Internet and email communications are essential for performing modern business tasks, but companies must put rules in place to reduce the risks that come along with those technologies. This policy offers guidelines to help ensure that both IT and users follow safe practices when using electronic communications such as messaging services, social media, and email tools.
From the policy:
Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access—viruses, ransomware, and data theft can result from unsafe practices, though infection can occur just from connecting an unsecured system to the network. Likewise, insider threats—such as the improper access or transfer of data—are important considerations when analyzing your security strategy.
This policy sets forth guidelines for the use of the internet, as well as internet-powered communication services, including email, proprietary group messaging services (e.g., Slack), and social networking services (e.g., Facebook, Twitter) in business contexts. It also covers Internet of Things (IoT) use, and bring-your-own-device (BYOD) practices.
You can customize this policy as needed to fit the requirements of your organization.
Generally, this policy assumes that:
Your organization permits personal internet use by employees, within reason.
Your organization uses internet content/security filtering software.
Backups, including compliance-related data retention, is automated by software.
Since March, Internet Archive has made more than 1.4 million books available online without restrictions, meaning that an unlimited amount of people could read one book at the same time, even if Internet Archive only owned one copy of that book.
The non-profit organisation had planned for the unrestricted lending service, dubbed the National Emergency Library (NEL), to be open through to 30 June 2020, “or the end of the US national emergency, whichever is later”.
“We moved up our schedule because … four commercial publishers chose to sue Internet Archive during a global pandemic,” Internet Archive wrote.
“However, this lawsuit is not just about the temporary National Emergency Library. The complaint attacks the concept of any library owning and lending digital books, challenging the very idea of what a library is in the digital world.”
The lawsuit against Internet Archive — raised by Hachette, HarperCollins, Wiley, and Penguin Random House — alleges that not only the NEL itself, but the way Internet Archive operates is a wholesale copyright violation scheme.
“IA is engaged in willful mass copyright infringement. Without any licence or any payment to authors or publishers, IA scans print books, uploads these illegally scanned books to its servers, and distributes verbatim digital copies of the books in whole via public-facing websites,” the publishers wrote in their complaint.
“With just a few clicks, any Internet-connected user can download complete digital copies of in-copyright books from Defendant.”
Isabella Alexander, former Newton Trust Law lecturer at the University of Cambridge, told TechRepublic that Internet Archive’s NEL is “essentially just copying books” and making them available to people without paying the owners of the copyright for that right.
“It’s prima facie infringement,” Alexander said.
“There are exceptions to copyright infringement in both the US and Australia, but it’s very unlikely that they would apply in the USA where they have this defense of fair use, which was successful in the Google Books case. But that was because they were only making small amounts available — here, they’re making the entire book available. [Internet Archive] is not transformative in any way, they’re clearly competing with the market of the copyright owners.”
Prior to the NEL, Internet Archive followed a “controlled digital lending” (CDL) model, which allowed patrons to digitally borrow a book for each physical copy that Internet Archive had in stock. Patrons would then be added to a waiting list if the book was checked out.
Kimberlee Weatherall, a professor at the University of Sydney Law School, said the case for infringing copyright was less clear when it came to lending books under a CDL model as its aim is to mimic libraries in how they lend physical books.
“The significant exception that operates in America is the fair use exception … fair use is open-ended, which means that new purposes like ‘we have a public health emergency and we need to make copies’,” Weatherall explained.
“You could try it, you could make the argument whether it would succeed would depend on whether the court decided that this was a true impact on the interest of the copyright owner, whether the purpose was a public good sort of purpose.”
Internet Archive operates differently to public libraries, however. It acquires a book through either donations or purchasing it, before then scanning the book and putting it online. Traditional libraries, meanwhile, pay licensing fees to publishers and agree to make books available for a certain number of times before repurchasing a licence to continue to lend digitally.
According to Alexander, lending books in this manner would still appear to not be legal as a copy of the works are still being made without permission from the author or publisher.
“There’s nothing in the statute in the US that says if you own the book, you’re allowed to make a copy of it. You only own the physical object, but the copyright is the right to make productions, which you don’t own just because you own a physical copy of a book,” Alexander said.
The Authors Guild, the US’ oldest writers’ organisation, has labelled Internet Archive’s decision to make in-copyright books freely available “appalling”.
“Bookstores are closing, forced to lay off staff, small publishers are already hurting so badly that some fear going under if the shut[d]own lasts too long. Everyone is working to support one another and especially the bookstores, so vital to our literary culture,” the Authors Guild wrote.
“Rather than supporting authors and book publishing, Internet Archive is undermining it when the industry faces a crisis of epic proportions.”
But Alexander said if the publishers were to progress the case all the way to a binding court decision, it would be a disappointing outcome as it could stunt the development of the e-book market, as well as other digital content markets.
With the proceedings not yet cancelled despite Internet Archive’s decision to cut the NEL program short, there are concerns that its other services, such as its Internet Wayback machine, which is an archive of the internet dating back to the 1990s, may also be affected.
“There is clearly a market here. Internet Archive is making available works that people needed and wanted, but they weren’t able to get them physically,” Alexander said.
“It feels like there is an opportunity, perhaps, for digital publishers to try and reach that market and maybe make their products more easily available, but not necessarily for free — on a basis that people can afford to access them in the same way that, say, Spotify has made mass libraries available for a reasonable price.”
But in explaining why digital publishers haven’t been as quick to adopt subscription-based models like those seen in the software and music streaming industry, Weatherall said e-books are “inherently different” products.
“Copyright markets are very distinct. Music operates differently from books, it operates differently from software, operates differently from film. The economics behind them, the markets behind them, the market structures around them, differ quite a lot,” she said.
Instead of taking a subscription-based route, she explained that digital publishers have used other methods such as embargoes on books that only allow them to be available for e-book lending after it has been released for two months, among other restrictions, that are aimed at preventing people from accessing content without permission.
The NEL service will end on Tuesday.
Be in the know about smart cities, AI, Internet of Things, VR, AR, robotics, drones, autonomous driving, and more of the coolest tech innovations.
Delivered Wednesdays and Fridays
Average daily web attacks against technology and media companies almost doubled between January 2018 and June 2019. In this same period, 35% of all credential stuffing attacks targeted these verticals. For this new State of the Internet / Security report, we look at the sources, techniques, and trends in this growing threat. You’ll see what 98% of web attacks against media and technology sectors have in common. And why video media attracts more credential stuffing attacks than any other vertical. You’ll also learn about the unique security challenges that streaming media companies face, including a shortage of security talent
Criminals go where the money is. And these days, there’s real money to be stolen in the virtual world of gaming. Our latest State of the Internet / Security report delves into the growing popularity of credential stuffing attacks against the gaming industry. In one 17-month period, we counted 12 billion attacks. We went over to the darknet and found some surprising reasons why. We also found another surprise in our study: Two vectors account for nearly 90% of all web application attacks. Also in this issue, Akamai CMO Monique Bonner shares three unexpected observations about security professionals.