Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Rights Management in the Academy

Similar presentations


Presentation on theme: "Digital Rights Management in the Academy"— Presentation transcript:

1 Digital Rights Management in the Academy
MERLOT International Conference August 3, 2004 This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License. To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. The license permits non-commercial use, requires attribution and forbids modification.

2 MERLOT Conference: DRM in the Academy
Purpose Explore the management of digital content rights in a distributed ecosystem Requirements Processes Technologies Services Examples Issues Consider the impact of digital rights management on MERLOT MERLOT Conference: DRM in the Academy August 3, 2004

3 MERLOT Conference: DRM in the Academy
Agenda Introduction and Agenda 1:00 – 1:10 Exercise: Non-Digital Scenario 1:10 – 1:40 The Digital Rights Challenge 1:40 – 2:00 Digital Rights Ecosystem Model 2:00 – 2:20 Exercise: Digital Scenario 2:20 – 2:40 Break 2:40 – 2:50 Exercise: Digital Scenario (Cont’d) 2:50 – 3:10 Demonstrator Projects and Tools 3:10 – 3:50 Discussion: MERLOT Implications 3:50 – 4:30 MERLOT Conference: DRM in the Academy August 3, 2004

4 Non-Digital Scenario

5 MERLOT Conference: DRM in the Academy
SCENARIO: TEXT BOOKS Author writes a book Publisher publishes it Publisher sells book to wholesaler Instructor selects book for course Wholesaler sells to College Bookstore Bookstore sells to Students MERLOT Conference: DRM in the Academy August 3, 2004

6 MERLOT Conference: DRM in the Academy
Role Playing Scenario Duration - 40 minutes total Assign Roles – Author, Publisher, Wholesaler, Retailer, Instructor, Student, Book Step through the life cycle – at each step: Market model, rights management expectations, law How are rights are defined, distributed, acquired, enforced and tracked? Identify the technology used to support rights processes MERLOT Conference: DRM in the Academy August 3, 2004

7 SCENARIO: Rights Perspective
© defined when book is published Publisher to Wholesaler to Bookstore to Student: Rights distributed / acquired in exchange for money The physical book Contains and renders content Is a token of exchange Helps enforce rights via copy protection & tracking Rights are Governed by law, agreements & professional ethics (e.g. attribution Supported by trusted B2B & B2C relationships MERLOT Conference: DRM in the Academy August 3, 2004

8 Digital Rights Management Challenge

9 What Changes in the Digital World?
Separation of content and rendering Digital files contain content Players render content A book does both Replication and distribution Replication is (nearly) perfect Distribution is (nearly) free Books are hard to replicate and require physical distribution MERLOT Conference: DRM in the Academy August 3, 2004

10 What Changes in the Digital World?
Tracking and control How do you uniquely label a digital copy? How many digital copies have been distributed? Books can be physically ‘stacked and tracked’ The nature of distribution Services are unbundled (and less familiar) There are few barriers to participation in digital distribution Who do you trust? MERLOT Conference: DRM in the Academy August 3, 2004

11 MERLOT Conference: DRM in the Academy
Therefore … A move from organizational to technological methods of rights management In the ‘perfect’ digital world: Authors define rights and licenses when they create the content Rights are expressed in a standardized form Distribution, repository and rendering technology Recognizes Interprets Enforces Redistributes But … we are at the beginning of the road MERLOT Conference: DRM in the Academy August 3, 2004

12 Digital Rights Requirements in Academia

13 MERLOT Conference: DRM in the Academy
Protect … or Share? Protection is not the only goal The commercial licensing of inviolable content directly to a consumer is only one model For education and research, digital rights must support sharing and reuse DRM as an enabler, not just a controlling technology Difficulty of accessing rights is a barrier to reuse * *NSDL Content Reusability project – MERLOT Conference: DRM in the Academy August 3, 2004

14 Policy vs. Enforcement *
Digital Policy Management Identify and describe rights Set business rules Organize rights to enable content distribution Digital Policy Enforcement Ensuring that digital rights are respected Not punitive, based on mutual benefit Two different, but interrelated activities * From a presentation by Chris Barlas of Rightscom at the EdMedia 2004 world conference in Lugano, Switzerland MERLOT Conference: DRM in the Academy August 3, 2004

15 Tracking and Attribution
Goals of academic authors Share IP as widely as possible Receive proper attribution Repositories and providers want to track usage Evaluation of the value of content Determining cost per use Reporting usage for funding and recognition MERLOT Conference: DRM in the Academy August 3, 2004

