Current Hard Disk Technologies
![]() |
||
Materials saved to storage devices with a variety of underlying magnetic or solid-state (flash) technologies that are hardwired into a computer still under warranty or supported: typically hard disks that are less than five years old. |
||
Group: Storage |
Trend in 2021: |
Consensus Decision |
Added to List: 2019 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Direct Attached Storage (DAS) such as Magnetic or solid-state drives integrated into individual laptop or workstations and into smaller scale storage facilities. |
||
‘Endangered’ in the Presence of Aggravating Conditions Encryption; poor handling; poor storage; lack of consistent replication; failure of external (dependencies e.g., suppliers, security); political or commercial interference; failure of internal dependencies (e.g., power supply, disk controller); overly aggressive compression; poor information security; lack of integrity-checking; lack of strategic investment; lack of warranty; unenforceable warranty; encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Backup to different technology; backup to diverse locations; documentation of assets; integrity checking; preservation planning; refreshment planning; export functionality; resilient to hacking; selection and appraisal criteria; version control; resilient funding; technology watch; enforceable warranty; disaster planning. |
||
2021 Review This entry was added in 2019 to ensure that the range of media storage is properly assessed and presented. It was reviewed in 2020 with no noted change towards greater or reduced risk. While the 2021 Jury agreed with the current Vulnerable classification, they added a trend towards greater risk in light of the continued shift towards reliance on cloud storage with computers increasingly reducing hard disk for solid-state storage and commercial motivations for less support. As people increasingly select other storage methods such as cloud, they are less likely to maintain existing content on portable hard disks, which means the portable hard disks are more likely to be overlooked or ignored (e.g., left in drawers) rather than checked and refreshed. |
||
Additional Jury Comments See also: Digital Preservation Coalition (2016) ‘Storage’ in Digital Preservation Handbook (Second Edition), online at https://dpconline.org/handbook/organizational-activities/storage. |
Research Data Published through Repositories
Research Data Published through Repositories
![]() |
||
Research data published through digital repositories or other services providers with specialist skills to manage the data and an ongoing commitment to ensure preservation. |
||
Group: Research Outputs |
Trend in 2021: |
Consensus Decision |
Added to List: 2019 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within three years, detailed assessment within one year |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve It would require a small effort to preserve materials in this group, with the deployment of proven tools or techniques. |
Examples Recognized data repositories in specialist disciplines; institutional data repositories in subject specialist centres and partnerships |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of long-term commitment; lack of user community; lack of visibility to potential depositors; lack of institutional commitment |
||
‘Lower Risk’ in the Presence of Good Practice Certification and documented good practice; effective documentation requirements for depositors; proven financial sustainability; skilled staff; participation in the digital preservation community |
||
2021 Jury Review This entry was added in 2019 as a separate entry, but it was previously introduced in 2017 under ‘Research Data’, though without explicit reference to the capacity of the repository infrastructure. In 2019, the Jury split the ‘Research Data’ entry into a range of contexts for research outputs including this addition. It was classified as vulnerable; the preservation of research data published through a well-founded repository with the capacity and commitment to ensure preservation and the capability in part through their own professional development activities, makes it a ‘lower risk’ outcome for research data. The 2021 Jury agreed with this classification but commented on the improvements and initiatives towards preservation of research data and outputs, leading to a trend towards reduced risk. |
||
2022 Trend The 2022 Taskforce agreed on a trend towards reduced risk based on material improvement over the last year that have not only offered examples of good research data management and preservation practices but also suggest a significant shift towards culture of change and collaboration across different research communities and stakeholders. These include (but are not limited to) improvements and initiatives by the European Open Science Cloud (EOSC), Science Europe, Research Data Alliance (RDA), Digital Curation Centre (DCC) and related projects on the preservation of research data and outputs |
||
Additional Comments Case Studies or Examples:
See also:
|
Cloud Storage
Cloud Storage
![]() |
||
Materials routinely copied or backed up to an independently managed, off-site data storage facility and able to be restored under contractual terms. |
||
Group: Storage |
Trend in 2021: |
Consensus Decision |
