Digital Preservation Policy Framework

Created May 2015; Revised December 2015; Revised July 2017

1. Purpose

The Digital Preservation Policy Framework formalizes the commitment of James Madison University Libraries and Educational Technologies to the long-term preservation of its diverse range of digital assets, assuring continued long-term access to these resources. Decisions regarding digital preservation are made based on this framework document for digital assets within the custody of JMU Libraries.

Preservation strategies may involve a combination of approaches, including locally managed stewardship, stewardship entrusted to a partner, vendor, or other outside entity. Preservation of digital assets may include any actions necessary to preserve persistent long-term access to the content, ensure authenticity of the materials, and mitigate the effects of media or technological obsolescence.

Preservation and persistent long-term access to digital assets requires support from units across JMU Libraries and Educational Technologies, including planning, research, documentation of procedures, and regular monitoring of digital materials.

2. Standards Compliance

JMU Libraries and Educational Technologies (LET) acknowledge the need to comply with current and prevailing national standards and practice of digital preservation. LET is committed to developing its digital preservation policies, repositories, and strategies in accordance with the Open Archival Information System (OAIS) reference model. LET, within prevailing technological, staffing, and resource constraints, aims to closely align its policy, practices, and procedures with ISO 16363/TDR, A Standard for Trusted Digital Repositories.

3. Administrative Responsibility

LET is responsible for developing and implementing strategies for persistent, long-term access to digital assets with its stewardship.

3.1 Objectives

The primary purpose of digital preservation activities is to preserve future access to digital assets determined to be of high value to the university over time. Some objectives of this framework include:

4. Organizational Viability

4.1 Role and Responsibilities

Within LET, the oversight and management of digital preservation activities and the lifecycle of locally born digital content is led by the Scholarly Resources & Discovery Department, and accomplished more specifically through the contributions of the Digital Collections unit, the Director of Scholarly Resources & Discovery, the Special Collections unit, and the Technology Department. Where appropriate other units and committees are consulted, these may include, but are not limited to, the Scholarly Communication Steering Committee. LET Dean’s Council evaluates high-level policy documents and reviews programmatic plans and progress.

4.2 Scope

The Scholarly Resources & Discovery Department, and Digital Collections specifically, are primarily responsible for identifying, securing, and providing the means to preserve and ensure access to locally born or created digital assets and acquired digital assets under the stewardship of LET. However, JMU LET recognizes that not all digital assets created or acquired by LET can be preserved, or fall under the purview of the Scholarly Resources & Discovery Department.

Priorities for digital assets are:

JMU Libraries will aspire to follow the National Digital Stewardship Alliance (NDSA) Levels of Digital Preservation, illustrated in Appendix B.

4.3 Operating Principles

LET will use the following principles and actions to guide the development, implementation, and management of the digital preservation program.

4.4 Selection and Acquisition

The JMU Libraries Collection Development Policy and the JMU Special Collections Collection Development Policy set forth the priorities and criteria for acquiring content, both in digital and non-digital formats. The JMU Libraries’ digital assets are subject to these same overarching criteria for selection, curation, management, and preservation as other collection resources.

4.5 Access and Use

Without the persistent, long-term preservation of digital assets, access would not be possible. Access to preserved digital content is provided using the most appropriate technology available at the time of processing and use. When retaining the look and feel is deemed essential, the libraries will seek to enable the original versions of the digital objects to be rendered over time. Appropriate preservation plans to render original versions of digital assets are devised on a case-by-case basis and are revised as needed.

4.6 Challenges

There are recognized challenges in implementing an effective and enduring digital preservation program, including:

5. Financial Sustainability

JMU LET has identified specific resources to support and enhance digital preservation functions within the organization.

5.1 Institutional Commitment

To sustain its digital preservation function, LET has allocated a portion of its permanent budget to digital preservation services. In addition, LET will continually seek additional funding to extend its digital preservation scope and capabilities.

