This page (revision-9) was last changed on 31-Mar-2015 17:19 by Alison Bennett

This page was created on 17-Sep-2012 15:14 by Alison Bennett

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note
9 31-Mar-2015 17:19 17 KB Alison Bennett to previous
8 03-Feb-2015 14:17 17 KB Alison Bennett to previous | to last
7 03-Feb-2015 14:15 2 bytes Alison Bennett to previous | to last
6 03-Feb-2015 11:36 9 KB Alison Bennett to previous | to last
5 14-Nov-2014 12:24 9 KB Sarah MacLean to previous | to last
4 01-Sep-2014 10:28 9 KB Sarah MacLean to previous | to last
3 24-Oct-2012 12:46 9 KB Sarah MacLean to previous | to last
2 19-Oct-2012 06:33 9 KB Sarah MacLean to previous | to last
1 17-Sep-2012 15:14 9 KB Alison Bennett to last

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 changed one line
[{TableOfContents title='B.13 Disaster planning'}]
[{TableOfContents title='B.11 lntranets and the internet'}]
At line 3 changed 2 lines
!!!B.13 Disaster planning
After a fire destroyed Norwich Central Library in 1994, library managers realised that 'it could happen to them'. Disasters do happen and by nature they are unexpected. Disaster plans help you to react in the event of a disaster and to cope with the aftermath.
!!!B.11 lntranets and the internet
!!B.11.1 lntranets
Intranets are closed networks that are established by organisations to serve the computing needs of their staff. An intranet may be small, for example a number of computers connected to a Local Area Network (LAN) within a building, but can be very large, for example the computing networks for a series of buildings connected to a Wide Area Network (WAN). In a WAN the buildings may be widely separated, as is the case in organisations with regional offices, such as English Heritage or multinational companies. The technology that links the computers is similar to that used in the internet. The difference is that use of an intranet is restricted to those with security clearance and a valid password. Intranets are enclosed inside a firewall to secure the information held on corporate systems from unauthorised access.
At line 6 changed 2 lines
!Why prepare a disaster plan?
There are various hazards in all environments. Often they just seem to be minor irritations, for example a dripping tap, a poorly closing door or an awkwardly placed cabinet, but sometimes they can escalate into disasters.
!!B.11.2 The internet
The internet is a shortening of 'Inter Networking' and offers a very different user environment consisting of millions of computers linked into a global communications network. Users include both private individuals and organisations from across the world all connected to the internet through an Internet Service Provider (ISP) or by establishing a web server. ISPs maintain web servers and other communications equipment enabling their clients to access a number of services from the internet. Access to the World Wide Web and electronic mail or 'e-mail' are normally considered as the most important internet services.
!Getting connected
Many HERs are already linked into an intranet, for example the network run by their local authority. Some HERs run their own small networks with a database server allowing access to a small number of simultaneous authorised users. A number of HERs have access to the internet either through a network connection provided by their organisation or by establishing a direct connection from a PC using a modem and an ISP.
At line 9 changed one line
The benefit of going through the disaster-planning process is that it gives you a chance to focus on what is really important, that is, the safety of the people who work in or visit the HER and the protection of valued information and services. Why put these at risk for the sake of a little time spent on preparation and good housekeeping?
!Firewalls
When intranets are connected into the global internet a protective security screen or firewall is normally established to control access to locally held resources from unauthorised outside users. The level of access to internet services allowed to individual users may also be controlled. This is generally achieved by setting up a proxy server that deals with internet requests from users connected to the internal network. Such a set up generally protects individual users but mobile computing is increasingly adding to security problems in that machines such as laptops and notepads may be used both within and outside of an organisational firewall with the possibility of introducing ‘infections’ into a system. A personal firewall on such machines is increasingly important particularly in light of the growing number of web based attacks (see [B.8.2|http://archaeologydataservice.ac.uk/ifp/Wiki.jsp?page=SectionB.8#section-SectionB.8-B.8.2DataSecurity]).
At line 11 changed 2 lines
!What next?
