{"id":550,"date":"2017-06-15T15:45:04","date_gmt":"2017-06-15T19:45:04","guid":{"rendered":"https:\/\/sites.haa.pitt.edu\/preservationroadmap\/?page_id=550"},"modified":"2017-06-15T15:45:04","modified_gmt":"2017-06-15T19:45:04","slug":"c4-permissions-data-integrity","status":"publish","type":"page","link":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/c4-permissions-data-integrity\/","title":{"rendered":"Module C4: Permissions &amp; Data Integrity"},"content":{"rendered":"<div style=\"font-size: 12px;text-align: center;margin-bottom: 15px\"><em>Module Status<\/em>: <span style=\"color: #999999\">Drafting in Progress<\/span> | <span style=\"color: #999999\">Ready for Testing<\/span> | <span style=\"color: #ff6600\">Tested<\/span><\/div>\n<table>\n<tbody>\n<tr>\n<th colspan=\"2\">Current Module Downloads: <a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-content\/uploads\/sites\/2\/2018\/04\/ModuleC4.pdf\" target=\"_blank\" rel=\"noopener\">Module C4 Activity Worksheet<\/a><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The activities discussed in this module focus on protecting and maintaining the integrity of your work over time, from the platform level down to the bit level. The permissions section asks you to assess which team members have read, write, and delete authorizations for each technology used. The data integrity section details actions that will help project members ensure that the files they are preserving remain, if desired, fixed or unchanged.<\/p>\n<h3>Permissions<\/h3>\n<p>This area is primarily dedicated to determining and documenting which team members have access to the technological components of\u00a0 your project and what actions they are allowed to perform. At Level 1, this means identifying who has read, write, and delete permissions for specific files, whereas at Level 4, this means creating and auditing logs of all actions taken on your files in order to closely monitor change and prevent loss. If your project needs and\/or uses version control software such as Git or Subversion, you may already be working at Level 3 in this area.<\/p>\n<p>Working through this section, you will find it helpful to refer back to <a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/b1-project-team\/\">Module B1<\/a>, where you identified project members and roles,\u00a0<a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/b2-technologicalinfrastructure\/\">Module B2<\/a>, where you identified your project&#8217;s technological infrastructure, and <a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/b3-sociotechnicalchecklist\/\">Module B3<\/a>, where you&#8217;ve made connections between staff and technology. If you&#8217;ve worked through those each of those modules, you&#8217;ll find that you&#8217;re already in good standing to address the sustainability levels detailed below. Monitoring staff access and permissions is important not only for preventing accidental data losses or changes, but also for preparing for transition planning in the event that a project team changes.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"94\"><\/td>\n<td width=\"94\"><strong>Level 1<\/strong><\/td>\n<td width=\"94\"><strong>Level 2<\/strong><\/td>\n<td width=\"94\"><strong>Level 3<\/strong><\/td>\n<td width=\"94\"><strong>Level 4<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"94\"><strong>Permissions<\/strong><\/td>\n<td width=\"94\"><span style=\"font-weight: 400\">Identify which project members have login credentials to accounts and services used\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Identify which project members have read, write, move, and delete authorization to individual files<\/span><\/td>\n<td width=\"94\"><span style=\"font-weight: 400\">Restrict authorizations to only necessary team members<\/span><\/p>\n<p><span style=\"font-weight: 400\">Document access restrictions for services and files<\/span><\/td>\n<td width=\"94\"><span style=\"font-weight: 400\">Maintain logs of who performs what actions on files, including deletions and preservation actions<\/span><\/td>\n<td width=\"94\"><span style=\"font-weight: 400\">Perform routine audits of activity logs<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Data Integrity<\/h3>\n<p>The second area in this module, Data Integrity, focuses on the physical attributes of the digital content itself. The activities in this area are intended to ensure that you are preserving the digital materials you intend to preserve, and that changes to files at the bit level do not go unnoticed.