Information Technology Reference
In-Depth Information
3. Check file contents for consistency - “Archivist will check the file contents for
the required parameters and consistency with the date of observation, if the data
is part of a sequence of files then check the sequence is consistent”
4. Perform integration and analysis - “It should be possible to perform inte-
gration and analysis on the data and the analysis strategy is appropriate and
recorded.”
At this point it is possible to identify the necessary steps for each protocol; these are
shown in Table 13.2 .
The Authenticity Steps for each protocol can now be completed with the specific
PDI fields necessary for modelling the capture of the appropriate evidence. The
complete list of PDI fields is considerable and is not included in this document.
13.8 Summary
This Chapter should have provided the reader with a good understanding of the
issues surrounding Authenticity. It is a complex and often misunderstood topic and
therefore we have provided some fairly detailed examples.
Search WWH ::




Custom Search