This manual offers guidelines to assist in preparing and updating a disaster plan that is tailored to an HER's local circumstances. (See [Panel 7|http://archaeologydataservice.ac.uk/ifp/Wiki.jsp?page=SectionB.11#section-SectionB.11-Panel7DisasterPlanTemplate] for a disaster-plan template).
!Web space
Access to the internet either through a corporate web server, co-ordinated by a web master, or from an ISP gives access to web space. This is space on the web server that may be used for file storage and for a website to advertise the HER. Websites have an address or URL which locates a hypertext file on the World Wide Web. Hypertext files can incorporate text, images and other digital data that are linked to the intranet. Websites may simply display information about an HER and its services with links to other websites of interest and facilities to allow users to record comments or send emails to the HER. Advanced sites can enable on-line searching of databases, incorporate video, sound and virtual-reality elements and many other features. HERs are increasingly presenting subsets of their data online as part of the drive towards greater accessibility. (See also [F.8|SectionF8])
At line 14 changed 10 lines
!!B.13.1 Prevention
There is an alarming range of potential disasters including:
*fire, flood, storm
*supply failures, gas explosion, liquid spillage
*structural collapse
*theft, vandalism, arson
*loss of key staff
*unauthorised access to archives, databases
*works, security breaches and disasters impacting from neighbouring premises
*collision by transport.
!Useful websites
At line 25 changed 7 lines
Simple precautions often reduce the possibility of a disaster occurring and minimise its effect. There is no substitute for good housekeeping. Take a good look at each of these areas:
*buildings/equipment maintenance
*security
*fire hazard
*location of collections
*storage of collections
*IT.
Brief history of the internet [http://www.isoc.org/internet/history/brief.shtml|http://www.isoc.org/internet/history/brief.shtml]
At line 33 changed one line
How vulnerable is each area? Are there any measures that you can take to protect the HER?
FirewalIs: [http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html|http://searchsecurity.techtarget.com/definition/firewall]
At line 35 changed 5 lines
Protection measures normally fall into one of four categories:
*avoiding the risk by making changes
*transferring the risk to someone better equipped to manage it
*controlling the risk by installing early-warning systems or safeguards
*accepting the risk if the asset value is low.
Intranets: [http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci212377,00.html|http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci212377,00.html]
At line 41 changed 2 lines
!!B.13.2 Preparedness
__If a disaster happens, it will be a shock. Preparing a written plan helps.__ This should cover both the procedures to be followed at the moment of disaster, and information to meet immediate requirements. A template is provided to assist (see [Panel 7|http://archaeologydataservice.ac.uk/ifp/Wiki.jsp?page=SectionB.11#section-SectionB.11-Panel7DisasterPlanTemplate]) but remember that your plan may need to be co-ordinated with a disaster plan for your local authority or department.
Proxy servers: [http://searchsmallbizit.techtarget.com/sDefinition/0,,sid44_gci212840,00.html|http://searchsmallbizit.techtarget.com/sDefinition/0,,sid44_gci212840,00.html]
At line 44 changed 2 lines
!Disaster control team
HERs form part of larger organisations. Any disaster will involve staff from other departments. Your plan should include the names and contact details (at home and at work) of all relevant staff. This must include a __disaster manager__ for the HER and contact details for members of staff who can be called out to assist.
World Wide Web (W3C) Consortium: [http://www.w3.org/|http://www.w3.org/]
At line 47 changed 2 lines
!Evacuation procedures
All visitors and members of staff must be evacuated when 'exposed to serious and imminent danger'.
Site design: Ability Net: [http://www.ability.org.uk/|http://www.ability.org.uk/index1.html]
At line 50 changed one line
Your plan should document evacuation procedures and should include a floor plan which locates all emergency exits, assembly points, alarms, equipment, etc.
Site design: RNIB: [http://www.rnib.org.uk/professionals/webaccessibility/designbuild/Pages/design_build.aspx|http://www.rnib.org.uk/professionals/webaccessibility/designbuild/Pages/design_build.aspx]
At line 52 changed 2 lines
!Insurance
Your plan should include details of any insurance policy and a named point of contact.
