Copyright Compliance and Fair Use

Copyright Compliance and Fair Use

Order Description

Scenario 1
Dr. Lucas is designing an asynchronous online undergraduate psychology course on the biology of behavior. She conducted an Internet search and came across an

interactive 10-minute multimedia segment on the brain that she would like to embed into her classroom as a learning resource for students. Dr. Lucas believes she does

not need to seek permission for use of the multimedia segment in this manner or cite its source because it will be used for educational purposes in her classroom, but

she is not sure.
With these thoughts in mind:
1. What factors should Dr. Lucas consider in determining if her use of the multimedia segment complies with or violates copyright law and fair use?
2. What advice would you offer Dr. Lucas to aid in making her decision?
In this discussion you are asked to: write a two-paragraph analysis that addresses the questions for scenario 1. Be specific and provide support from the Learning

Resources and scholarly literature.
I will upload these articles that are to be used:
? Ko, S., & Rossen, S. (2010). Copyright, intellectual property, and open educational resources. In Teaching online: A practical guide. (3rd ed., pp. 227?244). New

York, NY: Routledge.
Teaching online: A practical guide 3rd ed. by Ko, S., & Rossen, S. Copyright 2010 by Taylor & Francis Group LLC – BOOKS. Reprinted by permission of Taylor & Francis

Group LLC – BOOKS via the Copyright Clearance Center.
? Rodriguez, J. E. (2011). Social media use in higher education: Key areas to consider for educators .Journal of Online Learning & Teaching, 7(4). Retrieved

fromhttps://jolt.merlot.org/vol7no4/rodriguez_1211.htm
? Starr, L. (2010). The educator?s guide to copyright and fair use: A five-part series. Retrieved fromhttps://www.education-world.com/a_curr/curr280.shtml

Social Media Use in Higher Education: Key Areas to Consider for Educators

Julia E. Rodriguez
Assistant Professor
Information Literacy and Educational Technology Librarian
Oakland University
Rochester, MI 48309 USA
[email protected]

Abstract

The use of social media in higher education classrooms is on the rise as faculty employ a variety of software tools and free web applications to enhance learning,

communication, and engagement. Web 2.0 social software exists beyond traditional course management systems and potentially opens up the academic environment to a

public space. This article presents important issues for educators to consider as they use these new tools by investigating the ramifications of moving academic

activities to a public sphere and examining how laws that govern our academic freedoms and behaviors translate in this new environment. The discussion focuses on

concerns specific to incorporating the use of social media and user-generated content into the teaching and learning environment in higher education, touching on

compliance with disability and privacy law, intellectual property rights, copyright law, and the fair use exemption providing practical advice with each area of

consideration.

Keywords: user-generated content, intellectual property rights, copyright, ADA, FERPA, privacy, fair use

Introduction

With faculty using a variety of software tools and free web applications to enhance learning, communication, and engagement, the use of social media is on the rise in

higher education classrooms. Emerging Web 2.0 social software exists beyond traditional course management systems and potentially opens up the academic environment to

a public space. By using these tools, academic content, discussions, and other interactions no longer live in the safe, controlled world of academia but now become

public – living on public servers, retrievable by public search engines, where most, if not all, are owned by for-profit and public companies.

Rather than debating or discussing in any depth pedagogical reasons for using social software tools for teaching, three important questions will be addressed: 1) What

should educators know or consider as they employ these tools? 2) What are the ramifications of moving academic activities to the public sphere? 3) How do laws that

govern our academic freedoms and behaviors apply in the online environment? The discussion that follows focuses on issues specific to incorporating social media and

user-generated content into the teaching and learning environment in higher education, touching on compliance with the Americans with Disabilities Act (ADA) and the

Family Educational Rights and Privacy Act ( FERPA), intellectual property rights, copyright law, and the fair use exemption.

User-Generated Content (UGC), Social Media, and the Web 2.0 Revolution

The ubiquitous term “social media” has become inherently connected to the popular YouTube, Flickr, and Facebook websites. Describing media as “social” implies that it

exists in a social space and/or users interact in some way with the media. Kaplan and Haenlein (2010) defined social media as “a group of Internet-based applications

that build on the ideological and technological foundations of Web 2.0 and that allow the creation and exchange of user-generated content” (p.61).

User-generated content (UGC) is another term popularized by the possibilities of Web 2.0 applications, which no longer limit users to being passive consumers of

content but enable them to become active participants and even authors in a collaborative social environment. To be considered UGC, the creative content must be openly

published and accessible and developed outside the commercial sphere (Kaplan & Haenlein, 2010). In this wayusers are developing content for the sake of the creation

rather than as a consumable commodity (Halbert, 2009).

The term “Web 2.0” first appeared in 2004 to describe the transition of the World Wide Web from a broadcast to a participatory medium, recognizing the revolution

taking place by the unprecedented and ongoing collaboration between software developers and end-users (Kaplan & Haenlein, 2010). This development, brought on by new

and enhanced functionality, set the stage and created the infrastructure for social media to evolve (Kaplan & Haenlein, 2010). Web 2.0 structure and social networking

applications allow users to produce more easily and widely share UGC. Thus, social media is the arena where users can “engage in the creation and development of

content and gather online to share knowledge, information, and opinions using web-based applications and tools” (Grover & Stewart, 2010, p. 9).

Teaching with Social Media in Higher Education

The Web 2.0 revolution has certainly entered education, carrying with it the notion that users add value through their participation (Mason & Rennie, 2008). It has

changed the web browsing culture from passive to participatory with easily-created user-generated content. This call to users to become content creators radically

challenges the traditional authoritatively-driven teaching and learning model. When students actively participate in knowledge creation for themselves and their peers

by employing the tools they use every day, they are changing the flow of information from “unidirectional to multidirectional,” (Grover & Stewart, 2010, p. 10-11) and

defining a new Learning 2.0 paradigm . Lee and McLoughlin (2007) noted that this reality is one where teachers/educators relinquish some control to embrace the

informal leaner-centered pedagogies empowering twenty-first century learners; they went on to state, “these changes are inevitable and unavoidable, given the morphing

nature of higher education.”

Using technology to accommodate students’ different learning styles is not novel. The strength of social media applications is that they offer an assortment of tools

that learners can mix and match to best suit their individual learning styles and increase their academic success (Grover & Stewart, 2009). Further, such technologies

are typically freely accessible, easy to incorporate, and have a minimal learning curve to master. Learning environments can become personalized, and faculty can

enhance their pedagogical techniques by using tools to extend class engagement beyond designated class time and to increase the quality and quantity of participation

in online courses (Grover & Stewart, 2009).

Some faculty members are still reluctant to use their campus learning management systems, and others are frustrated with the limitations and proprietary nature of such

systems (Dalsgaard, 2006). The growth of courses, and even complete programs, being taught online has challenged educators to develop effective delivery methods that

move beyond ‘read and click’ while enhancing the learning of all students. Advocates feel that the wide acceptance of social media sites outside the higher education

arena establishes a congruity easily transferable to community building in e-learning, which has the potential to transform higher education as a whole (Hoffman,

2009). Hoffman (2009) also argued that case studies demonstrate “multiple benefits for using SNS [social networking software], including, retention, socialization,

collaborative learning, student engagement, sense of control and ownership” (p.3), along with a list of other perks for students and instructors.

Use of Social Media in Higher Education Literature

There have been many anecdotal articles published in the last eight to ten years on the use of social media and the incorporation of UGC in both K-12 and higher

education classrooms. More recently, in-depth theoretical discussions and research results from case studies and experimental studies have appeared.

Arguments and Examples Supporting Use

Alexander (2006) introduced a variety of social media tools and explains how they could be used in higher education classes. Yet, he also challenged the community to

look at how higher education faculty currently put forward “a complex, contradictory mix of openness and restriction, public engagement and cloistering” (p. 42). Duffy

and Bruns (2006) detailed the possibilities for using social software tools such as blogs, wikis, and RSS feeds in educational settings, stating that our new ‘social’

and ‘mobile’ reality of delivering educational content to students must match what they will encounter after graduation. They suggested that educational institutions

have an obligation to their students to best prepare them for the future by fostering their collaborative communication competencies (Duffy & Bruns, 2006).

Richardson (2006) examined teacher-specific implementations of web tools to inspire deep student learning and active participation in the knowledge that makes up the

web. His discussion connects these real examples to the pedagogy they support, emphasizing the shifts now happening in education toward mastering new competencies.

These examples include use of open educational content, meaningful knowledge constructions, and the 24/7 learning environment, among others. Mason and Rennie (2008)

advanced the idea that the core element of social networking sites, i.e the incorporation of UGC, has “potentially profound implications for education” (p. 4) because

it permits course design to add value and empower learners. Yet, they warn that new technologies should not lead the design of activities but only be utilized to

support educational outcomes.

