Authenticity Task Force Report
Authenticity Task Force Report
Authenticity Task Force Report
Definition of record
A record is defined as any document made or received and set aside in the course of a practical
activity. The interpretation of this definition in the context of electronic systems is discussed under
the "Research Design and Methodology" and "Research Findings" sections of this report.
1
Definitions of authenticity, authentic, and authentic record
In common usage, the concept of authenticity is defined as “the quality of being authentic, or
entitled to acceptance.”1 The term authentic means “worthy of acceptance or belief as conforming
to or based on fact” and is synonymous with the terms genuine and bona fide. Genuine “implies
actual character not counterfeited, imitated, or adulterated [and] connotes definite origin from a
source.” Bona fide “implies good faith and sincerity of intention.”2 From these definitions it follows
that an authentic record is a record that is what it purports to be and is free from tampering or
corruption.
1
Oxford English Dictionary, 2nd ed., s.v. “authenticity.”
2
Merriam-Webster Online Collegiate Dictionary, s.v. “authentic.”
3
See "Technological development".
2
embodies this framework.4 The Template is a decomposition of an electronic record into its
constituent elements. The decomposition defines each element, explains its purpose, and
indicates whether, and to what extent, that element is instrumental in assessing the record’s
authenticity.
The theoretical perspective that shaped the development of the Template was contemporary
archival diplomatics. Diplomatics emerged in the seventeenth century as an analytical technique
for determining the authenticity of records issued by sovereign authorities in previous centuries.
Its primary purpose was to ascertain “the reality of the rights or truthfulness of the facts”5
contained in such documents. The tenets and methods of diplomatics were laid out in 1681 in a
treatise written by Jean Mabillon, a Benedictine monk. Mabillon examined, among other things, the
language of the documents, their characteristic parts, their seals, and the systems of chronology
used in dating them. On the basis of this examination, “Mabillon stated what, for a particular time and
place, was the correct form for a genuine document, and presented the general principles of
diplomatics.”6 The original use of diplomatics was to determine a record’s authenticity for legal
purposes; that use continued into the eighteenth century, when many European faculties of law
incorporated its concepts and principles into their curricula. By the end of the nineteenth century,
however, under the influence of classical philology and the scientific school of historiography,
diplomatics emerged as a tool for assessing the authority of medieval records as historical
sources.
Over the past twenty years there have been numerous calls from within the archival community to
revive and adapt diplomatics as an aid to understanding the record-keeping processes of
contemporary bureaucracies. Delegates to the 1989 International Council on Archives’ Second
European Conference on Archives, for example, recommended “that the development of the
discipline of modern diplomatics be promoted through research in the typology of contemporary
records and in the records-creating procedures of contemporary institutions.” 7 In Europe, notable
archival efforts to construct a modern diplomatics include the work undertaken by Dutch archivists to
develop a typology of records created by organizations since the nineteenth century in the
4
See Appendix 1. The term elements is used differently in diplomatics to the way in which it is used in
information systems design. In developing the initial research questions and the Template for Analysis, the
task force used the diplomatic term elements to refer to both general and specific characteristics of a record
that may be found in its documentary form, in annotations, or in one or more of its various contexts. As the
research progressed, however, the task force found it necessary to narrow the scope of the concept. In the
Requirements for Assessing and Maintaining the Authenticity of Electronic Records, therefore, the term
record elements refers specifically to the intrinsic and extrinsic elements of a record’s documentary form as
these are identified in Template for Analysis. Such redefinition is illustrative of how diplomatics continues to
evolve in response to the changing nature of the record.
5
Luciana Duranti, “Diplomatics: New Uses for an Old Science,” Archivaria 28 (Summer 1989): 17.
6
James Westfall Thompson, A History of Historical Writing (New York: The Macmillan Co., 1942), vol. 2, 19.
7
Judith Koucky, ed. Second European Conference on Archives: Proceedings (Paris: International Council
on Archives, 1989), 113. The delegates’ recommendation was in support of comments made by Francis
Blouin. See Francis X. Blouin, Jr., “Convergences and Divergences in Archival Tradition: A North American
Perspective,” Second European Conference on Archives, 28–29. Other archivists who have advocated the
revival of diplomatics for modern records include Tom Nesmith, “Archives from the Bottom Up: Social
History and Archival Scholarship,” Archivaria 14 (Summer 1982): 5–26; Don C. Skemer, “Diplomatics and
Archives,” American Archivist 52 (Summer 1989): 376–82; and Hugh Taylor, “My Very Act and Deed: Some
Reflections on the Role of Textual Records in the Conduct of Affairs,” American Archivist 51 (Fall 1988):
456–69.
3
Netherlands;8 and the adaptation of traditional diplomatic concepts and methods to the record-
keeping environment of contemporary Italian administration undertaken by Paola Carucci.9
In North America, the most comprehensive effort to adapt traditional diplomatics to contemporary
record-keeping practices is embodied in the work of Luciana Duranti of the University of British
Columbia. In a series of articles written between 1989 and 1992,10 Duranti examined the
principles and concepts developed by diplomatic theorists for evaluating the authenticity of
medieval documents to determine whether they could be adapted for application to the records
generated by modern bureaucracies. Over the course of the six articles, she refined and
reinterpreted the classical concepts, and introduced new ones to take into account the variety and
complexity of bureaucratic record-keeping environments.
Duranti’s series of articles resulted in a preliminary elaboration of contemporary archival
diplomatics, an adaptation of traditional diplomatic concepts and methods to contemporary
record-keeping environments, and an integration of these concepts and methods with those of
archival science. It also laid the groundwork for a research project carried out between 1994 and
1997 at the University of British Columbia entitled The Preservation of the Integrity of Electronic
Records (known as the UBC Project).11 The goal of that project was to identify and define
conceptually the nature of an electronic record and the conditions necessary to ensure its
integrity (i.e., its reliability and authenticity) during its active and semi-active life. The research
resulted in a set of standards and rules for developing and implementing a trustworthy electronic
record-keeping system.12
The elements of an electronic record identified in the UBC Project provided the starting point for
the identification of the InterPARES Template elements. Based on researcher input from a range
of disciplinary perspectives, as well as data collected during the case studies, these original
elements were revised and extended, and new elements were added as the research
progressed. For example, the broader administrative and documentary contexts in which a record
is created, handled, and maintained were more precisely articulated in the Template than they
had been in the UBC Project, and a new category of context— that is, technological context—was
identified and elaborated.
To help the researchers understand traditional diplomatic elements and their contemporary
interpretation, student research assistants traced the lineage of the elements included in the
Template back to their original elaboration in the work of traditional French, German, and Italian
diplomatists.13 The researchers reasoned that a sound understanding of the historical meaning of
the elements would better equip them to assess the contemporary relevance of the elements.
8
For a summary of this research and its products, see David Bearman and Peter Sigmond, “Explorations of
Form of Material Authority Files by Dutch Archivists,” American Archivist 50 (Spring 1987): 249–53; Peter J.
Sigmond, “Form, Function and Archival Value,” Archivaria 33 (Winter 1991–92): 141–47.
9
Paola Carucci, Il Documento Contemporaneo (Rome: La Nuova Italia Scientifica, 1987).
10
Duranti. “Diplomatics I,” 7–27; “Diplomatics ... (Part II),” Archivaria 29 (Winter 1989–90): 4–17; “
Diplomatics ... (Part III),” Archivaria 30 (Summer 1990): 4–20; “Diplomatics ... (Part IV),” Archivaria 31
(Winter 1990–91): 10-25; “Diplomatics ... (Part V),” Archivaria 32 (Summer 1991): 6–24; “Diplomatics ...
(Part VI),” Archivaria 33 (Winter 1991–92): 6–24. Published in a single volume as Duranti, Diplomatics: New
Uses for an Old Science (Lanham, Maryland, and London: Scarecrow Press in association with the Society
of American Archivists and Association of Canadian Archivists, 1998).
11
For an overview of the project's findings, see Luciana Duranti and Heather MacNeil, “The Protection of the
Integrity of Electronic Records: An Overview of the UBC-MAS Research Project,” Archivaria 42 (Fall 1996): 46–
67.
12
The outcomes of the UBC Project were subsequently substantially incorporated into the Design Criteria
Standard for Electronic Records Management Software Applications (DoD 5015.2-STD) promulgated by the
U.S. Department of Defense.
13
The document showing the lineage of elements included in the Template for Analysis is available on the
InterPARES Web site at <http://www.interpares.org/reports.htm>.
