Archival Storage and Preservation Sample Clauses

Archival Storage and Preservation. ‌ “The Archival Storage Functional Entity contains the services and functions used for the storage and retrieval of Archival Information Packages.” [44] ID P2.5 Title AIP Storage Procedures Question Are there procedures to define how the AIP is stored down to the bit level? Purpose The purpose is to identify if there are procedures that define how the AIP is stored down to the bit level, that ensure that information can be extracted from an AIP. Notes Examples of evidence to demonstrate this can be documentation of the format of the AIP, Data Entity Dictionary Specification Language descriptions of the data components, number of copies, security measures, and technical documentation of the archival procedures.
AutoNDA by SimpleDocs
Archival Storage and Preservation. “The Archival Storage Functional Entity contains the services and functions used for the storage and retrieval of Archival Information Packages.” In the Open Archival Information System recommended practice (CCSDS 650.0-M-2).
Archival Storage and Preservation. Table 19 details the results of post-assessment questionnaire questions that related to the assessment of the archival storage and preservation capability of the initial assessment and evaluation. The results are shown for each of the pilots that were selected to answer the questionnaire. There were seven questions for this capability in the initial assessment and evaluation questionnaire. For each of these questions there were five questions in the post-assessment questionnaire as detailed in Table 19.

Related to Archival Storage and Preservation

  • Historic Preservation Subrecipient agrees to comply with the Historic Preservation requirements set forth in the National Historic Preservation Act of 1966, as amended (16 U.S.C. 470) and the procedures set forth in 36 CFR 800, Protection of Historic Properties, insofar as they apply to the performance of this Contract. In general, this requires concurrence from the State Historic Preservation Officer for all rehabilitation and demolition of historic properties that are fifty years old or older or that are included on a Federal, State, or local historic property list.

  • Preservation, Maintenance, and Protection of the Property Inspections. Borrower will not destroy, damage, or impair the Property, allow the Property to deteriorate, or commit waste on the Property. Whether or not Borrower is residing in the Property, Borrower must maintain the Property in order to prevent the Property from deteriorating or decreasing in value due to its condition. Unless Lender determines pursuant to Section 5 that repair or restoration is not economically feasible, Borrower will promptly repair the Property if damaged to avoid further deterioration or damage. If insurance or condemnation proceeds are paid to Lender in connection with damage to, or the taking of, the Property, Borrower will be responsible for repairing or restoring the Property only if Xxxxxx has released proceeds for such purposes. Lender may disburse proceeds for the repairs and restoration in a single payment or in a series of progress payments as the work is completed, depending on the size of the repair or restoration, the terms of the repair agreement, and whether Borrower is in Default on the Loan. Lender may make such disbursements directly to Borrower, to the person repairing or restoring the Property, or payable jointly to both. If the insurance or condemnation proceeds are not sufficient to repair or restore the Property, Borrower remains obligated to complete such repair or restoration. Lender may make reasonable entries upon and inspections of the Property. If Lender has reasonable cause, Xxxxxx may inspect the interior of the improvements on the Property. Lender will give Borrower notice at the time of or prior to such an interior inspection specifying such reasonable cause.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Media preservation and protection When a Contractor discovers a cyber incident has occurred, the Contractor shall preserve and protect images of all known affected information systems identified in paragraph (c)(1)(i) of this clause and all relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow DoD to request the media or decline interest.

  • Loop Reservations 2.21.3.1 For a Mechanized LMUSI, TWTC may reserve up to ten (10) loop facilities. For a Manual LMUSI, TWTC may reserve up to three (3) loop facilities.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Procurement of the Site 10.3.1 Pursuant to the notice specified in Clause 4.1.2, the Authority Representative and the Concessionaire shall, on a mutually agreed date and time, inspect the Site and prepare a memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site. Such memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been granted to the Concessionaire. Signing of the memorandum, in two counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall, subject to the provisions of Clause 10.2.2, be deemed to constitute a valid licence and Right of Way to the Concessionaire for free and unrestricted use and development of the vacant and unencumbered Site during the Concession Period under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. For the avoidance of doubt, it is agreed that valid licence and Right of Way with respect to the parts of the Site as set forth in the Appendix shall be deemed to have been granted to the Concessionaire upon vacant access thereto being provided by the Authority to the Concessionaire.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!