16 Persistence and Standards
Rights must persist in a distributed network IT can provide control within the organizational firewall … but … Content in academia must freely cross technological and organizational boundaries Rights expressions must ‘persist’ so they are available wherever and whenever content is used. Standards are needed For expressing, transmitting, interpreting and enforcing However, we are not going to enthrall you today with our vast knowledge of the details of evolving standards * Man turns to stone listening to standards presentation MERLOT Conference: DRM in the Academy August 3, 2004 * Permission to use requested from Williams-Exeter Programme at Oxford - dean/oxford/oxford.htm

17 MERLOT Conference: DRM in the Academy
Overarching Issues DRM = Management of Rights by Digital Means Rights Management depends on models of IP Control (individual – organizational – public) Rewards (fame – fortune – fulfillment) Constraints (policy – legal – technological) Content (form – function – properties) Relationships (trust – communication – economic) In the digital world Content has changed Relationships have changed Standards are in their infancy Functionality is clumsy MERLOT Conference: DRM in the Academy August 3, 2004

18 MERLOT Conference: DRM in the Academy
Definitions Attribute Assign credit to a creator of an original work when the work is referenced, copied, distributed or performed. Authenticate Establish the identity of an individual. Authorize Establish what an individual is permitted to do. Protect Protect a work from unauthorized use. MERLOT Conference: DRM in the Academy August 3, 2004

19 MERLOT Conference: DRM in the Academy
Definitions Copyright Rights granted to an original work under applicable law. License An explicit collection of rights pertaining to a resource. MERLOT Conference: DRM in the Academy August 3, 2004

20 MERLOT Conference: DRM in the Academy
Definitions Digital Rights Management The process of defining, tracking and enforcing permissions and conditions through electronic means. Persistent Rights Associating rights and restrictions with a work in a way that persists as the work moves through a network and is used by different applications, platforms and people. MERLOT Conference: DRM in the Academy August 3, 2004

21 A Digital Rights Ecosystem Model

22 DIGITAL RIGHTS ECOSYSTEM:
A system formed by the interaction of a distributed learning community with Law & Policy Market Mechanisms Rights Expectations Content workflows Content management technology Agents & Actors who distribute, acquire or enforce rights Learning environments Standards Infrastructure Services MERLOT Conference: DRM in the Academy August 3, 2004

23 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM
Rights Management Environment Law Market Mechanisms Policy Expectations Environment in which DRM takes place MERLOT Conference: DRM in the Academy August 3, 2004

24 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Actors in the Ecosystem MERLOT Conference: DRM in the Academy August 3, 2004

25 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish CONTENT MANAGEMENT MERLOT Conference: DRM in the Academy August 3, 2004

26 MERLOT Conference: DRM in the Academy
Content Life Cycle Create Author Assemble Offer Publish Catalog Distribute Acquire Find Acquire Rights Acquire Content Use MERLOT Conference: DRM in the Academy August 3, 2004

27 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Distribute Content Distribute Content External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Content Acquire Content Acquire Content Acquire Content Distribute Content Acquire Content The Flow of Content MERLOT Conference: DRM in the Academy August 3, 2004

28 Rights Management Processes
Define Rights Distribute / Acquire Rights Enforce Rights Track Usage MERLOT Conference: DRM in the Academy August 3, 2004

29 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage The Flow of Rights MERLOT Conference: DRM in the Academy August 3, 2004

30 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

31 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Rights expression A machine (and human) readable expression of what can be done with content under what conditions. Licenses can be written using rights expressions. A rights expression language is a grammar and vocabulary for expressing rights in a standardized format. Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

32 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Content Protection Preventing or discouraging the unauthorized use of content. E.g. copy or print protection. Supported by standards such as encryption, digital watermarking, etc. Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

33 Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment
Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Authentication and Authorization Authentication is the process of establishing the identity of a user. Authorization is the process of determining what a user is permitted to do. Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

34 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Content Registry A registry is a storehouse of information about content that provides persistent unique identifiers. Registries may provide means to find content in ways that are more dependable than direct pointers to content. Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

35 Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment
Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Rights (License) Registry A place where licenses associated with content may be permanently stored and readily accessed. License registries associate rights to content in a persistent fashion, and allows licenses to be accessed remotely. (Creative Commons is one example.) Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

36 DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Learning Management Environments
Rights Management Environment Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Financial Services Financial systems, human resources systems, and other ‘enterprise systems’ manage access to content based on departmental charge-backs, user fees, manager permissions and other factors. Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

