing Digital Cultural Collections Eirini Lourdi Mara Nikolaidou Libraries Computer Centre, University of Athens Harokopio University of Athens Panepistimiopolis, Ilisia, 15784 70 El.

More information

University of Bath. Publication date: Document Version Publisher's PDF, also known as Version of record. Link to publication

University of Bath. Publication date: Document Version Publisher's PDF, also known as Version of record. Link to publication Citation for published version: Patel, M & Duke, M 2004, 'Knowledge Discovery in an Agents Environment' Paper presented at European Semantic Web Symposium 2004, Heraklion, Crete, UK United Kingdom, 9/05/04-11/05/04,.

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS). Harvard University Library Office for Information Systems DRS Policy Guide This Guide defines the policies associated with the Harvard Library Digital Repository Service (DRS) and is intended for Harvard

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

Technical Guidelines for Digital Cultural Content Creation Programmes Version 1.0: Revised 08 April 2004

Technical Guidelines for Digital Cultural Content Creation Programmes Version 1.0: Revised 08 April 2004 Technical Guidelines for Digital Cultural Content Creation Programmes Version 1.0: Revised 08 April 2004 This document has been developed on behalf of the Minerva Project by UKOLN, University of Bath,

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Part III: Survey of Internet technologies

Part III: Survey of Internet technologies Part III: Survey of Internet technologies Content (e.g., HTML) kinds of objects we re moving around? References (e.g, URLs) how to talk about something not in hand? Protocols (e.g., HTTP) how do things

More information

Open Archives Initiatives Protocol for Metadata Harvesting Practices for the cultural heritage sector

Open Archives Initiatives Protocol for Metadata Harvesting Practices for the cultural heritage sector Open Archives Initiatives Protocol for Metadata Harvesting Practices for the cultural heritage sector Relais Culture Europe mfoulonneau@relais-culture-europe.org Community report A community report on

More information

The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003

The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003 The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003 Pete Johnston UKOLN, University of Bath Bath, BA2 7AY

More information

Design & Manage Persistent URIs

Design & Manage Persistent URIs Training Module 2.3 OPEN DATA SUPPORT Design & Manage Persistent URIs PwC firms help organisations and individuals create the value they re looking for. We re a network of firms in 158 countries with close

More information

Final Report. Phase 2. Virtual Regional Dissertation & Thesis Archive. August 31, Texas Center Research Fellows Grant Program

Final Report. Phase 2. Virtual Regional Dissertation & Thesis Archive. August 31, Texas Center Research Fellows Grant Program Final Report Phase 2 Virtual Regional Dissertation & Thesis Archive August 31, 2006 Submitted to: Texas Center Research Fellows Grant Program 2005-2006 Submitted by: Fen Lu, MLS, MS Automated Services,

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

Guidelines for Depositors

Guidelines for Depositors UKCCSRC Data Archive 2015 Guidelines for Depositors The UKCCSRC Data and Information Life Cycle Rod Bowie, Maxine Akhurst, Mary Mowat UKCCSRC Data Archive November 2015 Table of Contents Table of Contents

More information

Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment

Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment Shigeo Sugimoto Research Center for Knowledge Communities Graduate School of Library, Information

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK To sign up for Citizens State Bank s Internet Banking Services, complete all information on this form. Please read the CSBank Online Internet Banking Agreement

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation The Mission of the Joint Research

More information

Metadata Elements Comparison: Vetadata and ANZ-LOM

Metadata Elements Comparison: Vetadata and ANZ-LOM Metadata Elements Comparison: Vetadata and ANZ-LOM The Learning Federation and E-standards for Training Version 1.0 April 2008 flexiblelearning.net.au thelearningfederation.edu.au Disclaimer The Australian

More information

M2 Glossary of Terms and Abbreviations

M2 Glossary of Terms and Abbreviations M2 Glossary of Terms and Abbreviations 11 June 2015 M2: Electronic Standards for the Transfer of Regulatory Information Updated at ICH Expert Working Group meeting, Fukuoka, June 2015 Definitions... 2