4
Research assistants also prepared a sample typology of papal chancery documents to facilitate
the researchers’ understanding of how traditional diplomatists viewed the relationship between
authenticity and documentary form, and, more specifically, how individual elements of
documentary form supported the attestation of a record’s authenticity.14
Viewed from the perspective of contemporary archival diplomatics, an electronic record, like its
traditional counterpart, is a complex of elements and their relationships. It possesses a number of
identifiable characteristics, including a fixed documentary form,15 a stable content, an archival
bond with other records either inside or outside the system, and an identifiable context. It
participates in or supports an action, either procedurally or as part of the decision-making process
(meaning its creation may be mandatory or discretionary), and at least three persons (author,
writer, and addressee) are involved in its creation (although these three conceptual persons may
in fact be only one physical or juridical person).
In a traditional record-keeping environment, these characteristics manifest themselves in explicit
and implicit ways. For example, the name of the author may appear on the letterhead; and the
archival bond may be expressed in a classification code or some other unique identifier that
appears on the face of a record. The purpose served by these individual elements also depends
on their specific form of expression. For example, the identification of the name of the author that
appears in the letterhead serves the purpose of identifying aspects of the record’s provenancial
context. When that same name appears as a signature at the bottom of the record, it serves the
purpose of attesting to the validity of the record or its content. The working hypothesis of the
Authenticity Task Force was that, even though they may manifest themselves in different ways,
these same or similar elements are present explicitly or implicitly in electronic records. The
Template for Analysis was created to test that hypothesis. The elements of an electronic record
included in the Template fall into four main categories: documentary form, annotations, context,
and medium:16
Documentary form is defined as the rules of representation according to which the content of a
record, its immediate administrative and documentary context, and its authority are
communicated. It possesses both intrinsic and extrinsic elements.
Intrinsic elements are the discursive parts of the record that communicate the action in which the
record participates and the immediate context. They fall into three groups:
1) elements that convey aspects of the record’s juridical and administrative context (e.g., the
name of the author, addressee, the date);
2) elements that communicate the action itself (e.g., the indication and description of the
action or matter);
3) elements that convey aspects of the record’s documentary context and its means of
validation (e.g., the name of the writer, the attestation, the corroboration).
Extrinsic elements refer to specific, perceivable features of the record that are instrumental in
communicating and achieving the purpose for which it was created. For electronic records these
include:
14
The sample typology is available on the InterPARES Web site at <http://www.interpares.org/reports.htm>.
15
According to the Authenticity Task Force’s Research Methodology Statement, a fixed form “means that (1)
the binary content of the record, including indicators of its documentary form, are stored in a manner that
ensures it remains complete and unaltered; and (2) technology has been maintained and procedures
defined and enforced to ensure that the content is presented or rendered with the same documentary form it
had when it was set aside.” The statement is available on the project Web site at
<http://www.interpares.org/reports.htm>.
16
For a more detailed discussion of the Template for Analysis, see Heather MacNeil, “Providing Grounds for
Trust: Developing Conceptual Requirements for the Long-Term Preservation of Authentic Electronic
Records,” Archivaria 50 (Fall 2000): 56–67.
5
• overall presentation features (e.g., textual, graphic, image, sound, or some combination
of these);
• specific presentation features (e.g., special layouts, hyperlinks, colours, sample rate of
sound files);
• electronic signatures and electronic seals (e.g., digital signatures);
• digital time stamps;
• other special signs (e.g., digital watermarks, an organization’s crest or personal logo).
Annotations (additions made to a record after it has been created) constitute the next category of
elements included in the Template for Analysis. They fall into three basic groups:
1. additions made to the record after its creation as part of its execution (e.g., the date and
time of transmission added to an e-mail record at the moment it is sent, or the indication
of attachments added before it is transmitted);
2. additions made to the record in the course of handling the business matter in which the
record participates (e.g., comments noted on the face of the record, or embedded in it,
and dates of transmission to other offices);
3. additions made to the record in the course of handling it for records management
purposes (e.g., the classification code or file number assigned to the record, its draft
and/or version number, cross references to other records, and an indication of scheduling
actions).
Context shifts the analysis away from the record itself to the broader structural, procedural, and
documentary framework in which the record is created and managed. The identified elements of
context correspond to a hierarchy of frameworks ranging from the general to the specific. They
include the record’s juridical-administrative context, its provenancial context, its procedural
context, its documentary context, and its technological context. Knowledge of these elements is
critical to an understanding of the business processes in the course of which electronic records
are created, maintained, and used; the types of records generated from these processes; and the
connection between those processes and the creator’s broader functions and mandate.17
Medium proved to be a problematic construct from the perspective of diplomatic analysis. In
identifying and positioning the elements of the Template for Analysis, the Authenticity Task Force
struggled with the question of whether to treat the medium—that is, the physical carrier on which
a record is stored—as a part of the record itself or as part of its technological context. For
diplomatists examining medieval documents, the medium is an essential component of a record
because the examination of the physical carrier on which the document is inscribed is one of the
most obvious proofs of its authenticity.18 In the translation of traditional diplomatic concepts into
modern, paper-based, record-keeping environments, the medium has continued to be treated as
a part of the record itself, mainly because the medium and the message are inextricably linked.
The question was whether, in an electronic record-keeping environment, the medium should
continue to be treated as an essential part of the record itself given that: (1) the medium and the
message are no longer inextricably linked; (2) what is inscribed on or affixed to the medium is not
a record as such (or words, or pictures), but a bitstream; and (3) the choice of a medium by those
creating or maintaining the record is often arbitrary and carries no particular significance.
17
For a discussion of the embeddedness of electronic records within these contexts, see Anne J. Gilliland-
Swetland and Philip Eppard, “Preserving the Authenticity of Contingent Digital Objects: The InterPARES
Project,” Dlib Magazine 6 (July/August 2000), available at:
<http://www.dlib.org/dlib/july00/eppard/07eppard.html>.
18
For example, a royal diploma of Childebert I (King of Francs, sixth century) that is written on parchment
instead of papyrus is considered false. The medium also provides evidence of the manner in which medieval
documents were prepared. The documents from the German chancery have many erasures and corrections
in comparison to the documents of the papal chancery, indicating a lesser degree of care and accuracy in
the preparation of the final documents.
6
A record is assumed to be a representation of a fact or act that is memorialized on a physical
carrier—that is, a medium—and preserved by a physical or juridical person in the course of
carrying out its activities.19 It follows that a record cannot exist before its elements have been
inscribed on or affixed to a medium. Similarly, in an electronic environment, the bitstream—that
is, the source of the record—cannot endure for any length of time unless it is affixed to a medium.
Storage of a bitstream on a disk or tape, however, while necessary for the bitstream to endure, is
not sufficient to preserve a record as a record. As the Preservation Task Force observed early on
in its deliberations, “strictly speaking, it is not possible to preserve an electronic record. It is only
possible to preserve the ability to reproduce an electronic record. It is always necessary to
retrieve from storage the binary digits that make up the record and process them through some
software for delivery or presentation.”20 Moreover, although affixing a bitstream to a medium is a
precondition to the existence of an electronic record, it is not necessarily a relevant factor in
assessing that record’s authenticity. It is assumed to be neutral with respect to the record’s
authenticity, at least from the perspective of the records creator and the records preserver. The
Authenticity Task Force therefore concluded at the end of its research that the medium should be
considered part of the record’s technological context, rather than an essential part of the record
itself.
Initial development of the Template took place over a nine-month period from January to
September 1999. During that time, the Template was revised numerous times by both the
Authenticity Task Force and the InterPARES International Team. By June 1999, the Template
was considered sufficiently developed for the start of the process of testing and refining it through
case studies of real-life electronic systems.
Empirical-Inductive Approach
As discussed above, the Template for Analysis began as a model of an ideal record that, based
upon prior archival knowledge of record types, delineated the possible known elements that a
record may contain. However, where diplomatic typologies and analysis have in the past been
developed retrospectively based upon what was known about existing records, one goal of
InterPARES was to develop a predictive model that would assist archivists in identifying future
record types and the necessary requirements for maintaining their authenticity over time.
In the first year of the project, InterPARES researchers determined that they could develop a
richer picture of the complex nature of electronic records if they triangulated the theoretical,
deductive diplomatics-based approach with an inductive, empirical approach that was based on
an examination of actual electronic records and electronic record-keeping systems. This
examination was conducted by means of purposively selected, interpretive case studies of
electronic systems that contained, or were deemed likely to contain, electronic records. These
case studies were directed towards understanding electronic records within their various contexts
as well as the relationships of those contexts to each other.
The addition of this “bottom-up” approach extended InterPARES research activities considerably
beyond those originally envisaged. It provided a rich dataset that informed the theoretical
development by indicating the increasing role of procedural and technological context in ensuring
and maintaining the authenticity of records. At the same time, the application of the Template of
Analysis to existing records and record-keeping systems gave an indication of which necessary
extrinsic and intrinsic elements of form were not present in systems as they were currently
designed and operating, thus demonstrating potential weaknesses or deficiencies in the records
or record-keeping systems examined.