Web Accessibility initiative: [http://www.w3.org/WAI|http://www.w3.org/WAI]
At line 55 changed 2 lines
!Equipment and contacts
Disasters often involve mess and quantities of water. Assemble basic equipment in advance. In your plan, include a marked floor plan, showing where the service isolation points are, where your emergency equipment is stored and what equipment is available.
!!B.11.3 Metadata for electronic resources curated by HERs
HERs hold a variety of electronic resources including databases, text files, spreadsheets, CAD files and GIS. Metadata should be recorded for each of those resources to provide a catalogue to the HERs' holdings as an aid to resource discovery. HERs are recommended to follow the Dublin Core for electronic resources other than GIS (see [panel 6|http://archaeologydataservice.ac.uk/ifp/Wiki.jsp?page=SectionB.9#section-SectionB.9-Panel6ElementsOfTheDublinCore]), which provides a standard content-description model widely used on the internet (see [Miller and Greenstein 1997|Bibliography#Miller and Greenstein 1997|target='_blank']). HERs might want to consult the e-Gov metadata standard (eGMS) which adds several elements to the core Dublin Core schema. The UK GEMINI (Geo-spatial Metadata Interoperability Initiative) standard has replaced the NGDF standard previously recommended. UK GEMINI was developed through a collaboration of the Association for Geographic Information (AGI) and the Cabinet Office e-Government Unit, with additional representation from national and local government, and the academic community.
At line 58 changed one line
Include the names and addresses of contractors who provide maintenance, repair work or specialist services.
!Useful websites
Dublin Core [http://dublincore.org/|http://dublincore.org/]
At line 60 changed 2 lines
!Salvage priorities
What would you save first in a disaster? Make a list and include a floor plan showing where each item is stored in your disaster plan. Label priority items clearly (or the cabinets and drawers in which they are stored) so that they can be rapidly identified in an emergency.
e-Gov [http://www.esd.org.uk/standards/egms/|http://www.esd.org.uk/standards/egms/]
At line 63 changed 2 lines
!IT
All HER systems will be regularly backed up with tapes stored offsite. Include details in your plan of whoever is available to restore the HER from back-up in a disaster.
Metadata [http://guides.archaeologydataservice.ac.uk/g2gp/CreateData_1-2|http://http://guides.archaeologydataservice.ac.uk/g2gp/CreateData_1-2], [http://www.ukoln.ac.uk/metadata/|http://www.ukoln.ac.uk/metadata/]
At line 66 changed 2 lines
!Business contingency planning
How would you continue to operate if your computers were stolen? Include details in your disaster plan of business contingency plans which will help to keep services running in the event of particular disasters.
UK GEMINI [http://www.agi.org.uk/uk-gemini/|http://www.agi.org.uk/uk-gemini/]
At line 69 changed 2 lines
!Training
All staff should be regularly trained in emergency evacuation procedures. The disaster manager and members of the disaster team should also be trained in emergency salvage and conservation.
\\
%%panel-box
!Panel 7: Elements of the Dublin Core
At line 72 changed 2 lines
!!B.13.3 Reaction
Initial actions on discovering a disaster should be:
|__Element__|__Description__
|Title|The name given to a resource by its creator.
|Creator|Person(s) or organisation(s) involved in creating the original resource, for example the Environment Department might be responsible for creating a corporate GIS layer of SSSIs. As an aid to resource discovery it may be helpful to record both named individuals and their organisations, for example Fred Bloggs and Sam Spade of English Heritage might be involved in creating a CAD file.
|Subject|The topic of the resource, in keywords or phrases that describe the subject or content of the resource.
|Description|A text description of the contents of the resource, including abstracts in the case of document-like objects or content descriptions in the case of visual resources.
|Publisher|The publisher, distributor, department or other entity(ies) who are responsible for making the resource available, for example the Archaeology Data Service might provide access to a database created by Westshire County Council.
|Date|Dates when the resource was created, published, released, maintained or updated. A number of different types of dates may need to be recorded. Not to be confused with the date of the contents of the resource.
|Type|The general type of the resource, such as text, image, database etc.
|Format|The format in which the data is represented, for example text, HTML, ASCII, executable application, JPEG image etc. The size of the resource and the medium on which it is held may also be recorded.
|Identifier|A unique identifier for the resource, for example URLs, ISBN number or internal identification number.
|Source|The work from which the resource is derived, for example the source of an HTML page might be a paper volume.
|Language|The language(s) of the intellectual content of the resource.
|Relation|The relationship to other resources, for example images in a document.
|Coverage|The spatial and temporal coverage of the information contained in the resource.
|Rights|Statement of copyright or other rights relating to the resource.
