The IT Law Wiki
Advertisement

Definitions[]

General[]

Provenance (a French term that means "to come from")

includes information about the data's source and the processing that the data have undergone. To preserve the integrity of information, a digital archive must preserve a record of its origin and chain of custody.
[is] [i]nformation on the origin of a digital object and also on any changes that may have occurred over the course of its life cycle.[1]
issues involve the time, place, and manner of image creation. For instance, a photograph purporting to be an original of Abraham Lincoln recorded on modern film would be suspect.[2]
[t]he chronology of the origin, development, ownership, location, and changes to a system or system component and associated data. It may also include personnel and processes used to interact with or make modifications to the system, component, or associated data.[3]

Metadata[]

Provenance [is] "[m]etadata that describes the history of a dataset."[4]

Overview (General)[]

"In the absence of a witness who can testify to the origin of a questioned image or video, it may be possible for an examiner to authenticate such data by identifying its origin (provenance)."[5]

Overview (Metadata)[]

"Provenance type of metadata guides users to correct data utilization when the data is repurposed from its original collection process in an effort to extract additional value."[6]

"[T]he provenance, or history of the data, is increasingly an essential factor in big data analytics, as more and more data is being repurposed for new types of analytics in completely different disciplines from which the data was created. As the usage of data persists far beyond the control of the data producers, it becomes ever more essential that metadata about the full creation and processing history is made available along with the data. In addition, it is vital to know what analytics may have produced the data, since there are always confidence ranges, error ranges, and precision/recall limits associated with analytic outputs.[7]

References[]

  1. NDSA Glossary.
  2. FBI, Best Practices for Image Authentication, Forensic Science Communications (Apr. 2008) (full-text).
  3. NIST Special Publication 800-53, Rev. 5, at 300.
  4. NIST Big Data Interoperability Framework, Vol. 1, at 12.
  5. Id.
  6. Id.
  7. Id. at 17.

See also[]

Advertisement