Presentation on theme: "CISO 2001 1 COPYRIGHT GUIDANCE FOR NAVY CURRICULUM PRODUCTS Dr. Frankie Bratton-Jeffery CNET, ETS."— Presentation transcript:
CISO COPYRIGHT GUIDANCE FOR NAVY CURRICULUM PRODUCTS Dr. Frankie Bratton-Jeffery CNET, ETS
CISO It’s easier to ask forgiveness...
CISO DON Policy Acquire a copy of document granting permission to reproduce Retain the document with associated files Include copyright notices as specified by copyright owners.
CISO The 4 Copy “RIGHTS” The right to control: 1. Reproduction 2. Preparation of derivative works 3. Distribution 4. Performance or display Copyright protection is the author’s incentive to earn a fair return on efforts
CISO Guides for Permission Requests Provide complete identification of material - Title - Name of author - Exact copyright notice(s) appearing on work - Editor and edition, producer or distributor (when applicable)
CISO Guides for Permission Requests Example Keller, J. M., “The Systematic Process of Motivational Design” Performance & Instruction, November, 1987, pp. 1-8.
CISO Describe exact portion of work to be used Page numbers Paragraphs Photographs, etc Send a photocopy of material & copyright page if possible. Guides for Permission Requests
CISO Example:... the following graphics obtained from The Gram Stain Tutor. Bacillus anthracis (resa4.bmp) E. coli (urib1.bmp) Salmonella spp. (stob1.bmp) Streptococcus pnemoniae (csfa2.bmp) Guides for Permission Requests
CISO Guides for Permission Requests Provide a statement of intended use Number of copies Type of reproduction Intended distribution Fees or charges associated with distribution Length of time material will be used Date, format, audience of public performance or displays
CISO Guides for Permission Requests Example...These graphics are included in the interactive courseware project, Basic and Refresher Food Service Sanitation. The computer-based training course has been requested by the Bureau of Medicine to be included in the Shipboard Training Enhancement Program...
CISO Guides for Permission Requests Possible modifications to work... Each graphic contains a UW (University of Washington) identifier in the lower corner. Arrows have been added to emphasize the cell type...
CISO Guides for Permission Requests Request no more than what is needed Submit in duplicate, one copy for recipient Provide a stamped, self-addressed return envelope Permissions can be requested via web Formal letter follows through channels
CISO Guides for Permission Requests Request copyright owner provide copyright notice and credit line. The Gram Stain Tutor. Dr. Michael Astion, Department of Laboratory Medicine, University of Washington, Box , Seattle, WA Distribution available through: Lippencott-Raven Publishers, 227 East Washington Square, Philadelphia, PA (215)
CISO Guides for Permission Requests Fee-based permissions are approved through the chain of command Verify response matches the request Maintain file in the CISO or C 2 M 2 Office
CISO Guides for Permission Requests If you have any questions or run into problems: Consult first with Legal Counsel Activity makes final decision (The activity is responsible for financial settlement of claims.)
CISO Guides for Permission Requests Copyright Advice Navy Patent Counsel Director, Navy Patent Program Intellectual Property Counsel or Office of Counsel Attorney
CISO Summary What is Copyright? The exclusive legal right to reproduce, modify, publish, and sell a literary, musical or artistic work When in doubt leave it out!
CISO So where are we in 2001 with copyright? The CNET and DON instructions have not changed SCORM Metadata Tags require copyright information Contractor-developed products are following the copyright guidelines
CISO How should the INSTRUCTOR handle graphics? Identify in the IG where you found the graphic and the name of the file Original work Command file (it was in the lesson when you got here) DAVIS/DITIS ordered NAMTRAGRU Media Depot Web – include the website address
CISO A typical IG (4) Contemplated (possible) modifications to the work Graphic: Streptococcus, (bugs.bmp) from NETPDTC Traman “Food Service), 1999 or HOW TO CITE THIS ARTICLE "Streptococcus," Microsoft® Encarta® Online Encyclopedia Permission sent 05/16/01 (FCC Jones) Permission granted 10/07/01 (letter on file- FILE.DOC)
CISO What CISO can do to help? Guidance – use this lesson NETPDTC Video about copyright violations template request Formal letter template Establish a procedure that is easy to follow Scan “permission granted” letters and place in the electronic file with the lesson Keep the original in a central file
Content requires media Navy resource Outside source Verify copyright ownership 1.Send an (informal request) 2. Send the formal request 3. Check the permission granted 4. Scan the document & attach to the lesson 5.File the permission granted letter in the CISO Office Record in the IG Record in the IG