/%
At line 75 changed 4 lines
!Alert
*Alert the emergency services and evacuate people if necessary
*Contact the senior manager in office hours
*Contact the disaster manager outside office hours.
!!B.11.4 What is Z39.50?
Z39.50 is the name of a computer-to-computer communications protocol that is promoted by the National Information Standards Organization (NISO), an American National Standards Institute (ANSI) standards developer that serves the library, information, and publishing communities. Z39.50 is being implemented worldwide because it makes it easier for users to search and retrieve information simultaneously from groups of related databases on the internet.
At line 80 changed 8 lines
!Initial assessment
On arriving at the scene the disaster manager will:
*liaise with emergency services
*set up a control point
*assess the damage, when safe to do so brief the disaster team
*stabilise the environment
*secure undamaged material
*organise salvage operations.
!Applications of Z39.50 involving the UK
Much of the development of Z39.50 took place in the library sector, as a way of simultaneously interrogating the catalogues maintained in different libraries. The recent development of associated standards such as the Bath and CIMI profiles have made it easier to employ Z39.50 outside of library cataloguing. These provide support for more generalised record syntaxes such as Dublin Core and enable users to ask questions such as what, when, where or to conduct queries based on coordinate systems; undoubtedly more suited for those with an interest in Heritage. Suitability led the HEIRNET (Historic Environment Information Records Network) consortium to develop HEIRPORT; a Z39.50 system for searching geographically distributed databases of a number of heritage organisations including:
*English Heritage
*RCAHMS NMRS
*Durham SMR
*Portable Antiquities Scheme
*HEIRNET Register
*SCRAN
*ADS Catalogue
Using a standard web browser, a remote user can access the HEIRPORT gateway to interrogate its various targets. The results are then passed back to the user's browser through the origin, where they are displayed in HTML.
At line 89 changed one line
__Remember that your safety and the safety of the disaster team are paramount__. The disaster area should not be entered until it is declared safe by emergency services.
Recently a European Z39.50 gateway was launched as part of the [ARENA|http://ads.ahds.ac.uk/arena/] (Archaeological Records of Europe - Networked Access) project. Partners currently include:
*Denmark: National Agency for Cultural Heritage
*Iceland: Fornleifastofnun Íslands, The Institute of Archaeology
*Norway: The Museum Project, Oslo
*Poland: Poznan Archaeological Museum
*Romania: cIMeC, Institute for Cultural Memory
*United Kingdom: Archaeology Data Service
English Heritage, NMRs and HERs are also contributing to these projects through the provision of subsets of their data to the ADS.
At line 91 changed 2 lines
!Salvage
Working conditions may be cold, wet and dirty. There may be lots of heavy work if furniture and equipment are out of place. Warm, old clothes, gloves and stout shoes should be worn.
!What does Z39.50 do?
Z39.50 supports information retrieval in a client and server environment where a computer operating as a client submits a search request (that is, a query) to another computer acting as an information server. Software on the server performs a search on one or more databases and passes a result set of records to the client for processing.
At line 94 changed one line
The disaster manager should organise rest breaks with hot drinks and snacks for the disaster team.
The power of Z39.50 is that it separates the user interface on the client side from the information servers, search engines, and databases. It provides a consistent view of information from a wide variety of sources, offering the ability to integrate information from different databases without imposing rules on the structure of those databases. Z39.50 can be implemented on any platform and enables different computer systems (with different operating systems, hardware, search engines, database management systems) to inter-operate and work together seamlessly.
At line 96 changed 6 lines
!Procedures
*You should aim to sort undamaged materials from those that are dampened or saturated by water.