19
Maria Guercio, “Principi, metodi e strumenti per la formazione, conservazione e utilizzo dei documenti
archivistici in ambiente digitale,” Archivi per la storia XII, 1–2 (1999): 26.
20
Ken Thibodeau, “Certifying Authenticity of Electronic Records: Interim Report of the Chair of the
Preservation Task Force to the InterPARES International Team,” unpublished report, 19 April 2000, 1.
7
Use and selection of case studies
The task force researchers adopted a grounded theory approach; four successive rounds of case
studies of electronic systems that contained or potentially contained records were examined in
order to identify and describe phenomena associated with the records and their contexts.
Grounded theory is a method for discovering concepts and hypotheses and developing theory
directly from data under observation.21 Cases are selected for study “according to their potential
for helping to expand on or refine the concepts or theory that have already been developed. Data
collection and analysis proceed together.”22
Because of the grounded theory approach, researchers employed theoretical rather than
statistical sampling in the selection of case studies. Glaser and Strauss describe the process of
theoretical sampling as “a process of data collection for generating theory whereby the analyst
jointly collects, codes, and analyzes his data and decides what data to collect next and where to
find them, in order to develop his theory as it emerges.”23 In other words, task force researchers
purposively identified the cases that seemed most likely to explain phenomena that the research
was seeking to understand (e.g., what happens to active or inactive electronic records when they
are subject to migration?). No attempt was made to draw a representative or statistically
significant sample.
In the first two rounds of case studies, the focus was on electronic systems, although a
considerable amount of contextual data was collected to elucidate the broader record-keeping
environment. Following the International Team and Authenticity Task Force’s evaluation of these
case studies and analysis of case study data, the criteria for selection were adjusted to support
continued theory building.
The data gathered through these case studies were then used to test and extend the Template
for Analysis. The translation of the case study data into a form that could be analyzed
diplomatically by the Template was achieved by coding the data for interrelated themes and
concepts using a Template Element Data Gathering Instrument (TEDGI).24 The data collected
through the case studies were also made available to the Appraisal and Preservation Task
Forces to assist them with modelling preservation processes and then with walking through their
models.
First- and second-round case studies had to meet at least three of the following criteria:
1. Systems that contain, generate, or have the potential or possibility of generating
records.25
2. Systems that have gone through one or more migrations.
3. Systems where migration(s) was (were) from one electronic system to another.
4. Systems for which several aspects of technological context (storage media, system
software, application software, data format, schema) were changed in the course of each
migration.
21
Barney G. Glaser and Anselm L. Strauss, The Discovery of Grounded Theory: Strategies for Qualitative
Research (Chicago: Aldine Atherton, 1967), 6–7, 46.
22
Steven J. Taylor and Robert Bogden, Introduction to Qualitative Research Methods: The Search for
Meanings, 2nd ed. (New York: Wiley, 1984), 126.
23
Glaser and Strauss, Grounded Theory, 45.
24
The TEDGI is available on the project Web site, at <http://www.interpares.org/reports.htm>.
25
As explained earlier, a record possesses a number of identifiable characteristics. These include a fixed
documentary form, a stable content, an archival bond with other records either inside or outside the system,
and an identifiable context. It participates in or supports an action, either procedurally or as part of the
decision-making process, and at least three persons (author, writer, and addressee) are involved in its
creation.
8
5. Systems for which the pre-migration and the post-migration versions were available and
functional.
6. Systems for which detailed documentation (design, implementation, migration, metadata)
exists.
7. Systems with a diversity of information configurations (e.g., contain both text and
images).
An effort was also made to ensure diversity in content and type of records (i.e., case studies
representing a variety of systems) among the candidate systems proposed by the same archival
institution. Between institutions, an effort was made to identify and conduct case studies on
record-keeping systems performing similar functions (e.g., student registration systems in
different universities). The researchers believed that these two factors might enable them to see
emergent patterns relating to the nature of organizational record-keeping and specific record-
keeping functions.
A key issue encountered by the researchers, and indeed by any archivist or records managers
working with electronic records, is the difficulty in identifying actual electronic records and their
parameters. This issue stems from the nature of digital information systems, which are frequently
multipurpose, highly networked database systems capable of containing a diversity of information
elements that can be compiled and presented in a variety of ways (e.g., through hard-coded
report formats, style sheets, and virtual “on-the-fly” views) and that can invoke a range of
functionalities, according to the needs of different users. A single system may contain only raw
data or information, one or more than one type of record, or a combination of record types and
data or information. The diplomatic analysis of first- and second-round case studies indicated that
few of the systems contained records within close range of the ideal promulgated in the Template
(some systems proved to be information systems not containing records at all; some contained
records that were able to achieve their purpose but were not intrinsically very good records). In
line with the grounded theory approach, based upon what they had learned from the first two
rounds of case studies, the researchers modified the case study selection criteria for the third and
fourth round of case studies to define more precisely the types of cases in which they were now
interested. Through this redefinition, researchers incorporated the following indicators of systems
that are known to create records or have the potential to create records:
• if the action in which the system participates is juridically required;
• if there is a business procedure in place to carry out that action;
• if the system operates within the management or strategic decision-making levels of the
organization.
For case study rounds two to four, the researchers decided to examine only live systems (i.e.,
systems still being actively used by the creator to carry out business activities), since the case
studies of inactive electronic records indicated that too much contextual information had already
disappeared for the task force to be able to analyze the records and record-keeping systems
successfully. The researchers also eliminated criteria that related to systems and records that
had undergone migration, since these had not proven to yield significant additional insights for
either the Authenticity Task Force or the Preservation and Appraisal Task Forces. Additional
desirable criteria identified for rounds three and four case studies were:
1. Systems that come from different hierarchical levels within an organization; and optimally,
systems supporting management and strategic level activities.
2. Systems that contain supporting and narrative records.
3. Systems from the private sector.
4. Financial management systems.
5. Multimedia systems.
6. Computer-aided design (CAD) systems.
26
As required by the different researchers’ individual institutions, the entire protocol for the case studies and
all subsequent revisions to the protocol were submitted for review and approved by the institutional review
boards/offices for the protection of human subjects. The CSIP and TEDGI are available on the InterPARES
Web site at <http://www.interpares.org/reports.htm>.
10
and videotapes of interviews, supporting procedural and technological documentation, and case
study overviews. Not all data types exist for each case however, due to variations in how data
were collected (e.g., interviewees could decline to be audio taped), or to lack of availability of
specific supporting technological or procedural documentation or translations of that
documentation into English. It is also important to note that in the majority of cases, although the
case study focused on the electronic system, the actual record-keeping system comprised both
paper and electronic components.
27
The account of the process of diplomatic analysis is based on a summary prepared by Ian McAndrew,
with contributions from April Miller and Anna Gibson.
28
See fn. 10.
11
part of interviewers in the translation of data from the CSIP into the TEDGI, it was decided that
only the CSIPs and not the TEDGIs completed by the case study researchers would be used in
the diplomatic analysis in the first phase.
To complete the diplomatic analysis, the research assistants were assigned the following
questions:
• How many records are in the system?
• What is the function of these records (i.e., dispositive, probative, supporting, narrative)?29
• What is/are the action(s) associated with the system?
• What types of documentary forms are included?
• What is the status of transmission of each documentary form (i.e., original, draft, copy)?30
Considering these questions was essentially a process of examination that led to four more
questions:
• Does the system contain records?
• Should the system contain records?
• Is the system itself a record?
• With the nature and function of the system in mind, is there a presumption of
authenticity? If yes, what is the basis for this presumption?
Answering both sets of questions proved considerably more challenging than had been
anticipated. The fundamental problem the research assistants faced was that of identifying an
electronic record in diplomatic terms. Although the research assistants had experience with the
process of diplomatic analysis, they had only ever dealt with traditional paper records. To analyze
the case studies in diplomatic terms, it was necessary first to penetrate the complexity of the
electronic system and the surrounding record-keeping environment in order to establish whether
records even resided within that system and, if so, to understand the specific ways in which they
manifested themselves. To reach that understanding required a detailed knowledge of the
electronic system and the record-keeping environment that was difficult to achieve. The difficulty
stemmed in part from the fact that the knowledge had to be gleaned not on the basis of an
examination of the system itself and the entities within it—which is the traditional diplomatic
approach—but rather on the basis of the information found in the case study tools and related
documentation.
Documentation from all sources was valuable in supporting the analysis of a given case study.
The CSIP and its supporting documentation, however, did not provide enough information to
enable the research assistants to gain a good understanding of the relationship between the
electronic system and the business processes associated with it, and the relationship between
the business processes and the types of records generated from them. Moreover, the supporting
documentation was included only at the discretion of individual case study interviewers, who
encountered issues not unfamiliar to institutional archivists responsible for appraising electronic
records—up-to-date technological or procedural documentation may not exist, organizations or
their units may be reluctant to provide copies of systems documentation for security or other
reasons, and existing documentation may be intellectually inaccessible to the archivist for
technical or language reasons. For some case studies, therefore, there was considerable
supporting documentation; for others there was little or none. More supporting documentation did
not always imply more and better information about the systems, however: some supporting
documentation was difficult to understand and, in some cases, it was not clear why it was
included at all. To fill in the gaps in their knowledge, the research assistants solicited the
assistance of the interviewers who conducted the case studies. In some cases the interviewers
were able to answer the questions put to them; in others, however, they were either unable to
obtain the needed information, or unable to obtain it within the necessary time frame.
29
For definitions of these terms, see "Development of a Typology of Electronic Records" later in this section.
30
For definitions of these terms, see fn. 42.
12
As the analysis proceeded, it became increasingly clear that most of the systems under
examination did not contain records, or at least, did not contain “good” records, when measured
against the criteria established by contemporary archival diplomatics. In most cases this was
because the entities identified within the electronic system did not appear to possess either a
fixed documentary form or a stable content. To probe this situation further, UBC researchers
decided to draft “scenarios” for certain cases. For those case study systems that had been found
on first analysis to contain records, research assistants were instructed to answer the questions
already devised. Reports for a number of the other case studies were drafted on the basis of two
different scenarios: the first positing that “the system does not contain records, but if it did they
could be analyzed diplomatically as follows . . . ”; and the second positing that “the system does
not contain records, but it should; it could be reconfigured such that it would contain records, as
follows, and if this were done, the records could be analyzed diplomatically as follows . . .”
Given that the case studies so far had yielded very little information useful for the formulation of
the requirements for assessing authenticity, the researchers also decided to incorporate into the
analysis the procedural rules for creating and maintaining reliable and authentic electronic
records that had been developed by the UBC Project. The procedural rules for creating and
maintaining authentic records as laid out in the UBC Project were compared with data from each
case study concerning the methods used by the creator to support its presumption of the
authenticity of the records in the system under examination.31 On the basis of this comparison,
the research assistants described the means currently in place that, from the creator’s
perspective, supported a presumption of record authenticity; they also identified additional
methods for supporting and strengthening such presumption, based on the procedural rules.
The development of hypothetical case studies and the comparative analysis of real-world data
using the UBC procedural rules enabled the team to draft a preliminary set of conceptual
requirements for presentation at the International Team workshop in October 2000. It was
understood, however, that this was only a temporary solution and that the team would have to
adjust the case study process to achieve better results from the diplomatic analysis in subsequent
rounds. Accordingly, two changes were made to the process of conducting case studies.
The first change concerned the kinds of systems that would be targeted in subsequent rounds.
Given that the majority of systems that the Authenticity Task Force had examined thus far had not
contained records when viewed from the perspective of contemporary diplomatics, task force
researchers were faced with two choices. On the one hand, they could revise the eligibility criteria
for treating the entities within electronic systems or the electronic systems themselves as records
to accommodate the various dynamic realities they were seeing; on the other, they could
circumscribe the range of case studies to accommodate only systems that contained entities
fitting the diplomatic construct of a record. The researchers opted for the latter route on the
grounds that one of the reasons for choosing diplomatics as a means of analyzing electronic
records was to evaluate its effectiveness. The researchers needed to examine a range of
systems that fitted the construct in general terms before they could evaluate its effectiveness in
more specific terms. Accordingly, the case study selection criteria were adjusted to ensure that
only electronic systems containing, or having the potential to contain, records were selected in
subsequent rounds.32
The second change concerned the designation of responsibility for preparing the TEDGIs. It was
decided that the UBC research assistants would prepare the TEDGIs because their knowledge of
diplomatics made them the best equipped for mapping the answers to questions on the CSIP to
the relevant archival-diplomatic element of the TEDGI. Once the research assistants had
completed the TEDGIs, they were required to send them back to the case study interviewers for
verification of the accuracy of the mapping before finalization. The TEDGIs subsequently became
the basis for the preparation of draft versions of the diplomatic analyses of case studies, which
31
The procedural rules may be found on the Web site of the UBC Project at
<http://www.slais.ubc.ca/people/faculty/duranti/duranti.htm >.
32
See above, fn. 25.
13
were also returned to the case study interviewers for approval prior to being finalized. It was
decided also that the experiment of developing hypothetical scenarios would not be repeated in
the next rounds. While the exercise had helped the research assistants to understand how
authenticity requirements might manifest themselves in a given situation, the International Team
found them to be confusing and overly prescriptive.
Apart from these changes, the process of diplomatic analysis in the second and third phases
(rounds three and four) was similar to the process in the first phase (rounds one and two). The
main difference was that case studies from rounds three and four contained more systems with
records.
Twenty-two case studies were analyzed from an archival diplomatic perspective. Of these, twelve
systems were found to contain records. In the systems containing records, many of the elements
associated with uniquely identifying a record and placing it in its immediate context were either
implicit or absent. For example, in most of the systems there was no explicit manifestation of the
archival bond between and among the records participating in the same action. Moreover, while it
was reasonably straightforward to identify the business processes supported by the electronic
system in general terms, it was not always easy to determine how the records participated in or
supported specific actions.
Authenticity Task Force researchers had hypothesized at the outset of the research that intrinsic
and extrinsic elements of documentary form and annotations would play key roles in establishing
the identity and demonstrating the integrity of electronic records. This hypothesis failed to be
supported, however, by either the diplomatic analysis or the analysis of elements relating to the
identity and integrity of records described later in this document. In the case studies analyzed, it
was often difficult to determine the significance of the presence or absence of annotations or
specific elements of documentary form. The determination of documentary forms in general and
the establishment of required elements of form in particular appeared to be deeply embedded
within specific institutional and procedural contexts and were resistant to any easy
generalizations. As a result, the researchers were unable to draw any general conclusions about
the relevance of specific intrinsic and extrinsic elements of documentary form or annotations to a
consideration of an electronic record’s authenticity outside of the specific institutional and
procedural context in which the record was created (this is discussed further in this section).
At the same time, however, it was possible to identify certain commonalities in the means used by
creators to protect record authenticity from one institution to the next. The diplomatic analysis and
the analysis of elements relating to identity and integrity revealed that record creators tend to rely
on procedural means for protecting authenticity and to treat it as part of the management of the
electronic system as a whole rather than as part of the management of individual records within
the system. The commonest means identified were access privileges (including passwords, user
IDs, and user profiles), followed by the use of audit trails and back-up procedures.
33
Seamus Ross, “Dress-Pins from Anglo-Saxon England: Their Production and Typo-Chronological
Development” (D.Phil. diss., University of Oxford, 1992), 68.
14
objects/entities proposed as members of the group have the required attributes.
In this approach the set becomes equivalent with the type. In the second
approach the investigator starts with the objects and proceeds to describe the
component elements. The elements are then grouped into attributes and the
attributes subsequently grouped into restricted sets. These are shared
component types that carry meaning.34
The criterion for developing the typology of electronic records was the significance of specific
extrinsic and intrinsic elements of documentary form and annotations for carrying out or attesting
to the action or matter in which a record participated. Between October 2000 and April 2001, the
task force explored numerous candidate types based on a range of criteria. A top-down approach
was adopted for the identification of these types, mainly because there were insufficient data from
the case studies to support a bottom-up approach.
The initial basic typology reflected the four categories of records identified by contemporary
archival diplomatics, based on the relationship between a record and the action in which it
participates. This categorization was chosen on the grounds that groups of records sharing the
same function with respect to an action or matter form a bounded set. The categories are
dispositive records (records whose written form is required by the juridical system as the essence
and substance of an action), probative records (records whose written form is required by the
juridical system as proof that an action has taken place prior to its documentation), supporting
records (records whose written form is discretionary; they are created to provide support for, and
are procedurally linked to, an action), and narrative records (records whose written form is also
discretionary; they do not participate procedurally in the action but are created as part of the
process of setting oneself to work). The task force extended these categories so that they
referred to the smallest indivisible aggregation of records (e.g., the file unit) in each system rather
than to individual records. This definitional extension of the record categories implied an
extension of the authenticity requirements because the requirements for a given category of
record aggregation (dispositive, probative, supporting, narrative) would apply to all the records
within the aggregation, regardless of the different types of individual records contained within it.
