Page:The librarian's copyright companion, by James S. Heller, Paul Hellyer, Benjamin J. Keele, 2012.djvu/266

250 forward despite inevitable uncertainty by identifying possible risks (legal and otherwise) and reducing them to acceptable levels. This code of best practices should be of great assistance in arriving at rational risk management strategies, as it provides a more accurate picture of the risk (or lack thereof) associated with exercising legitimate fair use rights. Indeed, simply by articulating their consensus on this subject, academic and research librarians have already lowered the risk associated with these activities.

GENERAL POINTS ABOUT THE PRINCIPLES

This code of best practices identifies eight sets of common current practices in the use of copyrighted materials in and around academic and research libraries, to which the doctrine of fair use can be applied. It articulates principles describing generally how and why fair use applies to each such practice or situation. Each principle is accompanied by a list of considerations that the library community believes should inform or qualify it: limitations that should be observed to assure that the case for fair use is strong, and enhancements that could further strengthen that case. Please note that enhancements represent what the community believes are additional practices that demonstrate “above and beyond” efforts to add value to existing material or accommodate the interests of other stakeholders; such measures are laudable when they will not cause undue hardship but are not prerequisite to support a strong fair use rationale.

Some of the limitations and suggested enhancements involve the use of technical protection measures (TPMs) to help ensure that material intended for a particular institutional audience is confined to that audience. In some circumstances, the use of TPMs may be a meaningful demonstration of “good faith” on the part of the library in question. However, TPMs come in many varieties; for a library’s purposes, less obtrusive ones (password protection or watermarking) may be as or more appropriate than, for example, encryption.