Digital Rights Management in the Academy

Slides:



Advertisements
Similar presentations
Requirements for Rights Expressions in E-learning Robby Robson President, Eduworks Corporation Chair, IEEE Learning Technology Standards Committee Copyright.
Advertisements

Digital Rights Management and e-Learning Sarah Currier and Lorna M. Campbell Centre for Educational Technology Interoperability Standards (CETIS) Centre.
Click to Begin Part of the IEEE IPR Tutorial Series.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Copyright management in open access projects Iryna Kuchma Open Access Programme Manager Attribution 3.0 Unported.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
ARKIUG Fall 2006 A Fair Use and a Fair Guide? Mullins Library and E-reserves April White, University of Arkansas Fayetteville.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Understanding Active Directory
Open Educational Resources / production workshop / february 2009 Except where otherwise noted, this work is available under a Creative Commons Attribution.
Intellectual Property in the Digital Age Series “Don’t I Own My Own Work?” Negotiating to Keep Your Copyright Intellectual Property in the Digital Age:
May 18, 2004SCORM/NSDL Technical Meeting SCORM/NSDL Technical Meeting Alexandria, Virginia May 18, 2004 Reusability & Persistence: Talking Points -Robby.
NHPRC ELECTRONIC RECORDS RESEARCH FELLOWSHIP SYMPOSIUM Nov. 19, 2004 Rebecca Schulte University of Kansas Project Title: Testing Boundaries—An Exploration.
1 Understanding Applications of the TEACH Act: Distance Education and the New Copyright Law Institute for Computer Policy and Law Educause & Cornell University.
Understanding Active Directory
Standards and Guidelines for Web Page Publishing December 9, 2009.
Digital Rights Management in the Academy MERLOT International Conference August 3, 2004 This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
Introduction: Databases and Database Users
University of Michigan Enterprise Directory Services Appendix A Conceptual Architecture.
DRM - NSDL Annual Meeting 1 14 Oct, 2003 Intellectual Property Rights and Digital Rights Management Background and Thoughts For the NSDL Robby Robson This.
IT and IM: Promises and Pitfalls Greta Lowe August 15, 2011.
January 2005MERLOT Reusable Learning Design Guidelines OVERVIEW FOR MERLOT Copyright 2005 Reusable Learning This work is licensed under a Attribution-NoDerivs-NonCommercial.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
Copyright Laws Dodge City Public Schools November 2013 Compiled By: 6-12 Academic Coaches and DCHS Librarian Approved By: 6-12 Administrators.
Copyright Law A Guide for Educators. Jolene Hartnett, RDH, BS Seattle Central College © 2015 Certain materials in this program are included under the.
Wayne College Library Copyright in the Classroom Demonstrate an understanding of intellectual property, copyright, and fair use of copyrighted materials.
Managing Access at the University of Oregon : a Case Study of Scholars’ Bank by Carol Hixson Head, Metadata and Digital Library Services
Copyright Laws How to Get Permission? By: Ruth Garza EDTC
Open Science and Research – Services for Research Data Management © 2014 OKM ATT 2014–2017 initiative Licenced under.
Copyright Considerations for the Online Classroom.
Course Pack Production at HKIEd HKIEd Library 20 Jun 2013.
Presented by Dominique’ Harbour COPYRIGHT GUIDELINES FOR VIDEO USE.
Wanted: The Right Content and The Content Rights Putting Knowledge to Work: Building an Institutional Repository for Your Campus California Polytechnic.
Data Grids, Digital Libraries and Persistent Archives: An Integrated Approach to Publishing, Sharing and Archiving Data. Written By: R. Moore, A. Rajasekar,
EIFL Licensing Training 2: EIFL LICENCE AGREEMENTS
Acceptable Use Policy (Draft)
Insert Date Insert Instructors’ Names / Titles
The Opportunities and Threats for Commercial Players
Fair Use in the Classroom
Paolo Budroni, University of Vienna
Session 11: Fair and Acceptable Use and Copyright
CREATIVE COMMONS FOR CULTURAL HERITAGE
ServiceNow Implementation Knowledge Management
Orientation to Creative Commons CC BY and Skills Commons: A Road Map for Meeting TAACCCT SGA Requirements April 20, 2015.
Software Documentation
Lesson 2- Ethical Use of Digital Resources
WP7: Training & Education
Examining Digital Rights Management
Federated Digital Rights Management
Metadata in the modernization of statistical production at Statistics Canada Carmen Greenough June 2, 2014.
JSTOR as a Shibboleth Target
Copyright Crash Course
Copyright, Fair Use, and Creative Commons Licensing
Copyright, Fair Use, and Creative Commons Licensing
Advances in Digital Rights Management
Creative Commons Creative Commons is a nonprofit organization providing free legal mechanisms for learners inside and outside.
SMETE Information Portal A Digital Library for Science, Mathematics, Engineering and Technology Education Alice M. Agogino, Principal Investigator Flora.
Extending “Scholarship” to Including Teaching in a Digital World
Digital Library and Plan for Institutional Repository
NIMAC “Spring Training” for State Coordinators
CARL Guide to Author Rights
Distributed Digital Rights Management
Digital Library and Plan for Institutional Repository
Presentation transcript:

Digital Rights Management in the Academy MERLOT International Conference August 3, 2004 This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. The license permits non-commercial use, requires attribution and forbids modification.

MERLOT Conference: DRM in the Academy Purpose Explore the management of digital content rights in a distributed ecosystem Requirements Processes Technologies Services Examples Issues Consider the impact of digital rights management on MERLOT MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Agenda Introduction and Agenda 1:00 – 1:10 Exercise: Non-Digital Scenario 1:10 – 1:40 The Digital Rights Challenge 1:40 – 2:00 Digital Rights Ecosystem Model 2:00 – 2:20 Exercise: Digital Scenario 2:20 – 2:40 Break 2:40 – 2:50 Exercise: Digital Scenario (Cont’d) 2:50 – 3:10 Demonstrator Projects and Tools 3:10 – 3:50 Discussion: MERLOT Implications 3:50 – 4:30 MERLOT Conference: DRM in the Academy August 3, 2004

Non-Digital Scenario

MERLOT Conference: DRM in the Academy SCENARIO: TEXT BOOKS Author writes a book Publisher publishes it Publisher sells book to wholesaler Instructor selects book for course Wholesaler sells to College Bookstore Bookstore sells to Students MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Role Playing Scenario Duration - 40 minutes total Assign Roles – Author, Publisher, Wholesaler, Retailer, Instructor, Student, Book Step through the life cycle – at each step: Market model, rights management expectations, law How are rights are defined, distributed, acquired, enforced and tracked? Identify the technology used to support rights processes MERLOT Conference: DRM in the Academy August 3, 2004

SCENARIO: Rights Perspective © defined when book is published Publisher to Wholesaler to Bookstore to Student: Rights distributed / acquired in exchange for money The physical book Contains and renders content Is a token of exchange Helps enforce rights via copy protection & tracking Rights are Governed by law, agreements & professional ethics (e.g. attribution Supported by trusted B2B & B2C relationships MERLOT Conference: DRM in the Academy August 3, 2004

Digital Rights Management Challenge

What Changes in the Digital World? Separation of content and rendering Digital files contain content Players render content A book does both Replication and distribution Replication is (nearly) perfect Distribution is (nearly) free Books are hard to replicate and require physical distribution MERLOT Conference: DRM in the Academy August 3, 2004

What Changes in the Digital World? Tracking and control How do you uniquely label a digital copy? How many digital copies have been distributed? Books can be physically ‘stacked and tracked’ The nature of distribution Services are unbundled (and less familiar) There are few barriers to participation in digital distribution Who do you trust? MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Therefore … A move from organizational to technological methods of rights management In the ‘perfect’ digital world: Authors define rights and licenses when they create the content Rights are expressed in a standardized form Distribution, repository and rendering technology Recognizes Interprets Enforces Redistributes But … we are at the beginning of the road MERLOT Conference: DRM in the Academy August 3, 2004

