Content Security

iCopyright, a clearinghouse service and provider of licensing for digital content, announced the company has been granted a US patent on its instant copyright licensing and verification system. With this invention, it will allow users to instantly verify that someone using copyrighted material has the proper license to do so, while also enabling users to obtain their own license to use the work directly from the copied work.

Posted Jul 19, 2012

Content Security means different things to different organizations. For enterprises, it's often about confidentiality and legal concerns. For the media and publishers, it's about making sure content - or intellectual property - isn't stolen or illegally reproduced. When digital files or text can be transferred with the click of a button, or posted on a new site with a simple copy and paste, age old concerns about copyright go into overdrive. Content security has come a long way since the first days of Napster, when college kids started trading music files like baseball cards.

Posted Jun 18, 2012

Lately, it seems that every other article about ebooks is news about a new lawsuit. Ebooks have a series of legal ramifications inherent to the format, problems that did not exist (or did but to a far lesser degree) in other book formats. Collusion, piracy, and who owns the right to publish what are just a few of the legal boondoggles that ebook publishers and authors are currently facing.

Posted Jun 12, 2012

Cloud-based security company, Digital Defense, has announced a new high impact security awareness program called SecurED, which the company believes will reduce the risk of security breaches within organizations. Digital Defense will be using the SecurED program to create more awareness and educate companies of security gaps involved with data protection.

Posted Jun 11, 2012

Building off of a lawsuit by nine different authors that began developing in early January, Apple is now facing legal action from 22 Chinese writers. The writers claim that Apple has been selling unauthorized copies of their works through the App Store.

Posted Mar 19, 2012

The High Court of England and Wales has determined that filesharing site The Pirate Bay violates copyright laws on a large scale. Justice Richard Arnold said the site's operators "induce, incite or persuade its users to commit infringements. ..."

Posted Feb 21, 2012

In wake of Apple's admission that mobile iOS apps have had access to users' contact data without permission, Google announced it's impossible for apps on an Android phone to share personal data with a developer unless users acquiesce.

Posted Feb 16, 2012

Copyright Clearance Center (CCC) launched the OnCopyright Education Certificate Program. The program is comprised of industry-specific courses that are geared towards a number of different user communities and their respective challenges in managing copyright.

Posted Feb 13, 2012

Twenty-nine major news and information companies have signed on as initial investors and participants in NewsRight, an independent digital rights and content licensing organization led by former ABC News President David Westin. NewsRight aims to support original news reporting by facilitating the use of published news content and data analytics with the permission of publishers.

Posted Jan 05, 2012

Wiley-Blackwell announced its participation in CrossRef's CrossMark service, which aims to clarify among different versions of scholarly articles being discovered by readers online. The service standardizes the way readers can identify and locate the most up-to-date version of the content.

Posted Nov 30, 2011

The recent proposal of the Commercial Felony Streaming Act, and the uproar over the potential it holds to send artists like Justin Bieber to jail for copyright violation, has put the subject of intellectual property and copyright on the front page. The following is an excerpt from a chapter in the book, Dancing with Digital Natives: Staying in Step with the Generation That's Transforming the Way Business is Done. The full chapter is titled: "Ethics, Technology, and the Net Generation: Rethinking Intellectual Property Law" and is written by Albert M. Erisman. The book is available on Amazon, Barnes & Noble, and other retailers in e-book and print format.

Posted Oct 27, 2011

Copyright Clearance Center, Inc. (CCC) announced that academic institutions using its Pay-Per-Use Services would be able to obtain reuse rights for entire books, including some that are commercially unavailable. CCC enables publishers to offer reuse rights for their books.

Posted Jun 28, 2011

The latest version of Automated Content Access Protocol (ACAP), the publisher-led project to develop tools for online copyright permissions information, was presented at International Press and Telecommunications Council's (IPTC) Business Meets Technology Day in Berlin. Version 2.0 of ACAP targets business-to-business content syndication, with a special focus on the context of licensing newspaper stories and the exchange of video content by news agencies.

