MANAGING DIGITAL CONTENT OVER TIME MODULE 4: PROTECT Created for the Digital Education Outreach Program by: Lee Blackford, State Library of WA Koulla Giannikouris,

Slides:



Advertisements
Similar presentations
Practical Preparations Planning for Safety and Emergencies.
Advertisements

BCM and Security ROGSI/DMS PREPARED FOR DISASTER? BCM Lifecycle ROGSI/DMS Suite.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
From Analog to Digital: Changes in Preservation Gregor Trinkaus-Randall Digital Commonwealth Conference Worcester, MA March 25, 2010.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
BRC Storage & Distribution Safety and Quality Management System Training Guide
Business Services Emergency Preparedness. Agenda Emergencies Emergencies Business Continuation Business Continuation University Plan University Plan Building.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
Saving Your Business from a Data Loss Randy Clark.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
| Establishing a Contingency Plan.
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
Care Home Forum 19 th May 2015 Sarah Chittock – Merton Civil Contingencies Officer Taryn Milton – Emergency Planning Manager – Epsom St. Helier.
RBTC: Business Continuity 101 July 18, What is Business Continuity? Scenario Part 1 Why is BC important? What types of plans are needed? How do.
LEE MAYFIELD PLANNING CHIEF LEE COUNTY EMERGENCY MANAGEMENT Public-Private Partnerships in Disaster Preparedness.
Integrating Digital Curation in a Digital Library curriculum: the International Master DILL case study Anna Maria Tammaro University of Parma Florence,
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
National Rural Transit Assistance Program. Learning Objectives Safety Safety Security Security Emergency Preparedness Emergency Preparedness.
Considerations for Storage and Protection of Content An Introduction to Digital Preservation (Second of 3 ASERL Webinars) February 14, 2011 Jody L. DeRidder.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
Disaster planning and management Small public offices information briefing December 2004.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Digital Preservation: Store & Protect Laurie Sauer Information Technologies Librarian Knox College
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
24 March 2010Atlanta, Georgia Passing it on: Notes on digital initiative sustainability Marty Kurth HBCU Library Alliance – Cornell University Library.
Before Disaster Strikes: Ten Things You Need to Know An Infopeople Webcast November 30, 2006 – 12:00 -1:00pm Julie Page
Perspectives on Business Continuity Management Bill Wheeler, EPO.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Information Systems Security Operational Control for Information Security.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Cowlitz-Lewis Economic Development District th Avenue North, Adm. Annex, Kelso, WA Ph: ; FAX:
 WHAT IS MITIGATION?  DISASTER MANAGEMENT CYCLE.  ORGANISATIONS RESPONSIBLE FOR DISASTER MANAGEMENT AT THE REGIONAL AND NATIONAL LEVEL IN THE CARIBBEAN.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
MANAGING DIGITAL CONTENT OVER TIME MODULE 1: IDENTIFY Created for the Digital Education Outreach Program by: Antoinette Buchanan, Libraries ACT Amanda.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Benchmarking groups what they can and cannot do for an organisation….. Jo Harris Tracey Tilbry.
MANAGING DIGITAL CONTENT OVER TIME MODULE 2: SELECT Created for the Digital Education Outreach Program by: Cynthia Coombs, State Library of WA Marg Ludlow,
MANAGING DIGITAL CONTENT OVER TIME MODULE 5: MANAGE Created for the Digital Education Outreach Program by: Damien Cassidy, State Library of NSW Emma Jolley,
COOP Continuity of Operations. COOP COOP is “Good Business Practice” Ensure that county and state agencies can maintain and continue operations Ensure.
MANAGING DIGITAL CONTENT OVER TIME MODULE 3: STORE Created for the Digital Education Outreach Program by: Catherine Cottle, State Library of Queensland.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
MANAGING DIGITAL CONTENT OVER TIME MODULE 6: PROVIDE Created for the Digital Education Outreach Program by: Bridie Flynn, State Library Victoria Rebecca.
EXPECT THE UNEXPECTED Prepare Your Business for Disaster.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Business Continuity Planning 101
Welcome to the ICT Department Unit 3_5 Security Policies.
Technology and Business Continuity
The Development of Statistical Business Registers in
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Berry College Disaster Recovery Soft Exit
“The Link” - Continuity of Operations and Emergency Management
I have many checklists: how do I get started with cyber security?
A Complete and Absolute Shambles
According to “WHO”: “Disaster is any occurrence that causes damage, destruction, ecological disruption, loss of human life, human suffering, deterioration.
Developing and testing the Plan
IT OPERATIONS Session 7.
MANUFACTURING DISASTER RECOVERY PLAN
Presentation transcript:

