CISO 2001 3 DON Policy Acquire a copy of document granting permission to reproduce Retain the document with associated files Include copyright notices as specified by copyright owners.
CISO 2001 4 The 4 Copy “RIGHTS” The right to control: 1. Reproduction 2. Preparation of derivative works 3. Distribution 4. Performance or display Copyright protection is the author’s incentive to earn a fair return on efforts
CISO 2001 5 Guides for Permission Requests Provide complete identification of material - Title - Name of author - Exact copyright notice(s) appearing on work - Editor and edition, producer or distributor (when applicable)
CISO 2001 6 Guides for Permission Requests Example Keller, J. M., “The Systematic Process of Motivational Design” Performance & Instruction, November, 1987, pp. 1-8.
CISO 2001 7 Describe exact portion of work to be used Page numbers Paragraphs Photographs, etc Send a photocopy of material & copyright page if possible. Guides for Permission Requests
CISO 2001 8 Example:... the following graphics obtained from The Gram Stain Tutor. Bacillus anthracis (resa4.bmp) E. coli (urib1.bmp) Salmonella spp. (stob1.bmp) Streptococcus pnemoniae (csfa2.bmp) Guides for Permission Requests
CISO 2001 9 Guides for Permission Requests Provide a statement of intended use Number of copies Type of reproduction Intended distribution Fees or charges associated with distribution Length of time material will be used Date, format, audience of public performance or displays
CISO 2001 10 Guides for Permission Requests Example...These graphics are included in the interactive courseware project, Basic and Refresher Food Service Sanitation. The computer-based training course has been requested by the Bureau of Medicine to be included in the Shipboard Training Enhancement Program...
CISO 2001 11 Guides for Permission Requests Possible modifications to work... Each graphic contains a UW (University of Washington) identifier in the lower corner. Arrows have been added to emphasize the cell type...
CISO 2001 12 Guides for Permission Requests Request no more than what is needed Submit in duplicate, one copy for recipient Provide a stamped, self-addressed return envelope Permissions can be requested via web Formal letter follows through channels
CISO 2001 13 Guides for Permission Requests Request copyright owner provide copyright notice and credit line. The Gram Stain Tutor. Dr. Michael Astion, Department of Laboratory Medicine, University of Washington, Box 357110, Seattle, WA 98195- 7110. firstname.lastname@example.org. Distribution available through: Lippencott-Raven Publishers, 227 East Washington Square, Philadelphia, PA 19106 (215) 238-4325 email@example.com
CISO 2001 14 Guides for Permission Requests Fee-based permissions are approved through the chain of command Verify response matches the request Maintain file in the CISO or C 2 M 2 Office
CISO 2001 15 Guides for Permission Requests If you have any questions or run into problems: Consult first with Legal Counsel Activity makes final decision (The activity is responsible for financial settlement of claims.)
CISO 2001 16 Guides for Permission Requests Copyright Advice Navy Patent Counsel Director, Navy Patent Program Intellectual Property Counsel or Office of Counsel Attorney
CISO 2001 17 Summary What is Copyright? The exclusive legal right to reproduce, modify, publish, and sell a literary, musical or artistic work When in doubt...... leave it out!
CISO 2001 18 So where are we in 2001 with copyright? The CNET and DON instructions have not changed SCORM Metadata Tags require copyright information Contractor-developed products are following the copyright guidelines
CISO 2001 19 How should the INSTRUCTOR handle graphics? Identify in the IG where you found the graphic and the name of the file Original work Command file (it was in the lesson when you got here) DAVIS/DITIS ordered NAMTRAGRU Media Depot Web – include the website address
CISO 2001 20 A typical IG (4) Contemplated (possible) modifications to the work Graphic: Streptococcus, (bugs.bmp) from NETPDTC Traman “Food Service), 1999 or http://encarta.msn.com/find/Concise.asp?ti=03C96000 HOW TO CITE THIS ARTICLE "Streptococcus," Microsoft® Encarta® Online Encyclopedia 2001 http://encarta.msn. http://encarta.msn Permission email sent 05/16/01 (FCC Jones) Permission granted 10/07/01 (letter on file- FILE.DOC)
CISO 2001 21 What CISO can do to help? Guidance – use this lesson NETPDTC Video about copyright violations Email template request Formal letter template Establish a procedure that is easy to follow Scan “permission granted” letters and place in the electronic file with the lesson Keep the original in a central file
Content requires media Navy resource Outside source Verify copyright ownership 1.Send an email (informal request) 2. Send the formal request 3. Check the permission granted 4. Scan the document & attach to the lesson 5.File the permission granted letter in the CISO Office Record in the IG Record in the IG