5.2 Cooperation and Collaboration

LET is collaborating with James Madison University and other institutions to:

6. System Security

The processing procedures for digital assets held by JMU Libraries and Educational Technologies actively address the need for ensuring the accuracy and completeness of digital content through careful comparison of documentation and the generation of metadata. The JMU Libraries ensure the authenticity and integrity of digital assets through the active and ongoing use of checksums from the receipt of the digital asset onward. In addition, JMU Libraries conducts periodic reviews and audits of digital assets in storage.

7. Procedural Accountability

As a proponent of good digital preservation practice, JMU Libraries is committed to transparency in its policies and operations and has established a program to develop, promulgate, and maintain a comprehensive set of policies, procedures and protocols.

7.1 Policy Framework Administration

This digital preservation policy framework was created in May 2015, and last updated in December 2015. The Head of Digital Collections, in coordination with others as appropriate, will review the framework biannually to ensure it remains current and comprehensive as the digital preservation functions within the JMU Libraries and Educational Technologies evolves.

8. Definitions

8.1 Access: The services and functions which make the archival information holdings and related services visible to Consumers and authorized users. This includes restricting access in some instances due to copyright, confidentiality, or statutory requirements.2

8.2 Authenticity: A mechanical characteristic of any digital object that reflects the degree of trustworthiness in the object, in that the supportive metadata accompanying the object makes it clear that the possessed object is what it purports to be.3

8.3 Born-digital: A descriptor for information that is created in digital form, as opposed to digitized from analog sources.4

8.4 Chain of Custody: A process used to maintain and document the chronological history of the handling, including the transfer of ownership, of any arbitrary digital file from its creation to a final state version.5

8.5 Checksum: An algorithmically-computed numeric value for a file or a set of files used to validate the state and content of the file for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. The integrity of the data can be checked at any later time by re-computing the checksum and comparing it with the stored one. If the checksums match, the data was almost certainly not altered.6

8.6 Digital Assets: A collection of computer files that contain intellectual content (images, texts, sounds, video) and/or descriptive metadata of the content and its digital format.  They represent an investment for the depositor and an information resource for the researcher.7

8.7 Integrity: Internal consistency or lack of corruption in electronic data.8

8.8 Metadata: Structured information that describes the context, content and structure of a document and their management over time to allow users to find, manage, control, understand or preserve information over time.9

8.9 Open Archival Information System (OAIS): The Open Archive Information System (OAIS) Reference Model, an ISO standard that formally expresses the roles (producer, management, consumer, and implicitly archives), functions (common services, ingest, archival storage, data management, administration, preservation planning, and access), and content (submission information package, archival information collection, archival information package, and dissemination information package) of an archive. It was approved as an ISO standard in 2003 and updated in 2012: ISO 14721:2012.10

8.10 Preservation: The processes and operations in ensuring the technical and intellectual survival of objects through time.11

8.11 Standards: Rules typically developed, adopted, and promoted by large organizations that can advocate for their broad usage. Data standards enable the exchange of data while technology standards enable the delivery of data between systems.12

8.12 Trusted Digital Repository: A trusted digital repository is one whose mission is to provide long-term access to managed digital assets to its designated community, now and into the future; that accepts responsibility for the long-term maintenance of digital assets on behalf of its depositors and for the benefit of current and future users; that designs its system(s) in accordance with commonly accepted conventions and standards to ensure the ongoing management, access, and security of materials deposited within it; that establishes methodologies for system evaluation that meet community expectations of trustworthiness; that can be depended upon to carry out its long-term responsibilities to depositors and users openly and explicitly; and whose policies, practices, and performance can be audited and measured.13

Appendix A: Digital Formats and Level of Preservation


Preservation Formats

Supported Formats

Unstable or Non-Preservation Formats


  • Plain Text (encoding: US-ASCII, UTF-8, UTF-16 with BOM)
  • Plain Text (ISO 8859-1)
  • XML (includes XSD/XSL/SHTML, etc. with included or accessible schema and character encoding explicitly specified)
  • PDF/A (ISO 19005) (*pdf)
  • PDF (*.pdf) (embedded fonts)
  • Rich Text Format 1.x (*.rtf)
  • HTML (with DOCTYPE declaration) (*.htm, *.html)
  • SGML (*.sgml)
  • Cascading Style Sheets (*.css)
  • Microsoft Word (*.doc)
  • WordPerfect (*.wpd)
  • DVI (*.dvi)
  • Any other formats not listed here