37 Use DIGITAL RIGHTS MANAGEMENT ECOSYSTEM Rights Management Environment
Law Market Mechanisms Policy Expectations Authors Publishers Librarians / Repository Managers Faculty Students Usage Tracking and Reporting Services Usage tracking and reporting services are likely to be part of a widely distributed ecosystem, partly to support ‘per use’ financial models. Such services may be linked to content registries. Enforce and Distribute Rights Distribute Rights External Sites Digital Libraries E-stores Bookstores Etc. Internal Sites Libraries, Repositories, Content Mgt Systems Catalog Find Acquire Distribute Learning Management Environments Course Mgt Systems, Collaborative Environments, Portals Etc. Use Author Assemble Publish Distribute Rights Acquire Rights and Track Usage Acquire Rights and Track Usage Acquire Rights Enforce and Distribute Rights Acquire Rights and Track Usage Expression / Enforcement Standards Infrastructure Services (Some Standardized) Rights Expression Content Protection Authentication Financial Services Usage Tracking & Reporting Services Authorization MERLOT Conference: DRM in the Academy Content Registry August 3, 2004 Rights Registry

38 Exercise: Digital Scenario

39 Checklist for applying the model
Environmental factors that affect rights management: Market models; The legal and policy context; Important actors (organizations and people) and roles; Expectations for the management of rights Content lifecycle(s) in the scenario. Where and how should rights be Defined; Acquired and distributed; Enforced Where and how usage should be tracked. What services are required to support rights management processes? What services are provided by existing technology? Identify what functionality gaps need to be filled and what approaches are realistic MERLOT Conference: DRM in the Academy August 3, 2004

40 SCENARIO: Learning Object Repository*
State Resource Center Develops a piece of content themselves (adaptable content) Gets a piece of content from PBS Digital Repository Reviews the content, generates metadata descriptions, catalogs University / School District Library Identifies useful repository resources Incorporates into their catalog / teacher portal Teachers Discover and use content Modify content Deliver to Students via learning management environment * Based on scenarios from U.S. Eisenhower National Clearinghouse (ENC) MERLOT Conference: DRM in the Academy August 3, 2004

41 MERLOT Conference: DRM in the Academy
Scenario Analysis Purpose: Explore the requirements for individuals, technology and organizations to support a comprehensive distributed digital rights ecosystem. Examine rights management issues and requirements within the context of the repository scenario. Process: Assign roles – Authors, state resource center, digital repository, school district library, teacher, content Step through the simulation Flow from the creation of the content all the way to its eventual use by a student Identify rights management requirements and processes at each step MERLOT Conference: DRM in the Academy August 3, 2004

42 Environment / Requirements
The repository is a distributor Rights are determined by a range of rights holders, not the repository. Rights management issues include Viewing Modification Distribution Attribution Tracking Catalog records are also intellectual property. Repository wants attribution Repository wants to maintain quality branding MERLOT Conference: DRM in the Academy August 3, 2004

43 Content Life Cycle and Rights
Content authored by a range of sources Repository finds content or has it submitted to them Repository categorizes, evaluates and describes content and creates catalog records Users search repository to find content for a range of uses Rights Defined by authors when content is created Repository defines rights for catalog records themselves Repository may need to access rights through a number of layers in between them and the author Need to interpret, display and distribute rights as part of catalog in a consistent way MERLOT Conference: DRM in the Academy August 3, 2004

44 Usage Tracking and Services Needed
Repository wants to track and report usage of assets back to the source, and to funding agencies Services Required Rights expression for consistent display and interpretation Persistent unique identifiers to avoid redundant entries, and for ongoing maintenance Usage tracking service, including the tracking of the reuse of catalog records by other repositories MERLOT Conference: DRM in the Academy August 3, 2004

45 Services Provided and Gaps
None of those described are yet available Gaps Standards and technology are emerging for: Digital rights expression language Persistent unique identifiers / registries Nothing on the horizon for usage tracking services MERLOT Conference: DRM in the Academy August 3, 2004

46 Other Digital Scenarios

47 SCENARIO 1: Commercial “E-Packs”
Textbook publisher sells “e-packs” (or “course packs”). E-packs are loaded directly into a Course Management System*. Students access content through the Course Management System. * Same as “Virtual Learning Environment” or “Learning Management System” MERLOT Conference: DRM in the Academy August 3, 2004

48 Environment / Requirements
Remuneration for publisher. Attribution for author. Local copies for students. School required to control access per class or section or per individually purchased license. Publisher expects access to be restricted MERLOT Conference: DRM in the Academy August 3, 2004

