Digital Rights Management in the Academy MERLOT International Conference August 3, 2004 This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. The license permits non-commercial use, requires attribution and forbids modification.
MERLOT Conference: DRM in the Academy Purpose Explore the management of digital content rights in a distributed ecosystem Requirements Processes Technologies Services Examples Issues Consider the impact of digital rights management on MERLOT MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Agenda Introduction and Agenda 1:00 – 1:10 Exercise: Non-Digital Scenario 1:10 – 1:40 The Digital Rights Challenge 1:40 – 2:00 Digital Rights Ecosystem Model 2:00 – 2:20 Exercise: Digital Scenario 2:20 – 2:40 Break 2:40 – 2:50 Exercise: Digital Scenario (Cont’d) 2:50 – 3:10 Demonstrator Projects and Tools 3:10 – 3:50 Discussion: MERLOT Implications 3:50 – 4:30 MERLOT Conference: DRM in the Academy August 3, 2004
Non-Digital Scenario
MERLOT Conference: DRM in the Academy SCENARIO: TEXT BOOKS Author writes a book Publisher publishes it Publisher sells book to wholesaler Instructor selects book for course Wholesaler sells to College Bookstore Bookstore sells to Students MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Role Playing Scenario Duration - 40 minutes total Assign Roles – Author, Publisher, Wholesaler, Retailer, Instructor, Student, Book Step through the life cycle – at each step: Market model, rights management expectations, law How are rights are defined, distributed, acquired, enforced and tracked? Identify the technology used to support rights processes MERLOT Conference: DRM in the Academy August 3, 2004
SCENARIO: Rights Perspective © defined when book is published Publisher to Wholesaler to Bookstore to Student: Rights distributed / acquired in exchange for money The physical book Contains and renders content Is a token of exchange Helps enforce rights via copy protection & tracking Rights are Governed by law, agreements & professional ethics (e.g. attribution Supported by trusted B2B & B2C relationships MERLOT Conference: DRM in the Academy August 3, 2004
Digital Rights Management Challenge
What Changes in the Digital World? Separation of content and rendering Digital files contain content Players render content A book does both Replication and distribution Replication is (nearly) perfect Distribution is (nearly) free Books are hard to replicate and require physical distribution MERLOT Conference: DRM in the Academy August 3, 2004
What Changes in the Digital World? Tracking and control How do you uniquely label a digital copy? How many digital copies have been distributed? Books can be physically ‘stacked and tracked’ The nature of distribution Services are unbundled (and less familiar) There are few barriers to participation in digital distribution Who do you trust? MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Therefore … A move from organizational to technological methods of rights management In the ‘perfect’ digital world: Authors define rights and licenses when they create the content Rights are expressed in a standardized form Distribution, repository and rendering technology Recognizes Interprets Enforces Redistributes But … we are at the beginning of the road MERLOT Conference: DRM in the Academy August 3, 2004
Digital Rights Requirements in Academia
MERLOT Conference: DRM in the Academy Protect … or Share? Protection is not the only goal The commercial licensing of inviolable content directly to a consumer is only one model For education and research, digital rights must support sharing and reuse DRM as an enabler, not just a controlling technology Difficulty of accessing rights is a barrier to reuse * *NSDL Content Reusability project – www.reusablelearning.org MERLOT Conference: DRM in the Academy August 3, 2004
Policy vs. Enforcement * Digital Policy Management Identify and describe rights Set business rules Organize rights to enable content distribution Digital Policy Enforcement Ensuring that digital rights are respected Not punitive, based on mutual benefit Two different, but interrelated activities * From a presentation by Chris Barlas of Rightscom at the EdMedia 2004 world conference in Lugano, Switzerland MERLOT Conference: DRM in the Academy August 3, 2004
Tracking and Attribution Goals of academic authors Share IP as widely as possible Receive proper attribution Repositories and providers want to track usage Evaluation of the value of content Determining cost per use Reporting usage for funding and recognition MERLOT Conference: DRM in the Academy August 3, 2004