Images (Still)

  • TIFF (uncompressed)
  • JPEG2000 (lossless) (*.jp2)


  • BMP (*.bmp)
  • JPEG (*.jpg)
  • JPEG2000 (lossy) (*.jp2)
  • TIFF (compressed)
  • GIF (*.gif)
  • Digital Native DNG (*.dng)
  • MrSID (*.sid)
  • TIFF (in Planar format)
  • FlashPix (*.fpx)
  • Photoshop (*.psd)
  • RAW
  • JPEG2000 Part 2 (*.jpf, *.jpx)
  • All other image formats not listed here


  • SVG (no Java script binding) (*.svg)
  • Computer Graphic Metafile (CGM, WebCGM) (*.cgm)
  • Encapsulated Postscript (EPS)
  • Macromedia Flash (*.swf)
  • All other vector image formats not listed here


  • AIFF (PCM) (*.aif, *.aiff)
  • Broadcast wave (*.bwv)
  • Linear Pulse Code Modulated Audio (LPCM) (*.raw / *.aes)
  • WAV (PCM) (*.wav)
  • MP3 (MPEG-1/2, Layer 3) (*.mp3)
  • Standard MIDI (*.mid, *.midi)
  • Advance Audio Coding (*.mp4, *.m4a, *.aac)
  • Ogg Vorbis (*.ogg)
  • SUN Audio (uncompressed) (*.au)
  • Free Lossless Audio Codec (*.flac)
  • AIFC (compressed) (*.aifc)
  • NeXT SND (*.snd)
  • RealNetworks ‘Real Audio’ (*.ra, *.rm, *.ram)
  • Windows Media Audio (*.wma)
  • Protected AAC (*.m4p)
  • WAV (compressed) (*.wav)
  • All other audio formats not listed here


  • Motion JPEG 2000 (ISO/IEC 15444-4) (*.mj2)
  • AVI (uncompressed, motion JPEG) (*.avi)
  • QuickTime Movie (uncompressed, motion JPEG) (*.mov)
  • Motion JPEG 2000 (ISO/IEC 15444-4) (uncompressed, wrapped in MXF)
  • MPEG-1, MPEG-2 (*.mpg, *.mpeg, wrapped in AVI, MOV)
  • MPEG-4 (H.263, H.264) (*.mp4, wrapped in AVI, MOV)
  • Ogg Theora (*.ogg)


  • AVI (others) (*.avi)
  • QuickTime Movie (others)
  • RealNetworks ‘Real Video’ (*.rv)
  • Windows Media Video (*.wmv)
  • All other video formats not listed here

Spreadsheet / Database

  • Comma Separated Values (*.csv)
  • Delimited Text (*.txt)
  • DBF (*.dbf)
  • OOXML (ISO/IEC DIS 29500) (*.xlsx)
  • Microsoft Excel (*.xls)
  • Microsoft Access (*.mdb)
  • All other spreadsheet/database formats not listed here

Computer Programs

  • None
  • Computer program source code (*.c, *.c++, *.java, *.js, *.jsp, *php, *.pl, etc.)
  • Compiled/Executable files (EXE, *.class, COM, DLL, BIN, DRV, OVL, SYS, PIF)


  • None
  • OOXML (ISO/IEC DIS 29500) (*.pptx)
  • PowerPoint (*.ppt)
  • All other presentation formats not listed here

Web Archiving

  • WARC
  • None
  • All other web formats not listed here

Appendix B: NDSA Levels of Digital Preservation14

Version 1 of the Levels of Digital Preservation


Level 1
(Protect your data)

Level 2
(Know your data)

Level 3
(Monitor your data)

Level 4
(Repair your data)

Storage and Geographic Location

  • Two complete copies that are not collocated
  • For data on heterogeneous media (optical discs, hard drives, etc.) get the content off the medium and into your storage system
  • At least three complete copies
  • At least one copy in a different geographic location
  • Document your storage system(s) and storage media and what you need to use them
  • At least one copy in a different geographic location with a different disaster threat
  • Obsolescence monitoring process for your storage system(s) and media
  • At least three copies in geographic locations with different disaster threats

