The AP Plans 'News Registry' To Protect Content - InformationWeek
Infrastructure // PC & Servers
04:46 PM
Connect Directly
[Cybersecurity] New Methods for Managing the Skills Shortage
Jun 06, 2017
In this webinar, security experts discuss methods for doing better security with fewer people, inc ...Read More>>

The AP Plans 'News Registry' To Protect Content

The world's oldest and largest news gathering organization aims to fight online theft of its content with digital tracking beacons.

Aware that Facebook's Beacon initiative has turned "beacon" into a synonym for privacy invasion, Seagrave acknowledged that "beacon" is not a great word to describe the system. "It's not the same [as what Facebook did]," she said. "There are no cookies attached. We're not after personal information at all. What we're trying to find out is where the information is being used rather than who is using it."

Seagrave characterized the news registry as a business-to-business system designed to deter large-scale copying of AP content rather than individual bloggers who cut and paste a few too many paragraphs from an AP story. "It's not aimed at people who use part of stories periodically," she said. "It's aimed at being affirmative about how we allow our content to be used."

"The problem we have now is that our stories are getting scraped and reused in large quantities by aggregators who haven't paid any license fees," she said.

Seagrave said that determined content copiers could probably find ways around the system, but that the AP has additional methods to protect its rights. The news registry, she suggested, was more about clarifying the AP's expectations rather than delivering a technical silver bullet against copyright infringement.

Litigation is one such additional method. Earlier this month, the AP announced that it had settled its copyright infringement lawsuit against AHN Media for an undisclosed sum. As part of the settlement, AHN acknowledged using the AP's content without consent.

"We believe that we need to protect our content and take affirmative steps to protect our intellectual property interest," she said. "In any legal or business setting, having taken steps to say how content can and should be used is a point in your favor."

Black Hat is like no other security conference. It happens in Las Vegas, July 25-30. Find out more and register.

2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of Data and Analytics
Today's companies are differentiating themselves using data analytics, but the journey requires adjustments to people, processes, technology, and culture. 
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of November 6, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll