REPORT: ASPP Midwest Chapter Education Day, June 12, 2015

ASPP Midwest Education Day, by ASPP Member Mary Ann Albanese

The Mid-West chapter of the ASPP held its Education Day event on June 12, 2015, at Mrs. Murphy and Sons Irish Bistro, 3905 N Lincoln Avenue in Chicago. Mike Fisher, the Co-Founder of Custom Medical Stock Photo, took the role of Master of Ceremonies for the event.

Chris Sandberg 500x500The morning session, entitled “Talking Copyright Blues, Unpublished Works, Fair Use, and Creative Commons”, was presented by Christopher K. Sandberg, Partner and Attorney at Lockridge Grindal Nauen, and President of the Midwest Chapter of the ASPP.  (More info about Chris Sandberg.) Chris opened a brief history of copyright basics starting with the famous (or infamous) infringement of the Napoleon Sarony photographs (of Oscar Wilde) that led to the Supreme Court upholding the power of Congress to extend copyright protection to photography (1884), through “Bridgeman Art Library v. Corel” in 1999. Then, he explained the Rights of the Author, the concept of Derivative Works, Published versus Unpublished works (quizzing the audience on various scenarios, so we’d  understand the difference), as well as Fair Use, and Creative Commons. Best practice, says Chris, is to register photographs or other imagery at the US Copyright office prior to publication. If you don’t register your Published or Unpublished works, you will not be able sue for statutory damages, and attorney’s fees. (Note: Even if you don’t register, you’ll still be able to force the infringer to cease and desist.)

© 2015 REP3

© 2015 REP3

In the next session, Digital Asset Management expert, Michael Liwanag, explained “Electronic File Storage, Retrieval and Workflow”. Although Michael is currently the Regional Business Manager for Extensis Portfolio, he mainly covered the general benefits of DAM (Digital Asset Management) systems—how they enable users to find electronic files faster, control access to files, eliminate costly do-overs (needing to recreate files), and enable users to reuse and re-purpose files. Since a good DAM system can also convert files to other formats on the fly, non-graphics expert users needn’t have Photoshop on their workstation to, for example, change an EPS file to a file format usable in a Word document.

After a short break–during which attendees won door prizes from Konsultek, and Extensis— Judith (Judi) Buckardt, President and CEO of Buckardt Technologies, Inc. and DBA Konsultek, began her talk on Cyber Security Basics.

Judi prefaced her remarks by saying that her goal was to inform the audience, without frightening us into doing nothing on the web. Working on computers connected to the web is never 100% safe, no matter how your firewalls and access points are configured! Judi encouraged us to think in terms of “impact versus likelihood” and plan security accordingly. First, a person or company must decide what assets take priority. Then, he should determine the likely threats. Each security plan is different depending on how much you engage in social media and which services you use. Don’t think that because you use a MAC instead of a PC, or don’t have a Facebook account, or are behind a Firewall that you are safe from being hacked.

©2015 REP3

©2015 REP3

And the threat is not just electronic, but in your office environment–even in your cubicles and offices! Judi asked the audience to hold up their hands if they had ever posted their passwords in their cubicles/offices on post-it notes. She recounted the story of how surprised she was to visit a client seeking her security services, and to see post-it notes with passwords decorating most of the cubicle walls.

Judi then presented a concept described by David H. Stelzl in Data@Risk: Building an Asset Mindset Toward Securing Data—the PDR model. “PDR” stands for Protection, Detection and Response. First, a person or a company, needs to protect its’ assets with policies (such as a good password policy) and protective software. However, that protection doesn’t get you anywhere if you can’t detect that your security was circumvented. Finally, you need to know how to respond to the attack. Essentially, it’s impossible to prevent hackers from breaking in. After they’ve broken in, you need to be able to detect and respond before your assets are compromised.

Photographer Robert E. Potter III covered the event and provided two of the three illustrations for this article. The sponsors for the event were Danita Delimont Stock Photography, ImageRights, Feldman & Associates, Panoramic ImagesLockridge Grindal Nauen, Bannor & Bannor, Konsultek and Custom Medical Stock Photo.   The Midwest Chapter of the ASPP extends a huge thank you to each of our sponsors and encourages everyone to call them when their services are needed.