<\/p>\n<p>Straight away, you will certainly notice that the Level 1 behaviors for this area are identical to the Level 1 behaviors for the &#8220;Permissions&#8221; area above. This is because the first line of defense against data corruption is recognizing that people are capable of making mistakes, and that restricting access to files is not always about trust. It is also about limiting risk. Knowing who has access to perform which actions on which platforms and which files is good project management and is the first, best thing you can do to help protect the integrity of your data.<\/p>\n<p>Level 2 introduces the professional notion of &#8220;<a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/glossary\/\" target=\"_blank\" rel=\"noopener\">fixity<\/a>.&#8221;\u00a0Put simply, fixity refers to a digital object&#8217;s quality of being fixed or unchanged. To create fixity information, you can use\u00a0a checksum or cryptographic hash. For a more in-depth explanation of fixity, see the NDSA publication &#8220;<a href=\"http:\/\/www.digitalpreservation.gov\/documents\/NDSA-Fixity-Guidance-Report-final100214.pdf\" target=\"_blank\" rel=\"noopener\">Checking Your Digital Content: What is Fixity and When Should I Be Checking It?<\/a>&#8221; To learn more about cryptographic hashes, see this post by Bill LeFurgy from the Library of Congress&#8217;s blog, <em>The Signal<\/em>, &#8220;<a href=\"http:\/\/blogs.loc.gov\/thesignal\/2011\/11\/hashing-out-digital-trust\/\" target=\"_blank\" rel=\"noopener\">Hashing Out Digital Trust<\/a>.&#8221; Some off-the-shelf content management systems, such as CollectiveAccess, create checksum information upon ingesting digital files, so do check in with your system documentation to find out if you are already performing this activity.<\/p>\n<p>However, simply creating fixity information will not be enough to actually offer you sustaining help should something go wrong\u2014knowing that a file has been corrupted will not do much good without being able to repair the issue. For this reason Level 2 also indicates that you must also be able to replace corrupted information when you find out that there is a problem. To assure yourself that this would be possible, please refer back to your work in <a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/c2-access-backup\/\" target=\"_blank\" rel=\"noopener\">Module C2<\/a>, specifically in the section on Backing Up Your Work. Will you have sufficient copies, and access to those copies, to repair any corrupted files?<\/p>\n<p>It is particularly important in this area to remember that each of these levels may not be applicable to every project. Fixity information is likely to be more valuable in some projects than in others: namely, <strong>it may not be very meaningful to check and regularly update the fixity information of files that are being actively developed or altered<\/strong> because it is in the nature of such information to keep changing over time. On the other hand, if your project is centered on a curated collection of stable digital images, the fixity information of those files may be mission-critical. Keep this in mind as you consider your ideal level in this area.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"94\"><strong>\u00a0<\/strong><\/td>\n<td width=\"94\"><strong>Level 1<\/strong><\/td>\n<td width=\"94\"><strong>Level 2<\/strong><\/td>\n<td width=\"94\"><strong>Level 3<\/strong><\/td>\n<td width=\"94\"><strong>Level 4<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"94\"><strong>Data Integrity<\/strong><\/td>\n<td width=\"94\">Identify which project members have login credentials to accounts and services used<\/p>\n<p>Identify which project members have read, write, move, and delete authorization to individual files<\/td>\n<td width=\"94\">Be able to replace\/repair corrupted data<\/p>\n<p>Create fixity information for stable project files<\/td>\n<td width=\"94\">Check fixity of stable content at fixed intervals<\/td>\n<td width=\"94\">Check fixity of stable content in response to specific events or activities<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Additional Resources<\/h4>\n<p><span style=\"font-weight: 400\">Bailey, Jefferson, \u201cProtect Your Data: File Fixity and Data Integrity.