The University of Texas

Digital Projects

Continued excellence in UT Library's Digital Contributions

Data Lifecycle Management

(aka Digital Curation Lifecycle)

DCC Curation Lifecyle Model

Data Curation Lifecycle

Full Lifecycle Actions

Description and Representation Information

Assign administrative, descriptive, technical, structural and preservation metadata, using appropriate standards, to ensure adequate description and control over the long-term. Collect and assign representation information required to understand and render both the digital material and the associated metadata.

Preservation Planning

Plan for preservation throughout the curation lifecycle of digital material. This would include plans for management and administration of all curation lifecycle actions.

Community Watch and Participation

Maintain a watch on appropriate community activities, and participate in the development of shared standards, tools and suitable software.

Curate and Preserve

Be aware of, and undertake management and administrative actions planned to promote curation and preservation throughout the curation lifecycle.

Sequential Actions


Conceive and plan the creation of data, including capture method and storage options.

Create or Receive

- Create data including administrative, descriptive, structural and technical metadata. Preservation metadata may also be added at the time of creation.
- Receive data, in accordance with documented collecting policies, from data creators, other archives, repositories or data centers, and if required assign appropriate metadata.

Appraise and Select

Evaluate data and select for long-term curation and preservation. Adhere to documented guidance, policies or legal requirements.


Transfer data to an archive, repository, data center or other custodian. Adhere to documented guidance, policies or legal requirements.

Preservation Action

Undertake actions to ensure long-term preservation and retention of the authoritative nature of data. Preservation actions should ensure that data remains authentic, reliable and usable while maintaining its integrity. Actions include data cleaning, validation, assigning preservation metadata, assigning representation information and ensuring acceptable data structures or file formats.


Store the data in a secure manner adhering to relevant standards.

Access, Use and Reuse

Ensure that data is accessible to both designated users and reusers, on a day-to-day basis. This may be in the form of publicly available published information. Robust access controls and authentication procedures may be applicable.


Create new data from the original, for example:
- by migration into a different format, or
- by creating a subset, by selection or query, to create newly derived results, perhaps for publication

Occasional Actions


Return data which fails validation procedures for further appraisal and re-selection.


Migrate data to a different format. This may be done to accord with the storage environment or to ensure the data's immunity from hardware or software obsolescence.



Perry-Castañeda Library
101 East 21st St.
Austin, TX. 78713

Phone: (512) 495-4250

Connect with UT Libraries

Facebook Twitter Instagram Tumblr Google Plus Flickr Pinterest YouTube

© The University of Texas at Austin 2017   UTDIRECT