1. Digital Rights Management
Digital rights management (DRM) is used to describe the processes by which the
author or publisher of a work exerts his or her rights to control what the purchaser of the work
is entitled to do. This represents the control by which one can prevent a person or an
organization from copying, printing, editing, or otherwise making the privileged information
available to other people.
With the introduction of technology and the internet, the print age is slowly becoming
obsolete with publishers shifting to the digital age. Before, a person needed to copy or re-print
a physical book for additional copies. With digital technologies, copies are made at zero cost
with minimal detection. And it is not just books. Movies, music, software applications, etc. can
now be copied and shared faster, with less cost. With this set-up, the prevalence of peer-to-
peer (P2P) and torrent sites have made information control much harder.
2. While information gets to be disseminated faster to consumers, control as to how it is shared becomes an issue.
DownWhile information gets to be disseminated faster to consumers, control as to how it is shared becomes an issue.
Downloading pirated music online does not help the music artists as they are deprived of the royalties they are entitled
to. At the same time, getting the music for free does not mean being safe from malicious software and hacking attacks.
Thus, companies and organizations have come up with possible solutions to this digital dilemma. The following
are techniques designed to control access and reproduction of online information:l
1. Encryption
Encryption is the process of converting data or information in such a way that only authorized parties can
understand. Its primary purpose is to protect the confidentiality of digital data stored on computer systems or
transmitted via the internet or other computer networks. Encryption occurs every time someone uses an ATM or buys
something online with a smartphone, makes a mobile phone call, or presses a key fob to unlock a car. This is done so
that information being sent is kept safe and secure.
To DRM systems for multimedia often encrypt material in such a way that only a particular device can play or
retrieve it, enforcing constraints on how it is used. DVDs use an encryption scheme to prevent users from viewing discs
on unauthorized players. This is the concept of region coding discussed earlier. Region coding prevents discs sold in one
part of the world from being used on players sold in another.
oading pirated music online does not help the music artists as they are deprived of the royalties they are
entitled to. At the same time, getting the music for free does not mean being safe from malicious software and
hacking attacks. Thus, companies and organizations have come up with possible solutions to this digital
dilemma. The following are techniques designed to control access and reproduction of online information:
3. 2. Serial keys
Also known as a product key or a software key, it is a series of alphanumeric characters acting as a key to
denote that the product or software is original. In some cases, product keys are used for product activation. One
such example is Microsoft Windows OS. A product key is used to activate the operating system online. Online
activation helps maintain software authenticity by making sure no one else has used the same product key.
3. Scrambling
Data scrambling is done to hide sensitive information from unauthorized users. Scrambling is
accomplished by the addition of components to the original signal or the changing of some important component
of the original signal in order to make the extraction of the original signal difficult. It is often done with the aid of
encryption.
While region coding identifies which players can only play certain DVDs, computers with DVD drives
become another option for would-be pirates. Thus, the content scramble system (CSS) was introduced to restrict
access to content only for licensed applications. Meaning, even if the DVD was recognized by the DVD player in a
computer, certain applications or programs needed to play the video might not allow it.