More information

Metadata Framework for Resource Discovery

Metadata Framework for Resource Discovery Submitted by: Metadata Strategy Catalytic Initiative 2006-05-01 Page 1 Section 1 Metadata Framework for Resource Discovery Overview We must find new ways to organize and describe our extraordinary information

More information

Science Europe Consultation on Research Data Management

Science Europe Consultation on Research Data Management Science Europe Consultation on Research Data Management Consultation available until 30 April 2018 at http://scieur.org/rdm-consultation Introduction Science Europe and the Netherlands Organisation for

More information

UKOLN involvement in the ARCO Project. Manjula Patel UKOLN, University of Bath

UKOLN involvement in the ARCO Project. Manjula Patel UKOLN, University of Bath UKOLN involvement in the ARCO Project Manjula Patel UKOLN, University of Bath Overview Work Packages User Requirements Specification ARCO Data Model Types of Requirements Museum User Trials Metadata for

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Scientific Data Policy of European X-Ray Free-Electron Laser Facility GmbH

Scientific Data Policy of European X-Ray Free-Electron Laser Facility GmbH 6 June 2017 Scientific Data Policy of European X-Ray Free-Electron Laser Facility GmbH as approved by the Council on 30 June 2017 1 Preface... 2 2 Definitions... 2 3 General principles... 5 4 Raw data

More information

ACH Clearing Rules. Guidance Note No. 5 NEW CLIENTS ELECTRONIC CLIENT AGREEMENTS KEY TOPICS ACH CLEARING RULES. Guidance Note History.

ACH Clearing Rules. Guidance Note No. 5 NEW CLIENTS ELECTRONIC CLIENT AGREEMENTS KEY TOPICS ACH CLEARING RULES. Guidance Note History. ACH Clearing Rules Guidance Note No. 5 KEY TOPICS 1. Conditions 2. Electronic Methods 3. Written Agreement. 4. Requirement for a signature 5. The method must be as reliable as appropriate in the circumstances

More information

Robin Dale RLG

Robin Dale RLG Robin Dale RLG Robin.Dale@notes.rlg.org Diversity of applications (commercial, home-grown, operational, etc.) in the organization, structure and encoding of documents and data Complexity varies greatly

More information

The digital preservation technological context

The digital preservation technological context The digital preservation technological context Michael Day, Digital Curation Centre UKOLN, University of Bath m.day@ukoln.ac.uk Preservation of Digital Heritage: Basic Concepts and Main Initiatives, Madrid,

More information

Protecting Future Access Now Models for Preserving Locally Created Content

Protecting Future Access Now Models for Preserving Locally Created Content Protecting Future Access Now Models for Preserving Locally Created Content By Amy Kirchhoff Archive Service Product Manager, Portico, ITHAKA Amigos Online Conference Digital Preservation: What s Now, What

More information

Our Data Protection Officer is Andrew Garrett, Operations Manager

Our Data Protection Officer is Andrew Garrett, Operations Manager Construction Youth Trust Privacy Notice We are committed to protecting your personal information Construction Youth Trust is committed to respecting and keeping safe any personal information you share

More information

Checklist and guidance for a Data Management Plan, v1.0

Checklist and guidance for a Data Management Plan, v1.0 Checklist and guidance for a Data Management Plan, v1.0 Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan, v1.0. Available online: https://wiki.helsinki.fi/x/dzeacw

More information

GMO Register User Guide

GMO Register User Guide GMO Register User Guide A. Rana and F. Foscarini Institute for Health and Consumer Protection 2007 EUR 22697 EN The mission of the Institute for Health and Consumer Protection is to provide scientific

More information

Application Decommissioning in Digital Transformation

Application Decommissioning in Digital Transformation Application Decommissioning in Digital Transformation Produced by In cooperation with MARCH 2018 CONTENTS Role of Application Decommissioning in Digital Transformation 3 What is application decommissioning?...