*Materials that have been damaged beyond repair should be discarded
*Priority collections and undamaged materials should be secured against possible further damage
*Emergency conservation techniques include air drying, freeze drying and in some cases washing - these techniques are well documented in other literature
*Mould and pest infestations may represent health hazards. Both require monitoring and advice should be sought from experts on how to deal with them.
This means that if an HER database is mounted on the internet using Z39.50, it can be searched from both the HER website and any number of Z39.50 gateways without the necessity for any changes to its structure providing they support shared standards such as CIMI and Bath profile.
At line 103 changed 2 lines
!!B.13.4 Recovery
During the initial recovery phase, procedures should be put into place to allow the HER to continue services at a minimum level.
!How does it work?
Z39.50 standardises the way in which the client and the server communicate with each other, specifies procedures and provides a common language for the activities of both. In information retrieval, a series of messages passes between the client (referred to as the ‘origin') and server (referred to as the 'target') to establish a connection, initiate a Z39.50 session, and negotiate expectations and limitations on the activities that will occur (such as the maximum size of the records). After this, the client may submit a generic search request (and to any number of usually remote targets). The request specifies query type and query term, for example, undertake a ‘what’ search for ‘round barrow’. Configuration files map ‘what’ to the local equivalent which might be a ‘monument_type’ field in a ‘monument’ table and defines a local query. The server executes the search against one or more databases, and creates a result set. The client can then ask for records from the result set and, upon receipt, display records to the user. An advantage of Z39.50 is that each database can have unique characteristics, for example differences in the way they store data, in the access points available for searching and in the software platform on which they reside. The objective of Z39.50 is to support computer-to-computer communication in standard and mutually understandable terms and support the transfer of data between the systems independent of the structure, content, or format of the data in a particular system. In short Z39.50 is a tool for virtual searching.
At line 106 changed 8 lines
The disaster manager should initiate recovery procedures to:
*restore IT from back-up
*arrange for the area to be cleaned
*provide access to undamaged material
*list damaged or destroyed equipment and prepare any insurance claims
*order replacement furniture or equipment
*inform management and staff of progress
*review the disaster plan.
!Implementing Z39.50
Implementing Z39.50 has hitherto been complicated, but it is getting progressively simpler as the standards have developed. Two things are essential:
*First, the appropriate software has to be installed to handle communications between one computer and another.
*Second, the data within the target's databases have to be mapped on to the metadata standard(s) defined in shared profiles. Mapping to metadata allows for a description of the data to be passed from client to server in a format that both can manage. Information can be passed from target to origin in a number of standard formats.
Advice on implementing Z39.50 is available from both the ADS and the mda.
At line 115 changed one line
Be aware that, in the event of a major disaster staff may become depressed or otherwise affected. You may wish to include details of staff welfare services in your disaster plan or consider other arrangements to support staff coping with the aftermath.
!XML
XML (Extensible Markup Language) is a standard for creating markup languages which describe the structure of data. It is not a fixed set of elements like HTML, but rather, it is like SGML (Standard Generalised Markup Language) in that it is a metalanguage, or a language for describing languages. XML enables authors to define their own tags. XML is a formal specification of the World Wide Web Consortium. (More detailed definition is available from: [http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci213404,00.html|http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci213404,00.html]
At line 117 changed 2 lines
!Further information
*''Disaster Management Planning for Archaeological Archives'' IFA/AAF. This paper sets out in the required detail the considerations that need to be addressed in preparing and implementing a disaster management plan for archaeological archives.
The e-Government Interoperability Framework (e-GIF) mandates the adoption of XML and the development of XML schemas as the cornerstone of the government interoperability and integration strategy. A key element in the development of XML schemas is an agreed set of data standards. ([http://webarchive.nationalarchives.gov.uk/+/http://www.cabinetoffice.gov.uk/govtalk/schemasstandards/e-gif.aspx|http://webarchive.nationalarchives.gov.uk/+/http://www.cabinetoffice.gov.uk/govtalk/schemasstandards/e-gif.aspx]).