File Fixity and Data Integrity

  • Check file fixity on ingest if it has been provided with the content
  • Create fixity info if it wasn’t provided with the content
  • Check all fixity on ingests
  • Use write-blockers when working with original media
  • Virus-check high risk content
  • Check fixity of content at fixed intervals
  • Maintain logs of fixity info; supply audit on demand
  • Ability to detect corrupt data
  • Virus-check all content
  • Check fixity of all content in response to specific events or activities
  • Ability to replace/repair corrupted data
  • Ensure no one person has write access to all copies

Information Security

  • Identify how has read, write, move and delete authorization to individual files
  • Restrict who has those authorizations to individual files
  • Document access restrictions for content


  • Maintain logs of who performed what actions on files, including deletions and preservation actions
  • Perform audit of logs


  • Inventory of content and its storage location
  • Ensure backup and non-collocation of inventory
  • Store administrative metadata
  • Store transformative metadata and log events
  • Store standard and technical metadata
  • Store standard preservation metadata

File Formats

  • When you can give input into the creation of digital files encourage use of a limited set of known open formats and codecs
  • Inventory of file formats in use
  • Monitor file format obsolescence issues
  • Perform format migrations, emulation and similar activities as needed


Digital Preservation Framework. University of Minnesota Libraries. 2012, revised 2014. Retrieved from: Verified URL 11 June 2015.

Digital Preservation Glossary. University of Minnesota Libraries. Modified April 29, 2014. Verified URL 18 November 2015.

Glossary. California Digital Library. Verified URL 18 November 2015.
JISC Digital Media. Establishing a Digital Preservation Policy. Retrieved from: Verified URL: 11 June 2015.

Levels of Digital Preservation. National Digital Stewardship Alliance. 2013. Verified URL: 18 November 2015.

MetaArchive Cooperative. Preservation Policy Template. 2010. Retrieved from: Verified URL 11 June 2015.

Purdue University Research Repository (PURR) Digital Preservation Policy. 2012. Retrieved from: Verified URL 11 June 2015.

University of South Caroline Libraries. Digital Preservation Policy Framework. 2010. Retrieved from: Verified URL 11 June 2015.

Yale University Library. Policy for Digital Preservation. 2005, Revised 2007. Retrieved from: Verified URL 11 June 2015.

Document History

Approved By: Dean's Council

Date Approved:

Reviewed By: Data Management Librarian, Nov 2015
Director, Acquisitions & Cataloging (Cheri Duncan), Nov 20, 2015/Dec 9, 2015
Director of Collections (Cheri Duncan), Nov 20, 2015/Dec 9, 2015
TS Leadership (M. Butcher, C. Duncan, J. Fagan, S. Gasser), Dec 8, 2015

Review Frequency: Biannually

Review Responsibility: Head, Digital Collections Librarian (Grace Barth)

Revision Dates: November 19, 2015
December 9, 2015

July 13, 2017 (light revisions related to new organizational structure)

Created By: Digital Collections Librarian (Laura Drake-Davis), May 2015

Related Policies and Procedures:
JMU Libraries Collection Development Policy
JMU Libraries Special Collections Collection Development Policy
Deeds of Gift

Source(s) of Authority: Director, Scholarly Resources & Discovery/Head, Digital Collections

1 Content within digital repositories managed by LET reflect a continued commitment to long-term preservation and access to materials regardless of origination. Content within the repositories will be represented by a variety of the priority levels.

2 University of Minnesota Digital Preservation and Archiving Glossary. Accessed November 2015.

3 Ibid.

4 Ibid.

5 Ibid.

6 Ibid.

7 California Digital Library. Glossary. Accessed November 2015.

8 Ibid.

9 Ibid.

10 Ibid.

11 Ibid.

12 Ibid.

13 Ibid.

14 National Digital Stewardship Alliance (NDSA). Levels of Digital Preservation, Version1, 2013. Accessed November 2015.