More information

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings: PRIVACY POLICY BACKGROUND: Leaman Mattei Limited (LM) understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2)

JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) Functional requirements and design specification for an ONIX-PL license expression drafting system 1. Introduction This document specifies a

More information

KING S COLLEGE, CAMBRIDGE

KING S COLLEGE, CAMBRIDGE KING S COLLEGE, CAMBRIDGE Users of Library, Archive and Special Collections The controller for your personal data is King s College, King s Parade, Cambridge, CB2 1ST. The Officer for the College is the

More information

Developing a Research Data Policy

Developing a Research Data Policy Developing a Research Data Policy Core Elements of the Content of a Research Data Management Policy This document may be useful for defining research data, explaining what RDM is, illustrating workflows,

More information

Information retrieval concepts Search and browsing on unstructured data sources Digital libraries applications

Information retrieval concepts Search and browsing on unstructured data sources Digital libraries applications Digital Libraries Agenda Digital Libraries Information retrieval concepts Search and browsing on unstructured data sources Digital libraries applications What is Library Collection of books, documents,

More information

The OAIS Reference Model: current implementations

The OAIS Reference Model: current implementations The OAIS Reference Model: current implementations Michael Day, UKOLN, University of Bath m.day@ukoln.ac.uk Chinese-European Workshop on Digital Preservation, Beijing, China, 14-16 July 2004 Presentation

More information

National Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher)

National Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher) National Unit Specification: general information NUMBER DM4F 12 COURSE Information Systems (Higher) SUMMARY This Unit is designed to develop knowledge and understanding of the operating principles of the

More information

Developing an Electronic Records Preservation Strategy

Developing an Electronic Records Preservation Strategy Version 7 Developing an Electronic Records Preservation Strategy 1. For whom is this guidance intended? 1.1 This document is intended for all business units at the University of Edinburgh and in particular

More information

Harwich Haven - Surrender to Sanctuary.

Harwich Haven - Surrender to Sanctuary. Harwich Haven - Surrender to Sanctuary. Website Specification 7 February 2018 Issued by David Cain david@nhscic.org on behalf of New Heritage Solutions C.I.C Office 33 Red Gables Ipswich Road Stowmarket

More information

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation WOSDEC: Privacy Policy West of Scotland Development Education Centre WOSDEC - (We) are committed to protecting and respecting your privacy. This policy sets out how the personal information we collect

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

Summary of Bird and Simons Best Practices

Summary of Bird and Simons Best Practices Summary of Bird and Simons Best Practices 6.1. CONTENT (1) COVERAGE Coverage addresses the comprehensiveness of the language documentation and the comprehensiveness of one s documentation of one s methodology.

More information

CGM v SVG. Computer Graphics Metafile v Scalable Vector Graphic. David Manock

CGM v SVG. Computer Graphics Metafile v Scalable Vector Graphic. David Manock It shall not be communicated to any third party without the owner s written consent. All rights reserved. CGM v SVG Computer Graphics Metafile v Scalable Vector Graphic David Manock VP Sales and Marketing

More information

MPEG-21: The 21st Century Multimedia Framework

MPEG-21: The 21st Century Multimedia Framework MPEG-21: The 21st Century Multimedia Framework Jan Bormans, Jean Gelissen, and Andrew Perkis IEEE Signal Processing Magazine, March 2003 Outline Context and motivation of MPEG-21 An overview of MPEG-21

More information

PRIVACY POLICY BACKGROUND:

PRIVACY POLICY BACKGROUND: PRIVACY POLICY BACKGROUND: SA Designer Parfums Limited understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

This factsheet intends to provide guidance on how you can manage your s. You will discover:

This factsheet intends to provide guidance on how you can manage your  s. You will discover: Summary This factsheet intends to provide guidance on how you can manage your emails. You will discover: Why it is important to manage your emails Guidance for approaching email management How to identify

More information

Unit code: J/601/1286 QCF Level 4: BTEC Higher National Credit value: 15

Unit code: J/601/1286 QCF Level 4: BTEC Higher National Credit value: 15 Unit 14: Website Design Unit code: J/601/1286 QCF Level 4: BTEC Higher National Credit value: 15 Aim To enable learners to understand the concepts of website design and apply their own creativity in designing

More information

A candidate is encouraged to use the internet in any research, etc. However, the evidence produced must be the candidate s own written words.