49 Content Life Cycle and Rights
A simple linear life cycle Content enters ecosystem from a controlled source (publisher) Distributed via course management system Used by student Rights Defined through law and contract Trusted partners (publisher, bookstore, IT) Enforced by CMS restricting access to registered students Content could require students to have a license code MERLOT Conference: DRM in the Academy August 3, 2004

50 Usage Tracking and Services Needed
At the CMS when content is used, or At bookstore when license and textbook sold Services Required Copy protection / encryption Authentication and authorization Financial services (fees for licenses) Usage tracking and reporting MERLOT Conference: DRM in the Academy August 3, 2004

51 Services Provided and Gaps
CMS or IT env’t provides authentication and authorization Financial and usage tracking available via bookstore Gaps CMS cannot support entry of license code for content Copy protection not in student computing env’t No persistence of rights outside of CMS MERLOT Conference: DRM in the Academy August 3, 2004

52 SCENARIO 2: Sharing a Test Bank*
A professor creates a bank of interactive test questions. The funding comes from a grant with no intellectual property strings attached. * Contributed by Gerd Kortemeyer, Director, Michigan State University Laboratory for Instructional Technology in Education MERLOT Conference: DRM in the Academy August 3, 2004

53 Environment / Requirements
Use is free for educational purposes Commercial use requires permission Source code may be installed with permission and proper safeguards Professor wants attribution and record of all uses Does not want students to access questions and answers outside of a course Instructors want scores reported to Course Management Systems MERLOT Conference: DRM in the Academy August 3, 2004

54 Content Life Cycle and Rights
Distributed Network life cycle Prof creates question bank in personal env’t Distributes via her web site and loads to university library repository Faculty load content to other school’s CMS Some faculty want to make changes Rights Partners not known in advance Access is governed by roles (student and faculty) Modification not allowed without permission Copy / print enforcement needed to prevent students MERLOT Conference: DRM in the Academy August 3, 2004

55 Usage Tracking and Services Needed
Prof wants usage and question results reported Services Required Copy protection / encryption Authentication and role-based authorization (prof’s web site, library repository and all CMS systems) Expression of rights so faculty understand Usage tracking and reporting MERLOT Conference: DRM in the Academy August 3, 2004

56 Services Provided and Gaps
Authentication and authorization part of library repository and CMS environments Shibboleth can support cross-institution Downloads can be tracked Some file formats can be copy protected Gaps Prof’s web site not secure Downloading faculty could grant access to students Depending on format, no copy protection External CMS won’t report usage to prof No standard rights expression language MERLOT Conference: DRM in the Academy August 3, 2004

57 MERLOT Conference: DRM in the Academy
SCENARIO 3 –TEACH Act* A History professor wishes to make a portion of a copyrighted film available to students online. The professor's institution owns a copy of the film on videotape * US Copyright Law Exemption: Technology, Education And Copyright Harmonization ACT MERLOT Conference: DRM in the Academy August 3, 2004

58 Environment / Requirements
Teach Act Requirements College must be accredited. College must obtain a digitized copy if possible. (If not, then may digitize film.) Copyright policy must be in place; faculty and appropriate staff must be educated. Use must be under “instructor supervision.” Copyright notice must be displayed. Access must be restricted to class members and for a reasonable time period. Students must be technologically prevented from redistributing or retaining copies past deadline. MERLOT Conference: DRM in the Academy August 3, 2004

59 Content Life Cycle and Rights
Prof purchases as a consumer Loaded to server Viewed by students enrolled in course Rights Rights defined by PBS at time of production and sale TEACH act grants restricted usage and distribution rights Students acquire rights to view when then enroll in class Enforcement require to prevent student copying, and to stop access when class is over MERLOT Conference: DRM in the Academy August 3, 2004

60 Usage Tracking and Services Needed
CC not required to track usage Prof may want to track for pedagogical purposes Services Required Authentication and authorization Content copy protection / encryption Restrict student access to time enrolled in class MERLOT Conference: DRM in the Academy August 3, 2004

61 Services Provided and Gaps
CMS provides authentication and authorization CMS restricts access to enrolled students while class is on Media servers can prevent copying Gaps Ability to have rights associated directly with content, rather than having to program CMS every time a course is held. MERLOT Conference: DRM in the Academy August 3, 2004

62 Demonstrator Projects and Tools

63 MERLOT Conference: DRM in the Academy
COLIS See COLIS slides MERLOT Conference: DRM in the Academy August 3, 2004

64 MERLOT Conference: DRM in the Academy
Key Points to COLIS Rights are expressed through a rights expression language Rights are enforced at point of delivery Includes repository services & directory services MERLOT Conference: DRM in the Academy August 3, 2004