\u201d <\/span><i><span style=\"font-weight: 400\">Library of Congress The Signal Blog<\/span><\/i><span style=\"font-weight: 400\">. April 7, 2014. <\/span><a href=\"https:\/\/blogs.loc.gov\/thesignal\/2014\/04\/protect-your-data-file-fixity-and-data-integrity\/\"><span style=\"font-weight: 400\">https:\/\/blogs.loc.gov\/thesignal\/2014\/04\/protect-your-data-file-fixity-and-data-integrity\/<\/span><\/a><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">De Stefano, Paula, et al. \u201cWhat is Fixity and When Should I Be Checking It?\u201d <\/span><i><span style=\"font-weight: 400\">Checking Your Digital Content: An NDSA Publication<\/span><\/i><span style=\"font-weight: 400\">. Accessed September 23, 2022. <\/span><a href=\"http:\/\/www.digitalpreservation.gov\/documents\/NDSA-Fixity-Guidance-Report-final100214.pdf\"><span style=\"font-weight: 400\">http:\/\/www.digitalpreservation.gov\/documents\/NDSA-Fixity-Guidance-Report-final100214.pdf<\/span><\/a><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Gladney, H. M. and J. L. Bennett. \u201cWhat Do We Mean by Authentic? What\u2019s the Real McCoy?\u201d <\/span><i><span style=\"font-weight: 400\">D-Lib Magazine<\/span><\/i><span style=\"font-weight: 400\"> 9, no. 7\/8 (2003). <\/span><a href=\"http:\/\/www.dlib.org\/dlib\/july03\/gladney\/07gladney.html\"><span style=\"font-weight: 400\">http:\/\/www.dlib.org\/dlib\/july03\/gladney\/07gladney.html<\/span><\/a><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Hedstrom, Margaret L., Christopher A. Lee, Judith S. Olson, and Clifford A. Lampe. \u201c\u2019The Old Version Flickers More:\u2019 Digital Preservation from the User\u2019s Perspective.\u201d <\/span><i><span style=\"font-weight: 400\">American Archivist<\/span><\/i><span style=\"font-weight: 400\"> 69, no. 1 (Spring\/Summer 2006): 159-187. <\/span><a href=\"https:\/\/doi.org\/10.17723\/aarc.69.1.1765364485n41800\"><span style=\"font-weight: 400\">https:\/\/doi.org\/10.17723\/aarc.69.1.1765364485n41800<\/span><\/a><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Zwaard, Kate. \u201cHashing Out Digital Trust.\u201d <\/span><i><span style=\"font-weight: 400\">Library of Congress The Signal Blog<\/span><\/i><span style=\"font-weight: 400\">. Accessed September 23, 2022. <\/span><a href=\"https:\/\/blogs.loc.gov\/thesignal\/2011\/11\/hashing-out-digital-trust\/\"><span style=\"font-weight: 400\">https:\/\/blogs.loc.gov\/thesignal\/2011\/11\/hashing-out-digital-trust\/<\/span><\/a><span style=\"font-weight: 400\">. <\/span><\/p>\n<p><em>(Module last updated <span class=\"last-modified-timestamp\">June 2017<\/span>)<\/em><\/p>\n<table>\n<tbody>\n<tr>\n<th style=\"width: 50%\">Previous Module: <a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/c3-file-formats-metadata\/\" title=\"Module C3: File Formats &amp; Metadata\">Module C3: File Formats &amp; Metadata<\/a><\/th>\n<th style=\"width: 50%\">Next Module: <a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/c5-actionplan\/\" title=\"Module C5: Digital Sustainability Action Plan\">Module C5: Digital Sustainability Action Plan<\/a><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<h5 style=\"text-align: center\"><a href=\"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/sustainabilityplans\/\">Back to Section\u00a0C Overview<\/a><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Module Status: Drafting in Progress | Ready for Testing | Tested Current Module Downloads: Module C4 Activity Worksheet The activities discussed in this module focus on protecting and maintaining the integrity of your work over time, from the platform level down to the bit level. The permissions section asks you to assess which team members [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":12,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-550","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-json\/wp\/v2\/pages\/550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-json\/wp\/v2\/comments?post=550"}],"version-history":[{"count":0,"href":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-json\/wp\/v2\/pages\/550\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.haa.pitt.edu\/sustainabilityroadmap\/wp-json\/wp\/v2\/media?parent=550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}