A candidate is encouraged to use the internet in any research, etc. However, the evidence produced must be the candidate s own written words. Higher National Unit Specification General information for centres Unit code: DV6G 34 Unit purpose: The Unit will introduce the candidate to the steps necessary to undertake secure commercial transactions

More information

Case 1:13-cv TSC Document Filed 02/05/16 Page 1 of 8 EXHIBIT 14

Case 1:13-cv TSC Document Filed 02/05/16 Page 1 of 8 EXHIBIT 14 Case 1:13-cv-01215-TSC Document 164-22 Filed 02/05/16 Page 1 of 8 EXHIBIT 14 Case 1:13-cv-01215-TSC Document 164-22 Filed 02/05/16 Page 2 of 8 U.S. Department of Justice Civil Rights Division Disability

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

Assigns a persistent identifier that will always point to the object and/or its metadata.

Assigns a persistent identifier that will always point to the object and/or its metadata. Preservation Policy Mountain Scholar is committed to providing long-term access to the digital works it contains. Adhering to best practices, Mountain Scholar and CSU Libraries staff use digital preservation

More information

Data Management Checklist

Data Management Checklist Data Management Checklist Managing research data throughout its lifecycle ensures its long-term value and prevents data from falling into digital obsolescence. Proper data management is a key prerequisite

More information

Emory Libraries Digital Collections Steering Committee Policy Suite

Emory Libraries Digital Collections Steering Committee Policy Suite Emory Libraries Digital Collections Steering Committee Policy Suite Last Revised: March, 2018 Digital Collections Development Policy 2 Digital Preservation Policy 5 Digital Object Retention Policy 8 Third-Party

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

ARKive-ERA Project Lessons and Thoughts

ARKive-ERA Project Lessons and Thoughts ARKive-ERA Project Lessons and Thoughts Semantic Web for Scientific and Cultural Organisations Convitto della Calza 17 th June 2003 Paul Shabajee (ILRT, University of Bristol) 1 Contents Context Digitisation

More information

Tennessee. Business Technology Course Code Web Design Essentials. HTML Essentials, Second Edition 2010

Tennessee. Business Technology Course Code Web Design Essentials. HTML Essentials, Second Edition 2010 Tennessee Business Technology Course Code 6501240 Web Design Essentials HTML Essentials, Second Edition 2010 Notation Key SE Student Edition LE Learning Expectation Standard 1.0 Demonstrate knowledge of

More information

DRI: Preservation Planning Case Study Getting Started in Digital Preservation Digital Preservation Coalition November 2013 Dublin, Ireland

DRI: Preservation Planning Case Study Getting Started in Digital Preservation Digital Preservation Coalition November 2013 Dublin, Ireland DRI: Preservation Planning Case Study Getting Started in Digital Preservation Digital Preservation Coalition November 2013 Dublin, Ireland Dr Aileen O Carroll Policy Manager Digital Repository of Ireland

More information

Elba Project. Procedures and general norms used in the edition of the electronic book and in its storage in the digital library

Elba Project. Procedures and general norms used in the edition of the electronic book and in its storage in the digital library Procedures and general norms used in the edition of the electronic book and in its storage in the digital library Dabne - Tecnologías de la información http://dabne.net Index 1 Some procedures and norms

More information

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy

More information

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings: PRIVACY POLICY BACKGROUND: Entod Research Cell UK Ltd understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

The Unicode Standard Version 11.0 Core Specification

The Unicode Standard Version 11.0 Core Specification The Unicode Standard Version 11.0 Core Specification To learn about the latest version of the Unicode Standard, see http://www.unicode.org/versions/latest/. Many of the designations used by manufacturers

More information

RECOMMENDED FILE FORMATS

RECOMMENDED FILE FORMATS Research and Enterprise Services RECOMMENDED FILE FORMATS University of Reading Research Data Archive Contents Introduction: file format categories... 1 Overview: formats for preservation and use... 1

More information

Keynote: The Future of Data Leakage Prevention

Keynote: The Future of Data Leakage Prevention Keynote: The Future of Data Leakage Prevention ISSS Zürcher Tagung 2010 1.6.2010, WIDDER Hotel, Zürich Sandy Porter Head of Identity and Security, Avoco Secure Information Security Society Switzerland

More information

4. TECHNOLOGICAL DECISIONS

4. TECHNOLOGICAL DECISIONS 35 4. TECHNOLOGICAL DECISIONS 4.1 What is involved in preserving digital resources? Preservation is concerned with ensuring the longevity of a digital resource through changing technological regimes with

