Delivery/Access; Authentication
Before library patrons can use digital information, it has to be transmitted in some form to the library. This can happen in any one of a number of ways, including delivery to the library on CD-ROM, DVD, or some other physical medium, or through remote access to the publisher’s remote server. This section spells out exactly how this will be done.
Access by and Authentication of Authorized Users
Once the library has access to the digital information, it is necessary to provide a method by which your patrons can gain access to it. This sections sets forth how Authorized Users will be identified and authenticated to ensure that only those authorized by the agreement to use the information will be able to do so. Some of the more common methods are:
- Passwords and usernames
- Internet Protocol (IP addresses)
- Public keys/Certificates
If the agreement will be in effect for a long term, it might be useful to include a general clause the permits the parties to use new security methods that may be developed during the course of the agreement.
See also:
Delivery/Access; Authentication: Example Clauses
Delivery/Access of Licensed Materials to Licensee |
1. Licensor will provide the Licensed Materials to the Licensee in the following manner:
{Include all that apply:}
Network Access. The Licensed Materials will be stored at one or more Licensor locations in digital form accessible by telecommunications links between such locations and authorized networks of Licensee.
Physical Media. Copies of the Licensed Materials will be provided to the Licensee on physical media (e.g., Digital Video Disk, CD-ROM, digital tape) for use on Licensee’s network and workstations.
File Transfer. Copies of the Licensed Materials will be provided to the Licensee through electronic transfer (by means of File Transfer Protocol or otherwise).
|
|
Commentary: This clause lists some of the more common means by which digital materials are delivered to the licensee for use by Authorized Users. Most likely all of these methods will not be used in one agreement. |
|
Access by and Authentication of Authorized Users |
1. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following:
{Include all that apply:}
IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor.
Passwords. Authorized Users shall be identified and authenticated by the use of usernames and passwords assigned by Licensee. Licensee shall be responsible for issuing and terminating passwords, verifying the status of Authorized Users, providing lists of valid passwords to Licensor and updating such lists on a regular basis.
Public keys/Certificates. Authorized Users shall be identified and authenticated by means of public-key and X.509 certificates.
2. Developing Protocols. Authorized Users shall be identified and authenticated by such means and protocols as may be developed during the term of this Agreement.
|
|
Commentary: This clause sets forth the methods used to provide access to the licensed materials by authorized users, and to ensure that only authorized users have access. It is unlikely that all of these methods will apply to a single agreement.
Example 2 is designed to provide flexibility as new methods are developed to identify and authenticate authorized users. This can be useful for long term agreements. |
Last updated: April 25, 2012