Digital Rights Requirements in Academia

MERLOT Conference: DRM in the Academy Protect … or Share? Protection is not the only goal The commercial licensing of inviolable content directly to a consumer is only one model For education and research, digital rights must support sharing and reuse DRM as an enabler, not just a controlling technology Difficulty of accessing rights is a barrier to reuse * *NSDL Content Reusability project – www.reusablelearning.org MERLOT Conference: DRM in the Academy August 3, 2004

Policy vs. Enforcement * Digital Policy Management Identify and describe rights Set business rules Organize rights to enable content distribution Digital Policy Enforcement Ensuring that digital rights are respected Not punitive, based on mutual benefit Two different, but interrelated activities * From a presentation by Chris Barlas of Rightscom at the EdMedia 2004 world conference in Lugano, Switzerland MERLOT Conference: DRM in the Academy August 3, 2004

Tracking and Attribution Goals of academic authors Share IP as widely as possible Receive proper attribution Repositories and providers want to track usage Evaluation of the value of content Determining cost per use Reporting usage for funding and recognition MERLOT Conference: DRM in the Academy August 3, 2004

Persistence and Standards Rights must persist in a distributed network IT can provide control within the organizational firewall … but … Content in academia must freely cross technological and organizational boundaries Rights expressions must ‘persist’ so they are available wherever and whenever content is used. Standards are needed For expressing, transmitting, interpreting and enforcing However, we are not going to enthrall you today with our vast knowledge of the details of evolving standards * Man turns to stone listening to standards presentation MERLOT Conference: DRM in the Academy August 3, 2004 * Permission to use requested from Williams-Exeter Programme at Oxford - www.williams.edu/ dean/oxford/oxford.htm

MERLOT Conference: DRM in the Academy Overarching Issues DRM = Management of Rights by Digital Means Rights Management depends on models of IP Control (individual – organizational – public) Rewards (fame – fortune – fulfillment) Constraints (policy – legal – technological) Content (form – function – properties) Relationships (trust – communication – economic) In the digital world Content has changed Relationships have changed Standards are in their infancy Functionality is clumsy MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Definitions Attribute Assign credit to a creator of an original work when the work is referenced, copied, distributed or performed. Authenticate Establish the identity of an individual. Authorize Establish what an individual is permitted to do. Protect Protect a work from unauthorized use. MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Definitions Copyright Rights granted to an original work under applicable law. License An explicit collection of rights pertaining to a resource. MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Definitions Digital Rights Management The process of defining, tracking and enforcing permissions and conditions through electronic means. Persistent Rights Associating rights and restrictions with a work in a way that persists as the work moves through a network and is used by different applications, platforms and people. MERLOT Conference: DRM in the Academy August 3, 2004

A Digital Rights Ecosystem Model

DIGITAL RIGHTS ECOSYSTEM: A system formed by the interaction of a distributed learning community with Law & Policy Market Mechanisms Rights Expectations Content workflows Content management technology Agents & Actors who distribute, acquire or enforce rights Learning environments Standards Infrastructure Services MERLOT Conference: DRM in the Academy August 3, 2004

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Environment in which DRM takes place MERLOT Conference: DRM in the Academy August 3, 2004

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Actors in the Ecosystem MERLOT Conference: DRM in the Academy August 3, 2004

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish CONTENT MANAGEMENT MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Content Life Cycle Create Author Assemble Offer Publish Catalog Distribute Acquire Find Acquire Rights Acquire Content Use MERLOT Conference: DRM in the Academy August 3, 2004

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Distribute Content Distribute Content External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Content Acquire Content Acquire Content Acquire Content Distribute Content Acquire Content The Flow of Content MERLOT Conference: DRM in the Academy August 3, 2004

Rights Management Processes Define Rights Distribute / Acquire Rights Enforce Rights Track Usage MERLOT Conference: DRM in the Academy August 3, 2004

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage The Flow of Rights MERLOT Conference: DRM in the Academy August 3, 2004