Posted Jun 10, 2011

Cintas Corporation, a secure document management service provider, launched its Digital Vault Exchange (DVX) solution, a robust online system that backs up all databases, operating systems, and corporate email systems. Offering businesses 24/7 data security and compliance, the solution instantly recovers data if it is deleted or corrupted, and can save files for a fixed amount of time to comply with a business' retention policy.

Posted May 10, 2011

Liaison Technologies, a provider of cloud-based integration and data management services, acquired nuBridges, Inc., a company that provides enterprise data security, managed file transfer (MFT), B2B integration, and compliance management solutions.

Posted Apr 05, 2011

GigaTrust, a provider of enterprise rights management (ERM) content protection software solutions for Microsoft Active Directory Rights Management Services, is announcing the release of its DLP Protector for CA DLP. The GigaTrust Protector for CA DLP identifies and controls sensitive data while in storage, transmission, and use. It can determine what data needs to be controlled, prompting users to select digital rights to be applied when attempting to send sensitive data via email inside and outside the organization.

Posted Mar 24, 2011

Spectra Logic announced that it is now offering free data integrity verification for its complete series of tape libraries from SME to Enterprise. The company's BlueScale Data Integrity Verification ensures that data written to tape is retrievable now and into the future. According to Spectra, its tape libraries are currently the only tape storage systems that actively, automatically check the media and the data on tape throughout the storage life of the data.

Posted Mar 22, 2011

Giesecke & Devrient and Vodafone are developing mobile security applications that employ the SIM card as a key for authentication and encryption, including an application that involves SIM card-based authentication for access to a company network. The pilot projects for these applications were presented at CeBIT 2011, the international information and communications technology trade show hosted in Hannover, Germany, March 1-5 this year.

Posted Mar 08, 2011

Equifax announced the full integration between IBM Tivoli identity and access management solutions and its Anakam Identity Services. Equifax's Anakam Identity Services help government agencies implement strong authentication by helping configure authentication policy based on level of risk, individual project use cases, and compliance requirements.

Posted Mar 03, 2011

Information consultancy firm Anitian Enterprise Security will begin offering a cloud computing security assessment, allowing companies to evaluate the security of cloud-based solutions and identify potential risks. Anitian's Cloud Computing Assessment analyzes the ten primary areas at risk in a Cloud Computing environment, including user access, regulatory compliance issues, data security, and data forensics.

Posted Mar 03, 2011

In October, The Wall Street Journal reported that several popular Facebook applications had been transmitting users' personal identifying information to literally dozens of advertising and internet tracking companies. While Facebook maintains that there is "no evidence that any personal information was misused or even collected as a result of this issue," not all observers have been appeased.

Posted Feb 17, 2011

MVB, VLB, and the Copyright Clearance Center are teaming up to offer the VLB Books in Print Catalog through "MVB RightsLink - Powered by CCC," an automated and standardized rights trade system for small licence deals for the German-language sector. As part of this cooperation, the software and technology from CCC's Rightslink will be integrated into the VLB.

Posted Feb 10, 2011

Mobile workforce data protection leader attracts funding to fuel growth after signing multiple new channel partnership agreements.Datacastle, a provider of mobile workforce data protection solutions, announced completion of a $2 million financing. The company's latest funding round is led by CM Capital and Haag Ltd., both of Australia. The financing comes on the heels of several recently-announced agreements including relationships with Seagate i365, Systemax MISCO Germany, and Computerlinks to distribute Datacastle's endpoint backup and data protection solution - Datacastle RED.

Posted Feb 08, 2011

CipherOptics announced a company-ide rebranding initiative with a new name and logo. The company also outlined its strategy for support of secure cloud connectivity, along with a data security plan for customers migrating from distributed networking to private clouds and public cloud infrastructures.

Posted Jan 20, 2011

The new version of SecureTower identifies confidential documents within data flows that go beyond a company's borders, comparing those documents to preset templates.

Posted Jan 18, 2011