Pedagogy and Usefulness

Enough experimentation has taken place in the classroom that studies have now been published investigating pedagogy and actual usefulness of Web 2.0 tools, including

some discussions of outcomes (Grover & Stewart, 2010; Mason & Rennie, 2008). For example, Wheeler, Yeomans, and Wheeler (2008) evaluated collaborative learning by

students who use a wiki to create user-generated content for their learning experience. Despite students’ hesitation to create work in a public setting, or to work as

a group and the limitations of evaluating individual contributions, they still felt the tool held great potential to transform education. They emphasized that the

primary benefit of using the tool is for collaboration or extending engagement outside the classroom and advised teachers to act only as facilitators or moderators in

this environment.

Aijan and Hartshorne (2008) examined faculty adoption of Web 2.0 applications by investigating faculty members’ knowledge and perceptions of the tools. They also

considered actual use factors that influence adoption. Their literature review presented a discussion of pedagogy while highlighting some of the tools’ advantages.

Results indicated that while a majority of faculty members were aware of the pedagogical benefits these tools can offer, a disconnect occurs when it comes to actual

adoption or future plans to incorporate them into their teaching. They determined that faculty attitudes strongly predicted whether or not they actually adopted a new

method. Their recommendations called on administrators to promote the use of new social software , emphasizing their gradual learning curve and congruity with current

practices. Further, they suggest that efforts should be made to build educators’ overall confidence and comfort with new technologies (Aijan & Hartshorne, 2008 ).

In search of actual empirical data from student and faculty use of social technology, Hemmi, Bayne, and Land (2009) conducted in-depth case studies of three different

classroom use occurrences, exploring from a pedagogical perspective how higher education has been implementing these technologies. They concluded that faculty and

students are approaching new tools and methods with some caution. They attributed this to the inherent slow-to-adopt-change nature of academia and its unwillingness to

stray from the traditional models. Despite this, the researchers were encouraged that higher education institutions have begun to recognize social media’s immense

possibilities (Hemmi et al., 2009).

Junco, Heiberger, and Loken (2010) conducted an experimental study to determine how the use of a specific tool, Twitter, has impacted student engagement and affected

student grades. Twitter was used to extend discussion beyond the classroom by having students participate in panel discussions, submit reactions to readings and their

service work observations. Along with their posts they were to react to other students’ tweets. The researchers used two student groups, a control group who didn’t use

Twitter and an experimental group that received training and had assignments that required them to use to tool. Their data demonstrate that students using Twitter “had

a significantly greater increase in engagement than the control group, as well as higher semester grade point averages” (p. 1). The researchers strongly feel these

results are evidence to support the educational usefulness of the tool and social media as a means to reach higher educational outcomes.

The many chapters of Cutting-Edge Social Media Approaches to Business Education (2010) are authored by various educators who detail their experiences with using

Facebook, Second Life, Twitter and other common social media sites in their teaching. Several authors investigate learning styles and the connection between pedagogy

and tool-specific advantages. Wankel (2010), the editor, argues the case in the first chapter that business students will be expected by future employers to be

proficient with new cutting edge technologies for business communication. Individuals displaying these proficiencies are certain to have advantages over students who

haven’t had opportunities to develop these skills. This echoes the findings of Duffy and Bruns (2006).

The European Commission, interested in promoting innovation in higher education, has funded a three year iCamp research project which “ investigated how Web 2.0

technologies can be implemented in higher education settings.” (n.d., p. 6). This has resulted in the free published handbook, How to Use Social Software in Higher

Education. The handbook is aimed at educators who are interested in incorporating social software into the learning process. It takes a constructivist pedagogical

approach offering information about teaching styles and different software tools connected to the learning activities they support. The iCamp Project foresees that use

of these tools can transform learning in higher education.

These studies are just a few from the burgeoning discussion taking place in academia, a discussion which has begun to examine this new paradigm with increased scrutiny

and formality. While most of this literature considers the use of social media in education from a theoretical or educational pedagogical view, the remainder of this

article will provide practical guidance for faculty interested in incorporating social media tools in general, and user-generated content more specifically, into their

teaching. This is a chance to pause and consider some of the implications that arise when moving academic activities to the public sphere.

Key Areas of Consideration for Educators
The numerous books and articles that have already been published by enthusiasts detailing how social media and UGC can be used in classrooms are primarily written by

education reform advocates and early adopters. These authors share realistic examples while trying to demonstrate how these new tools can transform teaching, learning

and education as a whole ( Duffy & Bruns, 2006; Alexander, 2006; Richardson, 2006; Junco, Heiberger & Loken, 2010) . Missing from this dialogue, however, is discussion

of how best to tackle some of the practical, less paradigm-shifting questions about ownership, privacy and security, access, accessibility and compliance, stability of

technology, intellectual property rights, and copyright law.

Ownership and Intellectual Property
A discussion of ownership in academia is synonymous with addressing intellectual property (IP), a term that has become increasing common in the popular media. The

question really is one of ownership and rights: who owns not only the tangible item that is created, but the intellectual concepts, ideas or processes behind the

creative work or property? Dictionary definitions refer to concepts of property rights that extend to ideas, inventions or processes–that is, creative works of the

mind that may not have any tangible physical form (OED, 2010).
The examination of IP rights in the “real” world, however, is rapidly becoming a challenging and active legal area. In higher education IP is usually handled with

specific policies, often negotiated and connected to bargaining contracts that determine who owns the work that gets created by faculty and staff and which detail

agreements regarding inventions that can be trademarked. Student ownership, on the other hand, occupies a gray area. There is no standard way of addressing the

intellectual property rights of student work. Many universities assume ownership of student-generated work, usually those research projects that are co-sponsored by

faculty and are primarily created using university resources.
Before there was the ability to digitally create and collaborate or share work over the Internet, the ownership and use of another’s copyrighted creation was pretty

straightforward. An example of the growing uncertainty is the controversy about the plagiarism detection software Turnitin , which has been challenged by many student

advocates as a breach of their copyrights. These objections escalated into a t least one lawsuit that has since sparked discussions across campuses about students’

rights and, in some cases, influenced institutions’ decisions to end the use of these services altogether (Foster, 2002; Parry, 2009). Increasingly, universities are

respecting students’ IP rights, mainly by recognizing them as copyright holders of the work they create. When using social media tools in the classroom, the strict

definition of original author or owner is blurred. For example, who owns the IP rights to a class-created wiki or blog, or the items developed for an island in Second

Life? As faculty members recognize the possibilities of using these Web 2.0 tools to engage students, they are becoming co-authors/creators alongside their students.

Students begin to see these creations as portfolio work, and desire some ownership of what they’ve created. Further complicating the ownership question is the fact

that these new creations are often hosted on servers and services owned by for-profit companies. Most users of these services are not aware that the providers of these

free tools may claim ownership of the work created and residing on their servers. What is perhaps the most well-known controversy of this nature arose in 2009 when

Facebook changed its terms of service agreement with its users, granting itself the rights to use photos, posts and content that users make available on the system in

any way it desires–even in cases where users have terminated their accounts. Facebook’s explanation was that this change was necessary to maintain cohesion and system

functionality, but the public perception was that Facebook was staking claim to users’ copyrighted materials. The outcry was so great that Facebook returned to their

original policy (Stone & Stelter, 2009; McCarthy, 2009).
The virtual world of Second Life (SL) presents an even more complicated IP rights conundrum. Users in SL are content creators, constructing everything from basic

avatars and clothing to buildings and even islands. The terms of service agreement states that Linden Lab, the owners of SL:

“retains ownership of the account and related data, regardless of intellectual property rights you may have in content you create or otherwise own. You agree that

even though you may retain certain copyright or other intellectual property rights with respect to Content you create while using the Service, you do not own the

account you use to access the Service, nor do you own any data Linden Lab stores on Linden Lab servers (including without limitation any data representing or embodying

any or all of your Content)” (Terms of Service, http://secondlife.com/corporate/tos.php).

While faculty members may understand that having access to another’s work does not make them owners or give them rights to freely use the content as they wish, this

concept may not be so clear for students. Recognizing the ease with which digital content can be copied, remixed, and reused, it is wise to facilitate discussions or

assign readings about ownership and attribution, addressing ethical and legal content use.
Groups of users employing services and tools that involve the development of public spaces or objects are propelling the discussion of ownership, or lack thereof, to

the creative content. Intellectual property rights and ownership questions are at the center of a complex web, overlapped by issues encompassing the use of copyrighted

materials. Stuck in this web are other important concerns that must be considered such as matters of privacy rights; the Family Educational Rights and Privacy Act

(FERPA); security; accessibility; access; compliance with the Americans with Disabilities Act (ADA); and the longevity and stability of these tools and services .
Privacy (FERPA) and Security
Institutions of higher education and teaching faculty have been dealing with FERPA since it was enacted in 1974. Many exceptions and amendments have been added over

the years to address a wide variety of situations where personal information or data can or cannot be released ( U.S. Department of Education, 2004 ). Traditionally,

faculty only considered their obligations under FERPA when dealing with disclosure of student grades and the handling of personal information. However, when digital

communication started to replace analog methods, clarification had to be made about how faculty could even transmit this information (much of this concern has been

handled by securing institutional records systems and prohibiting the transmission of grades via email). Most universities include summaries of FERPA in their student

and faculty handbooks and have data security policies that outline employee obligations and restrictions.
Even though social media tools being used do not collect enough personally identifiable data to threaten FERPA laws in most cases, the issue of student privacy in the

broader context is still one that should be strongly considered. There was once a time when events that happened in a classroom were ephemeral and intangible,

restricted to only the participants present and the extent that their memory would retain them. Using mediated tools that capture discussions and activities in an open

public space fixes these events for digital perpetuity and makes them potentially available to a world audience. Stories about students posting images and comments on

