My understanding has always been that if you "Withdraw" an Item, the handle is 
not "reusable", but if you "Delete (Expunge)" an Item, then the handle is 
technically available for use.  Even though we don't use handle.net since all 
of our sites are behind our firewall, our policy has always been to never 
re-use a handle.
Best regards,
Sue

Sue Walker-Thornton
Software Developer|Database Administrator
NASA Langley Research Center
SGT, Inc.|LITES Contract
130 Research Drive
Hampton, VA  23666
Office: (757) 864-2368|Fax: (757) 224-4001|Mobile: (757) 506-9903
Email:  [email protected]
________________________________
From: Tim Donohue [[email protected]]
Sent: Tuesday, August 21, 2012 12:36 PM
To: Berry, Irene (CIV)
Cc: [email protected]
Subject: Re: [Dspace-tech] what happens to handles, once an item is expunged?

Hi Irene,

Once a handle is assigned by DSpace, it is never reused (even if the
item is expunged / deleted).

The only slight exception is that if you are using the AIP Backup &
Restore system, DSpace will allow you to *restore* a deleted/expunged
Item and also restore its old Handle (obviously this is not really
'reusing' the handle as much as just pointing it back at the newly
restored item).

https://wiki.duraspace.org/display/DSDOC18/AIP+Backup+and+Restore

- Tim

On 8/21/2012 11:26 AM, Berry, Irene (CIV) wrote:
> Hello – I have a question for the group --
> We're trying to figure something out about what happens to handles, once
> an item is expunged.  Is that handle then gone forever from the pool of
> available handles, or does the handle server consider that number
> available for reuse?  Could it cause conflicts, if the number is reused?
> Thank you very much,
> Irene Berry
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>
>
>
> _______________________________________________
> DSpace-tech mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/dspace-tech
>

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
DSpace-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspace-tech
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
DSpace-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspace-tech

Reply via email to