Persistence and Standards Rights must persist in a distributed network IT can provide control within the organizational firewall … but … Content in academia must freely cross technological and organizational boundaries Rights expressions must ‘persist’ so they are available wherever and whenever content is used. Standards are needed For expressing, transmitting, interpreting and enforcing However, we are not going to enthrall you today with our vast knowledge of the details of evolving standards * Man turns to stone listening to standards presentation MERLOT Conference: DRM in the Academy August 3, 2004 * Permission to use requested from Williams-Exeter Programme at Oxford - www.williams.edu/ dean/oxford/oxford.htm
MERLOT Conference: DRM in the Academy Overarching Issues DRM = Management of Rights by Digital Means Rights Management depends on models of IP Control (individual – organizational – public) Rewards (fame – fortune – fulfillment) Constraints (policy – legal – technological) Content (form – function – properties) Relationships (trust – communication – economic) In the digital world Content has changed Relationships have changed Standards are in their infancy Functionality is clumsy MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Definitions Attribute Assign credit to a creator of an original work when the work is referenced, copied, distributed or performed. Authenticate Establish the identity of an individual. Authorize Establish what an individual is permitted to do. Protect Protect a work from unauthorized use. MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Definitions Copyright Rights granted to an original work under applicable law. License An explicit collection of rights pertaining to a resource. MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Definitions Digital Rights Management The process of defining, tracking and enforcing permissions and conditions through electronic means. Persistent Rights Associating rights and restrictions with a work in a way that persists as the work moves through a network and is used by different applications, platforms and people. MERLOT Conference: DRM in the Academy August 3, 2004
A Digital Rights Ecosystem Model
DIGITAL RIGHTS ECOSYSTEM: A system formed by the interaction of a distributed learning community with Law & Policy Market Mechanisms Rights Expectations Content workflows Content management technology Agents & Actors who distribute, acquire or enforce rights Learning environments Standards Infrastructure Services MERLOT Conference: DRM in the Academy August 3, 2004
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Environment in which DRM takes place MERLOT Conference: DRM in the Academy August 3, 2004
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Actors in the Ecosystem MERLOT Conference: DRM in the Academy August 3, 2004
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish CONTENT MANAGEMENT MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Content Life Cycle Create Author Assemble Offer Publish Catalog Distribute Acquire Find Acquire Rights Acquire Content Use MERLOT Conference: DRM in the Academy August 3, 2004
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Distribute Content Distribute Content External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Content Acquire Content Acquire Content Acquire Content Distribute Content Acquire Content The Flow of Content MERLOT Conference: DRM in the Academy August 3, 2004
Rights Management Processes Define Rights Distribute / Acquire Rights Enforce Rights Track Usage MERLOT Conference: DRM in the Academy August 3, 2004
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage The Flow of Rights MERLOT Conference: DRM in the Academy August 3, 2004
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Rights expression A machine (and human) readable expression of what can be done with content under what conditions. Licenses can be written using rights expressions. A rights expression language is a grammar and vocabulary for expressing rights in a standardized format. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Content Protection Preventing or discouraging the unauthorized use of content. E.g. copy or print protection. Supported by standards such as encryption, digital watermarking, etc. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Authentication and Authorization Authentication is the process of establishing the identity of a user. Authorization is the process of determining what a user is permitted to do. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Content Registry A registry is a storehouse of information about content that provides persistent unique identifiers. Registries may provide means to find content in ways that are more dependable than direct pointers to content. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Rights (License) Registry A place where licenses associated with content may be permanently stored and readily accessed. License registries associate rights to content in a persistent fashion, and allows licenses to be accessed remotely. (Creative Commons is one example.) Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Financial Services Financial systems, human resources systems, and other ‘enterprise systems’ manage access to content based on departmental charge-backs, user fees, manager permissions and other factors. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Usage Tracking and Reporting Services Usage tracking and reporting services are likely to be part of a widely distributed ecosystem, partly to support ‘per use’ financial models. Such services may be linked to content registries. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry
Exercise: Digital Scenario
Checklist for applying the model Environmental factors that affect rights management: Market models; The legal and policy context; Important actors (organizations and people) and roles; Expectations for the management of rights Content lifecycle(s) in the scenario. Where and how should rights be Defined; Acquired and distributed; Enforced Where and how usage should be tracked. What services are required to support rights management processes? What services are provided by existing technology? Identify what functionality gaps need to be filled and what approaches are realistic MERLOT Conference: DRM in the Academy August 3, 2004
SCENARIO: Learning Object Repository* State Resource Center Develops a piece of content themselves (adaptable content) Gets a piece of content from PBS Digital Repository Reviews the content, generates metadata descriptions, catalogs University / School District Library Identifies useful repository resources Incorporates into their catalog / teacher portal Teachers Discover and use content Modify content Deliver to Students via learning management environment * Based on scenarios from U.S. Eisenhower National Clearinghouse (ENC) MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Scenario Analysis Purpose: Explore the requirements for individuals, technology and organizations to support a comprehensive distributed digital rights ecosystem. Examine rights management issues and requirements within the context of the repository scenario. Process: Assign roles – Authors, state resource center, digital repository, school district library, teacher, content Step through the simulation Flow from the creation of the content all the way to its eventual use by a student Identify rights management requirements and processes at each step MERLOT Conference: DRM in the Academy August 3, 2004
Environment / Requirements The repository is a distributor Rights are determined by a range of rights holders, not the repository. Rights management issues include Viewing Modification Distribution Attribution Tracking Catalog records are also intellectual property. Repository wants attribution Repository wants to maintain quality branding MERLOT Conference: DRM in the Academy August 3, 2004
Content Life Cycle and Rights Content authored by a range of sources Repository finds content or has it submitted to them Repository categorizes, evaluates and describes content and creates catalog records Users search repository to find content for a range of uses Rights Defined by authors when content is created Repository defines rights for catalog records themselves Repository may need to access rights through a number of layers in between them and the author Need to interpret, display and distribute rights as part of catalog in a consistent way MERLOT Conference: DRM in the Academy August 3, 2004
Usage Tracking and Services Needed Repository wants to track and report usage of assets back to the source, and to funding agencies Services Required Rights expression for consistent display and interpretation Persistent unique identifiers to avoid redundant entries, and for ongoing maintenance Usage tracking service, including the tracking of the reuse of catalog records by other repositories MERLOT Conference: DRM in the Academy August 3, 2004
Services Provided and Gaps None of those described are yet available Gaps Standards and technology are emerging for: Digital rights expression language Persistent unique identifiers / registries Nothing on the horizon for usage tracking services MERLOT Conference: DRM in the Academy August 3, 2004
Other Digital Scenarios
SCENARIO 1: Commercial “E-Packs” Textbook publisher sells “e-packs” (or “course packs”). E-packs are loaded directly into a Course Management System*. Students access content through the Course Management System. * Same as “Virtual Learning Environment” or “Learning Management System” MERLOT Conference: DRM in the Academy August 3, 2004
Environment / Requirements Remuneration for publisher. Attribution for author. Local copies for students. School required to control access per class or section or per individually purchased license. Publisher expects access to be restricted MERLOT Conference: DRM in the Academy August 3, 2004
Content Life Cycle and Rights A simple linear life cycle Content enters ecosystem from a controlled source (publisher) Distributed via course management system Used by student Rights Defined through law and contract Trusted partners (publisher, bookstore, IT) Enforced by CMS restricting access to registered students Content could require students to have a license code MERLOT Conference: DRM in the Academy August 3, 2004
