aims workshop case study 2: accessioning evolution
TRANSCRIPT
![Page 1: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/1.jpg)
Accessioning Evolution
Seth ShawDuke University Archives
![Page 2: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/2.jpg)
2007• Note in Aleph record• Complete Separation Sheets• Copy Data to Server• Create DOS directory listing• Annotate directory listing
![Page 3: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/3.jpg)
![Page 4: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/4.jpg)
![Page 5: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/5.jpg)
![Page 6: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/6.jpg)
2008• Note in Aleph record• Complete Separation Sheets (if appropriate)
• Run DataAccessioner
![Page 7: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/7.jpg)
![Page 8: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/8.jpg)
![Page 9: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/9.jpg)
2011• Record in Archivist’s Toolkit• Create separation sheets (if appropriate)• Assign Barcode (double barcodes for separation sheets)
• Photograph media• Acquire local copy (disk image or “authentic” copy)
• Scan content for SEI* & Viruses• Move content to Dark Storage• Securely erase local copy
* Sensitive Electronic Information
![Page 10: AIMS Workshop Case Study 2: Accessioning Evolution](https://reader035.vdocuments.us/reader035/viewer/2022062513/5562ade1d8b42a6e4f8b52cf/html5/thumbnails/10.jpg)