Security and Permissions
One of the strengths of digitizing resources is that it makes those resources accessible to many people. However, that strength can become a weakness if proper security is not put in place. In addition to institutional security practices there are several different strategies that should be built into any digital project.
- access to archival master files should be limited.
- workflow should prevent any changes to the master files.
- derivative files should be the ones delivered to users.
- there should be a clear copyright statement attached to all files
All faculty, staff, and students must comply with Bowdoin’s Information Technology policies as outlined under the heading "College-wide" at http://www.bowdoin.edu/about/admin/