The task force hypothesized that for dispositive and probative aggregations of records—that is,
records whose written form is required—the elements of extrinsic and intrinsic form as well as
annotations would be prescribed by the juridical system and therefore would have to be
preserved in their entirety. For supporting and narrative aggregations of records—that is, records
whose written form is not required—it was assumed that there would not be the same necessity
to preserve all the elements and annotations. This hypothesis was not, however, supported by
the case studies which suggested that: (1) the requirement of a written form does not necessarily
translate into specific required elements of documentary form or annotations; and (2) the fact that
a written form is not required does not necessarily translate into an absence or reduction of
specific required elements of documentary form or annotations since there are cases of
supporting and narrative records whose written form is highly regulated.
Next, the task force explored the possibility of a typology of electronic records based on the
diplomatic categorization of procedures. These include: constitutive procedures (procedures that
create, extinguish, or modify the exercise of power and that may be further subdivided into
procedures of concession, of limitation, or of authorization); executive procedures (procedures
that allow for the regular transaction of affairs according to rules established by an external
authority); instrumental procedures (procedures connected to the expression of opinions and
advice); and organizational procedures (procedures whose purpose is to establish organizational
structure and internal procedures and to maintain, modify, or extinguish them). Because the
categories of procedure imply different levels of documentary control, with constitutive procedures
being the most controlled and instrumental procedures the least controlled, the task force
hypothesized that records created in accordance with the more controlled procedures would have
more required elements of documentary form and annotations than would those created in
34
Ross, 86.
15
accordance with less controlled procedures. This categorization was ultimately rejected, however,
on the grounds that (1) records do not necessarily aggregate in accordance with these
procedures; and (2) it is not possible to generalize, simply on the basis of the procedure, about
the significance of elements of documentary form and annotations.
The task force experimented with a number of other candidate types, based on a range of criteria,
such as whether the system contained records or was itself a record; whether the system
contained one type of records, or many types; whether the records were digital or digitized, and
so on. None of these types, however, resulted in a categorization of records on the basis of which
specific requirements for authenticity could be formulated.
By April 2001, the task force had not yet succeeded in developing a typology that provided a
meaningful differentiation and specification of requirements for authenticity according to types of
records.35 Despite our efforts, we were simply unable to establish a correlation between
authenticity and the presence of specific documentary elements or annotations. Since the
deadline for submitting the final version of the requirements for authenticity was June 2001, the
task force decided to suspend its efforts to develop a typology and to focus instead on refining the
general conceptual requirements for assessing the authenticity of electronic records.
35
Researchers working on the D(igital) A(rchivering in V(laamse) I(nstellingen en) D(iensten) Project in
Brussels reached a similar conclusion. The original aim of the DAVID Project “was to work out a typology
from which a method for preserving the various types of digital archive documents over the long term would
follow.” According to the researchers, “[t]his typology would stand or fall on its usefulness in formulating a
preservation strategy, and was pursued with this goal in mind. The first attempt rested on the editorial form
and function of the digitally preserved document, a method of description and classification borrowed from
paper archiving. It was soon obvious, however, that this was no basis for managing digital archives and no
basis for formulating a preservation strategy.” See Filip Boudrez, “The Digital Recordkeeping System:
Inventory, Information Layers, and Decision-Making Model as Point of Departure” (Antwerp, June 2001), 4,
at <http://www.antwerpen.be/david>.
16
2. the elements that are most commonly absent, or cannot be discerned across case
studies;
3. the business functions being supported by the electronic systems studied;
4. the activities and transactions performed by the electronic systems in support of the
business functions;
5. at which level within the organization the electronic systems exist;
6. the relationships between paper and electronic components of record-keeping systems.
A narrative analysis of selected transcribed interviews was also undertaken to identify:
1. the ways that records creators, custodians, and systems personnel conceptualize the
nature and role of the electronic records and/or record-keeping system being studied;
2. the variances in language used to describe records by records creators, custodians, and
systems personnel;
3. the extent to which the findings of 1) and 2) should or could be factored into the design of
a method to identify and ensure the preservation of authentic electronic records.
As outlined above, upon commencing the data analysis, researchers first created a brief narrative
description of the case study, referred to as the case study overview, based upon the
documentation submitted for analysis by the interviewers. The draft overview was then returned
to the interviewers for them to review together with the respondents and make any necessary
corrections that might be due to misinterpretation of the case study data.
The researchers then proceeded to undertake the following four analytical activities:
i) Analysis of how and to what degree the identity and integrity of electronic records is supported
within and across case studies. In undertaking the diplomatic analysis of the case studies, the
researchers had begun with an assumption that the diplomatic elements of electronic records
would be the same (or at least the fundamental elements would be similar) as those of traditional
records. However, researchers began to realize that these elements are less explicit in electronic
records, and that more of the record’s identifying elements are found in its context, instead of on
the face of the records, as was the case for traditional records. As a result, the diplomatic
analysis often focused on what was wrong with the systems that were studied when held up
against the ideal record represented by the Template, rather than effectively identifying
alternative, new, or unanticipated ways in which authenticity requirements were being met in
these systems. To help the task force’s efforts to develop a typology of authenticity requirements
for electronic records, therefore, each case study was analyzed in order to determine which—if
any—aspects of the systems examined corresponded to or supported elements establishing the
identity and integrity of electronic records (the key concerns of authenticity) as delineated in the
Template for Analysis. This analysis examined not only specific elements, but a variety of
contexts, sources, and techniques through which elements might be manifested or their purposes
achieved.
The case study data were coded to see whether any patterns were discernible, across all case
studies, or across those that seem likely to contain similar types of records. The resulting analysis
showed that both within individual case studies and across all case studies, authenticity is
assured mainly through procedural means and treated as part of the management of the
electronic system as a whole.
ii) Characteristics of case studies by type of information system. This analysis applied a model
commonly used in business administration to identify types of information systems developed and
used in an organization to support business processes and to fulfil the mission of the
organization.36 The model provided one way to describe the nature of systems found in an
organization, and, thereby, potentially a method to help discern systems that are likely to create
records, and whether those records are likely to be dispositive, probative, supporting, or narrative.
36
Kenneth C. Laudon and Jane P. Laudon, Management Information Systems: New Approaches to
Organization and Technology (New Jersey: Prentice Hall, 1996).
17
In this model, an organization is divided into four levels:
1. Operational-level systems: information systems that monitor the elementary activities and
transactions of the organization.
2. Knowledge-level systems: information systems that support knowledge and data workers
in an organization.
3. Management-level systems: information systems that support the monitoring, controlling,
decision-making, and administrative activities of middle managers.
4. Strategic-level systems: information systems that support the long-range planning
activities of senior management.
Organizational functions are supported by six major types of systems:
1. Transaction processing system (TPS): computerized system that performs and records
the daily routine transactions necessary to conduct the business; these systems serve
the operational level of the organization.
2. Knowledge work system (KWS): information system that aids knowledge workers in the
creation and integration of new knowledge in the organization.
3. Office automation system (OAS): computer system—such as word processing, electronic
mail system, and scheduling system—that is designed to increase the productivity of data
workers in the office.
4. Management information system (MIS): information system at the management level of
an organization that serves the functions of planning, controlling, and decision making by
providing routine summary and exception reports.
5. Decision support system (DSS): information system at the management level of an
organization that combines data and sophisticated analytical models to support semi-
structured decision making.
6. Executive support system (ESS): information system at the strategic level of an
organization designed to address unstructured decision making through advanced
graphics and communications.
Operational level systems such as transaction processing systems help operational managers
keep track of the organization’s everyday activities. Knowledge level systems such as office
automation systems and knowledge work systems help knowledge and data workers design
products, distribute information, and manage paperwork. Management level systems such as
management information systems and decision support systems help middle managers monitor
and control business activities. Strategic level systems such as executive support systems help
senior managers with long-term planning. The model also delineates the information inputs,
processes, and outputs that serve as indicators of the type of system being examined.
This approach closely parallels certain traditional appraisal approaches that have targeted
executive and administrative levels within an organizational hierarchy as being most likely to
generate key records relating to policy, procedural, and organizational decision making37. In the
model used in this analysis, the types of information systems commonly associated with these
levels would be management information systems (MIS), decision support systems (DSS), and
executive support systems (ESS).
This analysis examined the organizational level and the information inputs, processes, and
outputs associated with each case study in an attempt to identify the type and nature of each
system and the likelihood that it generates, or should generate, records. In the analysis, in
recognition of the “mixed” nature of most of the systems studied, the researchers also extended
the model to identify more closely both electronic and paper outputs. Because stable content is
considered to be an identifying characteristic of authentic records, researchers further
categorized the status of system outputs in order to understand the degree to which they were
stable:
37
See, for example, Schellenberg, T. R. Modern Archives: Principles and Techniques (Chicago: Society of
American Archivists, 1998), 142–143.
