primer:chain_of_custody
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
primer:chain_of_custody [2017/05/30 22:47] – ↷ Page name changed from primer:chan_of_custody to primer:chain_of_custody Gerard Nicol | primer:chain_of_custody [2025/01/21 22:07] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 12: | Line 12: | ||
* Enterprises which operate under Freedom of Information laws such as policing. | * Enterprises which operate under Freedom of Information laws such as policing. | ||
- | * Enterprises with a high security requirement such as defence | + | * Enterprises with a high security requirement such as defense |
* Enterprises with a high chance of litigation such as healthcare and pharmaceutical. | * Enterprises with a high chance of litigation such as healthcare and pharmaceutical. | ||
* Enterprises with a high degree of regulation such as transport and financial services. | * Enterprises with a high degree of regulation such as transport and financial services. | ||
Line 22: | Line 22: | ||
* That every change in physical location of a tape be recorded. | * That every change in physical location of a tape be recorded. | ||
* That any data which influences the location of a tape, such an expiry or move date be recorded and that any change to this data also is recorded. | * That any data which influences the location of a tape, such an expiry or move date be recorded and that any change to this data also is recorded. | ||
- | * That changes to a chain of custody record can only occur through the asset management software and that where third party modifications are required that this can only occur though an Application Programming Interface (API) call. | + | * That changes to a chain of custody record can only occur through the asset management software and that where third-party modifications are required that this can only occur though an Application Programming Interface (API) call. |
* That for a change in the chain of custody to occur a user must be authenticated and securely logged on. | * That for a change in the chain of custody to occur a user must be authenticated and securely logged on. | ||
* That the User-ID, date, time, location and interface of the updating user be recorded for each update that changes the location or may influence the location of a tape in the future. | * That the User-ID, date, time, location and interface of the updating user be recorded for each update that changes the location or may influence the location of a tape in the future. | ||
- | * That chain of custody events | + | * That chain of custody events |
* That regular automated audits are run comparing known information and looking for discrepancies within the chain of custody. | * That regular automated audits are run comparing known information and looking for discrepancies within the chain of custody. | ||
- | ===== Chain of Custody | + | ===== Chain of Custody |
* Number of chain of custody events being captured per stakeholder. | * Number of chain of custody events being captured per stakeholder. | ||
- | * Number of atypical chain of custody events | + | * Number of atypical chain of custody events |
* Number of individual audit failures. | * Number of individual audit failures. | ||
* Number of chain of custody changes that occur outside the asset management system (when allowed). | * Number of chain of custody changes that occur outside the asset management system (when allowed). | ||
Line 41: | Line 41: | ||
< | < | ||
- | <- primer: | + | <- primer: |
primer/chain_of_custody.1496184474.txt.gz · Last modified: 2025/01/21 22:07 (external edit)