|
Logo
Guidance for Donors, Dealers, and Archival Repositories

3.6 Recommendations for Repositories

  • 2 Leave a comment on paragraph 2 0
  • Carefully review email files to identify and quarantine entire sensitive threads of sent and received messages and their attachments. Ensure that preservation and access to these messages are handled in accordance with long-term research value, all applicable laws, and provisions in your acquisition agreement.
  • 3 Leave a comment on paragraph 3 0
  • When staff, time, or technology constraints do not allow for review of sensitive email or other files, discuss restrictions on researcher access for a defined period of time with the donor or dealer.
  • 4 Leave a comment on paragraph 4 0
  • Before acquisition, ask about the presence of legally protected private files, such as confidential government files, medical records, and legal case files, and especially sensitive types of information, such as Social Security and credit card numbers.
  • 6 Leave a comment on paragraph 6 0
  • Balance the desire to capture information about the donor’s working environment and organizational strategies (via authentication and retention of original file structure and/or other means) with respect for the donor’s wishes regarding privacy and restrictions.
  • 7 Leave a comment on paragraph 7 0
  • Consider potential future use and access mechanisms when contemplating the value of disk images, deleted files, and automatically saved files.
  • 8 Leave a comment on paragraph 8 0
  • Make sure donors and dealers are aware of the different kinds of deleted information that may be present in their digital materials.
  • 9 Leave a comment on paragraph 9 0
  • Be realistic about restrictions, redaction, and the potential for sensitive material to be missed in an initial review, considering:
    • 9 Leave a comment on paragraph 9 0
    • Legal restrictions
    • Donor requests for restrictions
    • Third-party restrictions (e.g., oral histories without permission forms)
    • Technical constraints (e.g., obsolete formats, corrupted files, access problems)
    • Use restrictions (e.g., need to ensure authenticity and appropriate use by patrons)
Page 17

Source: http://mcpress.media-commons.org/borndigital/privacy-and-intellectual-property/recommendations-for-repositories/