SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Beyond DRM                             What Online Publishers Need to Know

                     Complimentary White Paper from Vitrium Systems                September 2006


DOCUMENT ABSTRACT

Online publishers need to protect their documents without making access to
content unnecessarily complex. Many would also benefit from understanding
their secondary – often unauthorized – readers. In this complimentary White
Paper we explore:

  approaches to document security

  online content sharing and how to benefit from “pass-along”

  how to improve the reader experience

  ways to protect online documents while making the content more
  attractive to authorized readers


In discussing these issues, we hope to address the potential of online content
sharing in a new way and help you to consider the opportunities that come with a
focus on content – not document – security.
INTRODUCTION

Most document security companies concern themselves solely with the prevention of
unauthorized access to content. Online publishers, on the other hand, struggle to find the
correct balance between document security and a satisfactory reader experience.

Recently, a new approach to document security has given online content publishers the ability
to protect their content without adding unnecessary complexity to document access. This new
approach can also make documents a rich source of insight into their readers.

In this white paper we examine some of the current approaches to Digital rights management
(DRM) and the considerations for copyright holders striving to prevent the unauthorized
duplication of their works. We review the issues surrounding online content sharing, how to
create an ideal experience for readers and some of the unexpected benefits that can come
from document security.



.......................................................................................




                                            Beyond DRM: What Online Publishers Need to Know     I
SEND TO A FRIEND




TABLE OF CONTENTS



Digital Rights Management Today                                                     1


A Fine Balance: Security and Sharing                                                3


Creating a Positive Experience for Readers                                          4


Document Security Protects Value-Added Content                                      7


About Vitrium Systems                                                               9




This exclusive document has been brought to you
by Vitrium Systems - www.protectedpdf.com

Please feel free to share it with your peers.




                                           Beyond DRM: What Online Publishers Need to Know      II
SEND TO A FRIEND




DRM is a business of                DIGITAL RIGHTS MANAGEMENT TODAY
trade-offs. To create
the highest levels of               Digital rights management (DRM) – defined as any technology that
                                    limits access to digital media like e-Books, music and video – is not
document security,                  without controversy. There is a great deal of debate about whether any
many limits must be                 limitations should be put on content distribution in the age of the Internet.
placed on readers. But              Controversy aside, document security is a pressing issue for online
to allow for the largest            content publishers concerned not only with copyright protection but also
                                    with understanding their readership.
readership and widest
document distribution,              Simply put, DRM is about protecting documents from unauthorized
document security                   access. As Gartner analyst Rich Mogull writes, “Data security is about
must be as user-                    protecting data from unauthorized access and unauthorized use after
friendly as possible.               legitimate access. Data security is primarily focused on keeping bad
                                    people from good content and keeping trusted people from misusing
                                    good content (maliciously or otherwise).” 1

                                    Copyright owners struggle to find a balance between security and access
                                    issues. How best to keep unauthorized readers “out” and deter document
                                    misuse by authorized readers? DRM is a business of trade-offs. To create
                                    the highest levels of document security, many limits must be placed on
                                    readers. But to allow for the largest readership and widest document
                                    distribution, document security must be as user-friendly as possible. 2

                                    File-level Security
                                    Companies who sell documents online generally employ file-level
                                    security mechanisms, which unlock content through relatively light
                                    security mechanisms, including registration and authentication via
                                    web-forms and email. For companies who distribute content for “free,”
                                    (usually in exchange for information about the reader, that will be used
                                    for purposes such as market research), security is often limited to the
                                    front-end of a transaction - the potential reader must provide some
                                    personal information to obtain permission to access the content.

                                    In both of these scenarios, the online documents do not contain highly
                                    confidential or otherwise secure information. Nevertheless, the
                                    information they contain is valuable and readers are willing to pay for,
                                    or submit information in exchange for, document access.




       1 Gartner,   Inc, Organizations Must Employ Effective Data Security Strategies, Rich Mogull, 30 August 2005

       2 Inthis paper “document” refers to any type of content that can be protected in Adobe® Portable Document Format
       (PDF). This includes papers, books, research, regulatory codes and articles; rich media including video, film, and
       music; and premium content such as fonts, textual content, audio, video as well as interactive elements such as
       FLASH. PDF simply acts as the canvas upon which all this content is packaged, ensuring that rich copyrighted material
       is paid for or accessed by an authorized end consumer.




                                                                Beyond DRM: What Online Publishers Need to Know                1
SEND TO A FRIEND




                             Most content creators are very familiar with the document security
                             options available with Adobe® Portable Document Format (PDF).
                             Access limits on PDF documents can be set at the document level by
                             using passwords or simply restricting certain features, such as printing,
                             text selection or editing. Once documents are unlocked, they can be read
                             and most can be distributed freely to additional readers.

                             Enterprise DRM
                             For some organizations for whom document security and control as
                             documents flow within an organization are critical – such as financial
                             institutions, government, or healthcare organizations – enterprise digital
                             rights management (DRM) is the only solution. Enterprise DRM uses
                             encryption to provide granular controls tied to the individual document.
                             Unlike basic (file-level) encryption, enterprise DRM follows the object
                             throughout its life cycle, but requires deep integration with the business
                             infrastructure and applications, and may not work between different
                             organizations. Example controls include read, edit, forward, copy, paste,
                             delete or expire the file after a set time. 3

                             Complex and expensive enterprise DRM solutions may be appropriate
                             in a context where high levels of security are critical and a great many
                             documents will be shared within a large group of readers. According
                             to Gartner analyst Jay Heiser, “If there is a need to set up a workgroup
                             that can control access to sensitive data without involving the system
                             administrators, then DRM products are often the most effective and
                             convenient protection. The greater the number of users or documents,
                             the more desirable DRM becomes.” 4

                             For most companies, there are few choices in approach. Concerns about
                             the relative weakness of file-based encryption has created an increasing
                             interest in enterprise DRM systems. However, these solutions are costly,
                             complex and do not allow for the widespread redistribution of documents.




3 Gartner,   Inc, Organizations Must Employ Effective Data Security Strategies, Rich Mogull, 30 August 2005

4 Gartner   Inc, Responding to Audit Demands for File System, Encryption, Jay Heiser, 17 February 2006




                                                         Beyond DRM: What Online Publishers Need to Know              2
SEND TO A FRIEND




“I [think we need                   A FINE BALANCE: READERS WANT TO SHARE DOCUMENTS
to] soften the rough
edges of DRM – when                 One thing is clear, online document readers have strong opinions about
                                    DRM and how much security is tolerable. Surveying comments on
publishers deem it                  Adobe’s ePublishing blog recently, we found several interesting posts that
necessary at all – so               reflect common attitudes to DRM. Bill McCoy, General Manager of the
it becomes more of a                ePublishing Business at Adobe sums up the middle ground in this debate:
gentle reminder, a way              “There needs to be enough [document security] for an average internet
                                    user to access the document.” He goes on to say, “I [think we need to]
to help “keep honest
                                    soften the rough edges of DRM – when publishers deem it necessary at
people honest.”                     all – so it becomes more of a gentle reminder, a way to help “keep honest
                                    people honest.” 5
Bill McCoy, GM,
ePublishing, Adobe                  Security considerations are similar in the retail sector. We are all
                                    familiar with the systems used by stores to combat shoplifting. Product
                                    tags and alarms deter shoplifters and are of little or no inconvenience to
                                    honest shoppers. However, the more deterrents stores put in place, the
                                    more aggravation they cause their customers.

Online Content Readers              Unlike retailers, though, online publishers have a continued interest in
Like to Share                       controlling document use and access after they’ve authorized its use.
                                    When online publishers make their electronic content available, they
•89% of adult Internet              effectively grant access to a purchaser whom they can’t be sure will use
users share email                   it as was intended once the transaction is completed.
content with others
                                    People who download documents certainly like to share them. In a
•75% of them share it               recent study of over 1,000 US Internet users, 89% of adult Internet users
with up to six others               indicated that they share email content with others, with 75% sharing
                                    content with up to six other recipients. 6 In a study by Bitpipe Inc., an
•77.8% of professionals             online content syndication firm, 77.8% of professionals who downloaded
who download white                  white papers and case studies reported that they passed them on to
papers and case                     colleagues, and 75% of them saved them for future reference. 7
studies pass them on
to colleagues                       Clearly, the distribution of digital content is seldom limited to its original,
                                    authorized users. While this is clearly a matter of concern for online
•75% of them save                   publishers, it is also an opportunity - they stand to gain a great deal from
them for future use                 understanding both the way their documents are shared and the people
                                    to whom they are redistributed. But how can publishers limit the use
                                    of content to authorized users while exploiting the potential benefits of
                                    document sharing?



       5 From   the corporate weblog of Bill McCoy, General Manager, ePublishing Business, Adobe Systems Incorporated.
       Visit his blog at http://blogs.adobe.com/billmccoy/
       6 “Nearly   90% of Internet Users Share Content via E-mail,” Sharpe Partners press release, January 25, 2006
       7 “2004
             Forbes.com and Bitpipe Study: Readership and Usage of White Papers and Case Studies by Corporate and IT
       Management,” co-sponsored by Forbes.com and Bitpipe, Inc., March 2004




                                                               Beyond DRM: What Online Publishers Need to Know                3
SEND TO A FRIEND




A document, like a         The Benefits of Content, Not Document Security
book, is a collection of   One consideration is the nature of document protection itself. Most
                           document publishers protect the entire document. Once a document
pages. Many document
                           is secured, even if it can be passed from an authorized reader to an
owners would benefit       unauthorized reader, it is rendered useless – it can’t be browsed or
from being able to         experienced in any way.
secure a document
while leaving certain      Document security can be handled differently. A document, like a book,
                           is a collection of pages. Many document owners would benefit from being
pages unprotected.
                           able to secure a document while leaving certain pages unprotected. With
                           this approach, when readers receive a new document, they have access
                           to enough content to decide whether or not to pay for access to the rest
                           of the document. In this way, page-level document security actually
                           enhances the experience of authorized and unauthorized readers by
                           allowing re-distribution and sampling of documents.

                           Publishers, meanwhile, are saved the trouble of creating a separate,
                           limited version of the document for marketing purposes. In addition,
                           content security can further the document owners’ business needs
                           long after the documents themselves have been initially distributed.
                           For example, they can learn more about their potential audience
                           by embedding online surveys in parts of a document available to
                           unauthorized readers.