At line 120 changed 4 lines
\\
%%panel-box
!Panel 7: Disaster plan template
Disaster Plan prepared for THE HER on ___________ by __________________.
''Useful web sites:''
[http://www.w3.org/XML/|http://www.w3.org/XML/]
At line 125 changed one line
The plan will be updated on ______________
XML UK: the United Kingdom Forum for Structured Information Standards [http://www.xmluk.org/| http://www.xmluk.org/]
At line 127 changed 2 lines
updates will be sent to the disaster manager, disaster team members, site managers, etc.
__Procedures for initial action on discovering a disaster.__
!The Future
In the past systems such as HEIRPORT have been described as portals. Today, however, a number of standards bodies have begun work on developing portal standards. Significant amongst these is Java Specification Request (JSR) 168 which defines a set of Java Application Program Interfaces for developing portlets which can be used in compliant portals. Portlets provide ‘Web Services’. Portlets can be designed to interface with remote Z39.50 targets or indeed just about anything that is network accessible. Users can ‘pick and mix’ which portlets and thus services they wish to use within a personalised portal environment. Thus someone living in the Northeast might activate a Durham HER portlet, a local weather portlet and local newsfeed portlet within their portal environment. The CREE (Contextual Resource Evaluation Environment) consortium is looking at providing portlet interaction with various services including HEIRPORT targets within a formal (JSR-168 compliant) portal environment.
At line 130 changed 15 lines
#Alert the Emergency Services as necessary. Dial (9) 999 and give details of the location and
nature of the emergency. Alert Security or Estates as necessary.
#Alert the Disaster Manager (insert name and contact numbers at home and work) and the most
senior staff member in office hours.
#Evacuate the building in the event of staff and readers being ‘exposed to serious and imminent
danger’ ([Management of Health & Safety at Work Regulations 1992|Bibliography#Statutory Instruments 1999|target='_blank']). Insert procedures.
__On arrival at the scene the Disaster manager should:__
#Liaise with emergency services and establish a control point.
#Contact the Disaster control team: (insert names and contact details for team members)
#Contact staff from other Departments (may include: Security, Estates, IT, Finance, Catering,
Senior Management.)
#Assess the scene and the damage. Stabilise the environment and break out emergency
supplies.
#Organise salvage teams. Salvage priority collections. Secure undamaged material. Arrange
rest breaks and refreshments for teams.
!Useful websites
ARENA: [http://ads.ahds.ac.uk/arena/|http://ads.ahds.ac.uk/arena/]
At line 146 changed one line
__Useful information:__
CREE: [http://www.hull.ac.uk/cree/|http://www.hull.ac.uk/cree/]
At line 148 changed one line
''Insurance''
HEIRNET: [http://www.britarch.ac.uk/HEIRNET/|http://www.britarch.ac.uk/HEIRNET/]
At line 150 changed one line
Insert insurance policy number and a contact details with the insurance company.
HEIRNET register: [http://ads.ahds.ac.uk/heirnet/index.cfm|http://ads.ahds.ac.uk/heirnet/index.cfm]
At line 152 changed one line
''Location plans''
Web Portals: [http://www.w3.org/2002/07/DIAT/posn/sun-portal.html|http://www.w3.org/2002/07/DIAT/posn/sun-portal.html]
At line 154 changed 18 lines
Insert the following location plans:
*Fire exits, fire extinguishers, smoke alarms, sprinkler systems, assembly points.
*Electrical, water, sewerage, drainage and gas systems; fuse boxes, stop cocks and isolation valves.
*The location of priority collections for salvage, emergency equipment stores and first aid boxes.
''Salvage priorities''
Insert a list of collection salvage priorities and the names of those responsible for each area.
''Emergency equipment''
List appropriate emergency equipment available and the precise location of the equipment stores. Equipment may fall into these categories e.g. cleaning, drying, packing.
''Suppliers of Emergency Equipment and Services''
Identify suppliers of emergency equipment and services. List contact details and contract
numbers.
/%
Z39.50 for all: [http://www.ariadne.ac.uk/issue21/z3950|http://www.ariadne.ac.uk/issue21/z3950]