MANAGING DIGITAL CONTENT OVER TIME MODULE 4: PROTECT Created for the Digital Education Outreach Program by: Lee Blackford, State Library of WA Koulla Giannikouris, Northern Territory Library Sarah Mason, State Library Victoria Shruti Navathe, Libraries ACT

2 SELECT What portion of that content will be preserved? STORE What issues are there for long- term storage? PROTECT What steps are needed to protect your digital content? MANAGE What provisions are needed for long-term management? PROVIDE What considerations are there for long-term access? The digital preservation lifecycle

3 At the end of this module you will have an understanding of: the risks and threats to digital content how to prepare digital content for emergencies strategies to keep digital content secure

4 Risk management World’s cutest cat Elizabeth Donoghue, CC BY-NC-ND 2.0Elizabeth Donoghue

5 Planning for uncertainty Prevent predict/identify detect Respond Repair

6 We cannot prevent it all, but we can lessen the negative impact.

7 What are we protecting content from? Hide little fella!! Cat & mouse Sonja Trpovski, CC BY-NC-SA 2.0Sonja Trpovski

8 Risk: Economic and organisational failure Money roll, by Zack McCarthy, CC BY 2.0Zack McCarthy

9 Risk: Obsolescence Floppy disks by George ChernilevskyGeorge Chernilevsky

10 Risk: Change and loss

11 Risk: Inappropriate access Geek Cats themadLOLscientist, CC BY 2.0themadLOLscientist

12 Give as much permission as needed and no more.

13 Risk: Failures Network, hardware, software Is this bad? by Geoff Goldman CC BY-NC-SA 2.0Geoff Goldman

14 Doesn’t happen often, but happens often enough

15 Risk: Non-compliance A flip of the switch by helga tawil souri CC BY-NC-SA 2.0helga tawil souri

16 Mandated collections Access TDR OAIS

17 Change is constant and iterative

18 Exercise A man performing exercises in a frame with weights and pulleys lithograph by E. Parry & Co., Wellcome Library, CC BY 4.0

19 Scaling up Ice climbing on Mt. Rainier, by Erik Charlton CC BY 2.0Erik Charlton

20 Scaling up VCF 2010 Domesday tray open by Regregex CC BY 3.0Regregex

21 Scaling up Servers at the Ashburn data centre by Victorgrigas CC BY-SA 3.0Victorgrigas

22 Scaling up

23 Risk: Disasters Hindenburg Burning, by Gus PasquerellaGus Pasquerella

24 Emergency planning Are we prepared? What is our plan? Engage in ongoing disaster planning Establish committee and share information Develop and maintain documents Identify possible outcomes and prepare e.g. server goes down; content is damaged

25 Plan “Ultimately, an organization would use a suite of plans to properly prepare response, recovery and continuity activities for disruptions affecting the organizations IT systems, business process, and the facility.” Source: NIST Contingency Planning Guide for Information Technology Systems

26 Disaster planning framework Organisation People Safe Digital Assets Intact Back to Business

27 Business continuity plan Disaster Recovery Plan Business Recovery Plan IT Recovery Plan Staff Emergency Plan Communication Plan

28 Disaster recovery plan Disaster Recovery by Olaf Gradin CC BY-SA 2.0Olaf Gradin

29 What needs to be available soonest? Identify core functions as part of planning Determine allowable downtime for each Consider steps to re-establish each function Develop relevant documents Make sure planning documents are accessible

30 Safety of employees and clients Ducks crossing by Javier Carcomo CC BY-NC-SA 2.0Javier Carcomo

31 Take home messages: Have a risks register of some kind. Build and maintain an emergency response team roster. Have a business continuity and disaster recovery plan. Keep up-to-date records, e.g. list of system users, credentials and access permissions. Ollie LOLcat by Mike CC BY-NC-SA 2.0Mike

32 SELECTSTOREPROTECTMANAGEPROVIDE What we’ve covered today the risks and threats to digital content how to prepare digital content for emergencies strategies to keep digital content secure

THANK YOU Contact details