“I don’t want to get my copyright stripped off” Michael Steidl, Privacy & Security Workshop 13 October 2015, Brussels (Belgium)

Slides:



Advertisements
Similar presentations
Capacity Building for Repositories Dr. Helena Asamoah-Hassan University Librarian, KNUST, Kumasi, Ghana at BioMed Open Access Africa Conference held at.
Advertisements

Knowledge Management at the Gordon – Staff Portal Project Presented by Deirdre Carmichael 12 September 2008.
IPTCs RightsML Rights expressions for the news industry ODRL Meeting 28 September 2011 Barcelona, Spain Michael Steidl, Managing Director IPTC.
The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
Welcome to the last of three EIFL-Licensing webinars on the EIFL Model Licences.
Laura Williams, Stanford University Libraries SAA Metadata and Digital Object Roundtable Meeting San Diego, California 2012.
Brought to you by 1 ICEF Online 2.0 – an introduction for for Educators and Service providers ICEF Berlin Workshop nd November.
Drupal Online Tutorial A Product of an ENGL 421 class at Purdue University Page 1.
1 Technology-Based Instruction: Planning at the Production Level by Jeremy Rowe ECURE 2001.
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
ER-0317/2/99 G R U P O S G A E Intellectual Property Rights in digitisation of education Part 1. Current problems in the face of digitisation. Massive.
1 Copyright and Intellectual Property Design Issues by Jeremy Rowe
WISER: Newspapers online : an introduction to the scope and range of recent and current newspapers available on Oxlip, including hints on effective search.
PSHE & Citizenship Lesson Please mix and match the activities in this lesson as you see fit schools.cla.co.uk.
Keywords: Legislation, Guidelines, Ownership, Copyright, Permissions, Copyright Free LO: You will be able to understand and explain Copyright, Designs.
Drupal Workshop Introduction to Drupal Part 1: Web Content Management, Advantages/Disadvantages of Drupal, Drupal terminology, Drupal technology, directories.
Online Safety 2.02 Remember the rules of online safety.
EXIF and Other Mysteries… MR Photography Workshop Park Place Porsche in Dallas August 23, 2014.
METADATA Research Data Management. What is metadata? Metadata is additional information that is required to make sense of your files – it’s data about.
COPYRIGHT & THE WEB LIS Information Technologies – Dr. Gilok Choi Pratt Institute, School of Information & Library Science Spring, 2009 By Diane.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
Publishing Digital Content to a LOR Publishing Digital Content to a LOR 1.
2005 Adobe Systems Incorporated. All Rights Reserved. 1 Ontolog Forum Gunar Penikis Sr. Product Manager Adobe Systems.
The Data Attribution Abdul Saboor PhD Research Student Model Base Development and Software Quality Assurance Research Group Freie.
1 herbert van de sompel CS 502 Computing Methods for Digital Libraries Cornell University – Computer Science Herbert Van de Sompel
Publishing 101 The MedEdPORTAL Guide to Educational Scholarship Sean Compas, M.A. Sara Hunt Matt Matarozza November 7, 2011.
The Lifecycle of Embedded Image Metadata within Digital Photographs: Challenges and Best Practices. - or - The Secret Life of Photo Metadata To promote,
“INDEXING” NON-TEXT ASSETS Download resource handout for seminar at: David Riecks, Project Leader,
U.01 General File Upload As a file uploader, I want to be able to upload files to Media Vault so that I can safely store and access these files. Acceptance.
Richard Siegersma General Manager Thorpe-Bowker Australian ISBN agency since 1997.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
By Collin Henry. Copyright is a protection that covers published and unpublished literary, scientific and artistic works, and other forms of expression.
Hunter Valley Amateur Beekeepers Forum User Guide Guide shows sample screenshots with most relevant actions. Website is at
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Wikispaces: A shared webspace. What is a wiki? A wiki is a shared website where members can add/share content for others Simply a wiki is a community.
Instructional Technology & Design Office or The World of Wikis Presented by Rebecca McGuire.
RENEE LE ROUX SABIF MANAGER WHY SABIF ? (SOUTH AFRICAN NODE OF GBIF) To create an enabling platform for researchers in South Africa –to.
Maps and their textual associations in a digital collection: a report from the Early Washington Maps project. Trevor Bond, Special Collections Librarian.
Management of Data as Responsible Use ICPL Information Privacy and Security As usual in higher education, different institution will have, and take,
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
Contents: 1. The copyright context 2. Image copyright and teaching 3. Image databases: copyright clearance 4. Image databases: copyright management 5.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Poderator is an online resource for authoring XML files required to host a podcast off of any Server. This tutorial is designed to walk you through the.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
The Role of Embedded Metadata in Visual Resources Mira Basara DSPS January 2015.
Online Safety 2.02 Remember the rules of online safety.
FORUM GUIDE TO SUPPORTING DATA ACCESS FOR RESEARCHERS A STATE EDUCATION AGENCY PERSPECTIVE Kathy Gosa, Kansas State Department of Education.
CIM VIsualizer & Analyzer: CIMvian Kalidindi S. Raju October 26, 2007.
Licensing of Orphan Works Olav Stokkmo, Chief Executive, IFRRO 26 October 2009European Commission, Orphan Works hearing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Catherine Tabone 04 June 2014 European Legislation Identifier (ELI)
Year 3.  What is copyright?  What is protected by copyright?  Who owns copyright?  What has copyright got to do with me ?  What is creative commons.
Security Settings Everything-well almost everything, ok-some things that will help you with Security Settings!
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Welcome to TUSK: Author Guide TUSK User Support Location: Sackler Bldg. 5 th Floor, Room 504 Phone: (617)
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
BUILD SECURE PRODUCTS AND SERVICES
Welcome To MusicBrainz
Background and Overview
21st Century Copyright for Education
Supplier Publicity Guidelines for SCQI, PQS and Achievement Winners
News in schedule and agendas for 2015
Alison Valk Georgia Tech
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
Caroline Morgan, CEO of IFRRO Malaysian National Seminar
EIFL-Licensing webinars on the
Distributed Digital Rights Management
Presentation transcript:

“I don’t want to get my copyright stripped off” Michael Steidl, Privacy & Security Workshop 13 October 2015, Brussels (Belgium)

IPTC – who‘s that? The global standards body for the news media A not-for-profit organisation with more than 50 members … from news agencies, newspapers, broadcasters and systems vendors … only a subset of members is shown © 2015 IPTC 2

IPTC Photo Metadata Standard … defines a schema of metadata properties … by 3 major groups: 1.Describes what can be seen in an image: caption, persons, locations, artwork, products … 2.Writes down administrative data: when created, identifier(s), job id, instructions … 3.Defines data relevant for rights: creator, copyright owner, licenses, credit line, model release, property release … © 2015 IPTC 3

Photo workflow/supply chain Photog takes photo, initial metadata (e.g. creator + copyright + who is shown) Photo library in country ABC: gets local copyright, modifies metadata (e.g. adds location …) International photo agency EPA: gets international copyright, modifies metadata Online news XYZ in country KLM: publishes the photo on their website. May modify metadata. Mary Miller: sees photo, likes it, downloads it, cannot get aware of a copyright and shares the photo by Pinterest © 2015 IPTC 4

The Challenge Looking at the photo downloaded by Mary Miller, a party from the supply chain may shout: “I don’t want to get my copyright stripped off” © 2015 IPTC 5

The Real Challenge How to guarantee that Mary Miller has the correct metadata in the image file © 2015 IPTC 6

Clarification IPTC … has as long experience and strong knowledge about the data used to describe and manage a photo … … but only little knowledge about how to secure metadata against modifications without permission. We want to forward the needs of people using the IPTC metadata schema to security experts. © 2015 IPTC 7

What needs to be secured IPTC sees the need for different levels of protection "never ever change the value of property X“ (after the initial application of the value) "property Y may be changed only with an agreement by the prior editor of this property value" Protected history of changes which allows to track back © 2015 IPTC 8

Limit editing metadata Top Level „never ever change“ –E.g. Initial Globally Unique Identifier Second Level: change only with an explicit permission by the last editor of this value (maybe: using a shared key) –Creator –Core rights properties: Copyright Owner + Notice, Licensing Third Level: at least show a warning and keep records (history) of any change –Model & Property Releases –Credit Line © 2015 IPTC 9

Control editing metadata IPTC‘s wish-list: –Each (protected) metadata field should get a security level assigned –Editing a metadata field should only be possible with a permission of the previous editor of the metadata values – depending on the security level. © 2015 IPTC 10

Show alarm if a change was not permitted IPTC knows: as long as bits and bytes of a file can be changed also the bits and bytes of embedded metadata can be changed. Sealing metadata does not protect it against changing its bytes but a modification can be detected! IPTC’s wish: if sealed metadata have been changed an alarm should be shown to the user. The user has to draw conclusions. © 2015 IPTC 11

Implementation IPTC‘s wish-list: –The security features should be implemented by a widely supported standard/technology. –The implementation should be a planned joint action of standardization bodies and software implementers. (To overcome the usual chicken-egg business discussion: what’s first, the need for that feature or the software providing the feature.) © 2015 IPTC 12

Thank you for listening to IPTC. We are happy to join a discussion of next steps. Meet IPTC at © 2015 IPTC 13