Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Approved by the DDR Program Committee, December 145, 2016

Audience

The intended audience for this policy includes faculty, administrators, and students of Duke University, as well as researchers external to Duke who are collaborating with Duke personnel and whose projects will make use of Duke University Libraries’ repository services.

...

  • Bit-level preservation will be provided to all digital objects in the repository through fixity checking and version control

    • Depositors may submit fixity information along with objects to validate against during ingest. Fixity checks are performed by the repository at regular intervals.

    • Objects that fail a fixity check will be restored from one of three backup copies.  For more information, see the Backup and Disaster Recovery documentation.
  • Geographically disparate copies

    • Duke University Libraries maintains at least three distinct replicas of DDR data at all times.  The Libraries contracts with DuraCloud, a library-oriented, preservation-focused storage provider, to support off-site data replicas.  The primary copy of the data is locally-stored at Duke with the secondary copy in DuraCloud and tertiary copy in Amazon Glacier.  

  • File formats and obsolescence management

    • File formats will be surveyed and evaluated to create list of preferred file formats

    • File formats will be monitored for obsolescence

    • Select file formats will be migrated to formats presenting less risk

    • Formats that are not preferred may still be included in DDR and receive bit-level preservation, but may not receive enhanced preservation

    • For more information, please see the Format Policy Metadata

    • Support for descriptive, administrative, technical, and preservation metadata to ensure continued understanding of the materials stored in DDR

  • Information Security

    • Authorization to read, write, move and/or delete materials and metadata from DDR will be controlled

    • DDR will maintain and periodically audit logs of read, write, edit, and delete actions taken

    • For more information on security, see our Threat Models documentation.

...

  1. The NDSA Levels of Digital Preservation: An Explanation and Uses

...