Added to List: 2019 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Remote network storage provided by a third-party service under contract, such as DropBox, Amazon, Microsoft Azure, Dell EMC, Google Cloud Platform, Google Drive, IBM, Intel, Rackspace, Iron Mountain, SAP, and others |
||
‘Endangered’ in the Presence of Aggravating Conditions Encryption; lack of routine maintenance; lack of storage replication; over-dependence on single supplier; insufficient documentation; lack of local alternative; political or commercial instability; overly aggressive compression; poor information security; lack of transparent integrity-checking; lack of strategic investment; lack of migration plan; lack of exit strategy; unenforceable penalties; unstable pricing; unpredictable removal costs |
||
‘Lower Risk’ in the Presence of Good Practice Backup to different technology; backup to diverse locations; documentation of assets; integrity checking; preservation planning; export functionality; resilient to hacking; version control; resilient funding; technology watch; enforceable contract; disaster planning and documentation, stable pricing; budgeted removal costs. |
||
2021 Jury Review This entry was added in 2019 to ensure that the range of media storage is properly assessed and presented. The 2021 Jury noted increased risk in light of greater reliance on the cloud and localized disruptions to cloud services over the pandemic. The 2021 trend towards greater risk is based on the wider (global) dependence on these services, especially Google Drive, for record keeping and business workflows. The impact of loss increases with much more reliance on cloud services leading to greater risk; however, this should not deter people from using cloud storage. Therefore, the vulnerable classification stands so long there are safeguards in place. |
||
Additional Comments The history of digital preservation suggests that the risk of vendors going out of business or shutting down services is the key issue here, over and above any specific technical solutions or risks. Case Studies or Examples:
See also: Digital Preservation Coalition (2016) ‘Storage’ in Digital Preservation Handbook (Second Edition), online at https://dpconline.org/handbook/organizational-activities/storage. |
Current Hard Disk Technologies
Current Hard Disk Technologies
![]() |
||
Materials saved to storage devices with a variety of underlying magnetic or solid-state (flash) technologies that are hardwired into a computer still under warranty or supported: typically hard disks that are less than five years old. |
||
Group: Storage |
Trend in 2021: |
Consensus Decision |
Added to List: 2019 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Direct Attached Storage (DAS) such as Magnetic or solid-state drives integrated into individual laptop or workstations and into smaller scale storage facilities. |
||
‘Endangered’ in the Presence of Aggravating Conditions Encryption; poor handling; poor storage; lack of consistent replication; failure of external (dependencies e.g., suppliers, security); political or commercial interference; failure of internal dependencies (e.g., power supply, disk controller); overly aggressive compression; poor information security; lack of integrity-checking; lack of strategic investment; lack of warranty; unenforceable warranty; encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Backup to different technology; backup to diverse locations; documentation of assets; integrity checking; preservation planning; refreshment planning; export functionality; resilient to hacking; selection and appraisal criteria; version control; resilient funding; technology watch; enforceable warranty; disaster planning. |
||
2021 Jury Review This entry was added in 2019 to ensure that the range of media storage is properly assessed and presented. It was reviewed in 2020 with no noted change towards greater or reduced risk. |
||
Additional Comments See also: Digital Preservation Coalition (2016) ‘Storage’ in Digital Preservation Handbook (Second Edition), online at https://dpconline.org/handbook/organizational-activities/storage. |
Recently Commissioned or Completed Media Art
Recently Commissioned or Completed Media Art
![]() |
||
Media art currently displayed in a gallery or in the process of being displayed. |
||
Group: Media Art |
Trend in 2021: |
Consensus Decision |
Added to List: 2019 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within three years, detailed assessment within one year |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Media art recently acquired by galleries that utilizes specific hardware and software in order to be accessed or exhibited. |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of documentation to enable maintenance; lack of clarity with respect to intellectual property; complex interdependencies on specific hardware, software or operating systems; lack of capacity in the gallery or workshop; lack of strategic investment; complex external dependencies |
||
‘Lower Risk’ in the Presence of Good Practice Strong documentation; clarity of preservation path and ensuing responsibilities; proven preservation plan; capacity of workshop to support artwork at de-installation; capacity of gallery to conserve after de-installation; capacity of gallery to re-install work; ; lack of documentation about artist intent |