Due to the widespread      CREATING A POSITIVE READER EXPERIENCE
availability of free
information online,        Due to the widespread availability of free information online, readers
                           expect to be able to share the content they have and often measure the
readers expect to          relative ease of access to new documents against documents with no
be able to share the       DRM at all.
content they have and
often measure the          In this context, it is difficult to create document security systems that
                           do not cause frustration among users. Document security, inexpertly
relative ease of access
                           applied, can quickly become a deterrent for readers, especially as many
to new documents           people often feel they can most-likely find the information they need from
against documents          another, more accessible source.
with no DRM at all.
                           For some content providers, leaving documents unprotected is simply
                           not an option. Therefore, a balance must be struck between creating
                           a positive experience for readers and maintaining document security.
                           There are no set rules governing how best to do this - the balance will
                           depend on the specific needs of different content providers and readers.
                           Nevertheless, a few fundamental issues should be borne in mind.




                                                  Beyond DRM: What Online Publishers Need to Know       4
SEND TO A FRIEND




Six Considerations for             Balance Reader Privacy vs. the Publisher’s “Need” to Know
the Reader Experience              Content publishers must find a balance between gathering information
                                   about the reader (in order to validate the reader’s right to access the
1. Balance Reader                  content) with the reader’s right to only provide essential personal
Privacy vs. the                    information. Many content publishers feel the allure of asking for
Publisher’s “Need”                 additional data during a security transaction, but asking for more
to Know                            information than is necessary for the transaction can leave the reader
                                   feeling that security system is needlessly time-consuming and invasive.
2. Consider Content
Persistence vs.                    Consider Content Persistence vs. Content Protection
Content Protection                 Unencrypted content can be widely and easily transferred. As discussed
                                   above, easily shared information is shared – and often. For the online
3. Consider Document               content sharers in the study above, “The most popular content is
Protection vs.                     humorous material, with 88% forwarding jokes or cartoons. The second
Infringing on                      most popular category is news (56%), followed by healthcare and medical
Private Property                   information (32%), religious and spiritual material (30%), games (25%),
                                   business and personal finance information (24%), and sports/hobbies
4. Understand the                  (24%).” 8
Reader’s Use Patterns
                                   While unprotected digital information can be freely shared, it is usually of
5. Understand Your                 less value than information from protected sources. Encrypted content,
Commitment to                      on the other hand, is only accessible for as long as the reader recalls how
Maintaining the                    to unlock it and is therefore easily lost to posterity. We all know how easy
Reader Record                      it is to lose - or forget - usernames and passwords.

6. Implement a                     Consider Document Protection vs. Infringing on Private Property
Tolerable Document                 In 2005 the Sony CD copy protection scandal brought the controversy
Security Level                     surrounding DRM right into the public view. In short, Sony/BMG created
                                   software which was silently installed when customers used their desktop
                                   computers to play music CDs. This opened security holes on the PCs,
                                   causing a range of serious problems. Sony/BMG faced many lawsuits and
                                   were forced to recall the affected CDs.

                                   In this instance, a well-known corporation neglected to find a balance
                                   between copyright protection and consumer privacy. Specifically,
                                   they failed to realize that many consumers are reluctant to have
                                   proprietary software installed on their computers, particularly if it’s done
                                   surreptitiously.

                                   Understand the Reader’s Behavior
                                   Readers often want to download a document on one computer and read it
                                   on another. For instance, a reader might need to have the document on
                                   a desktop at work but may also want to transfer it to a laptop for travel.
                                   With many DRM solutions, this is not possible and the user’s attempts to
                                   access the document legitimately are impeded.


      8 “Nearly   90% of Internet Users Share Content via E-mail,” Sharpe Partners press release, January 25, 2006




                                                              Beyond DRM: What Online Publishers Need to Know                5
SEND TO A FRIEND




                        Understand Your Commitment to Maintaining the Reader Record
                        How long is the document publisher obligated to maintain a record that
                        the reader has authorized access to a document? Vendors and publishers
                        must balance the need to keep systems simple and databases clean
                        against readers’ expectation that, once authorized access rights have
                        been granted, they will persist for a reasonable period of time.

                        Maintain a Tolerable Level of Document Security
                        All DRM is susceptible to circumvention. How much security is enough
                        varies from application to application. A blogger responding to a recent
                        post in the weblog of Adobe’s Bill McCoy, General Manager, ePublishing
                        Business sums up accepted wisdom about the effectiveness of DRM.
                        Blogger Ben Trafford comments:


                              “Let’s face it - any DRM can and will be hacked. DRM should be like
                              the Club - it deters your basic thief from stealing my car, but doesn’t
                              stop me from driving. If more people could grasp this idea, we’d
                              have a much happier world...and doubtlessly, a lot more eBooks
                              on the digital shelves. It’s a real pity that big business seems to
                              think that strong DRM is anything but a burden to customers. The
                              strongest DRM gets hacked all the time - and at about the same
                              speed as weak DRM. The only difference between the two is that
                              one is a pain for the customer, and the other...is not.” 9


                        What is at issue here is the common belief that DRM is “a pain for the
                        customer.” In this context, it is important that reader’s feel that the
                        level of security is balanced out by the perceived value of the document’s
                        content.