18
• Fixed: Once output is created, it is immutable. If it needs to be changed, either an update
must be appended or a new version must be created.
• Transient: Output is created for temporary use only (e.g., a screen display providing the
results of an information query).
• Dynamic: Output is stored on the system but can be changed, updated, annotated, and
overwritten.
The analysis indicated the complexity of the systems studied. Almost no system exists
independent of a wider record-keeping system, and most relate to more than one organizational
level and perform a range of functions rather than conforming to one of the discrete types
contained in the business model. Equally, most of the systems studied have paper as well as
electronic components. This “mixed” environment must be taken into account when
understanding the nature of any potential record generated by the system. Many of the systems
studied contained primarily transactional data, and most of them generated primarily transient or
dynamic output.
The majority of the case studies focused on systems that function at the operational and
knowledge levels within the organization, and less frequently at the management level.
Comparing analyses of the same case studies, we see that those systems identified through the
diplomatic analysis as ones that contain or should contain dispositive or probative records for the
most part carry out at least some management as well as operational and knowledge-level
functions. We could speculate, therefore, that systems addressing functions at the management
level and above would be more likely to contain records and less transactional data.
iii) Functional analysis of case studies. As the research progressed, it became increasingly clear
that understanding the nature and boundaries of electronic records required a detailed
understanding of the business functions and activities of the record-keeping systems being
studied. Researchers at UCLA selected the method delineated in the National Archives of
Australia’s DIRKS (Designing and Implementing Recordkeeping Systems) Manual38 as one of the
most robust and replicable extant approaches to functional analysis. The purpose of conducting
the InterPARES analysis was to describe—unambiguously for non-archivists, particularly systems
designers—the nature of the system's record-keeping function. The researchers attempted a
narrative and graphical representation of the major functions of the systems being studied, and a
breakdown of the actions and transactions that support those functions. They then received
feedback from interviewers and respondents upon the draft breakdowns. The researchers
concluded that it was not possible to render an accurate functional decomposition of each case
study because the CSIP, developed from the diplomatic perspective of analyzing individual
documents, had not been designed to capture the appropriate depth of functional detail about the
record-keeping system as a whole.
iv) Narrative analysis of transcribed case study interview data. The researchers were concerned
that their understanding of the nature of electronic records and the concept of authenticity, as well
as the way that understanding was expressed through the terminology used in the CSIP and any
other InterPARES products, would not match that of, or be understandable by, record keepers
and systems personnel. Although the case study interviews were heavily scripted to ensure some
level of consistency, some interviews were recorded and transcribed (where respondents gave
their permission) and of these interviews, some contained additional discussion about the nature
and functionality of the electronic record keeping in which respondents were engaged. Selected
case study transcripts were examined to gain a closer understanding of respondent perspectives
and terminology. A complete narrative analysis was conducted of one case study; it
demonstrated that, even though the process of transcribing and analyzing interview data is
laborious and time-consuming, such an approach would be valuable for future research.39 The
38
National Archives of Australia, Designing and Implementing Recordkeeping Systems: Manual for
Commonwealth Agencies. Available at: <http://www.naa.gov.au/recordkeeping/dirks/dirksman/dirks.html>.
39
The narrative analysis was undertaken by Ciaran Trace. Her report, “Applying Content Analysis to Case
Study Data: A Preliminary Report,” is available at <http://www.interpares.org/reports.htm>.
19
case studies, however, were not originally intended to be subjected to narrative analysis. Had this
been the case, interviews or components of interviews would need to have been conducted in a
more free-form or conversational manner that would have allowed respondents to expand their
commentary and would have avoided providing respondents with InterPARES’ own terminology
and rhetorical tropes.
Research Findings
Preamble
The purpose for developing the Template for Analysis and testing its effectiveness through four
rounds of case studies was to lay the foundation for establishing conceptual requirements for
assessing and maintaining the authenticity of electronic records over the long term. The
requirements are described in detail in Requirements for Assessing and Maintaining the
Authenticity of Electronic Records (Appendix 2) and embody the major conceptual findings of the
Authenticity Task Force.
20
After the authenticity of the creator’s electronic records has been established in the appraisal
process, and the records transferred from the creator to the preserver, the preserver needs to
maintain the authenticity of the records. To do so, the preserver must maintain the electronic
records in accordance with procedures that ensure their continuing authenticity and produce
copies of those records in accordance with procedures that ensure that their authenticity is not
compromised by the reproduction process. To support its attestation of the authenticity of copies
of electronic records, the preserver must also produce and maintain documentation relating to the
manner in which it has maintained the records over time as well as the manner in which it has
reproduced them.
In light of the above, the Authenticity Task Force has developed two sets of requirements. The
first set, termed "benchmark requirements," includes requirements that support the presumption
of the authenticity of the creator’s electronic records before they are transferred to the custody of
the preserver. The second group, "baseline requirements," includes requirements supporting the
production of authentic copies of electronic records that have been transferred to the custody of
the preserver.
40
Margaret Hedstrom, “Building Record-Keeping Systems: Archivists Are Not Alone on the Wild Frontier,”
Archivaria 44 (Fall 1997): 57.
41
Bernard D. Reams Jr., L. J. Kutten, and Allen E. Strehler. Electronic Contracting Law: EDI and Business
Transactions, 1996-97 Edition (New York: Clark, Boardman, Callaghan, 1997), 37.
21
Specific conceptual framework for the benchmark requirements for assessing the authenticity of
the creator’s electronic records
The creator’s records belong to one of two categories. The first comprises those records that
exist as created; they are considered authentic because they are the same as they were in their
first instantiation. The second category comprises those records that have undergone some
change and therefore cannot be said to exist as first created; they are considered authentic
because the creator treats them as such by relying on them for action or reference in the regular
conduct of business. However, the authenticity of electronic records is threatened whenever they
are transmitted across space (i.e., when sent to an addressee or between systems or
applications) or time (i.e., either when they are in storage, or when the hardware or software used
to store, process, or communicate them is updated or replaced). Given that the acts of setting
aside an electronic record for future action or reference and of retrieving it inevitably entail moving
it across significant technological boundaries (from display to storage subsystems and vice
versa), virtually all electronic records belong to the second category. Therefore, the preserver’s
inference of the authenticity of electronic records must be further supported by evidence—
provided in association with the records—that they have been maintained using technologies and
administrative procedures that either guarantee their continuing identity and integrity or at least
minimize risks of change from the time the records were first set aside to the point at which they
are subsequently accessed. The requirements for assessing the authenticity of the creator’s
electronic records concern this evidence.
22
Specific conceptual framework for the baseline requirements supporting the production of
authentic copies of electronic records
After the records have been presumed or verified authentic in the appraisal process, and have
been transferred from the creator to the preserver, their authenticity needs to be maintained. In
order to do this, the preserver must carry forward the records in accordance with the baseline
requirements that apply to the maintenance of records, producing copies according to procedures
that also maintain authenticity. The production of authentic copies is regulated by the Baseline
Requirements Supporting the Production of Authentic Copies of Electronic Records (Requirement
Set B). Unlike the benchmark requirements, all of the requirements included in the baseline
requirements must be met before the preserver can attest to the authenticity of the electronic
copies in its custody (hence the word "baseline").
Satisfaction of these baseline requirements will enable the preserver to certify that copies of
electronic records are authentic. Traditionally, the official preserver of the records has been the
person entrusted with issuing authentic copies of such records. To fulfil that role, the preserver
needed simply to attest that the copy conformed to the record being reproduced. With electronic
records, the difficulties related to preservation make it prudent for the preserver to produce and
maintain documentation relating to the manner in which it has maintained the records over time
as well as the manner in which it has reproduced them to support its attestation of authenticity.
A copy is the result of a reproduction process. A copy can be made from an original or from a
42
copy of either an original or another copy. There are several types of copy. The most reliable
copy is a copy in the form of an original, which is identical to the original although generated
subsequently. An imitative copy is a copy that reproduces both the content and form of the
record, but in such a way that it is always possible to tell the copy from the original. A simple copy
is a copy that only reproduces the content of the original.
Any of these types of copy is authentic if attested to be so by the official preserver. By virtue of
this attestation, the copy is deemed to conform to the record it reproduces until proof to the
contrary is shown. Such attestation is supported by the preserver’s ability to demonstrate that it
has satisfied the applicable baseline requirements for maintenance and all of the requirements for
the production of authentic copies.
