Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

DRM is dead – long live DRM

in Blog, Document Security, DRM, PDF Security

DRM for copyright protection

Some people say DRM is dead and that people should be free to copy and reproduce works published on the Internet.  Authors however want to get paid for their work (assuming they are not giving it away for free) yet the only way to ensure copyright protection is by using DRM to control use.  So is DRM really dead?

You must have read the headlines – surely not fake news – that DRM will have died out in the very near future.

The arguments being used are:

  • DRM unnecessarily prevents those granted access to protected works from using them as they see fit, even if that contradicts their license to use the information
  • there is an implicit ‘right’ to convert both form and format of the documents they are using, and maintaining as many copies and versions as they wish
  • you must not prevent providing copies for ‘personal evaluation’ to an unlimited number of other people who may or may not be known to the initial user
  • copyright protection is achieved by adding the copyright mark to a document.

Freedom to use

At one level a free-for-all for access to any published work sounds very attractive for users.  In one simple step everyone everywhere has the right to have a free copy of anything published over the Internet, and do what they like with it.

Well I can see how that would be attractive to recipients.  It would be like being able to go into any library or bookstore, then just helping yourself and walking out again!  That doesn’t sound like copyright protection.

Now I’m not sure how long libraries and bookstores would manage to keep running.  Pretty soon they would be out of stock (well, of all the good stuff), and authors and publishers would not be supplying because they aren’t getting paid.  And what’s the point of a library that has no books?

Ah – but Internet distribution is free (not quite true, the users actually pay to use broadband and to publish information on web sites, so it’s really a pay-as-you-go service), storage is cheap and access is satisfactory in major economic regions.  So even if the users don’t realize they are actually paying something for their copies, it still raises some questions.

Economic imperatives

If you can’t sell any digital works on the Internet, then what is the motivation for people to create works for free distribution?  Whilst people are paying for content they are likely to be critical if what they paid good money for is substandard.  If it is free then who cares.

But what is the motivation driving people to publish at their own expense?  Are they genuinely trying to produce new artistic work?  Are they producing work of real academic status, or sowing the seeds of academic confusion by publishing inaccurate work or advancing theoretical arguments that appear to disagree with largely accepted work?  Are they taking the work of others and just re-badging it?

What is real?

And that brings us to fake news.  How do you know what is genuine?

Interestingly, DRM technologies are well placed to answer this question.

In the physical world it is frequently too much hard work to change some of the content of a physical book, or a picture, or a film or a sound track.  But in the digital world……..  DRM can prevent any change to published documents and takes steps to prevent copying sections of documents by automated methods.  (Nothing prevents someone from getting pen and paper and writing a copy, but generally people are not interested in doing that.)

In the digital world identifying who is the publisher is more complicated.  You can rely upon web searches for web sites and references (and suppliers often use that as part of their credit control process), but finally they look at the bank that is providing the money.  Similar processes are applied by the big trading houses such as Amazon and eBay, or the credit handler Paypal.  They may not guarantee that client systems cannot or have not been hacked, but they provide another complex layer of security that has to be overcome before an attacker can create secured documents that do not come from where they appear to.  This could be important if you are reading investment advice from a broker or an M&A agreement from a lawyer or the minutes of a board meeting.

A question of intent

There is a curious idea that because something has been created in a digital form and used on the Internet that there was every intention of sharing the content with everyone in the world.  The creators of digital works may, for entirely legitimate reasons, such as publishing corporate procedure manuals to all internal staff that cannot be given to outsiders, or training course materials that are for internal use only; need to restrict both access and use – something that DRM is well positioned to facilitate.

But there is no intent by the publisher to share information in the broadest context.  Indeed it is entirely obvious that the publisher has not the slightest intent to share with anyone outside of the circle that they have defined.  That does not deny them copyright protection, but its effectiveness is in some doubt.

Restricting form and format

Because DRM implements controls that are applied regardless of the environment, translation of form and format is generally forbidden because that would likely remove the controls.  DRM providers get round multi-platform use in one of two ways.

  1. They can run a scheme using the native browser on the user’s device (desktop, laptop, Macbook, iPad and so on).  A browser based approach has the disadvantage that the device has to be online to use the document.  It also has limitations of the controls that can be implemented because system authorities are restricted to the authority of the browser.
  2. They can also provide custom viewer applications to run in different environments.  This is an intrinsically more secure approach in that the DRM functionality is under the control of a dedicated handler that can work offline without loss of overall security, and can integrate more closely with the operating environment in order to prevent such things as screen capture or copying functions from being run.  In these cases a single form/format is used and each dedicated viewer is able to process the content, but does not allow any change as that could prejudice the security of the content.

Personal study and review

This claim harks back to the creation of Copyright protection under the statute of Anne, where it was felt essential that published books should be able to be studied, and valid criticisms published, to promote an ‘age of enlightenment’.  It was also about establishing a balance between the interests of the author and the wider common good.

Copyright protection was, of course, all about the right to make (and presumably sell) copies of documents (books, pictures, forms, maps, government documents, banknotes and so on).  So its original purpose was economic, to balance the rights of authors to enjoy the fruits of the creation of their product, in this case a printed idea rather than a physical artefact, against the rights of publishers and distributors and competitors.

The latest argument seems to be saying that an author has no rights, and must make a living from something else or depend on donations from passing viewers.  In the past famous authors have gone on tour reading their own work for a fee (this includes musicians) but the short life of ‘new information’ on platforms such as Facebook and Twitter leaves space only for those capitalized to take advantage of the ephemeral ‘going viral’ and the original authors scarcely have chance to make a reputation before the next good thing comes along.

So I suggest that the demand for wholesale copying and redistribution denies an author the rights of the fruits of their labours because they are prevented from controlling copying – the very thing copyright protection was set up to control.

Conclusions

I can understand the wild desire to make all information freely available to all – no digital hiding place – a must-have in the modern government spy system?  But I cannot see the advantage to the authors as against the mass publicists who are likely fuelled by advertising rather than book sales.  The free book sales can (and are) turned off and on whenever it suits the marketing stance of the publicists.

I see that there are many situations where privacy and the need to exert strict control over the distribution of content are fundamentals of the publishing equation, and denying the essential DRM tools to those whose business operations rely upon them is to remove the oxygen of industry and government – in other words to follow the law of unintended consequences and harm the economic system in ways that were never expected when freedom was being talked about.

So let us say, “DRM is dead – long live DRM”.

Tags: copyright, copyright protection, document drm, document protection, document security, drm
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Controlling membership access with Document DRM Link to: Controlling membership access with Document DRM Controlling membership access with Document DRMLink to: Training course copy protection Link to: Training course copy protection Training course copy protection
Scroll to top Scroll to top Scroll to top