65 CELEBRATE CELEBRATE slides CELEBRATE demonstration site
For information on CELEBRATE MERLOT Conference: DRM in the Academy August 3, 2004

66 Key Points to CELEBRATE
Rights embedded in metadata via a rights expression language A Brokerage provides federated search & rights management services Brokerage mediates and records agreements among highly trusted clients Users are not identified; they are hidden behind LMS / CMS that communicate and enforce constraints MERLOT Conference: DRM in the Academy August 3, 2004

67 What Is Microsoft Rights Management Server (RMS)? *
Information protection technology works with RMS-enabled applications to help safeguard digital information from unauthorized use online and offline inside and outside the firewall Includes encryption, certificates and authentication technologies Protection of information through persistent usage policies, which remain with the information—no matter where it goes XrML – eXtensible rights Markup Language * Extracted from– “Microsoft Windows Rights Management Services for Windows Server 2003”, October 2003 MERLOT Conference: DRM in the Academy August 3, 2004

68 Microsoft RMS and GigaTrust
GigaTrust presentation Rights Definition and Enforcement MERLOT Conference: DRM in the Academy August 3, 2004

69 Key Points about RMS and GigaTrust
Rights embedded in rights expression Access to central server required to get access to license Authentication (based on address in demo) required to get the license Encryption prevents access without license Rights persist regardless of file location MERLOT Conference: DRM in the Academy August 3, 2004

70 MERLOT Conference: DRM in the Academy
From National Science, Math, Engineering and Technology Digital Library Web Site -- Overview of the Core Library Architecture MERLOT Conference: DRM in the Academy August 3, 2004

71 MERLOT Conference: DRM in the Academy
Key Points to NSDL No uniform rights model yet Rights management motivated by reusability Moving to Fedora ( architecture Things that don’t work: Absolute enforcement of constraints Requiring applet download MERLOT Conference: DRM in the Academy August 3, 2004

72 Discussion - MERLOT Recommendations

73 Rights & Permissions Guidelines
The NSDL Reusable Learning project has developed Guidelines for reusability Structure is modeled after Web Accessibility guidelines The handout contains the guidelines that pertain to rights These may be useful in the subsequent discussion MERLOT Conference: DRM in the Academy August 3, 2004

74 Rights & Permissions Guidelines
Provide a statement of rights and permissions. Grant appropriate rights. Statement of Copyright (P1) - The copyright should be clearly stated, and include contact information for the copyright holder. Terms of Use (P1) - A license or explicit statement of rights and terms of use should be attached to or referenced in the resource. Grant Modification Rights (P2) - Grant rights to modify the digital learning resource, or provide contact information for asking permission. MERLOT Conference: DRM in the Academy August 3, 2004

75 MERLOT Conference: DRM in the Academy
Recommendations Write down 2 concrete recommendations for MERLOT or MERLOT contributors with regard to Rights Management and related topics (5 minutes) Post to Flip chart Sharing and discussion MERLOT Conference: DRM in the Academy August 3, 2004

76 Moving Forward

77 Conclusions from Examples
DRM models emerging for federations Persistence not yet addressed Services / Standards are emerging Persistent Unique Identifiers Rights Expression Languages Federated trusted authorization Standardized licenses Tracking services Content protection MERLOT Conference: DRM in the Academy August 3, 2004

78 MERLOT Conference: DRM in the Academy
Challenges There are demonstrators, but … Limited in scope Need solutions now There are standards and technology, but … Not ready Won’t be ready soon Changing the world would be nice, but … Decision makers need answers now Implementers need answers now Users need answers now MERLOT Conference: DRM in the Academy August 3, 2004

79 MERLOT Conference: DRM in the Academy
Some Tools of the Trade Rights Expression Languages Standardized expressions of rights (permissions, conditions, offers etc.) XML – machine & human readable (somewhat) Key for persistent DRM Creative Commons Licenses Standardized grants of rights by copyrights holders Easily incorporated, legally correct Persistent Unique Identifiers “Handle” systems Registration authorities Standardized MERLOT Conference: DRM in the Academy August 3, 2004

80 MERLOT Conference: DRM in the Academy
Questions & Answers Contact information: Slides will be available from MERLOT Conference: DRM in the Academy August 3, 2004


Download ppt "Digital Rights Management in the Academy"

Similar presentations


Ads by Google