Digital preservation Sample Clauses

Digital preservation.  How many of the digitisation activities are aimed at enhancing preservation of the cultural heritage?  How many of the cultural heritage institutions in Europe handle digital preservation in a systematic way?  How many of the cultural heritage institutions in Europe have outsourced the safe storage of their digital heritage collections?  How many digital heritage repositories are there in Europe?  How many of the cultural heritage institutions are actively collecting and managing born digital heritage?  What institutions prefer offline storage for preservation instead of online storage?
AutoNDA by SimpleDocs
Digital preservation. Data taken from Core Survey 2 (n=883). Key statistics: • 26% of the institutions have a written digital preservation strategy that is endorsed by the management (23% in Core Survey 1). • 48% does not have a solution yet for long term preservation based on international standards for digital preservation. • National libraries are ‘front runners’ in meeting the international criteria for long term preservation.
Digital preservation a) In accordance with the Archives Regulation, the EU institutions are responsible for the digital preservation of their own digital archives. Long term digital preservation is therefore not a service available under the framework partnership agreement.
Digital preservation. Vendor guarantees that artifacts and portfolios will be compatible with all current and future versions of the software.

Related to Digital preservation

  • Historic Preservation Subrecipient agrees to comply with the Historic Preservation requirements set forth in the National Historic Preservation Act of 1966, as amended (16 U.S.C. 470) and the procedures set forth in 36 CFR 800, Protection of Historic Properties, insofar as they apply to the performance of this Contract. In general, this requires concurrence from the State Historic Preservation Officer for all rehabilitation and demolition of historic properties that are fifty years old or older or that are included on a Federal, State, or local historic property list.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • WORK PRESERVATION For the purpose of preserving work and job opportunities for the employees covered by this Agreement, the signatory Employer agrees that no operation, work or services of the kind, nature or type covered by, or presently performed by, or hereafter assigned to, the collective bargaining unit by the signatory Employer will be subcontracted, transferred, leased, diverted, assigned or conveyed in full or in part (hereinafter referred to as “divert” or “subcontract”), by the Employer to any other plant, business, person, or non-unit employees, or to any other mode of operation, unless specifically provided and permitted in this Agreement. In addition, the signatory Employer agrees that it will not, as hereinafter set forth, subcontract or divert the work presently performed by, or hereafter assigned to, its employees to non-employee owner-operators or other business entities owned and/or controlled by the signatory Employer, or its parent, subsidiaries or affiliates.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Electrical appliance safety The Hirer shall ensure that any electrical appliances brought by them to the premises and used there shall be safe, in good working order, and used in a safe manner in accordance with the Electricity at Work Regulations 1989. Where a residual circuit breaker is provided the hirer must make use of it in the interests of public safety.

  • Procurement of the Site 10.3.1 Pursuant to the notice specified in Clause 4.1.2, the Authority Representative and the Concessionaire shall, on a mutually agreed date and time, inspect the Site and prepare a memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site. Such memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been granted to the Concessionaire. Signing of the memorandum, in two counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall, subject to the provisions of Clause 10.2.2, be deemed to constitute a valid licence and Right of Way to the Concessionaire for free and unrestricted use and development of the vacant and unencumbered Site during the Concession Period under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. For the avoidance of doubt, it is agreed that valid licence and Right of Way with respect to the parts of the Site as set forth in the Appendix shall be deemed to have been granted to the Concessionaire upon vacant access thereto being provided by the Authority to the Concessionaire.

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.