Skip to Content

OLD: Managing Data - Authenticity

Q. What information do I need for version control and authenticity?

Just as quality control activities check that the data is valid, authenticity and version control activities are undertaken to ensure the data is what you say it is.  You may have to make changes to the data or migrate it to a current file format, but you can maintain its authenticity by tracking and documenting all of the changes and versions over time. 


Take action

  • Decide what versions to keep and record version
  • Track location of files
  • Keep a master file of data
  • Create a version control table


Review use cases and resources

  • MacNeil, Heather, et al.  "Authenticity Task Force Report."  InterPARES (2002).

    Describes two sets of requirements: one includes requirements that support the presumption of the authenticity of electronic records before they are transferred to the preserver’s custody; the other includes requirements that support the production of authentic copies of electronic records after they have been transferred to the preserver’s custody.


    CASPAR: Cultural, Artistic and Scientific knowledge for Preservation, Access and Retrieval is an Integrated Project co-financed by the European Union within the Sixth Framework Programme.  For the programme goals, see

  • Data Life Cycle - Authenticity and Integrity. From Digital Curation Centre. [Link] -- not sure what this is supposed to link to (CB)



  • Van den Eynden, Veerle, Louise Corti, et al.  "Managing and sharing data."  Colchester, UK Data Archive, 2011.

    Section on Quality Assurance (page 14) lists quality control measures for data collection and processing.

  • DataONE.  "Provide version information for use and discovery."

    Outlines best practice for versioning data products.

  • Bearman, David and Jennifer Trant.  "Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process."  D-Lib Magazine 6 (1998).

    Calls for further definition of requirements for digital authenticity and the associated assessment of mechanisms being offered in order to hasten the development of trusted and widely adopted solutions.

  • Cullen, Charles T. et al.  "Authenticity in a Digital Environment."  Washington, DC: Council on Library and Information Resources, May 2000.
    Arose from a project intended to begin a discussion among different communities that have a stake in the authenticity of digital information and to create a common understanding of key concepts surrounding authenticity and of the terms various communities use to articulate them.
  • Hook, Les A., Suresh K. Santhana Vannan, Tammy W. Beaty, Robert B. Cook, and Bruce E. Wilson.  "Best Practices for Preparing Environmental Data Sets to Share and Archive."  September 2010. 

    Read pages 27-29: 2.7 Provide Data Set Documentation and Metadata.

  • Lord, Philip and Alison Macdonald.  "e-Science Curation Report: Data curation for e-Science in the UK: an audit to establish requirements for future curation and provision."  Joint Information Systems Committee, 2003. 

    This study examined the current provision and future needs of curation of primary research data in the UK, particularly within the e-Science context.  It summarises the strategic and policy analyses and outlines proposals for the organisational structuring of curation provision and provides a table showing which recommendations address the findings.


Last updated on 09/27/13, 3:34 pm by tlchristian



about seo | group_wiki_page