The site or place the data is located, which invokes the Security process for applying the required protections.
Catalog the data, and maintain it with other life cycle activities for which notification is received.
Maintain the data's operational characteristics throughout its deployment.
Migrate data when indicated by policy. The types of migration include from one technology to another, and across
locations and system images.
Archive data.
|