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Rights expression A machine (and human) readable expression of what can be done with content under what conditions. Licenses can be written using rights expressions. A rights expression language is a grammar and vocabulary for expressing rights in a standardized format. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Content Protection Preventing or discouraging the unauthorized use of content. E.g. copy or print protection. Supported by standards such as encryption, digital watermarking, etc. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Authentication and Authorization Authentication is the process of establishing the identity of a user. Authorization is the process of determining what a user is permitted to do. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Content Registry A registry is a storehouse of information about content that provides persistent unique identifiers. Registries may provide means to find content in ways that are more dependable than direct pointers to content. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Rights (License) Registry A place where licenses associated with content may be permanently stored and readily accessed. License registries associate rights to content in a persistent fashion, and allows licenses to be accessed remotely. (Creative Commons is one example.) Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Financial Services Financial systems, human resources systems, and other ‘enterprise systems’ manage access to content based on departmental charge-backs, user fees, manager permissions and other factors. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Usage Tracking and Reporting Services Usage tracking and reporting services are likely to be part of a widely distributed ecosystem, partly to support ‘per use’ financial models. Such services may be linked to content registries. Enforce and Distribute Rights Distribute Rights External Sites -------------- Digital Libraries E-stores Bookstores Etc. Internal Sites ------------- Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments --------------- Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

Exercise: Digital Scenario

Checklist for applying the model Environmental factors that affect rights management: Market models; The legal and policy context; Important actors (organizations and people) and roles; Expectations for the management of rights Content lifecycle(s) in the scenario. Where and how should rights be Defined; Acquired and distributed; Enforced Where and how usage should be tracked. What services are required to support rights management processes? What services are provided by existing technology? Identify what functionality gaps need to be filled and what approaches are realistic MERLOT Conference: DRM in the Academy August 3, 2004

SCENARIO: Learning Object Repository* State Resource Center Develops a piece of content themselves (adaptable content) Gets a piece of content from PBS Digital Repository Reviews the content, generates metadata descriptions, catalogs University / School District Library Identifies useful repository resources Incorporates into their catalog / teacher portal Teachers Discover and use content Modify content Deliver to Students via learning management environment * Based on scenarios from U.S. Eisenhower National Clearinghouse (ENC) MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Scenario Analysis Purpose: Explore the requirements for individuals, technology and organizations to support a comprehensive distributed digital rights ecosystem. Examine rights management issues and requirements within the context of the repository scenario. Process: Assign roles – Authors, state resource center, digital repository, school district library, teacher, content Step through the simulation Flow from the creation of the content all the way to its eventual use by a student Identify rights management requirements and processes at each step MERLOT Conference: DRM in the Academy August 3, 2004

Environment / Requirements The repository is a distributor Rights are determined by a range of rights holders, not the repository. Rights management issues include Viewing Modification Distribution Attribution Tracking Catalog records are also intellectual property. Repository wants attribution Repository wants to maintain quality branding MERLOT Conference: DRM in the Academy August 3, 2004

Content Life Cycle and Rights Content authored by a range of sources Repository finds content or has it submitted to them Repository categorizes, evaluates and describes content and creates catalog records Users search repository to find content for a range of uses Rights Defined by authors when content is created Repository defines rights for catalog records themselves Repository may need to access rights through a number of layers in between them and the author Need to interpret, display and distribute rights as part of catalog in a consistent way MERLOT Conference: DRM in the Academy August 3, 2004

Usage Tracking and Services Needed Repository wants to track and report usage of assets back to the source, and to funding agencies Services Required Rights expression for consistent display and interpretation Persistent unique identifiers to avoid redundant entries, and for ongoing maintenance Usage tracking service, including the tracking of the reuse of catalog records by other repositories MERLOT Conference: DRM in the Academy August 3, 2004

Services Provided and Gaps None of those described are yet available Gaps Standards and technology are emerging for: Digital rights expression language Persistent unique identifiers / registries Nothing on the horizon for usage tracking services MERLOT Conference: DRM in the Academy August 3, 2004

Other Digital Scenarios

SCENARIO 1: Commercial “E-Packs” Textbook publisher sells “e-packs” (or “course packs”). E-packs are loaded directly into a Course Management System*. Students access content through the Course Management System. * Same as “Virtual Learning Environment” or “Learning Management System” MERLOT Conference: DRM in the Academy August 3, 2004

Environment / Requirements Remuneration for publisher. Attribution for author. Local copies for students. School required to control access per class or section or per individually purchased license. Publisher expects access to be restricted MERLOT Conference: DRM in the Academy August 3, 2004