                        It is also vital that content owners understand readers’ attitudes to online
                        content sharing. They must not get “in the way” of the experience that
                        consumers of online data expect to have, whilst still protecting their
                        property. Each company must evaluate the approach that best fits the
                        needs of its readership to ensure the widest possible readership, the
                        most leads or the greatest revenue.




9 http://blogs.adobe.com/billmccoy/2006/06/ebook_pioneer_j.html#comments




                                                   Beyond DRM: What Online Publishers Need to Know      6
SEND TO A FRIEND




There are a number of,     DOCUMENT SECURITY PROTECTS VALUE-ADDED CONTENT
perhaps unexpected,
                           There are a number of, perhaps unexpected, benefits that both online
benefits that both
                           publishers and their readers can obtain through a thoughtful approach to
online publishers          document security. The right approach can help add real value to online
and their readers          content.
can obtain through a
thoughtful approach        Again, the example of retail is instructive here. Most stores invest
                           extensively in the entire shopping experience. Advertising helps to bring
to document security.
                           shoppers into a retail outlet and the store’s design can encourage them
The right approach can     to stay. In addition, loyalty programs keep customers coming back, whilst
help add real value to     helping the store to learn about the needs of its customers.
online content.
                           Likewise, software companies add value to their products through
                           extensive customer support and regular updates. While it is easy to
                           obtain software through illegitimate means, doing so prevents the user
                           from having access to these desirable extras. Therefore, users are still
                           willing to pay for the “real thing”.

                           In the case of publishers, an author’s raw manuscript is given added
                           value through an extensive editorial process and attractive production
                           values (layout, illustrations and so on). Online publishers of electronic
                           documents can create even greater additional value by including features
                           that could not exist in the physical realm, including automatic updates,
                           search engines and links to supplementary data online.

Online content is not      Clearly, online content is not simply a digital version of a physical product
simply a digital version   - it has a whole unique range of potential value-added content. A well
                           designed approach to DRM will protect this aspect of a document’s
of a physical product
                           content, ensuring that it is only available to authorized users - thereby
- it has a whole unique    helping readers feel it is worth paying for the real thing.
range of potential
value-added content. A     As in the case of retail loyalty programs, this value-added content can
well designed approach     also be used to help online publishers with their market research.
                           The interactive nature of online documents can provide benefits to
to DRM will protect this
                           the consumer that simultaneously help publishers learn more about
aspect of a document’s     their readers’ preferences. This, in turn, allows content providers to
content, ensuring that     continuously improve their products in line with their customers’ needs.
it is only available to
authorized users.          In addition to all these benefits, it should be remembered that freely
                           accessible information is fundamentally less reliable than that contained
                           in documents that are copyright protected. Search engines and other
                           online information sources take freely available content, index it and turn
                           it into something usable by the reader. But checks are limited and do not
                           generally extend to fact-verification. For online content creators, a great
                           deal of resources are invested into the editorial process which produces
                           a peer-reviewed, high quality final product.




                                                   Beyond DRM: What Online Publishers Need to Know         7
SEND TO A FRIEND




“… anonymity blocks              Readers are prepared to pay for this high-value content but they also
credibility.” Randall            want the ease of use of that freely available information provides. DRM
                                 can be difficult to implement because it implies a compromise between
Stross, New York
                                 the publisher and reader.
Times, March 12, 2006
                                 In a recent article in the New York Times, writer Randall Stross explored
                                 the issue of whether free online articles such as those found in Wikipedia
                                 can be judged as credible without knowing the author. Like DRM itself,
                                 Wikipedia is controversial. Founded in 2001, “the system rests upon the
                                 belief that a collectivity of unknown but enthusiastic individuals, by dint of
                                 sheer mass rather than possession of conventional credentials, can serve
                                 in the supervisory role of editor.” The article explores the challenges of
                                 this model to the credibility of its content, concluding with the thought:
                                 “…anonymity blocks credibility.” 10 Ultimately, he concludes, there needs
                                 to be some more restrictive process to grant final approval, or “feature
                                 article” status to more of the online encyclopedia’s contributions.

                                 In focusing on the additional value they can offer with digital content,
                                 online publishers can distance themselves from the often inferior content
                                 that is freely accessible online. A well thought-out approach to document
                                 security would be an essential component of any serious attempt to do
                                 this.




      10 “Anonymous   Source Is Not the Same as Open Source,” Randall Stross, March 12, 2006, nytimes.com




                                                            Beyond DRM: What Online Publishers Need to Know         8
SEND TO A FRIEND




ABOUT VITRIUM SYSTEMS

At Vitrium we take a fresh approach to document security. We understand
that readers often want to share content and that publishers want to
facilitate this insofar as it can help to expand their legitimate readership.
While publishers don’t want this redistribution of documents to infringe
upon their ownership rights, they also don’t want to make gaining access
to documents so complex that it discourages legitimate use.

In general, digital rights management companies are concerned with
security above all other things. As a result, their solutions - while
highly secure - can be cumbersome to deploy, non-user friendly and
challenging to implement, manage and maintain. Where content security
is the foremost concern, such limitations may be acceptable but for
organizations who produce or distribute content widely, concerns such
as cost, complexity, accessibility and usability are just as important as
security. For these kinds of companies, page-level security is the answer.