||
2021 Jury Review This entry was added in 2019 as a separate entry, but it was previously introduced in 2017 under ‘Media Art’ with particular reference to historical media art. It was added for greater specificity for its recommendations, to represent works commissioned in the last five years where there is a reasonable expectation that documentation has been produced or could still be obtained. |
||
Additional Comments By the time digital art, time-based media, etc., has entered into the permanent care of a stewarding institution, many of its technologies are already end-of-life, unsupported, or the hardware components have deteriorated. Often the expertise to maintain these many interacting components sits outside the host organization, with a technical supplier to the gallery, and this is in itself vulnerable to business change. Although there are a few exceptions, there is a need for greater capacity within the museum and gallery sector to address the challenges. There have been new initiatives for guidance and examples of institutions taking wider sectoral responsibility for standards, which have helped with the effort to preserve, such as Matters in Media Art information resource and guidance. See: http://mattersinmediaart.org/
Case Studies or Examples:
See also:
|
PDF/A
PDF/A
![]() |
||
Materials contained within PDF/A; a format derived from the PDF 1.4 variant but with additional requirements that reduce external dependencies. Includes more recent variants (PDF/A2 and PDF/A3) |
||
Group: Formats |
Trend in 2021: |
Consensus Decision |
Added to List: 2017 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within five years, detailed assessment within three years |
Significance of Loss The loss of tools, data or services within this group would impact on people and sectors around the world. |
Effort to Preserve It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Documents stored offline, or online in repositories or EDRMS including as reports, agenda, minutes, correspondence, contracts, essays, articles, or research papers. |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of conformance or validation; Lack of preservation commitment or planning; Lack of storage replication; Poor management of data protection or intellectual property rights; Political or commercial interference; loss of version control; use beyond the design capability of the standard; complacency; poor metadata; disassociation from context; loss of authenticity; encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Backup and documentation of media assets; validation on creation; part of preservation plan; export functionality; licencing enables preservation; preservation capability in repository or EDRMS service; resilient to hacking; selection and appraisal criteria; version control; authenticity; resilient funding and recognition of value; technology watch |
||
2021 Jury Review This entry was added in 2017. PDF/A has become more stable and reduces dependencies, and thus curtails preservation risks for certain types of content. |
||
Additional Jury Comments Vulnerability also depends on if the PDF file conforms to the specific PDF/A standard or not. This is caused by a combination of 1) not conforming to the standard and 2) collection managers assuming that the file is resilient simply because it purports to be a PDF/A. This risk is less with the format and more with the understanding and experience in data management. Moreover, materials embedded in or attached to PDF/A-2 and PDF/A-3 may be at risk. See also: Fanning, B (2017) Preserving with PDF/A (Second Edition), DPC Technology Watch Report 17-01 online at http://doi.org/10.7207/twr17-01. |
Published Research Papers
![]() |
||
Completed research papers published in serials, monographs or theses which fall under specific collecting policies of research libraries or archives and are managed through dedicated repository infrastructures. |
||
Group: Research Outputs |
Trend in 2021: |
Consensus Decision |
Added to List: 2017 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within five years, detailed assessment within three years |
Significance of Loss The loss of tools, data or services within this group would impact on people and sectors around the world. |
Effort to Preserve It would require a small effort to preserve materials in this group, with the deployment of proven tools or techniques. |
Examples Scholarly E-Books, Electronic Journals, E-theses, Electronic Monographs. |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of documentation; lack of clarity with respect to intellectual property; embedded complex objects; unstable funding for repository; lack of strategic investment; complex external dependencies; lack of persistent identifiers; bespoke formats; lack of legal deposit mandate. |
||
‘Lower Risk’ in the Presence of Good Practice Strong documentation including intellectual property rights; clarity of preservation path and ensuing responsibilities; credible preservation plan; proven capacity of repository; legal deposit preservation copying; post-cancellation access service; persistent identifiers used consistently; non-proprietary formats used and validated; minimal or well managed external dependencies. |
||
