Browse Definitions :
Definition

CyberCemetery

CyberCemetery is an online archive of websites, videos and documents that serves as an historic record for over 50 defunct United States government agencies and commissions. The need for a permanent archive came to the attention of University of North Texas librarians in the mid 1990s when they realized that websites affiliated with the Clinton administration were disappearing. 

The archive can be browsed by agency name or retirement date or searched by visiting the CyberCemetery site, the USA.gov search engine, Google U.S. Government Search or the National Archives and Records Administration website. CyberCemetery is maintained by the University of North Texas and the U.S. Government Printing Office in partnership with the National Archives and Records Administration. Websites, including internal pages and links, are reproduced in full for public access.

One of the most popular archives in CyberCemetery belongs to the National Commission on Terrorist Attacks Upon the United States (aka the 9/11 Commission). The archive includes the Commission’s complete report on the 9/11 attacks and is available as a free, downloadable PDF. Other noteworthy archives include reports from the Columbia Accident Investigation Board and the National Bioethics Advisory Commission.

See also: Wayback Machine

Learn more about CyberCemetary:

Visitors can browse the CyberCemetery archive.

The University of North Texas Library has more information about CyberCemetary.

Mike Hardy writes about CyberCemetary in "Dead government Web sites haunt the CyberCemetery."

This was last updated in October 2010

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close