At Vitrium, we developed protectedpdf with the needs of both readers and
document owners in mind. We protect content at the page level, not at
the document level. This gives online publishers the flexibility to unlock
select pages and grant potential readers controlled insight into content,
without compromising overall document protection. Readers can even
unlock additional pages from within a document itself, without having to
leave to visit a shopping cart.

Online publishers can track not only the first reader’s access but every
other instance of document access. It’s easy to embed optional surveys
or forms directly within the document to encourage willing readers to
share their insights. Publishers can grant and revoke reader rights,
control printing, update or even digitally “shred” documents dynamically,
all while the document is in the public realm. All this is possible with no
proprietary software - all readers need to be able to access the content is
Adobe® Reader® and an internet connection.

Contact Vitrium Systems today to learn more about our fresh approach to
content – not document – security.

Vitrium Systems Inc.
www.protectedpdf.com
1-866-403-1500, press ‘2’ (for sales)
+1-604-677-1500, press ‘2’

sales@protectedpdf.com




                          Beyond DRM: What Online Publishers Need to Know       9

Contenu connexe

Dernier

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Dernier (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Beyond Drm

  • 1. Beyond DRM What Online Publishers Need to Know Complimentary White Paper from Vitrium Systems September 2006 DOCUMENT ABSTRACT Online publishers need to protect their documents without making access to content unnecessarily complex. Many would also benefit from understanding their secondary – often unauthorized – readers. In this complimentary White Paper we explore: approaches to document security online content sharing and how to benefit from “pass-along” how to improve the reader experience ways to protect online documents while making the content more attractive to authorized readers In discussing these issues, we hope to address the potential of online content sharing in a new way and help you to consider the opportunities that come with a focus on content – not document – security.
  • 2. INTRODUCTION Most document security companies concern themselves solely with the prevention of unauthorized access to content. Online publishers, on the other hand, struggle to find the correct balance between document security and a satisfactory reader experience. Recently, a new approach to document security has given online content publishers the ability to protect their content without adding unnecessary complexity to document access. This new approach can also make documents a rich source of insight into their readers. In this white paper we examine some of the current approaches to Digital rights management (DRM) and the considerations for copyright holders striving to prevent the unauthorized duplication of their works. We review the issues surrounding online content sharing, how to create an ideal experience for readers and some of the unexpected benefits that can come from document security. ....................................................................................... Beyond DRM: What Online Publishers Need to Know I
  • 3. SEND TO A FRIEND TABLE OF CONTENTS Digital Rights Management Today 1 A Fine Balance: Security and Sharing 3 Creating a Positive Experience for Readers 4 Document Security Protects Value-Added Content 7 About Vitrium Systems 9 This exclusive document has been brought to you by Vitrium Systems - www.protectedpdf.com Please feel free to share it with your peers. Beyond DRM: What Online Publishers Need to Know II
  • 4. SEND TO A FRIEND DRM is a business of DIGITAL RIGHTS MANAGEMENT TODAY trade-offs. To create the highest levels of Digital rights management (DRM) – defined as any technology that limits access to digital media like e-Books, music and video – is not document security, without controversy. There is a great deal of debate about whether any many limits must be limitations should be put on content distribution in the age of the Internet. placed on readers. But Controversy aside, document security is a pressing issue for online to allow for the largest content publishers concerned not only with copyright protection but also with understanding their readership. readership and widest document distribution, Simply put, DRM is about protecting documents from unauthorized document security access. As Gartner analyst Rich Mogull writes, “Data security is about must be as user- protecting data from unauthorized access and unauthorized use after friendly as possible. legitimate access. Data security is primarily focused on keeping bad people from good content and keeping trusted people from misusing good content (maliciously or otherwise).” 1 Copyright owners struggle to find a balance between security and access issues. How best to keep unauthorized readers “out” and deter document misuse by authorized readers? DRM is a business of trade-offs. To create the highest levels of document security, many limits must be placed on readers. But to allow for the largest readership and widest document distribution, document security must be as user-friendly as possible. 2 File-level Security Companies who sell documents online generally employ file-level security mechanisms, which unlock content through relatively light security mechanisms, including registration and authentication via web-forms and email. For companies who distribute content for “free,” (usually in exchange for information about the reader, that will be used for purposes such as market research), security is often limited to the front-end of a transaction - the potential reader must provide some personal information to obtain permission to access the content. In both of these scenarios, the online documents do not contain highly confidential or otherwise secure information. Nevertheless, the information they contain is valuable and readers are willing to pay for, or submit information in exchange for, document access. 1 Gartner, Inc, Organizations Must Employ Effective Data Security Strategies, Rich Mogull, 30 August 2005 2 Inthis paper “document” refers to any type of content that can be protected in Adobe® Portable Document Format (PDF). This includes papers, books, research, regulatory codes and articles; rich media including video, film, and music; and premium content such as fonts, textual content, audio, video as well as interactive elements such as FLASH. PDF simply acts as the canvas upon which all this content is packaged, ensuring that rich copyrighted material is paid for or accessed by an authorized end consumer. Beyond DRM: What Online Publishers Need to Know 1
