Assign administrative, descriptive, technical, structural and preservation metadata, using appropriate standards, to ensure adequate description and control over the long-term. Collect and assign representation information required to understand and render both the digital material and the associated metadata.
Plan for preservation throughout the curation lifecycle of digital material. This would include plans for management and administration of all curation lifecycle actions.
Maintain a watch on appropriate community activities, and participate in the development of shared standards, tools and suitable software.
Be aware of, and undertake management and administrative actions planned to promote curation and preservation throughout the curation lifecycle.
Conceive and plan the creation of data, including capture method and storage options.
- Create data including administrative, descriptive, structural and technical metadata. Preservation metadata may also be added at the time of creation.
- Receive data, in accordance with documented collecting policies, from data creators, other archives, repositories or data centers, and if required assign appropriate metadata.
Evaluate data and select for long-term curation and preservation. Adhere to documented guidance, policies or legal requirements.
Transfer data to an archive, repository, data center or other custodian. Adhere to documented guidance, policies or legal requirements.
Undertake actions to ensure long-term preservation and retention of the authoritative nature of data. Preservation actions should ensure that data remains authentic, reliable and usable while maintaining its integrity. Actions include data cleaning, validation, assigning preservation metadata, assigning representation information and ensuring acceptable data structures or file formats.
Store the data in a secure manner adhering to relevant standards.
Ensure that data is accessible to both designated users and reusers, on a day-to-day basis. This may be in the form of publicly available published information. Robust access controls and authentication procedures may be applicable.
Create new data from the original, for example:
- by migration into a different format, or
- by creating a subset, by selection or query, to create newly derived results, perhaps for publication
Return data which fails validation procedures for further appraisal and re-selection.
Migrate data to a different format. This may be done to accord with the storage environment or to ensure the data's immunity from hardware or software obsolescence.