Before library patrons can use digital information, it has to be transmitted in some form to the library. This can happen in any one of a number of ways, including delivery to the library on CD-ROM, DVD, or some other physical medium, or through remote access to the publisher’s remote server. This section spells out exactly how this will be done.
Access by and Authentication of Authorized Users
Once the library has access to the digital information, it is necessary to provide a method by which your patrons can gain access to it. This sections sets forth how Authorized Users will be identified and authenticated to ensure that only those authorized by the agreement to use the information will be able to do so. Some of the more common methods are:
- Passwords and usernames
- Internet Protocol (IP addresses)
- Public keys/Certificates
If the agreement will be in effect for a long term, it might be useful to include a general clause the permits the parties to use new security methods that may be developed during the course of the agreement.
Delivery/Access; Authentication: Example Clauses
|Delivery/Access of Licensed Materials to Licensee|
|1. Licensor will provide the Licensed Materials to the Licensee in the following manner:
|Commentary: This clause lists some of the more common means by which digital materials are delivered to the licensee for use by Authorized Users. Most likely all of these methods will not be used in one agreement.|
|Access by and Authentication of Authorized Users|
|1. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following:
|Commentary: This clause sets forth the methods used to provide access to the licensed materials by authorized users, and to ensure that only authorized users have access. It is unlikely that all of these methods will apply to a single agreement.
Example 2 is designed to provide flexibility as new methods are developed to identify and authenticate authorized users. This can be useful for long term agreements.