Facebook that have later come back to haunt them when looking for a job, or employees being let go because of comments made in what they thought was a private space,

have made media headlines in the past few years. Even if class-created content is later deleted by the faculty member or kept restricted to only the class

participants, content and comments created online can be stored and archived by anyone with access, which creates the potential for them to resurface later. Will this

public learning space inhibit risk-taking and instead foster a reluctance to share ideas with a broader audience for fear that these things will come back to haunt the

student later? Faculty should consider not only having a discussion about online privacy but also include a statement in their syllabus about proper conduct and

expectations for both students and faculty.
Another twist to the privacy concern is what the hosting sites do with the data they collect on their users. Should faculty ask or require students to use public

systems that gather preference data on users, which the sites then sell to other companies as valuable targeted marketing data? Facebook has repeatedly made news

headlines about privacy issues and access to user profiles. Lately, the concern has been third party applications misusing information without users even knowing that

their information is being made available (Young, 2008). But perhaps this new Google-infused culture renders the privacy issue moot, as Google appears to be the search

engine of choice and has long been mining user emails and search histories without widespread dissent. If nothing else, faculty can use these issues as teaching topics

that aim to enhance students’ media literacy.
Using social media in classroom activities moves discussions and interactions that were once private, happening in a secure classroom, into a public space where

potentially the entire connected world can bear witness. Common sense would dictate that even when an online space is restricted to a specific classroom, it is never

wise to publicly discuss student grades or put forth any critical review or feedback of an individual student’s performance.
Access, Accessibility and Compliance
In the area of access, faculty members need to consider a chosen medium’s ability to accommodate students’ diverse learning needs, which include accessibility as

defined by the Americans with Disabilities Act (ADA). The rights of students with disabilities at the university level are also protected under the Vocational

Rehabilitation Act of 1973 (United States Department of Education (2004) and the Americans with Disabilities Act of 1990 ( U . S . Department of Justice (2009 ).

University faculty members are most familiar with the reasonable accommodation requirement or “appropriate academic adjustment,” as stated in section 504 subpart E of

the Disabilities Act (Jarrow, 1997). It is notable that the law does not go into detail as to what is considered “reasonable,” leaving this up for interpretation.
Again, in an analog world addressing these concerns was much less complicated. Today, with the prevalence of electronic course management systems, library databases

and institutional data systems, ensuring that necessary materials are actually useable and available to every student has become more challenging. Fortunately, the

availability of assistive technology tools to enhance accessibility for a wide range of challenges and disabilities seems to have increased. For instance, screen

readers are no longer expensive software systems relegated to a few computers in the university library. What’s more, free applications that read screen text aloud are

now available.
Online social media sites create an even more challenging environment as they are rich in media, images, and links facilitating complex interactions that use scripting

languages not compatible with accessibility software, such as typical screen readers. In a survey of the five most popular social media sites (Facebook, MySpace,

YouTube, Yahoo, and Bebo), Ability Net, a UK disability charity, found “that, in contrast to their apparent universal appeal, they are effectively ‘locking out’

disabled visitors, the majority of whom can’t even register, let alone participate in the on-line communities they wish to join” (AbilityNet, 2008). Even just creating

an account was found to be nearly impossible as the widely used CAPTCHA image technology ( C ompletely A utomated P ublic T uring Test to Tell C omputers and H umans A

part) is inaccessible to visually impaired, dyslexic, and many others with learning disabilities. Most users have encountered it as the visual verification code of

slated and distorted letters that they must decipher before proceeding with a task. While newer versions of spam software are now employing audio in attempt to address

this dilemma, access issues remain.
The National Federation of the Blind recently filed a federal complaint against Pennsylvania State University on behalf of the blind and visually impaired citing

“pervasive and ongoing discrimination” (Parry, 2010), claiming that the omnipresent use of technology on campus creates a “misery for blind students trying to go about

basic academic business”. This complaint is the first of its kind in that it’s not targeting a specific technology as did the Arizona State University-Kindle case.

This grievance was filed in 2009 by the National Federation of the Blind and the American Council of the Blind against the university for distributing electronic

textbooks that were not accessible to visually impaired users (Beja, 2009) . The complaint against Pennsylvania State University is lodged at systems used by the

entire university: its department websites, course management system, and even the library.
Universities already go to great measures to be inclusive and equitable. Faculty and staff are typically the ones carrying out policies and communicating needs. So

far, fringe use of new social media tools may not have reached a level of saturation to be included in large scale lawsuits; however, faculty need to be diligent and

thoughtful about accessibility and compliance issues when looking to incorporate new and exciting teaching methods.
Stability of Technology
The stability of the technology and the systems professors use for teaching and research is often taken for granted. Unless there is an outage, accessing the network

from anywhere, using technology in the classroom, or teaching with a course management system (CMS) are usually effortless tasks that happen repeatedly throughout the

day without much thought. However, if the network goes down in the middle of a lecture or files that were uploaded to the CMS disappear or are somehow corrupted, the

reliability and stability of these systems quickly become an issue.
Campus systems need to establish support mechanisms: there should always be someone to call, be it the university technology services department or the technology help

desk. However, when faculty members use off-site, in-the-cloud software, the reliability and stability of these systems are all outside the traditional support

structure. New start-up companies (and even some well-established ones) can disappear overnight, can be bought by competitors, or change their use agreements without

notice, all of which jeopardize the users’ content.
The most common stability issue for technology is likely the removal of content by the software web host or system provider because of a Digital Millennium Copyright

Act (DMCA) take-down request wherein copyright holders can initiate removal of material they consider to be infringing upon their copyright. The web host has a limited

time to respond to the request, so typically it will remove the content without investigating the complaint and then send a notice to the user who posted the content,

notifying him/her of the removal. Users can challenge the removal, but it takes time and creates a lot of hassle for users who need to access their content for a

specific time period. The Recording Industry Association of America (RIAA) uses the DMCA take down provision regularly to control the use and remix of their

copyrighted works; most users just comply even if they feel their use of the music was fair, fearing the wrath of this industry Goliath. A growing backlash has been

getting more attention, fueled by the perceived abusive use of take down notices being exploited by those who want to control speech, protect their online

reputation–or worse, limit access to important research and information (Electronic Frontier Foundation, 2003). Over the past few years, the Electronic Frontier

Foundation (EFF) has begun challenging the blatant overuse and even misuse of the take down provision by filing lawsuits in support of affected users (EFF, 2007). With

social media exploding exponentially, these challenges to the thirteen-year-old DMCA law are certain to continue.
Technological stability may not be a large concern for faculty, since their use of systems is often limited to a fixed time period, such as specific semester.

Nonetheless, of the issues raised by DMCA take down provision, specifically intellectual property right and copyright ownership are often the most confusing for

faculty.
Intellectual Property Rights (meets) Copyright law
Social media by its very nature uses other peoples’ content, as many of the new web software tools are based on the idea of mashups. Mashups utilize user-generated

content and available media or data to create derivative works or supply enriched digital content ( Wikipedia.org, March 9, 2011) . An example of this would be the BBC

news website incorporating Google maps data to enhance their news coverage.
Digital technologies and new ways to use and reuse content are challenging society’s notion of intellectual property and what is a fair use of someone’s copyrighted

work. Probably the first blockbuster case involved the music site Napster, whose service was ultimately shut down (Green, 2001). But that case was only the beginning

of the revolution brought on by digital media and users’ desire to change the paradigm of control. Napster and other similar file sharing services’ weakness is that

they simply shared original, copyrighted files without adding, transforming, commenting upon, or in some way enriching them, as is the idea of mashups. These user

creations can exist, knowingly or not, because of the fair use exception found in the copyright act and because, at the moment, there is no legal precedent to stop

them.
Understanding Copyright Law Limitations and Fair Use

Title 17 of the United States Copyright Act protects authors’ rights to their original expression by providing them an exclusive license, for a limited time (though

not so limited any more), to do the following: reproduce copies of the work, publicly distribute or transmit copies, publicly perform the work, publicly display the

work, and create derivative works based on the original work. Copyright protection cannot be applied to facts, ideas, processes or procedures, concepts, principles,

system or methods of operation, nor discoveries.

The intent of copyright law is twofold: to protect the rights of authors/creators for a limited time and to promote the public good by allowing for use of these

creations. Therefore, built into copyright law were some limitations: it does not control private uses, readings, and performances (section 110); it is limited by the

right of first sale (section 109), thereby allowing reselling of books; and it contains a fair use provision (section 107). Fair Use is a “ judicially created

equitable rule of reason” ( Oakley, 1990, section G, 1, para. 1), a provision of copyright law that permits individuals to use portions of copyrighted works without

obtaining permission. The doctrine includes an non-exhaustive list of uses that could qualify as fair, such as works that are transformative, derivative, works of

parody, commentary, and educational (which includes teaching, scholarship, and research). Rather than listing exact limits of fair use, copyright law provides four

factors for determining a fair use exemption: the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit

educational purposes; the nature of the copyrighted work; the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and the

effect of the use on the potential market for or value of the copyrighted work. The four factors are weighed against each other; no one factor is determinative in

every case.

