SlideShare ist ein Scribd-Unternehmen logo
1 von 28
DIGITAL RIGHTS MANAGEMENT
(DRM) AND YOU
By Marcin Marszałek
PROBLEM WITH TERMINOLOGY
 DRM means different things in different
environments:
Music/Movies/Games
Operating Systems and other software
 No one body defines the term
WHAT IS DRM?
Also known as:
 Copy Protection
 Copy Control
 Copy Prevention
 Digital locks
WHAT IS DRM AS COPY PROTECTION?
 Intends to limit copying.
WHAT IS DRM?
 Intends to limit copying or access to digital content
WHAT IS DRM?
 Intends to limit copying or access to digital content
WHAT IS DRM?
 Intends to limit copying or access to digital content.
 Used to protect the rights of the authors, artists,
creators, programmers, publishers
HOW DOES DRM WORK?
 DRM adds an extra layer of protection around a file
 It does so by embedding code
 Needs a key (license to unlock)
2 GENERATIONS OF DRM
 1st generation
Limited copying.
 2nd generation
Limits access (what you can do with) digital content.
USAGE OF DRM?
 DRM is used to limit copying of and access to:
Music
Ebooks
Movies
Software
 Programs
 Games
SHORT HISTORY OF DRM
 Altair BASIC for Altair 8800
SHORT HISTORY OF DRM
 Altair BASIC for Altair 8800
HISTORY OF DRM
 Bill Gates’s Open Letter to Hobbyists (1976)
“As the majority of hobbyists must be aware, most of
you steal your software. Hardware must be paid for,
but software is something to share.”
SHORT HISTORY OF DRM
 Bill Gate’s Open Letter to Hobbyists (1976)
“One thing you do do is prevent good software from
being written. Who can afford to do professional
work for nothing? What hobbyist can put 3-man
years into programming, finding all bugs,
documenting his product and distribute for free?
The fact is, no one besides us has invested a lot of
money in hobby software. “
SHORT HISTORY OF DRM
 Floppy disks
Paraphrases
Code wheel
Puzzle solving
Code sheets
CD-keys
 Dongle
Pieces of hardware that were plugged to a computer
SHORT HISTORY OF DRM: MOVING ONLINE
 Steam
 Origin
 Games for Windows LIVE
 Uplay
 iTunes
DRM PROS AND CONS
 Pros:
Help protect intellectual property from being stolen: in
other words, they prevent piracy (albeit not completely).
Helps transfer content only to authorized consumers.
Complete product and support: since hundreds of man-
hours were put into creation of proprietary software, bug
fixes etc. are done by the owner of the software.
(Maybe?)
DRM PROS AND CONS
 Cons:
DRM might prevent the possibility of making backup
copies of software.
Prevents lending of material
Limits materials for research/education under fair
dealing.
DRM PROS AND CONS
 Cons:
Creates a situation where you potentially have to pay
twice for the same product e.g. if you buy a computer
with a copy of Windows and then have to format your
computer.
Limits having the same material on multiple devices
since not all formats are compatible with or transferable
to other devices.
2 FACES OF DRM
 1. Limits illegal copying and distribution
 2. Sets limits on access of legally obtained
materials
RELEVANCE TO
LIBRARIES/MUSEUMS/ARCHIVES
 2 different DRMs
1. Lending materials
2. Programming software
RELEVANCE TO
LIBRARIES/MUSEUMS/ARCHIVES
 Can be implemented in digital libraries by:
Controlling access to materials through encryption and
watermarking
Ensuring the content is accessed only by authorized
consumers and remains unmodified
RELEVANCE TO
LIBRARIES/MUSEUMS/ARCHIVES
 Limits coding
 Open software a viable alternative
DRM ALTERNATIVES
 The GNU Project
 Linux
 Open Source Software
 Copyleft
DRM ALTERNATIVES
 Munich completely open source
DRM FUTURE
 Is DRM changing?
iTunes DRM-free
Gog.com
DRM: ETHICAL ISSUES
 Do you own the material you buy?
Well, not really!
 Can you resell your content?
Well, not really!
 Can you modify your content?
 Well, not really!
 Where does fair use doctrine fit?
DRM QUESTIONS
 1. Is DRM an answer to piracy? Does it create more
problems than it solves?
 2. Where do you think DRM will take us? Will we
forget the idea of ownership for the idea of access?
Is ownership relevant in the online world?