Usage Tracking and Services Needed At the CMS when content is used, or At bookstore when license and textbook sold Services Required Copy protection / encryption Authentication and authorization Financial services (fees for licenses) Usage tracking and reporting MERLOT Conference: DRM in the Academy August 3, 2004
Services Provided and Gaps CMS or IT env’t provides authentication and authorization Financial and usage tracking available via bookstore Gaps CMS cannot support entry of license code for content Copy protection not in student computing env’t No persistence of rights outside of CMS MERLOT Conference: DRM in the Academy August 3, 2004
SCENARIO 2: Sharing a Test Bank* A professor creates a bank of interactive test questions. The funding comes from a grant with no intellectual property strings attached. * Contributed by Gerd Kortemeyer, Director, Michigan State University Laboratory for Instructional Technology in Education MERLOT Conference: DRM in the Academy August 3, 2004
Environment / Requirements Use is free for educational purposes Commercial use requires permission Source code may be installed with permission and proper safeguards Professor wants attribution and record of all uses Does not want students to access questions and answers outside of a course Instructors want scores reported to Course Management Systems MERLOT Conference: DRM in the Academy August 3, 2004
Content Life Cycle and Rights Distributed Network life cycle Prof creates question bank in personal env’t Distributes via her web site and loads to university library repository Faculty load content to other school’s CMS Some faculty want to make changes Rights Partners not known in advance Access is governed by roles (student and faculty) Modification not allowed without permission Copy / print enforcement needed to prevent students MERLOT Conference: DRM in the Academy August 3, 2004
Usage Tracking and Services Needed Prof wants usage and question results reported Services Required Copy protection / encryption Authentication and role-based authorization (prof’s web site, library repository and all CMS systems) Expression of rights so faculty understand Usage tracking and reporting MERLOT Conference: DRM in the Academy August 3, 2004
Services Provided and Gaps Authentication and authorization part of library repository and CMS environments Shibboleth can support cross-institution Downloads can be tracked Some file formats can be copy protected Gaps Prof’s web site not secure Downloading faculty could grant access to students Depending on format, no copy protection External CMS won’t report usage to prof No standard rights expression language MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy SCENARIO 3 –TEACH Act* A History professor wishes to make a portion of a copyrighted film available to students online. The professor's institution owns a copy of the film on videotape * US Copyright Law Exemption: Technology, Education And Copyright Harmonization ACT MERLOT Conference: DRM in the Academy August 3, 2004
Environment / Requirements Teach Act Requirements College must be accredited. College must obtain a digitized copy if possible. (If not, then may digitize film.) Copyright policy must be in place; faculty and appropriate staff must be educated. Use must be under “instructor supervision.” Copyright notice must be displayed. Access must be restricted to class members and for a reasonable time period. Students must be technologically prevented from redistributing or retaining copies past deadline. MERLOT Conference: DRM in the Academy August 3, 2004
Content Life Cycle and Rights Prof purchases as a consumer Loaded to server Viewed by students enrolled in course Rights Rights defined by PBS at time of production and sale TEACH act grants restricted usage and distribution rights Students acquire rights to view when then enroll in class Enforcement require to prevent student copying, and to stop access when class is over MERLOT Conference: DRM in the Academy August 3, 2004
Usage Tracking and Services Needed CC not required to track usage Prof may want to track for pedagogical purposes Services Required Authentication and authorization Content copy protection / encryption Restrict student access to time enrolled in class MERLOT Conference: DRM in the Academy August 3, 2004
Services Provided and Gaps CMS provides authentication and authorization CMS restricts access to enrolled students while class is on Media servers can prevent copying Gaps Ability to have rights associated directly with content, rather than having to program CMS every time a course is held. MERLOT Conference: DRM in the Academy August 3, 2004
Demonstrator Projects and Tools