More information

Proving your identity and ownership of a property

Proving your identity and ownership of a property Proving your identity and ownership of a property Acceptable documents - Money Laundering Regulations 2017 As with all Estate Agents, Easy Home Lets & Sales is subject to the Money Laundering Regulations

More information

Access Rights and Responsibilities. A guide for Individuals and Organisations

Access Rights and Responsibilities. A guide for Individuals and Organisations Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making

More information

RDA Resource Description and Access

RDA Resource Description and Access 1 RDA Resource Description and Access Scope and Structure This document is one of three that define the framework for the development of RDA. The RDA Strategic Plan establishes long-term goals for RDA

More information

Metadata and Encoding Standards for Digital Initiatives: An Introduction

Metadata and Encoding Standards for Digital Initiatives: An Introduction Metadata and Encoding Standards for Digital Initiatives: An Introduction Maureen P. Walsh, The Ohio State University Libraries KSU-SLIS Organization of Information 60002-004 October 29, 2007 Part One Non-MARC

More information

Protecting your Privacy Winchester Cathedral Privacy Notice

Protecting your Privacy Winchester Cathedral Privacy Notice Protecting your Privacy Cathedral Privacy Notice Introduction Cathedral is committed to protecting the privacy of any personal information it may hold regarding individuals. This Privacy Note explains

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

CTI Short Learning Programme in Internet Development Specialist

CTI Short Learning Programme in Internet Development Specialist CTI Short Learning Programme in Internet Development Specialist Module Descriptions 2015 1 Short Learning Programme in Internet Development Specialist (10 months full-time, 25 months part-time) Computer

More information

B. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc.

B. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc. DELANCEYPLACE.COM LLC PRIVACY POLICY DELANCEYPLACE.COM, LLC and its affiliates ( DelanceyPlace, we or us ) operate a website and related social network along with all related applications, software, daily

More information

Valley Blinds GDPR Privacy Policy. Introduction. What kind of personal data do we collect?

Valley Blinds GDPR Privacy Policy. Introduction. What kind of personal data do we collect? Valley Blinds GDPR Privacy Policy Introduction This Privacy Policy explains what we do with your personal data, whether we are in the process of dealing with an enquiry, processing an order, continuing

More information

Digital Preservation Policy. Principles of digital preservation at the Data Archive for the Social Sciences

Digital Preservation Policy. Principles of digital preservation at the Data Archive for the Social Sciences Digital Preservation Policy Principles of digital preservation at the Data Archive for the Social Sciences 1 Document created by N. Schumann Document translated by A. Recker, L. Horton Date created 18.06.2013

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS July 2015 212001734.08 Contents 1. CORE STANDARDS FOR PLT COURSES 1 1.1 Fundamental requirement 1 1.2 Course objectives 1 1.3 Course content 1 1.4 Teaching

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Registration and Authentication

Registration and Authentication Registration and Authentication e-government Strategy Framework Policy and Guidelines Version 3.0 September 2002 Registration and Authentication / Version 3.0 / September 2002 1 Contents 1. Introduction

More information

Semantic interoperability, e-health and Australian health statistics

Semantic interoperability, e-health and Australian health statistics Semantic interoperability, e-health and Australian health statistics Sally Goodenough Abstract E-health implementation in Australia will depend upon interoperable computer systems to share information

More information

1.1 Research and describe the current and historical concepts and principles of graphics design to include: a) composition and layout

1.1 Research and describe the current and historical concepts and principles of graphics design to include: a) composition and layout Unit Title: Digital Graphics editing Level: 3 Sub-level: Unit 313 Credit value: 6 Guided learning hours: 50 Unit purpose and aim This unit helps learners to familiarise themselves with the more advanced

More information

Preservation and Access of Digital Audiovisual Assets at the Guggenheim

Preservation and Access of Digital Audiovisual Assets at the Guggenheim Preservation and Access of Digital Audiovisual Assets at the Guggenheim Summary The Solomon R. Guggenheim Museum holds a variety of highly valuable born-digital and digitized audiovisual assets, including

More information