Content Life Cycle and Rights A simple linear life cycle Content enters ecosystem from a controlled source (publisher) Distributed via course management system Used by student Rights Defined through law and contract Trusted partners (publisher, bookstore, IT) Enforced by CMS restricting access to registered students Content could require students to have a license code MERLOT Conference: DRM in the Academy August 3, 2004

Usage Tracking and Services Needed At the CMS when content is used, or At bookstore when license and textbook sold Services Required Copy protection / encryption Authentication and authorization Financial services (fees for licenses) Usage tracking and reporting MERLOT Conference: DRM in the Academy August 3, 2004

Services Provided and Gaps CMS or IT env’t provides authentication and authorization Financial and usage tracking available via bookstore Gaps CMS cannot support entry of license code for content Copy protection not in student computing env’t No persistence of rights outside of CMS MERLOT Conference: DRM in the Academy August 3, 2004

SCENARIO 2: Sharing a Test Bank* A professor creates a bank of interactive test questions. The funding comes from a grant with no intellectual property strings attached. * Contributed by Gerd Kortemeyer, Director, Michigan State University Laboratory for Instructional Technology in Education MERLOT Conference: DRM in the Academy August 3, 2004

Environment / Requirements Use is free for educational purposes Commercial use requires permission Source code may be installed with permission and proper safeguards Professor wants attribution and record of all uses Does not want students to access questions and answers outside of a course Instructors want scores reported to Course Management Systems MERLOT Conference: DRM in the Academy August 3, 2004

Content Life Cycle and Rights Distributed Network life cycle Prof creates question bank in personal env’t Distributes via her web site and loads to university library repository Faculty load content to other school’s CMS Some faculty want to make changes Rights Partners not known in advance Access is governed by roles (student and faculty) Modification not allowed without permission Copy / print enforcement needed to prevent students MERLOT Conference: DRM in the Academy August 3, 2004

Usage Tracking and Services Needed Prof wants usage and question results reported Services Required Copy protection / encryption Authentication and role-based authorization (prof’s web site, library repository and all CMS systems) Expression of rights so faculty understand Usage tracking and reporting MERLOT Conference: DRM in the Academy August 3, 2004

Services Provided and Gaps Authentication and authorization part of library repository and CMS environments Shibboleth can support cross-institution Downloads can be tracked Some file formats can be copy protected Gaps Prof’s web site not secure Downloading faculty could grant access to students Depending on format, no copy protection External CMS won’t report usage to prof No standard rights expression language MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy SCENARIO 3 –TEACH Act* A History professor wishes to make a portion of a copyrighted film available to students online. The professor's institution owns a copy of the film on videotape * US Copyright Law Exemption: Technology, Education And Copyright Harmonization ACT MERLOT Conference: DRM in the Academy August 3, 2004

Environment / Requirements Teach Act Requirements College must be accredited. College must obtain a digitized copy if possible. (If not, then may digitize film.) Copyright policy must be in place; faculty and appropriate staff must be educated. Use must be under “instructor supervision.” Copyright notice must be displayed. Access must be restricted to class members and for a reasonable time period. Students must be technologically prevented from redistributing or retaining copies past deadline. MERLOT Conference: DRM in the Academy August 3, 2004

Content Life Cycle and Rights Prof purchases as a consumer Loaded to server Viewed by students enrolled in course Rights Rights defined by PBS at time of production and sale TEACH act grants restricted usage and distribution rights Students acquire rights to view when then enroll in class Enforcement require to prevent student copying, and to stop access when class is over MERLOT Conference: DRM in the Academy August 3, 2004

Usage Tracking and Services Needed CC not required to track usage Prof may want to track for pedagogical purposes Services Required Authentication and authorization Content copy protection / encryption Restrict student access to time enrolled in class MERLOT Conference: DRM in the Academy August 3, 2004

Services Provided and Gaps CMS provides authentication and authorization CMS restricts access to enrolled students while class is on Media servers can prevent copying Gaps Ability to have rights associated directly with content, rather than having to program CMS every time a course is held. MERLOT Conference: DRM in the Academy August 3, 2004