Often universities, particularly their libraries, develop some version of a checklist or quota system for determining if a use of copyrighted material qualifies as

fair. These are attempts to assist faculty and librarians in their fair use decisions, but these checklists typically oversimplify the analysis and over-restrict use

by placing false quotas on amounts. Using one chapter of a thirty chapter book is not the same as one chapter of a four chapter book. Overuse of these quotas by

university libraries has contributed to the eroding of fair use along with a propensity to avoid any risk and accept the increasing demand to pay for every use for

fear of a lawsuit.

Educators are typically familiar with copyright law through the fair use exception that allows use of copyrighted materials in the classroom. Most higher education

faculty have some comfort level with interpreting fair use for their classroom activities but are challenged by how to translate this use into their online classrooms

and our new digital online society. Course management systems have placed the power in the hands of faculty to upload, link, and stream pretty much anything they wish

to include in their lessons. If being in a university-sponsored password protected online space that is limited to only the current class has created a fictitious

safety net for using copyrighted materials, taking this class out into the open web–a public space available for the world to view–should spark some serious

contemplation.

Digital technologies have challenged some very basic definitions that we considered axiomatic for a long time. For instance, the idea of ‘copies’ is difficult in the

digital age. When someone shared a copy of a book in the analog world, the original owner no longer had the book, or if she/he did, the copy that was shared was

greatly inferior. Today when a digital file of a book is shared, both people have perfect copies, and when one person forwards that item to a group of friends, now any

recipient of that transaction also has a perfect copy. So this simple act not only challenges the notion of copies (first exclusive protection) but also the concept of

distribution (second exclusive protection). Consider when a mother innocently posts a video of her child singing along to a famous pop singer’s song on YouTube. One

may interpret this as performing, transmitting, broadcasting or even displaying a copyrighted work (fourth and fifth exclusive protection) as argued by the Universal

Music Corp and the artist Prince against Stephanie Lenz (Citizen Media Law Project, 2007 ). Social media and remixing of creative expressions inherently challenges the

third exclusive right of creating derivative works based on the original. All of these activities can take place daily in a modern classroom that incorporates new

media tools.
Pushback and Guidelines
Many industry giants and big business are trying to secure their intellectual property; essentially, claiming that fair use does not apply to digital content or the

Internet-connected social Web 2.0 universe. A growing movement of user watchdog groups, educators, librarians, researcher, scholars, artists, and new technology

innovators are adamantly arguing to the contrary.
One such result of this pushback was the founding of the Creative Commons (CC) community, a 501(c)(3) tax-exempt charitable corporation founded in 2001 with support

from the Center for the Study of the Public Domain at Duke Law School. According to its mission, CC “develops, supports, and stewards legal and technical

infrastructure that maximizes digital creativity, sharing, and innovation” (http://creativecommons.org/about). Its members work to achieve this through the development

of the Creative Commons licenses . These sets of licenses and tools supply a means for copyright owners to choose the type of use they would like to allow for their

work, while at the same time providing users with content free of copyright restrictions; thus, empowering all groups.
Guidelines for Use
In line with the Creative Commons movement has been the development of Best Practice Codes. These codes, developed by different factions of users, interpret fair use

and establish specific “best practices” for the use of copyrighted material for their discipline or communities. The Center for Social Media at American University’s

School of Communication, in partnership with Washington College of Law, has spearheaded the development of fair use educational tools and best practice codes for a

growing number of communities. These codes are now being recognized as ‘industry’ standards, such as the Code of Best Practices for Fair Use in OpenCourseWare, for

Media Literary Education, for Online Video, for Documentary Filmmakers, for Scholarly Research in Communication (Center for Social Media, 2011). These best practice

codes set precedent for exercising fair use as an “affirmative right that allows copying in specific circumstances versus merely a defense used in cases of copyright

infringement” (Davis, 2002, p. 5). Doing otherwise empowers IP rights’ holders and copyright owners and the restrictive technologies they employ to personally censor

creativity and removes fair use as an option altogether (Davis, 2002).
Fair use can still be applied in the digital world. In many cases the use or reference to another’s creative work by one author/creator can bring unexpected attention

and interest to work that otherwise may have remained forgotten or anonymous. New technologies and social media in some ways make it easier to provide attribution to

the original works that inspired the new creations. Students begrudgingly learn that they need to cite their sources when writing papers. Faculty need to extend

discussions of ethical information use in all forms of scholarly endeavors including media and creative compositions, stressing the concept that just because something

is legal, doesn’t make it ethical. Simple steps, such as always acknowledging sources of content, linking borrowed information and ideas, or creating credit pages can

be made part of the requirements for an assignment. If use is substantial enough, but still within the fair use exception, it is always good ethical practice to extend

courtesy to the original creator by seeking permission with a request that details how the work is being remixed. This is especially true if students plan to retain

the work for their portfolios and will be ‘publishing’ them in some way for potential employers to view. It’s important for students to remember that posting work to

the Internet or even a course management system can be considered publishing and distributing.
Many groups have joined together in challenging the evasive permission culture (Lessig, 2004) in defense of fair use and the ability to retain access to cultural

objects not just for educational purposes but continuing our tradition of “free culture– not free as in free beer but free as in free speech, free markets, free trade,

free enterprise, free will, free elections. A free culture supports and protects creators and innovators” (Lessig, 2004, preface xiv).
Conclusion
Faculty are embracing the use of new and innovative technologies, but this time the technological change isn’t arriving as carefully planned and sanctioned

institutional initiatives but more as a grassroots movement. Adventurous educators see how the new communication and networking tools used by the masses can be adapted

and utilized for teaching purposes. The free, easy-to-use social media that has now permeated so much of daily life brings with it the opportunity to enhance learning,

participation, communication, and engagement; to extend the classroom experience; and/or to enrich the online classroom. Professors incorporating these tools into

their instruction can build their confidence with employing technology. At the same time, students are encouraged to be active participants in teaching and in their

learning which creates a more engaging environment for all constitutes.

Choosing to use social media software and integrate UGC with the intention of enhancing engagement, interaction, and excitement is a very worthwhile effort but one

should ensure that the trade-offs are equitable and ethical. Some suggest that these tools have relevance for implementation at all levels of education; they argue

that such action “will better prepare students for a slew of new illiteracies and competencies in their post-education lives.” (Richardson, 2006, p 5).

Faculty can benefit from sharing experiences with colleagues and developing assignments that engage students in thoughtful discussions of new media’s challenges

relating to privacy, ownership of intellectual property, and use of copyrighted materials which are teaching topics that can enhance students’ media literacy.

Ultimately, the goal of teaching is learning and knowledge creation. If our society is at the point of what Thomas Friedman has described as “connecting all the

knowledge pools in the world together” (2005, p269), then is it imperative that not only our students but also our faculty are competent knowledge consumers

(Richardson, 2006).

References

Alexander, B. (2006). Web2.0: A New wave of innovation for teaching and learning? EDUCASE March/April, p. 33-44.

Ajjan, H., & Hartshorne, R. (2008). Investigating faculty decisions to adopt Web2.0 technologies: Theory and empirical tests. Internet and Higher Education, 11, 71-80.

doi:10.1016/j.iheduc.2008.05.002

Beja. M. (2009, July 2). Advocates for the blind sue Arizona State U. over kindle use. The Chronicle of Higher Education, Wired Campus blog.

Citizen Media Law Project. (2007, November 7). Universal Music v. Lenz. Retrieved from Berkman Center for Internet & Society, Citizen Media Law Project webpage

http://www.citmedialaw.org/threats/universal-music-v-lenz

Center for Social Media. (2011). Best Practices. Retrieved from AUSOC- Center for Social Media webpage http://www.centerforsocialmedia.org/fair-use/best-practices

Creative Commons (n.d.) About. Retrieved from Creative Commons webpage http://creativecommons.org/about

Dalsgaard, C. (2006). Social software: E-Learning beyond learning management systems. European Journal of Open, Distance and E-Learning, 07-12. Retrieved from

http://www.assonur.org/sito/files/Social%20Software%20as%20learning%20tool.pdf

Davis, M. (2002). From pirates to patriots: Fair use for digital media. IEEE MultiMedia, 9 (4). October-December, 4-7. Retrieved from

http://fusion.sims.berkeley.edu/GarageCinema/pubs/pdf/pdf_06C344BC-84CF-4145-B7049AD77E22B959.pdf

Diaz, V., Golas, J., & Gautsch, S. (2010). Privacy considerations in cloud-based teaching and learning environments. EDUCASE Learning Initiative [ELI White paper

3:2010, November]. Retrieved from http://www.educause.edu/Resources/PrivacyConsiderationsinCloudBa/221094

Duffy, P. & Bruns, A. (2006). The use of blogs, wikis and RSS in education: A conversation of possibilities. In Proceedings Online Learning and Teaching Conference

(31-38). Brisbane. Retrieved from http://eprints.qut.edu.au/5398/

EFF. (2003). Unsafe harbors: Abusive DMCA subpoenas and takedown demands. Retrieved from EFF webpage https://www.eff.org/wp/unsafe-harbors-abusive-dmca-subpoenas-and-

takedown-demands

EFF. (2007, July 24). Mom sues universal music for DMCA abuse . Retrieved from EFF webpage https://www.eff.org/deeplinks/2007/07/mom-sues-universal-music-dmca-abuse

Mashup (digital). (n.d.). In Wikipedia. Retrieved June 7, 2007 from http://en.wikipedia.org/wiki/Mashup_(digital)

Foster, A. (2002, May 17). Plagiarism-detection tool creates legal quandary. The Chronicle of Higher Education, Information Technology, A37-A38.