  • 5. SEND TO A FRIEND Most content creators are very familiar with the document security options available with Adobe® Portable Document Format (PDF). Access limits on PDF documents can be set at the document level by using passwords or simply restricting certain features, such as printing, text selection or editing. Once documents are unlocked, they can be read and most can be distributed freely to additional readers. Enterprise DRM For some organizations for whom document security and control as documents flow within an organization are critical – such as financial institutions, government, or healthcare organizations – enterprise digital rights management (DRM) is the only solution. Enterprise DRM uses encryption to provide granular controls tied to the individual document. Unlike basic (file-level) encryption, enterprise DRM follows the object throughout its life cycle, but requires deep integration with the business infrastructure and applications, and may not work between different organizations. Example controls include read, edit, forward, copy, paste, delete or expire the file after a set time. 3 Complex and expensive enterprise DRM solutions may be appropriate in a context where high levels of security are critical and a great many documents will be shared within a large group of readers. According to Gartner analyst Jay Heiser, “If there is a need to set up a workgroup that can control access to sensitive data without involving the system administrators, then DRM products are often the most effective and convenient protection. The greater the number of users or documents, the more desirable DRM becomes.” 4 For most companies, there are few choices in approach. Concerns about the relative weakness of file-based encryption has created an increasing interest in enterprise DRM systems. However, these solutions are costly, complex and do not allow for the widespread redistribution of documents. 3 Gartner, Inc, Organizations Must Employ Effective Data Security Strategies, Rich Mogull, 30 August 2005 4 Gartner Inc, Responding to Audit Demands for File System, Encryption, Jay Heiser, 17 February 2006 Beyond DRM: What Online Publishers Need to Know 2
  • 6. SEND TO A FRIEND “I [think we need A FINE BALANCE: READERS WANT TO SHARE DOCUMENTS to] soften the rough edges of DRM – when One thing is clear, online document readers have strong opinions about DRM and how much security is tolerable. Surveying comments on publishers deem it Adobe’s ePublishing blog recently, we found several interesting posts that necessary at all – so reflect common attitudes to DRM. Bill McCoy, General Manager of the it becomes more of a ePublishing Business at Adobe sums up the middle ground in this debate: gentle reminder, a way “There needs to be enough [document security] for an average internet user to access the document.” He goes on to say, “I [think we need to] to help “keep honest soften the rough edges of DRM – when publishers deem it necessary at people honest.” all – so it becomes more of a gentle reminder, a way to help “keep honest people honest.” 5 Bill McCoy, GM, ePublishing, Adobe Security considerations are similar in the retail sector. We are all familiar with the systems used by stores to combat shoplifting. Product tags and alarms deter shoplifters and are of little or no inconvenience to honest shoppers. However, the more deterrents stores put in place, the more aggravation they cause their customers. Online Content Readers Unlike retailers, though, online publishers have a continued interest in Like to Share controlling document use and access after they’ve authorized its use. When online publishers make their electronic content available, they •89% of adult Internet effectively grant access to a purchaser whom they can’t be sure will use users share email it as was intended once the transaction is completed. content with others People who download documents certainly like to share them. In a •75% of them share it recent study of over 1,000 US Internet users, 89% of adult Internet users with up to six others indicated that they share email content with others, with 75% sharing content with up to six other recipients. 6 In a study by Bitpipe Inc., an •77.8% of professionals online content syndication firm, 77.8% of professionals who downloaded who download white white papers and case studies reported that they passed them on to papers and case colleagues, and 75% of them saved them for future reference. 7 studies pass them on to colleagues Clearly, the distribution of digital content is seldom limited to its original, authorized users. While this is clearly a matter of concern for online •75% of them save publishers, it is also an opportunity - they stand to gain a great deal from them for future use understanding both the way their documents are shared and the people to whom they are redistributed. But how can publishers limit the use of content to authorized users while exploiting the potential benefits of document sharing? 5 From the corporate weblog of Bill McCoy, General Manager, ePublishing Business, Adobe Systems Incorporated. Visit his blog at http://blogs.adobe.com/billmccoy/ 6 “Nearly 90% of Internet Users Share Content via E-mail,” Sharpe Partners press release, January 25, 2006 7 “2004 Forbes.com and Bitpipe Study: Readership and Usage of White Papers and Case Studies by Corporate and IT Management,” co-sponsored by Forbes.com and Bitpipe, Inc., March 2004 Beyond DRM: What Online Publishers Need to Know 3
  • 7. SEND TO A FRIEND A document, like a The Benefits of Content, Not Document Security book, is a collection of One consideration is the nature of document protection itself. Most document publishers protect the entire document. Once a document pages. Many document is secured, even if it can be passed from an authorized reader to an owners would benefit unauthorized reader, it is rendered useless – it can’t be browsed or from being able to experienced in any way. secure a document while leaving certain Document security can be handled differently. A document, like a book, is a collection of pages. Many document owners would benefit from being pages unprotected. able to secure a document while leaving certain pages unprotected. With this approach, when readers receive a new document, they have access to enough content to decide whether or not to pay for access to the rest of the document. In this way, page-level document security actually enhances the experience of authorized and unauthorized readers by allowing re-distribution and sampling of documents. Publishers, meanwhile, are saved the trouble of creating a separate, limited version of the document for marketing purposes. In addition, content security can further the document owners’ business needs long after the documents themselves have been initially distributed. For example, they can learn more about their