Chapter 4: Data protection
The development of digital preservation systems for business processes and services focuses on bringing digital preservation into the realm of business continuity management by developing the activities, processes and tools that ensure long-term continued access to business processes and the underlying software and hardware infrastructure. To achieve this, however, it is not only necessary to improve understanding of digital preservation, but also to create and increase awareness that operating digital preservation systems is one of the most important steps for businesses to ensure that they will be able to use their present knowledge in the future. The creation of a digital preservation system is accompanied by many technical and non-technical issues. Of course, the technical issues must be resolved first – no digital preservation system could be set up without consideration of how to preserve information or what is the most effective way of storing data. But once these questions are answered, it will be necessary to turn one’s attention to non-technical issues. Running an effective digital preservation system in a holistic way means transferring more or less all important and relevant business data to new data storage. One of the first user questions that usually arises in this context is: ‘How safe is my preserved business information?’ This is a legitimate question, because the risks of protection of personal data associated with online activity are increasing, and the possible methods of intercepting personal data have become increasingly complex and less easily detectable.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.