Freedman, C. S. (2008). State of the eNation reports: Social networking sites lock out disabled users. (18 January 2008. Retrieved from AbilityNet website:

http://www.abilitynet.org.uk/enation85

Friedman, T. (2005). The world is flat: A brief history of the twenty-first century. New York: Farr Strauss and Giroux.

Green, S. (2001). Reconciling Napster with the Sony decision and recent amendments to copyright law. American Business Law Journal, Fall 39(1), 57-98.

Grodecka, K., Wild, F., & Kieslinger, B. (2008). How to use social software in higher education: A handbook from the iCamp project. Retrieved from icamp.eu webpage

http://www.icamp.eu/wp-content/uploads/2009/01/icamp-handbook-web.pdf

Grover, A., & Stewart, D. W. (2010). Defining interactive social media in an educational context. In C. Wankel & M. Marovich & J. Stanaityte (Eds.), Cutting edge

social media approaches to business education: Teaching with LinkedIN, Facebook, Twitter, Second Life, and Blogs (pp7-38). Charlotte, NC: Information Age Publishing.

Halbert, D. (2009). Mass culture and the culture of the masses: A manifesto for user-generated rights. Vanderbilt Journal of Entertainment and Technology Law, 11(4),

921-961.

Hemmi, A., & Bayne, S. & Land, R. (2009). The appropriation and repurposing of social technologies in higher education. Journal of Computer Assisted Learning, 25, 19-

30. doi:10.1111/j.1365-2729.2008.00306x

Hoffman, E. (2009). Social media and learning environments: Shifting perspective on the locus of control. in education. 15(2), (Special Issue Technology & Social

Media, Part 1). Retrieved from http://www.ineducation.ca/article/social-media-and-learning-environments-shifting-perspectives-locus-control

Intellectual property. 2010. In Oxford English Dictionary. Third edition, online version November 2010. Retrieved March, 22, 2011, from

http://www.oed.com:80/Entry/97387
Jarrow, J. (1997). What is a reasonable accommodation?[web log article except]. DAIS (Disability Access Information and Support. Retrieved from

http://www.daisweb.com/node/53
Junco, R., & Heiberger, G., & Loken, E., (2010). The effect of Twitter on college student engagement and grades. Journal of Computer Assisted Learning , 27(2), 119-

132. doi: 10.1111/j.1365-2729.2010.00387.x

Kaplan, A. & Haenlein, M. (2010). Users of the world, unite! The challenge and opportunities of social media. Business Horizons. 53,

http://www.sciencedirect.com/scidirimg/clear.gif59-68. doi:10.1016/j.bushor.2009.09.003

Lee, M., & McLoughlin, C. (2007). Teaching and learning in the Web2.0 era: Empowering students through learner-generated content. International Journal of

Instructional Technology & Distance Learning, 4 (10). Retrieved from http://www.itdl.org/Journal/Oct_07/article02.htm

Lessig, L. (2004). Free culture: How big media uses technology and the law to lock down culture and control creativity . New York: Penguin Press. Retrieved from

http://www.free-culture.cc/freeculture.pdf

Linden Research, Inc. ( 2010, December 15). Second Life Terms of Service. Retrieved March 18, 2011 from Second Life website http://secondlife.com/corporate/tos.php

Mason, R. & Rennie, F. (2008). E-learning and social networking handbook: Resources for higher education. New York: Routledge.

McCarthy. C. (2009, February 18). Facebook faces furor over content rights.CNN.com. Retrieved from http://www.cnn.com/2009/TECH/02/17/facebook.terms.service/index.html
Oakley, R. (1990). Copyright and preservation: A serious problem in need of a thoughtful solution. (CLIR pub11 – The Commission on Preservation and Access). Retrieved

from CLIR website: http://www.clir.org/pubs/reports/oakley/index.html
Parry, M. (2009, April 20). Students lose, fair use wins in suit targeting anti-plagiarism tool. The Chronicle of Higher Education. Retrieved from

http://chronicle.com/blogs/wiredcampus/students-lose-fair-use-wins-in-suit-targeting-anti-plagiarism-tool/4636

Parry, M. (2010, November 12). Penn State accused of discriminating against blind students. The Chronicle of Higher Education, Wired Campus blog.

Richardson, W. (2006). Blogs, wikis, podcasts, and other powerful web tools for classrooms. Thousand Oaks,CA: Corwin Press.

Stone, B. & Stelter, B. (2009, February 18). Facebook withdraws changes in data use. The New York Times, Technology Internet. Retrieved from

https://www.nytimes.com/2009/02/19/technology/internet/19facebook.html

U.S. Copyright Office (1998). The Digital Millennium Copyright Act of 1998 – U.S. Copyright Office Summary. Retrieved March 22, 2011 from

http://copyright.gov/legislation/dmca.pdf

U.S. Department of Education (2004) Legislative History of Major FERPA Provisions. Retrieved March 22, 2011 from http://www2.ed.gov/policy/gen/guid/fpco/ferpa/leg-

history.html

U.S. Department of Education (2004).U.S. Department of Education Reasonable Accommodation Handbook. Retrieved Feb. 01, 2011 from

http://www2.ed.gov/policy/gen/leg/foia/acshbom3.pdf

U.S. Department of Justice (2009). Americans with Disabilities Act of 1990, As Amended . Retrieved Feb. 01, 2011 from ADA homepage http://www.ada.gov/pubs/ada.htm

Varvel, V. (2001, Nov/Dec ). Whose words – Who owns student posts in an online course? Pointer and Clicker, ION’s Technology Tip of the Month. Retrieved from

http://www.ion.uillinois.edu/resources/pointersclickers/2001_11/index.asp

Wankle, C. (2010). Technologies that bring learners collaboratively together in the world. In C. Wankel & M. Marovich & J. Stanaityte (Eds.), Cutting edge social media

approaches to business education: Teaching with LinkedIN, Facebook, Twitter, Second Life, and Blogs (pp. 1-6). Charlotte, NC: Information Age Publishing.

Wheeler, S., & Yoemans, P. & Wheeler, D. (2008). The good, the bad and the wiki: Evaluating student-generated content for collaborative learning. British Journal of

Educational Technology, 39(6), 987-995. doi:10.1111/j.1467-8535.2007.00799.x

Young, J. R. (2008, February 4). Study raises new privacy concerns about Facebook. The Chronicle of Higher Education, Technology.