potential audience by embedding online surveys in parts of a document available to unauthorized readers. Due to the widespread CREATING A POSITIVE READER EXPERIENCE availability of free information online, Due to the widespread availability of free information online, readers expect to be able to share the content they have and often measure the readers expect to relative ease of access to new documents against documents with no be able to share the DRM at all. content they have and often measure the In this context, it is difficult to create document security systems that do not cause frustration among users. Document security, inexpertly relative ease of access applied, can quickly become a deterrent for readers, especially as many to new documents people often feel they can most-likely find the information they need from against documents another, more accessible source. with no DRM at all. For some content providers, leaving documents unprotected is simply not an option. Therefore, a balance must be struck between creating a positive experience for readers and maintaining document security. There are no set rules governing how best to do this - the balance will depend on the specific needs of different content providers and readers. Nevertheless, a few fundamental issues should be borne in mind. Beyond DRM: What Online Publishers Need to Know 4
  • 8. SEND TO A FRIEND Six Considerations for Balance Reader Privacy vs. the Publisher’s “Need” to Know the Reader Experience Content publishers must find a balance between gathering information about the reader (in order to validate the reader’s right to access the 1. Balance Reader content) with the reader’s right to only provide essential personal Privacy vs. the information. Many content publishers feel the allure of asking for Publisher’s “Need” additional data during a security transaction, but asking for more to Know information than is necessary for the transaction can leave the reader feeling that security system is needlessly time-consuming and invasive. 2. Consider Content Persistence vs. Consider Content Persistence vs. Content Protection Content Protection Unencrypted content can be widely and easily transferred. As discussed above, easily shared information is shared – and often. For the online 3. Consider Document content sharers in the study above, “The most popular content is Protection vs. humorous material, with 88% forwarding jokes or cartoons. The second Infringing on most popular category is news (56%), followed by healthcare and medical Private Property information (32%), religious and spiritual material (30%), games (25%), business and personal finance information (24%), and sports/hobbies 4. Understand the (24%).” 8 Reader’s Use Patterns While unprotected digital information can be freely shared, it is usually of 5. Understand Your less value than information from protected sources. Encrypted content, Commitment to on the other hand, is only accessible for as long as the reader recalls how Maintaining the to unlock it and is therefore easily lost to posterity. We all know how easy Reader Record it is to lose - or forget - usernames and passwords. 6. Implement a Consider Document Protection vs. Infringing on Private Property Tolerable Document In 2005 the Sony CD copy protection scandal brought the controversy Security Level surrounding DRM right into the public view. In short, Sony/BMG created software which was silently installed when customers used their desktop computers to play music CDs. This opened security holes on the PCs, causing a range of serious problems. Sony/BMG faced many lawsuits and were forced to recall the affected CDs. In this instance, a well-known corporation neglected to find a balance between copyright protection and consumer privacy. Specifically, they failed to realize that many consumers are reluctant to have proprietary software installed on their computers, particularly if it’s done surreptitiously. Understand the Reader’s Behavior Readers often want to download a document on one computer and read it on another. For instance, a reader might need to have the document on a desktop at work but may also want to transfer it to a laptop for travel. With many DRM solutions, this is not possible and the user’s attempts to access the document legitimately are impeded. 8 “Nearly 90% of Internet Users Share Content via E-mail,” Sharpe Partners press release, January 25, 2006 Beyond DRM: What Online Publishers Need to Know 5
  • 9. SEND TO A FRIEND Understand Your Commitment to Maintaining the Reader Record How long is the document publisher obligated to maintain a record that the reader has authorized access to a document? Vendors and publishers must balance the need to keep systems simple and databases clean against readers’ expectation that, once authorized access rights have been granted, they will persist for a reasonable period of time. Maintain a Tolerable Level of Document Security All DRM is susceptible to circumvention. How much security is enough varies from application to application. A blogger responding to a recent post in the weblog of Adobe’s Bill McCoy, General Manager, ePublishing Business sums up accepted wisdom about the effectiveness of DRM. Blogger Ben Trafford comments: “Let’s face it - any DRM can and will be hacked. DRM should be like the Club - it deters your basic thief from stealing my car, but doesn’t stop me from driving. If more people could grasp this idea, we’d have a much happier world...and doubtlessly, a lot more eBooks on the digital shelves. It’s a real pity that big business seems to think that strong DRM is anything but a burden to customers. The strongest DRM gets hacked all the time - and at about the same speed as weak DRM. The only difference between the two is that one is a pain for the customer, and the other...is not.” 9 What is at issue here is the common belief that DRM is “a pain for the customer.” In this context, it is important that reader’s feel that the level of security is balanced out by the perceived value of the document’s content. It is also vital that content owners understand readers’ attitudes to online content sharing. They must not get “in the way” of the experience that consumers of online data expect to have, whilst still protecting their property. Each company must evaluate the approach that best fits the needs of its readership to ensure the widest possible readership, the most leads or the greatest revenue. 9 http://blogs.adobe.com/billmccoy/2006/06/ebook_pioneer_j.html#comments Beyond DRM: What Online Publishers Need to Know 6
