Selection Criteria
The criteria for selection are as follows:
- Recordings selected for the National Recording Registry are those that are culturally, historically or aesthetically important, and/or inform or reflect life in the United States.
- For the purposes of recording selection, "sound recordings" are defined as works that result from the fixation of a series of musical, spoken, or other sounds, but not including the sound component of a moving image work, unless it is available as an autonomous sound recording or is the only extant component of the work.
- Recordings may be a single item or group of related items; published or unpublished; and may contain music, non-music, spoken word, or broadcast sound.
- Recordings will not be considered for inclusion into the National Recording Registry if no copy of the recording exists.
- No recording should be denied inclusion into the National Recording Registry because that recording has already been preserved.
- No recording is eligible for inclusion into the National Recording Registry until ten years after the recording's creation.
Read more about this topic: National Recording Registry
Famous quotes containing the words selection and/or criteria:
“Every writer is necessarily a criticthat is, each sentence is a skeleton accompanied by enormous activity of rejection; and each selection is governed by general principles concerning truth, force, beauty, and so on.... The critic that is in every fabulist is like the icebergnine-tenths of him is under water.”
—Thornton Wilder (18971975)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)