tag:blogger.com,1999:blog-8137713.post7847125699065783075..comments2024-03-19T16:26:45.863-04:00Comments on Digitization 101: Defensible chain-of-custodyJill Hurst-Wahlhttp://www.blogger.com/profile/16355882159165026398noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-8137713.post-91946900837830257602008-05-12T17:02:00.000-04:002008-05-12T17:02:00.000-04:00Jill: A new way to promote a good digital chain o...Jill: A new way to promote a good digital chain of custody is to <A HREF="http://hack-igations.blogspot.com/2008/04/text-message-investigations.html" REL="nofollow">authenticate records with a voice signature</A>. A voice signature can help to show who collected the evidence, when it was collected, and that it has not changed since collection. --Ben <A HREF="http://hack-igations.blogspot.com/2008/04/text-message-investigations.html" REL="nofollow">http://hack-igations.blogspot.com/2008/04/text-message-investigations.html</A>Benjamin Wrighthttps://www.blogger.com/profile/11543639411820745571noreply@blogger.comtag:blogger.com,1999:blog-8137713.post-89367352999802970502008-04-18T16:36:00.000-04:002008-04-18T16:36:00.000-04:00To a certain degree one's ability to assess the au...To a certain degree one's ability to assess the authenticity of a preserved digital object can be accomplished by confirming the existence of an unbroken chain of custody from the time the object is creation to the time when it is accessed by the user. Periods when the digital objects were not subject to some form of protective measures by the creator, or a successor repository with a vested interest in maintaining the accuracy and completeness of the digital objects, might cast significant doubt on their authenticity. This is particularly important for archives, but also most other cultural heritage organizations.KevinGlickhttps://www.blogger.com/profile/03729434374090844457noreply@blogger.com