Educational Resources
n the last chapter, we discussed the use of the Web as
resource and focus of online course assignments. Instruc­
Itional
use of the Web has been greatly enhanced in recent years
by the growth of open educational resources (OER). OERs by
their very nature permit instructors to freely use, adapt, or even
add to their content. However, many other potential materials
that you may want to include in your courses are those gov­
erned by copyright and fair use laws. Finally, instructors who
create their own content may be concerned with the issue of
intellectual property. This chapter deals with these three related
issues of import to the online instructor. Copyright and fair use
and intellectual property are but two sides of the same coin.
These three issues are treated here as follows;
1. Copyright and fair use. Do you have the right to use other
people’s materials in teaching your course?
2. Intellectual property. What happens to the intellectual mater­
ial that you create once you’ve posted it online? Do you still
own it? What can you do if an unauthorized person makes
use of it?
3. Open educational resources (known as OER) are generally
free materials that are available under terms of use that
encourage sharing, reproduction, and, in some cases, even
repurposing by educators. In most cases, while the materials
~
Teaching Online
are freely reusable, the user is required to attribute the
resource to its original creator.
While there exist international copyright regulations, specif­
ics in copyright law differ from country to country. Here we will
discuss copyright and fair use as well as intellectual property as
it relates to the United States, and touch on possible signifi­
cance for other countries. We are not legal experts on these
matters so our intention is merely to set out some guidelines
that faculty can reasonably follow in approaching these issues.
After discussing copyright, we will then discuss open educa­
tional resources, a truly international movement.
Copyright and fair Use in the United
States
No matter what country you are in, you need to be aware of the
copyright laws where the material originates. In using materials
you find on the Web, you need to know what material you can
use, under what circumstances you can use it, and when you
are breaking the law.
The simple answer to all of the above is that copyright law, as
it is written, states that if you’re using material that belongs to
others without their permission and the material you’re using
goes beyond “fair use” and is made openly accessible (either on
your public web site or via a DVD you’ve distributed to your
students), then you’re probably breaking the law and thus
vulnerable to a suit by the material’s rightful owner.
Ifyou are an educator, the powers that be [a consortium con­
sisting of representatives of industry, publishing, education,
and other areas in the United States convened to advise Con­
gress on the creation of a new or amended copyright law) have
made a few grudging exceptions. If you are teaching in a class­
room or online, you may make use of materials that you don’t
own, as long as you do not malce them freely available for distri­
bution and the amount you use does not exceed certain fixed
limits. These exceptions have been collected in a document
known as the Fair Use Guidelines for Educational Multimedia
Chapter 8 • Copyright, Intellectual Property, and OERs
~
which emerged in the mid-1990s. They are “guidelines” rather
than legal code because they did not constitute a formal
amendment to the basic copyright law. Nevertheless, an educa­
tor adhering to the Fair Use Guidelines is likely avoiding the risk
of liability to a suit.
Kimberly Bonner is an expert in intellectual property who
heads up the Center for Intellectual Prope1ty at University of
Maryland University College. We asked her about the most
common misconception that faculty have about fair use and
she replied, “I think many faculty really think that fair use is
automatic for educational purposes and it is not.”
So how do you determine ifwhat you’re using falls within the
fair use criteria? The copyright Jaw itself specifies four overall
determining factors:
1. What is the character of the use? Put simply, is it for commer­
cial or noncommercial purposes? Noncommercial use is
much more permissible. If you are a: teacher at an educa­
tional institution, you will have no problem satisfying this
criterion. But if you are assembling courseware for distribu­
tion-say, via a DVD-you may not qualify for the fair use
exemption because you have copied information that does
not belong to you and made it available outside the confines
ofyour classroom.
2. What is the nature of the work to be used? If the work is in the
public domain-that is, out of copyright or never copyrighted
(created for public use or older than the copyright Jaws)­
then, of course, you’re fine. If the work is copyrighted, the
“nature of the work” may include how original or creative it’s
considered to be. Original or creative work often requires the
permission of the owner. Strictly factual material is Jess likely
to require permission.
3.    How much of the work will you use? Large amounts and large
percentages of the original work do not qualify as fair use.
4.    What effect would the use have on the marlcetfor the original
work? Use that would significantly damage the work’s market
value does not qualify as fair use. This is the key provision for
online educators. If you are teaching using a password­
protected site, to which only students or other invited guests
~
Teaching Online
may gain access, you probably qualify under this part of the
fair use rules. In essence, your site may be deemed the equiv­
alent of a traditional classroom bounded by four walls. But if
your class is accessible by anyone on the Internet, you are, in
effect, making the work available for anyone who wants it,
and this presumably damages the work’s market value ..
To these four original factors, the consortium that developed
the Fair Use Guidelines for Educational Multimedia added the
following stipulations:
1.    Students may incorporate portions of others’ works into their
multimedia creations and perform and display those crea­
tions for academic assignments.
2.    Faculty may incorporate portions of others’ works into their
multimedia creations
a.    to create multimedia curriculum materials;
b. to teach remote classes where access and total number of
students are limited and where technology makes copying
impossible. (If materials can be copied, they may be made
available over the network for only fifteen days and then
must be placed on reserve for on-site use only.)
3.    Faculty may demonstrate their multimedia creations at pro­
fessional symposia and retain them in their own portfolios.
4.    Time limit on fair use by faculty: two years from first instruc­
tional use of the multimedia work.
5.    Copies limit: Generally only two copies are allowed, but joint
work creators may each have a copy. In an electronic sense, a
copy is a file you have saved on a disk.
6.    Pmiion limits:
a.    motion media (including video and animations): up to 10
percent of the original work or three minutes, whichever is
Jess;
b. text: up to 10 percent of the original work or 1,000 words,
whichever is Jess;
c.    poems: up to 250 words, but further limited to:
i. three poems or pmiions of poems by one poet, or
Chapter 8 • Copyright, Intellectual Property, and OERs
~
ii. five poems or portions of poems by different poets from
a single anthology.
7.    Music (including lyrics and music videos): up to 10 percent
of the original work or thirty seconds, whichever is less.
8,    Photos and images: up to five works from one artist or pho­
tographer; up to lO percent or fifteen works, whichever is
less, from a collection.
9.    Database information: up to 10 percent or 2,500 fields or cell
entries, whichever is less.
The Technology, Education, and Copyright Harmonization
(TEACH) Act of 2002 is a copyright amendment that did serve to
broaden the conversation to explicitly include distance educa­
tion and digital creations. But the TEACH Act is complex and is
not something individual instructors can be expected to inter­
pret on their own. In some ways it has confused as much as elu­
cidated the rules for educators and it often addresses issues that
must be handled by institutions as a whole. However, if you are
seeking to use text, video, or audio without paying a fee, you are
probably on solid ground ifyou observe some of the same limits
we have already noted. To sum up:
1111 Limit amount-do not attempt to make available an entire
work (see fair use guidelines above).
1111 Limit time-do not make the work available for an entire
semester.
1111 Limit access-make available only to enrolled students in
your class; use a password-protected site such as your course
management system.
Is Anyone Really Watching?
Some readers may find the foregoing fair use guidelines some­
what excessive. After all, you might argue, with so much mater­
ial available on the Web, who could possibly monitor it all
anyway?
Think of the matter this way: It is just as easy for those who
own material to find it on the Web as it was for you to secure it
~
Teaching Online
in the first place. Sophisticated search tools now exist, and are
continually being improved upon, for tracking down pirated
material. As the market for distance education grows, so do the
economic incentives for people to protect any material that
rightfully belongs to them.
Thus, you must be especially conscientious about materials
you post on the public Web. If you aren’t, the institution you
work for will no doubt encourage you to revise your behavior,
because it is usually the institution that bears the heaviest lia­
bility in a copyright suit. But you personally are not immune.
ll’nnclnng the l!’liglhltful Owner
Ascertaining the rightful owner of copyrighted material can
sometimes prove quite complex, particularly when ownership
may have changed hands several times since the work was first
published.
There are a number of ways to track down authorship using
the Web. Services such as the Copyright Clearance Center
[www.copyright.com) can help with searching out the owner­
ship status of a given piece of material and can often give you
price quotes as well.
Wlhlaft ftc ID«» Rf YciiJI Aren’t Sure Whether YcM
Need Permission
First, we recommend that you consult your institution’s library
to see if they are able to assist you with licensing or securing
permission. They will also be able to tell you what costs, if any,
are associated with licensing. Such costs are not easy to calcu­
late in advance-they can range from inexpensive electronic
rights to a short article or an exorbitant price for one poem.
Once you know what the costs incurred might be, you (and your
institution) can make a choice about whether or not to use par­
ticular material. Your institution may have a specific form that
they want you to use in applying for permission or to enable
them to make that determination for you. If you do not have
access to such a service and you think the work you are using
does not qualify for the fair use exemption you should write the
owner and ask for permission.
Chapter 8 • Copyright, Intellectual Property, and OERs
~
State who you are, what you plan to do with the material, and
how long you plan to use it/when you plan to remove it from
your course site. Some publishers have their own forms for per­
missions posted on their web sites. But in other cases, you may
A Sample Letter Requesting Permission
The following general template can be can adapted as necessary
when you need to secure permission to use someone else’s work.
In the paragraph where you explain your intentions, be sure to note
the key features of the proposed use, such as who will have
access to the site and how long the material will be made avail­
able. If the material is to be sold as part of a coursepack, you
should indicate that as well.
[Letterhead stationery or return address/email/phone or fax numbers]
[Date]