  • 10. SEND TO A FRIEND There are a number of, DOCUMENT SECURITY PROTECTS VALUE-ADDED CONTENT perhaps unexpected, There are a number of, perhaps unexpected, benefits that both online benefits that both publishers and their readers can obtain through a thoughtful approach to online publishers document security. The right approach can help add real value to online and their readers content. can obtain through a thoughtful approach Again, the example of retail is instructive here. Most stores invest extensively in the entire shopping experience. Advertising helps to bring to document security. shoppers into a retail outlet and the store’s design can encourage them The right approach can to stay. In addition, loyalty programs keep customers coming back, whilst help add real value to helping the store to learn about the needs of its customers. online content. Likewise, software companies add value to their products through extensive customer support and regular updates. While it is easy to obtain software through illegitimate means, doing so prevents the user from having access to these desirable extras. Therefore, users are still willing to pay for the “real thing”. In the case of publishers, an author’s raw manuscript is given added value through an extensive editorial process and attractive production values (layout, illustrations and so on). Online publishers of electronic documents can create even greater additional value by including features that could not exist in the physical realm, including automatic updates, search engines and links to supplementary data online. Online content is not Clearly, online content is not simply a digital version of a physical product simply a digital version - it has a whole unique range of potential value-added content. A well designed approach to DRM will protect this aspect of a document’s of a physical product content, ensuring that it is only available to authorized users - thereby - it has a whole unique helping readers feel it is worth paying for the real thing. range of potential value-added content. A As in the case of retail loyalty programs, this value-added content can well designed approach also be used to help online publishers with their market research. The interactive nature of online documents can provide benefits to to DRM will protect this the consumer that simultaneously help publishers learn more about aspect of a document’s their readers’ preferences. This, in turn, allows content providers to content, ensuring that continuously improve their products in line with their customers’ needs. it is only available to authorized users. In addition to all these benefits, it should be remembered that freely accessible information is fundamentally less reliable than that contained in documents that are copyright protected. Search engines and other online information sources take freely available content, index it and turn it into something usable by the reader. But checks are limited and do not generally extend to fact-verification. For online content creators, a great deal of resources are invested into the editorial process which produces a peer-reviewed, high quality final product. Beyond DRM: What Online Publishers Need to Know 7
  • 11. SEND TO A FRIEND “… anonymity blocks Readers are prepared to pay for this high-value content but they also credibility.” Randall want the ease of use of that freely available information provides. DRM can be difficult to implement because it implies a compromise between Stross, New York the publisher and reader. Times, March 12, 2006 In a recent article in the New York Times, writer Randall Stross explored the issue of whether free online articles such as those found in Wikipedia can be judged as credible without knowing the author. Like DRM itself, Wikipedia is controversial. Founded in 2001, “the system rests upon the belief that a collectivity of unknown but enthusiastic individuals, by dint of sheer mass rather than possession of conventional credentials, can serve in the supervisory role of editor.” The article explores the challenges of this model to the credibility of its content, concluding with the thought: “…anonymity blocks credibility.” 10 Ultimately, he concludes, there needs to be some more restrictive process to grant final approval, or “feature article” status to more of the online encyclopedia’s contributions. In focusing on the additional value they can offer with digital content, online publishers can distance themselves from the often inferior content that is freely accessible online. A well thought-out approach to document security would be an essential component of any serious attempt to do this. 10 “Anonymous Source Is Not the Same as Open Source,” Randall Stross, March 12, 2006, nytimes.com Beyond DRM: What Online Publishers Need to Know 8
  • 12. SEND TO A FRIEND ABOUT VITRIUM SYSTEMS At Vitrium we take a fresh approach to document security. We understand that readers often want to share content and that publishers want to facilitate this insofar as it can help to expand their legitimate readership. While publishers don’t want this redistribution of documents to infringe upon their ownership rights, they also don’t want to make gaining access to documents so complex that it discourages legitimate use. In general, digital rights management companies are concerned with security above all other things. As a result, their solutions - while highly secure - can be cumbersome to deploy, non-user friendly and challenging to implement, manage and maintain. Where content security is the foremost concern, such limitations may be acceptable but for organizations who produce or distribute content widely, concerns such as cost, complexity, accessibility and usability are just as important as security. For these kinds of companies, page-level security is the answer. At Vitrium, we developed protectedpdf with the needs of both readers and document owners in mind. We protect content at the page level, not at the document level. This gives online publishers the flexibility to unlock select pages and grant potential readers controlled insight into content, without compromising overall document protection. Readers can even unlock additional pages from within a document itself, without having to leave to visit a shopping cart. Online publishers can track not only the first reader’s access but every other instance of document access. It’s easy to embed optional surveys or forms directly within the document to encourage willing readers to share their insights. Publishers can grant and revoke reader rights, control printing, update or even digitally “shred” documents dynamically, all while the document is in the public realm. All this is possible with no proprietary software - all readers need to be able to access the content is Adobe® Reader® and an internet connection. Contact Vitrium Systems today to learn more about our fresh approach to content – not document – security. Vitrium Systems Inc. www.protectedpdf.com 1-866-403-1500, press ‘2’ (for sales) +1-604-677-1500, press ‘2’ sales@protectedpdf.com Beyond DRM: What Online Publishers Need to Know 9