Before library patrons can use digital information, it has to be transmitted in some form to the library. This can happen in any one of a number of ways, including delivery to the library on CD-ROM, DVD, or some other physical medium, or through remote access to the publisher’s remote server. This section spells out exactly how this will be done.
Access by and Authentication of Authorized Users
Once the library has access to the digital information, it is necessary to provide a method by which your patrons can gain access to it. This sections sets forth how Authorized Users will be identified and authenticated to ensure that only those authorized by the agreement to use the information will be able to do so. Some of the more common methods are:
- Passwords and usernames
- Internet Protocol (IP addresses)
- Public keys/Certificates
If the agreement will be in effect for a long term, it might be useful to include a general clause the permits the parties to use new security methods that may be developed during the course of the agreement.