[Name and address of addressee]
Dear [title, name]:
I am [describe your position] at [narne of institution]. I would like
your permission to [explain intended use in detail-e.g., reprint,
incorporate into lectures, post in online classroom, distribute via
DVD] the following [insert the full citation to the original work or
attach a copy of the image or graphics if needed]. The material will
be made available to # students as follows [e.g., through
password-protected web site, on DVD] for the expected period of
[time period intended].
Please indicate your approval of this permission by signing the
letter where indicated below and returning it to me as soon as pos­
sible, by mail, by fax, or [by scanned image] via email. Your
signing of this letter will also confirm that you own [or your
company owns] the copyright to the above-described material.
Thank you very much,
Sincerely,
[Your name and signature]
PERMISSION GRANTED FOR THE USE REQUESTED ABOVE
[Type name of addressee below signature line]
[Date]
~
Teaching Online
need to write the owner directly. (See the box “A Sample Letter
Requesting Permission.”) Keep a copy of all your correspond­
ence, whether by letter or by email. If no one responds to your
request, you can then probably use the material, relatively
secure that you have made a good-faith effort to contact the
author and secure his or her permission.
In most cases-probably about 95 percent of the time-you
will receive permission to use the material without havllig to
pay any fee or royalty. In those rare cases in which you are not
given permission free of charge, you can either pay the fee or
use other material instead.
Rffifli/)M:WRc!!Bi!§.’~ If you are not sure whether or not you
can use someone else’s content, the rule is-when in
doubt, ask.
What about i.ill’lks tatll’id !Embedded Resources?
Linking to someone else’s public web site, whether as part of a
course assignment or as an addition to a page of course notes,
does not contradict the copyright strictures. However, as a
matter of courtesy, it may be advisable to let the owner of a per­
sonal page know that you are linking to the site, particularly if it
is a personal site housed on a hosting service that might incur
additional costs if more than a prescribed number of visitors
“bit” the site. Vety often, when you notify the owner this way,
he or she may return the favor by letting you know when the
URL for the site has changed.
An increasing number of Web 2.0 sites like VoiceThread,
YouTube, and TeacherTube allow for the copying and embed­
ding of code within your course management system, blogs,
PowerPoint, or web page, permitting your students to play the
video or other multimedia from within your own course site. This
is particularly helpful for those whose institutions have blocked
access to the YouTube site or for those who do not want students
to wade through all the other potentially inappropriate or dis­
tracting links surrounding a video. On the other hand, the video
in question is still being hosted on the other source’s external
server, so the instmctor does not need to worry about possible
overload on a university or personal hosting server. Instructions
Chapter 8
o
Copyright, Intellectual Property, and OERs
~
for embedding a video and its player from YouTube are supplied
at www.youtube.com/sharing. When the embed code is auto­
matically generated by the external party as is the case with
YouTube, you, the instructor, do not need to write any of your
own code to embed the video, so it is a real boon to instmctors
who do not know how or do not have easy access to support to
create code. Embedding, when it is made freely available in this
manner, may be thought of as a sophisticated way oflinking.
, .~ Uv.:docr
fii
ldyS~soo
(;}) FrJ;::;nost,:r
(!)
Bebo
(!
}!
i.YS
G
‘5(
(i)
Llv~ S;::so:s
~.:_~· Fiao
IJ Fscebcr:k
Tsgged
Vox
,l
Yahco
1~! myYe:.:uhock
Multiply
Blo.gg!:r
~ u.,.·e.Journsl
*
_..
Fsgeflsl<;:;
~ Fre.:web~
Xsngs
Eom
-‘SO h:i2hi”‘ ?;:) ; ~tE’2″1’ ~’3″‘”‘”‘ ,.,,::-•;i,;:
hi!=-: .,,,::-i~l”‘-::.9::>.c<:ry c::·-:.;d:c==<:’;;’-S”-IS ~<: c:;·~.,:~”crsrr·
r:S”‘·,:= -,w,,::i’=- ·;,:<h.,,;= t’Z.I’1:;c:S-‘,;rt ~ o: ~<”3″1’~~:-::’1·:;-:,)
;-·c, ·rae··· v.:i~i.+>-,;2:; •:>: ‘1’ c: .:~:.u r c “o:’~B.: t S t,.c ~= 3 c c llt-2li: r ·:,.;;-. ::·Q.·,•;,:~.;;;-~::;~j;;-.:t·:-·i:;.ti>::
·i~lu-::=
Figure 8.1 Auto-generated code for embedding a VoiceThread item
within your web page, blog, or course management system.
YouTube and many other Web 2.0 tools offer this option which allows
your sludents to access the application without leaving the classroom.
Reproduced by permission from VoiceThread.
~
Teaching Online
It’s one thing to borrow someone else’s work to help teach your
class-you know your intentions are good-but it’s quite
another thing if someone borrows your work. Among instruc­
tors who are leery of using the Web, one persistent fear is that
their intellectual property will be stolen by some enterprising
student, or worse still, by another educator.
This fear is not unfounded. Students do reproduce course
notes and even sell them, often supplementing them with notes
they have written themselves. This practice has been going on
since long before the advent of the Web (surely no one has for­
gotten the dreaded copying machine). But the practice is signif­
icantly easier when lectures and other course materials are
posted online, because all one needs to do is to copy the mater­
ials electronically and save them as a file.
A more sinister scenario involves other educators, or even
for-profit publishers of educational material, “borrowing” your
lectures and using them for their own purposes, either rework­
ing them or reformatting them to suit their own needs. In a
world in which tenured positions are becoming less common­
place and many instructors find themselves teaching for various
universities at one time or another, intellectual theft of this sort
may not be as rare as you suppose.
Let’s look first at your legal rights and then at some practical
steps you can take to protect your work.
The Legal Status of Your Work
Believe it or not, legal ownership of material you create is a very
gray area at most institutions. Most faculty members are under
the impression that the intellectual work they produce or
publish automatically belongs to them. Not so. It is simply the
accepted custom of most universities, particularly those
involved in research, to cede rights to such intellectual property
to their faculty members, because the administrators realize
that work thus produced will bring the institution revenue in
the form of grants. But institutions do not have to cede these
rights. They merely choose to.
Chapter 8
o
Copyright, Intellectual Property, and OERs
~
The same has been historically true for course content,
including syllabi, lecture notes, and course outlines. Depart­
ments, however, often retain copies of these materials to make
available to new instructors or TAs who are teaching the course
for the first time. Of course, in this situation the new instructors
may be expected to adapt rather than copy the original syllabus.
A departing instructor is also usually free to take his or her
courseware to a new institution.
Teaching online often means creating original material in the
form of electronic files or web pages enriched with multimedia
elements such as graphics, sound, video, and animations.
Instructors who create such material may assume it belongs to
them, but when a university or other institution is intent on
marketing its courses and programs online, ownership of these
materials may not be quite as clear-cut. From the institution’s
point of view, such material may not bring in revenue in the
form of grants, but it can help create revenue in the form of
increased tuition. Hence the institution may be less willing to
cede rights to the instructor. The institution may consider what
the instructor has created as work-made-for-hire, that is, work
that was done in the context of fulfilling job responsibilities. Or,
the institution may “unbundle” the rights, permitting them­
selves to continue to use the material while allowing the
instructor to use all or a portion of the material at another uni­
versity or in some other educational context.
As Kimberly Bonner notes, faculty,
need to understand the “works made for hire” doctrine in
copyright law that makes the employer the copyright owner
ofa work if the work was done within the scope ofemploy­
ment or pursuant to an independent contractor relation­
ship. And they need to know that course ownership policies
may not be enough to alter a “work made for hire”
arrangement.
It is a good idea, therefore, to find out-in Wliting-your
institution’s policy with respect to online materials you’ve
created to teach your course. If there is no established policy,
come to some agreement with the administrators about your
material. This is especially important if you’re a nontenured
~
Teaching Online
adjunct or lecturer and expect to use your.courseware at several
different institutions, either online or as part of a blended
course. As Bonner explains, “faculty should either have specific
language in their contracts that suppbrt them retaining owner­
ship in their works or incorporate copyright policies in their
teaching contracts (particularly if the policy permits faculty
retaining ownership rights in course materials).”
If you can’t secure clear ownership rights to your own mater­
ial, you can always copyright the material yourself before
making it available to your institution or class. Although most
faculty members aren’t aware of this, you automatically hold
the copyright of your intellectual property the moment you
commit it to paper or to any fixed medium. If it came to a court
case, however, you would have to prove the date you created
the material. One way to do this is to send yourself a registered
envelope or package with the material inside and then keep the
package unopened. A second way is to submit a claim for copy­
right to the Library of Congress.
As online instruction becomes more lucrative for universities
and private institutions alike, the question of who owns the
rights to material and who benefits from revenues derived from
it will become more and more important, especially since the
percentage of instructors in contingent rather than secure, full­
time permanent positions has also increased.
The field of copyright law and intellectual property is rife
with legal experts. We do not pretend to a special expertise.
What we do suggest is that you tal<e nothing for granted when it
comes to material you have created and that you ma!<e the
effort to learn in advance the specific policies of the institution
you are working for.
ll”ractical Steps for Protecting Your Work
A copyright notice prominently displayed is like a scarecrow in
a field. It will scare away some of the crows, but some will come
pecking all the same. So it pays ·to be both vigilant and
practical.
Various instructional materials are pilfered from ordinary
classrooms every day, and the Internet mal<es it even easier to
Chapter 8 • Copyright, Intellectual Property, and OERs
~
steal material and repurpose it. With a little care, however,
most instructors who post material online can avoid serious
problems.
Begin with common sense. Say you have an essay you’ve
been working on. It hasn’t yet been published, but you have
good reason to think it may be published. Meanwhile, you’d like
your class to read it. If you’re fearful that one of your students
may copy it or send it to someone else, then post an abstract or
description of it instead. Or, you may affix a notice that clearly
cautions students that the essay is not for distribution-this is a
milder approach, but surprisingly effective: most students will
be respectful of this and it suggests to all that you are con­
sciously setting up some controls on this content.
There are also some technological strategies you can use to
help ward off potential thieves.
Technological Methods The first, and probably the most
obvious, technological stratagem to reduce theft is to use a
