click to print
Reserving
Rights

Summary

How do you secure something that you’ve already given to someone else? How do you prevent digital information from being duplicated? How do you know when something has been duplicated illegally? Maintaining control of digital rights has become one of the most controversial and complicated aspects of security. A rapidly growing industry is addressing many of these core issues. This part will explore the various problems facing digital rights control.

Key Points

  • Businesses that create and profit from digital content need practical ways to enforce their legal intellectual property rights as part of their overall security strategy.
  • Rights can be enforced through technology, economics, and the legal system.
  • Rights can also be circumvented through technology, economics, and the legal system
  • Businesses often use a combination of these three methods in order to successfully protect their intellectual property.
  • Maintaining the relevancy of intellectual property laws has been a struggle since the 1960s because of new technologies and a globalized economy.

Connections

The technologies currently being used to manage digital rights are those that support existing legislation. Digital watermarking enables companies to collect evidence of misuse, which can be used to support legal enforcement. Copy protection techniques attempt to prevent unauthorized use in the first place. This part contains the following chapters:
  • Digital Rights Management discusses the business strategies and related technologies for controlling intellectual property rights across digital and traditional media.

  • Copy Protection examines technology used to prevent the unauthorized duplication of digital media.

  • Digital Watermarking (web bonus) technology creates and detects invisible “markings”, which can be used to trace the origin, authenticity and usage of digital data.