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
convergence of technologies
convergence of technologiesconvergence of technologies
convergence of technologiesdeepinder07
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4AfiqEfendy Zaen
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
How internet works
How internet worksHow internet works
How internet worksANurag Kumar
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyBeing Aabis
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Eucalyptus cloud computing
Eucalyptus cloud computingEucalyptus cloud computing
Eucalyptus cloud computingRahul Rana
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 

Was ist angesagt? (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
convergence of technologies
convergence of technologiesconvergence of technologies
convergence of technologies
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Digital divide
Digital divideDigital divide
Digital divide
 
How internet works
How internet worksHow internet works
How internet works
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information society
Information societyInformation society
Information society
 
Eucalyptus cloud computing
Eucalyptus cloud computingEucalyptus cloud computing
Eucalyptus cloud computing
 
IT Security
IT SecurityIT Security
IT Security
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 

Andere mochten auch

Digital Rights Management for Ebooks
Digital Rights Management for EbooksDigital Rights Management for Ebooks
Digital Rights Management for EbookseBOUND Canada
 
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...Kirk Biglione
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRMcastLabs
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingRamesh Kumar
 
Web browsers and website publishing
Web browsers and website publishingWeb browsers and website publishing
Web browsers and website publishingGurleen Kaur
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM InteroperabilityHiram Juarbe
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07bobweber
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategyHeather Ford
 
Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Amit Maitra
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content FrustrationSarah Houghton
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementRoberto García
 
Digital Strategy For Publishers
Digital Strategy For PublishersDigital Strategy For Publishers
Digital Strategy For PublishersLJ Interactive
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 

Andere mochten auch (18)

Digital Rights Management for Ebooks
Digital Rights Management for EbooksDigital Rights Management for Ebooks
Digital Rights Management for Ebooks
 
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & Gaming
 
Web browsers and website publishing
Web browsers and website publishingWeb browsers and website publishing
Web browsers and website publishing
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM Interoperability
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategy
 
Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Scenario Mapping
Scenario MappingScenario Mapping
Scenario Mapping
 
Electronic Publishing Arun Joseph MLISc
Electronic Publishing Arun Joseph MLIScElectronic Publishing Arun Joseph MLISc
Electronic Publishing Arun Joseph MLISc
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content Frustration
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights Management
 
Digital Strategy For Publishers
Digital Strategy For PublishersDigital Strategy For Publishers
Digital Strategy For Publishers
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 

Ähnlich wie Digital rights management (drm) and you

Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminarcorinnejordan
 
DRM: A Skeptics View
DRM: A Skeptics ViewDRM: A Skeptics View
DRM: A Skeptics ViewLeigh Dodds
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?blogzilla
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Digital Right Management
Digital Right ManagementDigital Right Management
Digital Right ManagementOmkar Tembe
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatLeaMayMuozGaurino
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Paolo Nesi
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 
The free software history and communities’ journey ahead
The free software history and communities’ journey aheadThe free software history and communities’ journey ahead
The free software history and communities’ journey aheadRicardo Amaro
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Open source freeopensource & linux
Open source freeopensource & linuxOpen source freeopensource & linux
Open source freeopensource & linuxManura Perera
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11mrmwood
 
Free Robotics
Free RoboticsFree Robotics
Free Roboticseshuy
 

Ähnlich wie Digital rights management (drm) and you (20)

Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
What is DRM?
What is DRM? What is DRM?
What is DRM?
 
Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminar
 
Presentazione
PresentazionePresentazione
Presentazione
 
DRM: A Skeptics View
DRM: A Skeptics ViewDRM: A Skeptics View
DRM: A Skeptics View
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Digital Right Management
Digital Right ManagementDigital Right Management
Digital Right Management
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstat
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
The free software history and communities’ journey ahead
The free software history and communities’ journey aheadThe free software history and communities’ journey ahead
The free software history and communities’ journey ahead
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Open source freeopensource & linux
Open source freeopensource & linuxOpen source freeopensource & linux
Open source freeopensource & linux
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 
Free Robotics
Free RoboticsFree Robotics
Free Robotics
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Digital rights management (drm) and you