password-protected web site. Most course management
systems possess encryption tools that prevent unwanted vis­
itors from viewing the course. If you aren’t using a course man­
agement system, tools exist that will permit your computer
support personnel to password-protect your web site with
various computer programs. Even if you’re essentially on your
own, with no support, a number of easily accessible programs
will allow you to password-protect your site (refer to the web
sites listed in the Guide to Resources).
There are also some technological methods for protecting
unlawful copying or downloading of your work. Some software
programs permit you to limit the way your work can be copied
by others online. Talce the case of a lecture you have created
using Microsoft Word. If you save this document as an HTML
file or post it to your web site as an attachment, your students
will be able to open it or download it exactly as if they had
copied it from your hard disk. Wbat you might do instead is to
use a program such as Adobe Acrobat. This is the program that
permits you to create the Acrobat file format that you see every­
where on the Web, and it provides options that can help limit
unauthorized use of your material.
~
Teaching Online
Using Adobe Acrobat
With Adobe Acrobat, you can use any program you normally
would to format your material: Microsoft Word, PowerPoint–­
any program that permits you to print. When your document is
ready, you “print” it in a format known as PDF (Portable Docu­
ment Format). You can then make this PDF file available via
your web site, permitting any student who possesses the ubiq­
uitous Adobe Acrobat Reader to read, download, and even
reprint your file exactly as you originally formatted it without
having to own the software program that created it.
However, if you do not want your students to reprint your
material or save it, Adobe Acrobat permits you to restrict how
the material is used. You can remove the ability to reprint text
and graphics or even to select and copy them once they reach a
student’s home computer. You can restrict printing out the
document so that no printing out is allowed or only in low reso­
lution. You can require a password to open. Similarly, assuming
you are operating according to the fair use guidelines, you can
copy articles or material culled from other sources and “print”
them as PDF files, then limit your students’ rights to repurpose
them by taking advantage of the features just mentioned. (Note:
Adobe Reader is a free program, but Adobe Acrobat is not. If it is
not available on your computer, check to see if your institution
can install it for you. Once Acrobat is installed, the PDF option
should appear as one. of the printing options available in your
print setup (dialog) box or in the “Save As” option.)
Another way to protect your intellectual property is to
convert it into streaming media format, particularly when it
involves the use of multimedia. Streaming media, such as nar­
rated slide shows and recorded audio files, are housed on the
server and streamer to the user. They exist in temporaty
memory on the user’s computer. A particularly clever student
hacker might figure out how to retrieve this material from the
temporary memory cache, but most users will neither want to
nor know how to. The same may be said for the PDF restriction
detailed above-a determined student may be able to evade the
restrictions, but sending out information in this format is like
building a fence around your fields. It will keep most, though
not all, intruders from pillaging your crops.
Chapter 8
o
Copyright, Intellectual Property, and OERs
©lilecking fll>W !IJinaWitlii~J>rizedl !Uise
Finally, if you are worried that your intellectual prope1ty is being
stolen, or even if you are just sensibly concerned, t1y conducting
an online search every six months or so. Choose a unique sen­
tence or phrase from one ofyour lectures and use a search engine
to search online. If the phrase pops up, and it looks as if it was
borrowed from your notes, drop the author of the offending page
a warning note or query, as the case may demand. Be gracious­
it may often be inadvertent on the part ofthe offender.
The term “open educational resources,” mentioned in Chapters
3 and 7, derives from a 2002 UNESCO forum on open course­
ware for developing countries. Since 2005, the OER community
has grown to encompass organizations and individuals world­
wide who are interested in sharing resources and creating new
digital resources that can be made available to all on the Inter­
net. The definition of OER not only includes the notion that the
content of OER is free for use but also that sharing of knowledge
is actively encouraged. A useful handbook for OER educators is
available at www.wikieducator.org/OER_Handbook/educator_
version_one–the handbook and the Wikieducator site itself are
both examples of OER.
OER content ranges from small learning objects, images,
quizzes, lesson plans, syllabi, or discrete modules to larger col­
lections of modules and entire courses. OER can usually be
freely reused, adapted to new uses through mixing with other
content, and freely distributed in their new form. The terms of
use for OER can vary but most require attribution to the original
creator and are offered free for use by nonprofits and educa­
tional institutions. Look for terms of use on each OER site. For
example, the MIT Opencourseware site clearly sets forth its own
rules as (1) noncommercial, i.e., the content can only be used
by non-profit groups and educators; (2) attribution must be
made to MIT and the professor whose work you are using,
whether the content is used as is or mixed or repurposed; and
~
Teaching Online
(3) “share-alike”-anything created with their content must be
offered as an OER to others.
They also give explicit guidelines concerning how to affix an
attribution.
You can find OER content through a number of different
ways. Obviously, you can search your library databases or the
Web for such resources, and while this may turn up articles on
OER rather than the materials themselves, there may be links to
the actual OER as well. There are some well-known sites that
provide collections of OER, such as the OER Commons (http: II
oercommons.org), or that have more discipline-specific collec­
tions such as the previously mentioned Chemistry Collective
(www.chemcollective.org). (See the Guide to Resources for
more collections of OER.)
By making use of appropriate OER, you are often able to
enhance your course while avoiding the issues and costs associ­
ated with copyrighted material. Another approach to using OER
is to incorporate or adapt the OER with your own materials. For
example, you might add to your own lecture in introductory
physics by using some materials from a lecture by one of the
professors featured on the MIT Opencourseware site. By mixing
OER with your own materials in this way, you may find that you
are able to add diversity of perspectives and approaches to your
own content.
Creative Commons l!.ucense
Do consider whether or not a particular piece you have created is
something you want to protect for whatever reason-e.g., it
involves expected income or because you fear another educator
may reuse it and claim it for their own. If you simply want
acknowledgment and attribution of your work, then especially
for publicly available web sites, blogs, wilds, or other sites where
you may share your work, the Creative Commons license (http://
creativecommons.org/license) may be a good approach. When
you sign up for a free license with this organization, you can
decide what limitations you wish to put on what you publish
online-this can range from no restrictions to no modifications
Chapter 8 • Copyright, Intellectual Property, and OERs
~
License Conditions
Creators choose a set of cond~lons IIleY wish to apply to their work.
<D
Attribution
You let others copy,
distribute, display, and
perform your copyrighted
wolk- and defivatire
works based upon it-
but only if they give credit
the way you request.
@Share Alike
You allow others to
distribute derivative works
only under a license
identical to Ute license
that g!lVIlms your work
No Derivative
@ Noncommercial @ WorM
You Jet others copy,
distribute, display, and
pelform your woik- and
derivative works based
uptlll it- but for
noncommercial puiJloSes
only.
You let olhers copy,
distribute, display, and
peffonn only verbatim
wpies of your work, nut
derivative works based
upon it.
Figure 8.2 Creative Commons Licensing Conditions, from http://
crealivecommons.org/about/licenses. Image licensed by Creative
Commons.
or use by commercial entities; the Creative Commons site has a
very helpful series of questions to take you step by step through
this decision. By affixing one of the six main Creative Commons
notices, you can let others know that you are encouraging the
propagation of your ideas, but that you do want credit for origi­
nating those ideas. Deliberately making some portion of your
work available as an OER can actually benefit you in many
ways-you may create a demand for your work that might not
have otherwise transpired, find potential collaborators among
the world of educators, and find yourself quoted, invited to
present at conferences, and other unexpected benefits.
If you want to mix the use of OER materials along with some
non-OER materials that are not covered under fair use, you will
want to request permission from the copyright bolder. The OER
handbook discusses how to handle this situation and provides
a sample letter requesting permission for clearance at
www.wikieducator.org/ OER_Handbook/ educator_version_one/
License/ Copyright_clearance.
Special Issues Related to Free Web 2.0 Sites
Many of the free Web 2.0 sites mentioned in this book and the
many others not explicitly mentioued here may invoice terms
of use that, while granting that what you blog, record, or
~
Teaching Online
otherwise create using their tools and hosting service remains
your intellectual property, may yet contain provisions that
entitle them to display and reveal your content as part of their
publicity, demonstrations, or other possible uses. ·This is espe­
cially true for any content that you choose to make public, but
may also potentially include your “private” areas. While you
should not overreact to this sort of use (which, in effect, is part
of the bargain, like advertisements, in exchange for free use
and seldom exercised), it is a reminder that you should hesit­
ate to post anything or create content-such as something
incorporating private contact info, personal details, photos,
etc.-that you would feel uncomfortable having revealed to
the world. It is a good idea to make your students aware of the
terms of use for the sites and encourage them to use similar
discretion outside your course management system. There is
also the fact that a Web 2.0 site may be hosted on a server in a
country that does not hold to the same privacy provisions as
those of your own country, so that is yet another reason to
carefully read the terms of use and privacy policy posted on a
site.
() t) (.l () (!
Assuri1111g Academic H1111tegrity amc1111g Ycur
Stude1111ts
In Chapter 3 we discussed the need to devise assessments in
such a way as to make it more difficult for students to plagiarize
essays and papers. For instructors who suspect that the ele­
gantly worded phrases they suddenly encounter in their stu­
dents’ essays may have been borrowed from something the
students discovered online, a simple search on Google will often
result in the identification of the plagiarized portions.
But again, as students spend more and more time online and
students themselves increasingly engage in production on the
Web, assurance of academic integrity and guarding against pla­
giarism is something that should start well before the work is
produced. Here are some other tips for encouraging academic
integrity when developing an assignment:

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

find the cost of your paper

This question has been answered.

Get Answer