Methodological findings
Although the primary purpose of the work of the Authenticity Task Force has been to address
authenticity requirements for electronic records, a significant by-product of its work, and indeed
that of the entire InterPARES Project, has been an enhancement and extension of existing
archival methodological knowledge and expertise. Drawing upon the multidisciplinary expertise of
its researchers, InterPARES applied a diverse range of theoretical and applied approaches,
including diplomatic analysis, modelling, and narrative analysis. This diversity of approaches was
unprecedented in archival research to date, and throughout its work, the Authenticity Task Force
42
In common language, copy and reproduction are synonyms. For the purposes of this research,
the term reproduction is used to refer to the process of generating a copy, while the term copy is
used to refer to the result of such a process, that is, to any entity which resembles and is
generated from the records of the creator. An original record is the first, complete record, which is
capable of achieving its purposes (i.e., it is effective). A record may also take the form of a draft,
which is a temporary compilation made for purposes of correction. For a discussion of the status
of originals, drafts, and copies in an electronic environment see Luciana Duranti and Heather
MacNeil, "The Protection of the Integrity of Electronic Records: An Overview of the UBC-MAS
Research Project." Archivaria 42 (Fall 1996): 56–57. For the definition and interpretation of an
original in the context of international law and electronic commerce, see United Nations
Commission on International Trade Law, UNCITRAL Model Law on Electronic Commerce with
Guide to Enactment (New York: United Nations, 1997), esp. article 8 of the “Model Law” and
para. 62–69 of the “Guide to Enactment.”
23
strived to assess and document what worked in the different methods that it used, what partially
worked, what did not work— and why.
43
The typology of papal chancery documents prepared in the course of the Authenticity Task Force’s work is
an example of special diplomatics. See fn. 14.
24
of the systems examined through the case studies, however, contained heterogeneous
aggregates of records. In fact, the archival extensions of the Template, such as the addition of the
five categories of context (juridical-administrative, provenancial, procedural, technological,
documentary), turned out to be the most relevant to an understanding of the record-keeping
environment, and the grounds on which creators based their presumption of the records’
authenticity. These contexts were, however, the least well developed part of the Template. For
example, in several case studies, audit trails were identified by the creator as a significant means
of ensuring the authenticity of electronic records. Audit trails are part of system administration and
therefore were considered an element within the record’s technological context. The element
“system administration” was not decomposed sufficiently, however, to enable task force
researchers to identify the various kinds of audit trails and the specific purposes they serve in a
given environment. In the absence of that identification, it was difficult to assess the extent to
which an audit trail supported the creator’s presumption of authenticity in particular cases.
To deal more effectively with such systems, therefore, the researchers believe that a
contemporary archival diplomatic analysis should seek to identify and elaborate in a more
comprehensive way the nature of archival aggregates and the elements that uniquely
characterize them.
26
1. Explicitly examine the entire record-keeping system, and not just its electronic
components.
2. Reorient the CSIP to start with an analysis of business processes: proceeding from the
general to the specific and delineating functions, activities, and then transactions. This
will make it easier to identify actions in which records participate, and the nature of that
participation.
3. Adjust terminology in the CSIP to reflect the language of records creators and systems
managers more closely. The Glossary Committee may be able to provide some insight
into how to map between the terminology used by interviewees and the terminology being
used by the InterPARES Project. Additional analysis of the transcribed tape recordings of
the case studies to date should also assist with this aspect.
4. Rewrite the CSIP questions so that they contain the definitions of the terms, rather than
the actual glossary terms used in the Template of Analysis.
5. Eliminate questions that have failed to yield useful data through three or more rounds of
case studies.
6. Interviewers’ comments from the CSIP and TEDGI suggest that a high level of technical
expertise is needed to understand the systems being studied. In a best-case scenario,
interviews should be conducted with both an archivist and an IT or computer professional.
Preamble
In order to place its conclusions in context, the task force has conducted comparative analyses of
the authenticity requirements against three prominent records management standards: the
International Organization for Standardization's (ISO) Draft International Standard on Records
Management; the U.S. Department of Defense’s (DoD) 5015.2 Records Management Standard;
and the European Commission’s (EC) Model Requirements Specification (MoReq). Each of the
“mapping documents” produced in this exercise has been designed to reveal the extent of
similarity between the Authenticity Requirements, on the one hand, and the particular standard
under examination, on the other.44 The ISO and EC mapping documents identify provisions that
can be considered as counterparts to the individual InterPARES benchmark requirements, while
the DoD mapping locates provisions that function parallel to the stipulations contained in both the
benchmark and the baseline requirements.
The mapping documents provide a basis for comparison from both microscopic and bird's-eye
perspectives. With respect to the former, each mapping reproduces or summarizes individual
provisions from the ISO, DoD, or EC standard alongside the particular authenticity requirement to
which they relate. Thereby, the mapping documents allow for assessment of how InterPARES
requirements are expressed differently from, and similarly to, pertinent provisions of the existing
standards. At the same time, the documents can be used to make more general comparisons in
that they reveal an overall portrait of the relationship between the InterPARES requirements and
the three existing standards in question. For instance, the mapping documents demonstrate how
many of the InterPARES requirements have counterparts in, respectively, the ISO, DoD, and EC
standards.
A brief summary of the findings of each mapping exercise is presented below. Please note that
making identifications between provisions of different standards involves recognizing degrees of
similarity, and is rarely a simple yes/no question. This is a result of several factors, such as the
fact that the specific wording used in any given standard tends to be unique, and the fact that an
idea or concept treated in one single provision by, for instance, the authenticity requirements
44
The mapping documents are available at <http://www.interpares.org/reports.htm>.
27
might be scattered among several provisions in the ISO, DoD, or EC standard. Therefore, this
text generally makes statements to the effect of “DoD provision X is a parallel (or counterpart) to
InterPARES requirement Y.” Such statements are understood to mean that a general
resemblance exists between provisions X and Y, not that they correspond directly and completely
with one another. Conversely, by avoiding statements such as “Fulfilment of DoD provision X
satisfies InterPARES requirement Y in all respects,” the text attempts to avoid suggesting that
necessary and complete correspondence is entailed in identification of counterparts and parallels.
45
International Organization for Standardization, Technical Committee ISO/TC 46 Information and
Documentation, Subcommittee 11, Archives/Records Management, International Organization for
Standardization Draft International Standard (ISO/DIS 15489) Information and Documentation—Records
Management (Geneva: International Organization for Standardization, 2000), “1. Scope;” in ISO mapping
document.
46
See ISO mapping document at <http://www.interpares.org/reports.htm>.
28
United States Department of Defense. Standard for Electronic Records Management
Software Applications
The so-called Design Criteria Standard, better known as DoD 5015.2, “sets forth mandatory
baseline functional requirements, and identifies non-mandatory features deemed desirable” for
procurement of records management application (RMA) software by agencies of the United
States government. 5015.2 has been implemented in this context for the purpose of “assur[ing]
efficient and effective records management.” The scope of the standard is restricted to
management of active records, and, as a procurement standard, its contents focus almost
exclusively on required system functionalities.47
These observations suggest some of the ways in which DoD 5015.2 differs from the authenticity
requirements, and, for that matter, from ISO 15489: specifically, the Design Criteria devotes
primary attention to software specifications over procedures and other implementation means,
and to methods over principles. Furthermore, the focus of DoD 5015.2, like the ISO standard but
unlike the InterPARES requirements, is solely on active records. Finally, this standard is distinct
in that it does not overtly address authenticity, the record quality of principal concern to the task
force, anywhere in its terms.
The DoD standard features provisions that can be understood as counterparts to six of the eight
benchmark requirements. The exceptions are Requirement “A.6 Authentication of Records,”
which has no parallel provision in 5015.2, and Requirement A.1 on “Expression of Record
Attributes and Linkage to Record,” which is satisfied in several respects, although not entirely due
to the fact that A.1 mandates capture of certain metadata fields not covered in the DoD standard.
As for the InterPARES baseline requirements, counterpart provisions have been identified for
“B.1 Controls over Records Transfer, Maintenance, and Reproduction,” and “B.2 Documentation
of Reproduction Process and its Effects.” No parallel stipulation was located for “B.3 Archival
Description.”48
47
United States Department of Defense, Assistant Secretary of Defense for Command, Control,
Communications, and Intelligence Design Criteria, Standard for Electronic Records Management Software
Applications (DoD 5015.2-STD) June 2001, “C1.1. Purpose.” The characterization of the purpose of 5015.2
presented here is based on 44 U.S.C. § 2902, the passage of the United States Code cited in the “C.1.1.