  • 1. DIGITAL RIGHTS MANAGEMENT (DRM) AND YOU By Marcin Marszałek
  • 2. PROBLEM WITH TERMINOLOGY  DRM means different things in different environments: Music/Movies/Games Operating Systems and other software  No one body defines the term
  • 3. WHAT IS DRM? Also known as:  Copy Protection  Copy Control  Copy Prevention  Digital locks
  • 4. WHAT IS DRM AS COPY PROTECTION?  Intends to limit copying.
  • 5. WHAT IS DRM?  Intends to limit copying or access to digital content
  • 6. WHAT IS DRM?  Intends to limit copying or access to digital content
  • 7. WHAT IS DRM?  Intends to limit copying or access to digital content.  Used to protect the rights of the authors, artists, creators, programmers, publishers
  • 8. HOW DOES DRM WORK?  DRM adds an extra layer of protection around a file  It does so by embedding code  Needs a key (license to unlock)
  • 9. 2 GENERATIONS OF DRM  1st generation Limited copying.  2nd generation Limits access (what you can do with) digital content.
  • 10. USAGE OF DRM?  DRM is used to limit copying of and access to: Music Ebooks Movies Software  Programs  Games
  • 11. SHORT HISTORY OF DRM  Altair BASIC for Altair 8800
  • 12. SHORT HISTORY OF DRM  Altair BASIC for Altair 8800
  • 13. HISTORY OF DRM  Bill Gates’s Open Letter to Hobbyists (1976) “As the majority of hobbyists must be aware, most of you steal your software. Hardware must be paid for, but software is something to share.”
  • 14. SHORT HISTORY OF DRM  Bill Gate’s Open Letter to Hobbyists (1976) “One thing you do do is prevent good software from being written. Who can afford to do professional work for nothing? What hobbyist can put 3-man years into programming, finding all bugs, documenting his product and distribute for free? The fact is, no one besides us has invested a lot of money in hobby software. “
  • 15. SHORT HISTORY OF DRM  Floppy disks Paraphrases Code wheel Puzzle solving Code sheets CD-keys  Dongle Pieces of hardware that were plugged to a computer
  • 16. SHORT HISTORY OF DRM: MOVING ONLINE  Steam  Origin  Games for Windows LIVE  Uplay  iTunes
  • 17. DRM PROS AND CONS  Pros: Help protect intellectual property from being stolen: in other words, they prevent piracy (albeit not completely). Helps transfer content only to authorized consumers. Complete product and support: since hundreds of man- hours were put into creation of proprietary software, bug fixes etc. are done by the owner of the software. (Maybe?)
  • 18. DRM PROS AND CONS  Cons: DRM might prevent the possibility of making backup copies of software. Prevents lending of material Limits materials for research/education under fair dealing.
  • 19. DRM PROS AND CONS  Cons: Creates a situation where you potentially have to pay twice for the same product e.g. if you buy a computer with a copy of Windows and then have to format your computer. Limits having the same material on multiple devices since not all formats are compatible with or transferable to other devices.
  • 20. 2 FACES OF DRM  1. Limits illegal copying and distribution  2. Sets limits on access of legally obtained materials
  • 21. RELEVANCE TO LIBRARIES/MUSEUMS/ARCHIVES  2 different DRMs 1. Lending materials 2. Programming software
  • 22. RELEVANCE TO LIBRARIES/MUSEUMS/ARCHIVES  Can be implemented in digital libraries by: Controlling access to materials through encryption and watermarking Ensuring the content is accessed only by authorized consumers and remains unmodified
  • 23. RELEVANCE TO LIBRARIES/MUSEUMS/ARCHIVES  Limits coding  Open software a viable alternative
  • 24. DRM ALTERNATIVES  The GNU Project  Linux  Open Source Software  Copyleft
  • 25. DRM ALTERNATIVES  Munich completely open source
  • 26. DRM FUTURE  Is DRM changing? iTunes DRM-free Gog.com
  • 27. DRM: ETHICAL ISSUES  Do you own the material you buy? Well, not really!  Can you resell your content? Well, not really!  Can you modify your content?  Well, not really!  Where does fair use doctrine fit?
  • 28. DRM QUESTIONS  1. Is DRM an answer to piracy? Does it create more problems than it solves?  2. Where do you think DRM will take us? Will we forget the idea of ownership for the idea of access? Is ownership relevant in the online world?

Hinweis der Redaktion

  1. It is used differently by different environments/industries. The world of music/movies vs. the world of OS etc.
  2. Claiming DRM is only about copying does not tell the whole truth. The second generation of DRM is concerned not just with copying but access, use, resale etc.
  3. Claiming DRM is only about copying does not tell the whole truth. The second generation of DRM is concerned not just with copying but access, use, resale etc.
  4. 1st generation concerned itself with physical objects (floppy disks, cds, dvds etc.)
  5. Limiting what buyers can do with the content they buy is nothing new. As far back as 1976, a certain Bill Gates of a certain Micro-Soft, penned an Open Letter to Hobbyists in which he expressed dismay at unauthorized copying of his system’s punched tapes.
  6. Can’t do much about punched cards if someone has a paper punching machine, they can easily make copies. Which is what happened.
  7. Can’t make back-ups of fragile floppy disks. Entering phrases from manual, using code wheel or sheets, puzzle solving was used.
  8. Until now, copy protection was limited to physical objects. Now it’s moved to digital files.
  9. If you are lending digital materials like ebooks, music or films, DRM ensures the content will be removed after loan period. If you are using Windows, you cannot modify it to fit your needs. Linux can be fully rewritten to better serve your individual needs.
  10. When you embed code into a file, you can specify how long it can be accessed for, how many devices can access it etc. If you are lending digital materials like ebooks, music or films, DRM ensures the content will be removed after loan period. If you are using Windows, you cannot modify it to fit your needs. Linux can be fully rewritten to better serve your individual needs.
  11. Gnu’s not UNIX. Richard Stallman. Open source is not public domain.
  12. Ideally, the consumer never experiences DRM but that has not been the case. The future of DRM might CISCO’s DRM cloud http://www.youtube.com/watch?v=L49uv81fSSc