2021 Jury Review This entry was added in 2017 under 'Published research outputs,' though without reference to the capacity of the repository infrastructure. The 2019 Jury amended it to presume the existence of repository infrastructure and noted that the aggravating conditions (which introduce risks) and good practice enhancements (which reduce it) are most relevant to repository operations. |
||
Additional Comments The 2022 BitList Taskforce recommends that the next 2023 Jury review considers splitting this entry into separate areas to assess different levels of risk relating to:
See also:
|
Local Network Storage
Local Network Storage
![]() |
||
Materials routinely copied or backed up to locally managed data storage facility and able to be restored under institutional service arrangements. |
||
Group: Storage |
Trend in 2021: |
Unanimous Decision |
Added to List: 2019 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Institutional or departmental network storage and institutional data centers based on technologies such as (NAS) Network Attached Storage, (RAID) Redundant Array of Independent Disks, (SAN) Storage Area Networks, JBOD (Just a bunch of disks), SPAN and related |
||
‘Endangered’ in the Presence of Aggravating Conditions Encryption; lack of routine maintenance; lack of storage replication; over-dependence on single supplier, technology or technician; insufficient documentation; single point of failure; political or commercial interference; failure of dependencies (e.g., power supply, controller software); overly aggressive compression; poor information security; lack of integrity-checking; lack of strategic investment; lack of warranty; unenforceable warranty, encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Backup to different technology; backup to diverse locations; documentation of assets; integrity checking; preservation planning; refreshment planning; export functionality; resilient to hacking; selection and appraisal criteria; version control; resilient funding; technology watch; enforceable warranty; disaster planning and documentation. |
||
2021 Jury Review This entry was added in 2019 to ensure that the range of media storage is properly assessed and presented. The 2021 Jury agreed with the Vulnerable classification with no trend towards greater or reduced risk. |
||
Additional Comments See also: Digital Preservation Coalition (2016) ‘Storage’ in Digital Preservation Handbook (Second Edition), online at https://dpconline.org/handbook/organizational-activities/storage. |
Pension, Mortgage and Insurance Records
![]() |
||
Records of transactions for long-lived financial products and services contracted between individuals and corporations. These records typically contain or depend on significant amounts of personal information and outlast the infrastructure on which they were created. |
||
Group: Sensitive Data |
Trend in 2021: |
Consensus Decision |
Added to List: 2017 |
|
Previous classification: Vulnerable |
Trend in 2022: |
||
|
||
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors |
Effort to Preserve It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Applications, correspondence and ancillary records relating to pensions, mortgages and insurances and other contracts of long duration. This includes corporate databases, email, web archives and EDRMS and may require some co-ordination of paper, microfiche, born digital and digitized records. These records often include the scope and duration of the contract as well as any agreed changes during the lifetime of the product. It may also include evidence of mis-selling or other sharp practice which only becomes apparent after the fact. This entry pertains to the corporate records rather than personal records. |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of corporate preservation planning; lack of preservation within procurement of corporate systems; companies conflating backup with preservation; loss of integrity and authenticity; loss of context and connections to provide meaning; lack of preservation capability within agencies; lack of preservation voice at executive level; poor planning and roadmap for corporate infrastructure; proliferation of legacy systems; slapdash procurement or migration of new systems; mergers and acquisitions leading to confusion of corporate systems; lack of compliance, audit or accountability at operational levels; encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Backup and documentation; use of open formats and open source software; considered data management planning; licencing that enables preservation; preservation capability in designated repository; resilient to hacking; selection and appraisal in place; authenticity and integrity of records managed; resilient funding and recognition at executive level; technology watch; regular preservation audits; accreditation and participation in professional preservation community. |
||
2021 Jury Review This entry was added in 2017 but was outside the competence of the judges to assess at that time. It was assessed in 2019 with additional expertise invited to the panel to support this assessment and reviewed again in 2020. |
||
Additional Comments The work and outputs of the EDRMS Preservation Taskforce, such as the EDRMS Preservation Toolkit, may be helpful for guidance in this context. See: https://www.dpconline.org/digipres/implement-digipres/edrms-preservation-toolkit |