Purpose” section of the standard. In full, this law reads as follows:
It is the purpose of this chapter, and chapters 21, 31, and 33 of this title, to require the
establishment of standards and procedures to assure efficient and effective records
management. Such records management standards and procedures shall seek to
implement the following goals: (1) Accurate and complete documentation of the policies
and transactions of the Federal Government; (2) Control of the quantity and quality of
records produced by the Federal Government; (3) Establishment and maintenance of
mechanisms of control with respect to records creation in order to prevent the creation of
unnecessary records and with respect to the effective and economical operations of an
agency; (4) Simplification of the activities, systems, and processes of records creation and
of records maintenance and use; (5) Judicious preservation and disposal of records; (6)
Direction of continuing attention on records from their initial creation to their final
disposition, with particular emphasis on the prevention of unnecessary Federal paperwork;
(7) Establishment and maintenance of such other systems or techniques as the
Administrator or the Archivist considers necessary to carry out the purposes of this
chapter, and chapters 21, 31, and 33 of this title.
48
See U.S. DoD mapping document at <http://www.interpares.org/reports.htm>.
29
“pragmatic” and “usable,” and its purpose is to ensure that an ERMS will “manage electronic
records with the desired levels of confidence and integrity.”49
Like DoD 5015.2, MoReq is a software specification, and accordingly it differs from the
InterPARES requirements in that it explicitly focuses on system functionality over procedures, and
on implementation methods over records management principles. The European Commission
standard also shares a point in common with ISO 15489 in that it addresses authenticity of
records directly. However, MoReq defines “authenticity” in a manner that may or may not match
the InterPARES definition. Note as well that MoReq features a greater extent of variability than
any of the other standards considered here, including the InterPARES requirements. Having been
designed to acknowledge that “different countries have their differing traditions, views and
regulatory demands for managing records,” the EC standard presumes that, prior to use, it will be
tailored to the business needs and the legal-regulatory requirements bearing upon an
organization.50
MoReq counterparts have been located for seven of the eight InterPARES benchmark
requirements. In the remaining case, several provisions from the EC standard are listed as
parallel to Requirement A.1 on “Expression of Record Attributes and Linkage to Record.”
However, there are metadata fields mandated for capture in InterPARES Requirement A.1 that
are not specified in MoReq.51
49
Requirements for the Management of Electronic Records (MoReq Specification), prepared by Cornwell
Affiliates plc. (CECA-CEE-CEEA: Bruxelles-Luxembourg, 2001), “1.2 Purpose and Scope of this
Specification,” “1.5 Emphasis and Limitations of this Specification.”
50
See “1.5 Emphasis and Limitations of this Specification,” “4.5 Authenticity,” and “13.1 Glossary.” The
Glossary defines “authenticity” as “the quality of being genuine,” but the quality of genuineness is not itself
defined in the MoReq Glossary, or elsewhere. Note also that MoReq does distinguish between “mandatory”
and “desirable” requirements, but that organizations implementing MoReq may nevertheless modify
mandatory functionalities, and even omit individual requirements, when custom-designing the specification
to suit their business needs.
51
See EC mapping document at <http://www.interpares.org/reports.htm>.
52
University of Michigan and University of Leeds, CAMiLEON: Creative Archiving at Michigan and Leeds.
Emulating the Old on the New, available at <http://www.si.umich.edu/CAMILEON/>.
30
digital preservation requirements. They found that few formal policies are in place for
distributed resources and that as a result the level of trust about the preservation of
content is low. 53
• The San Diego Supercomputer Center’s (SDSC) Collection-Based Persistent Archives
and Archivists’ Workbench projects, which are engaged in deriving XML information
models from collections of software-dependent data objects and developing tools that can
be used to ensure preservation and access to those objects over time. The Persistent
Archives approach is built around the Open Archival Information System (OAIS)
reference model. It supports archival processes from accessioning through preservation
and use, and it recognizes the importance of collection-based management. It also
exploits inherent hierarchical structures within records, predictable record forms, and
dependencies between them. It is designed to be consistent, comprehensive, and
independent of infrastructure.54
• The Cedars Project (CURL exemplars in digital archives), which seeks to address
strategic, methodological, and practical issues and provide guidance in best practices for
digital preservation. Cedars is a United Kingdom collaboration of librarians, archivists,
publishers, authors, and institutions (libraries, records offices, and universities). Working
with digitized and born-digital materials, Cedars is using a two-track approach to evaluate
different preservation strategies through demonstration projects at U.K. test sites;
develop recommendations and guidelines; and develop practical, robust, and scaleable
models for establishing distributed digital archives. Cedars is also examining other issues
related to the management of digital information, including rights management and
metadata.55
Only one of these research initiatives, the Persistent Archives research at SDSC, focuses
specifically on the preservation of electronic records. However, the task force believes that the
delineation of the nature of electronic records and the conceptual requirements for authenticity
provide a rigorous framework for approaching issues of preserving the integrity of complex digital
objects in general, and electronic records in particular that could be applied in all these research
initiatives.
53
Cornell University, Project PRISM, available at <http://www.library.cornell.edu/preservation/prism.html>.
54
Arcot Rajasekar et al, “Collection-Based Persistent Digital Archives [Parts 1 and 2],” Dlib Magazine 6
(March/April 2000), available at <http://www.dlib.org/dlib/march00/moore/03moore-pt1.html>;
<http://www.dlib.org/dlib/april00/moore/04moore-pt2.html>.
55
Cedars Project, Metadata for Digital Preservation: The Cedars Project Outline Specification Draft for
Public Consultation (2000), available at <http://www.leeds.ac.uk/cedars/documents/Metadata/cedars.html>.
31
Conclusion
Electronic records are very complex physical objects and intellectual constructs. Both the
deductive and the inductive approaches employed by the Authenticity Task Force have
constructed a detailed profile of the complexity of contemporary electronic records and identified
the ways that they are embedded in their juridical-administrative, provenancial, procedural,
documentary, and technological contexts.
In terms of what the Authenticity Task Force learned relating to issues of authenticity, we found
that most contemporary records systems are a hybrid of electronic and paper records; that few
explicit measures are employed to ensure the authenticity of electronic records; and that
authenticity is generally assured through procedural means.
Although the task force developed a conceptual framework for establishing the requirements for
preserving authentic electronic records, it failed to create a single, comprehensive typology of
authenticity requirements for electronic records. It identified several possible perspectives from
which a typology could be constructed, but none of these can be developed in such a way that it
can be thorough, deep, and predictive. It seems likely that a typology based upon individual
creators and the acts, procedures, and functions they perform would be the single most effective
approach. Potentially such typologies could be generalized to other similar settings, but this
generalizability would be limited because each creator interprets his or her own juridical context
differently and implements it differently procedurally. The task force, however, has not at this
point collected the necessary data to support such an hypothesis.
In terms of methodological outcomes, the task force found that because of the complexity of
electronic records and record keeping, it is both difficult and problematic for those researching or
managing electronic records to identify a single, appropriate unit of analysis. Diplomatics
approaches the issue from the perspective of the individual record; archival science, from that of
the record aggregate; and systems analysis, from that of the automated information or record-
keeping system. Each of these perspectives contributes to both understanding the nature of the
record and its long-term preservation. What is also required, however, is an overall systems
approach that takes into account the total record-keeping environment, that is, the sum of all of
the contexts identified through InterPARES.
32
3. Is it possible to develop meaningful typologies of records of specific creators or specific acts,
procedures, and functions?
Technological development
1. Digital signature technologies have been implemented for the authentication of records across
space, but what are the implications of their use for the management of authentic electronic
records over the long term? Will their implementation impede the long-term management of
authentic electronic records? Can the use of digital signatures be adapted and extended to
support the long-term preservation of authentic electronic records. What specific adaptations and
extensions would be necessary?
2. A related question concerns the infrastructure supporting digital signature technologies. The
authority of a digital signature depends on the existence of a public key infrastructure (PKI), which
is a hierarchical organization of certification authorities invested with the competence to
authenticate the ownership and characteristics of a public key. The effectiveness of such
infrastructure depends on the continuity of the chain of trust guaranteed by those certification
authorities. As private sector organizations take on the role of certification authorities, what
mechanisms are, or should be, in place to guarantee the continuity of the chain of trust in the
event that an organization ceases to exist?
3. What specific technologies might support the implementation of the benchmark and baseline
requirements in specific record-keeping and record-preservation environments?
Record-keeping policy
1. What are the juridical implications of developing a record-keeping system in which some
requirements for authenticity are satisfied in an implicit rather than an explicit manner—for
example, in a trusted record-keeping system where the integrity of the system as a whole,
including the procedures used to maintain the system, creates a presumption of the authenticity
of its component parts? Would such a record-keeping system have equal validity in common law
and civil law jurisdictions?
2. To what extent can the models and principles developed by this project for administrative and
bureaucratic records be applied to other kinds of digital objects such as records generated for
cultural and creative purposes?
33