MERLOT Conference: DRM in the Academy COLIS See COLIS slides MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Key Points to COLIS Rights are expressed through a rights expression language Rights are enforced at point of delivery Includes repository services & directory services MERLOT Conference: DRM in the Academy August 3, 2004
CELEBRATE CELEBRATE slides CELEBRATE demonstration site http://demoportal.eun.org/ For information on CELEBRATE http://www.eun.org/eun.org2/eun/en/index_celebrate.cfm MERLOT Conference: DRM in the Academy August 3, 2004
Key Points to CELEBRATE Rights embedded in metadata via a rights expression language A Brokerage provides federated search & rights management services Brokerage mediates and records agreements among highly trusted clients Users are not identified; they are hidden behind LMS / CMS that communicate and enforce constraints MERLOT Conference: DRM in the Academy August 3, 2004
What Is Microsoft Rights Management Server (RMS)? * Information protection technology works with RMS-enabled applications to help safeguard digital information from unauthorized use online and offline inside and outside the firewall Includes encryption, certificates and authentication technologies Protection of information through persistent usage policies, which remain with the information—no matter where it goes XrML – eXtensible rights Markup Language * Extracted from– “Microsoft Windows Rights Management Services for Windows Server 2003”, www.microsoft.com, October 2003 MERLOT Conference: DRM in the Academy August 3, 2004
Microsoft RMS and GigaTrust GigaTrust presentation Rights Definition and Enforcement MERLOT Conference: DRM in the Academy August 3, 2004
Key Points about RMS and GigaTrust Rights embedded in rights expression Access to central server required to get access to license Authentication (based on email address in demo) required to get the license Encryption prevents access without license Rights persist regardless of file location MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy From National Science, Math, Engineering and Technology Digital Library Web Site -- Overview of the Core Library Architecture MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Key Points to NSDL No uniform rights model yet Rights management motivated by reusability Moving to Fedora (www.fedora.info) architecture Things that don’t work: Absolute enforcement of constraints Requiring applet download MERLOT Conference: DRM in the Academy August 3, 2004
Discussion - MERLOT Recommendations
Rights & Permissions Guidelines The NSDL Reusable Learning project has developed Guidelines for reusability Structure is modeled after Web Accessibility guidelines The handout contains the guidelines that pertain to rights These may be useful in the subsequent discussion MERLOT Conference: DRM in the Academy August 3, 2004
Rights & Permissions Guidelines Provide a statement of rights and permissions. Grant appropriate rights. Statement of Copyright (P1) - The copyright should be clearly stated, and include contact information for the copyright holder. Terms of Use (P1) - A license or explicit statement of rights and terms of use should be attached to or referenced in the resource. Grant Modification Rights (P2) - Grant rights to modify the digital learning resource, or provide contact information for asking permission. MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Recommendations Write down 2 concrete recommendations for MERLOT or MERLOT contributors with regard to Rights Management and related topics (5 minutes) Post to Flip chart Sharing and discussion MERLOT Conference: DRM in the Academy August 3, 2004
Moving Forward
Conclusions from Examples DRM models emerging for federations Persistence not yet addressed Services / Standards are emerging Persistent Unique Identifiers Rights Expression Languages Federated trusted authorization Standardized licenses Tracking services Content protection MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Challenges There are demonstrators, but … Limited in scope Need solutions now There are standards and technology, but … Not ready Won’t be ready soon Changing the world would be nice, but … Decision makers need answers now Implementers need answers now Users need answers now MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Some Tools of the Trade Rights Expression Languages Standardized expressions of rights (permissions, conditions, offers etc.) XML – machine & human readable (somewhat) Key for persistent DRM Creative Commons Licenses Standardized grants of rights by copyrights holders Easily incorporated, legally correct Persistent Unique Identifiers “Handle” systems Registration authorities Standardized MERLOT Conference: DRM in the Academy August 3, 2004
MERLOT Conference: DRM in the Academy Questions & Answers Contact information: rrobson@eduworks.com gcollier@eduworks.com Slides will be available from http://www.eduworks.com/library MERLOT Conference: DRM in the Academy August 3, 2004