Security and Permissions

One of the strengths of digitizing resources is that it makes those resources accessible to many people.  However, that strength can become a weakness if proper security is not put in place.  In addition to institutional security practices there are several different strategies that should be built into any digital project.

  • access to archival master files should be limited.
  • workflow should prevent any changes to the master files.
  • derivative files should be the ones delivered to users. 
  • there should be a clear copyright statement attached to all files

Security Standards

All faculty, staff, and students must comply with Bowdoin’s Information Technology policies as outlined under the heading "College-wide" at http://www.bowdoin.edu/about/admin/