Demonstrator Projects and Tools

MERLOT Conference: DRM in the Academy COLIS See COLIS slides MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Key Points to COLIS Rights are expressed through a rights expression language Rights are enforced at point of delivery Includes repository services & directory services MERLOT Conference: DRM in the Academy August 3, 2004

CELEBRATE CELEBRATE slides CELEBRATE demonstration site http://demoportal.eun.org/ For information on CELEBRATE http://www.eun.org/eun.org2/eun/en/index_celebrate.cfm MERLOT Conference: DRM in the Academy August 3, 2004

Key Points to CELEBRATE Rights embedded in metadata via a rights expression language A Brokerage provides federated search & rights management services Brokerage mediates and records agreements among highly trusted clients Users are not identified; they are hidden behind LMS / CMS that communicate and enforce constraints MERLOT Conference: DRM in the Academy August 3, 2004

What Is Microsoft Rights Management Server (RMS)? * Information protection technology works with RMS-enabled applications to help safeguard digital information from unauthorized use online and offline inside and outside the firewall Includes encryption, certificates and authentication technologies Protection of information through persistent usage policies, which remain with the information—no matter where it goes XrML – eXtensible rights Markup Language * Extracted from– “Microsoft Windows Rights Management Services for Windows Server 2003”, www.microsoft.com, October 2003 MERLOT Conference: DRM in the Academy August 3, 2004

Microsoft RMS and GigaTrust GigaTrust presentation Rights Definition and Enforcement MERLOT Conference: DRM in the Academy August 3, 2004

Key Points about RMS and GigaTrust Rights embedded in rights expression Access to central server required to get access to license Authentication (based on email address in demo) required to get the license Encryption prevents access without license Rights persist regardless of file location MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy From National Science, Math, Engineering and Technology Digital Library Web Site -- Overview of the Core Library Architecture MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Key Points to NSDL No uniform rights model yet Rights management motivated by reusability Moving to Fedora (www.fedora.info) architecture Things that don’t work: Absolute enforcement of constraints Requiring applet download MERLOT Conference: DRM in the Academy August 3, 2004

Discussion - MERLOT Recommendations

Rights & Permissions Guidelines The NSDL Reusable Learning project has developed Guidelines for reusability Structure is modeled after Web Accessibility guidelines The handout contains the guidelines that pertain to rights These may be useful in the subsequent discussion MERLOT Conference: DRM in the Academy August 3, 2004

Rights & Permissions Guidelines Provide a statement of rights and permissions. Grant appropriate rights. Statement of Copyright (P1) - The copyright should be clearly stated, and include contact information for the copyright holder. Terms of Use (P1) - A license or explicit statement of rights and terms of use should be attached to or referenced in the resource. Grant Modification Rights (P2) - Grant rights to modify the digital learning resource, or provide contact information for asking permission. MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Recommendations Write down 2 concrete recommendations for MERLOT or MERLOT contributors with regard to Rights Management and related topics (5 minutes) Post to Flip chart Sharing and discussion MERLOT Conference: DRM in the Academy August 3, 2004

Moving Forward

Conclusions from Examples DRM models emerging for federations Persistence not yet addressed Services / Standards are emerging Persistent Unique Identifiers Rights Expression Languages Federated trusted authorization Standardized licenses Tracking services Content protection MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Challenges There are demonstrators, but … Limited in scope Need solutions now There are standards and technology, but … Not ready Won’t be ready soon Changing the world would be nice, but … Decision makers need answers now Implementers need answers now Users need answers now MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Some Tools of the Trade Rights Expression Languages Standardized expressions of rights (permissions, conditions, offers etc.) XML – machine & human readable (somewhat) Key for persistent DRM Creative Commons Licenses Standardized grants of rights by copyrights holders Easily incorporated, legally correct Persistent Unique Identifiers “Handle” systems Registration authorities Standardized MERLOT Conference: DRM in the Academy August 3, 2004

MERLOT Conference: DRM in the Academy Questions & Answers Contact information: rrobson@eduworks.com gcollier@eduworks.com Slides will be available from http://www.eduworks.com/library MERLOT Conference: DRM in the Academy August 3, 2004