Interim Video Policy
The policy summarized below is intended for videos of paper presentations made at ACM conferences. Such videos have become increasingly common, and the policy specifies the access and ownership rights associated with those videos once created. The policy does not extend to include contractual agreements with videographers responsible for the creation of the videos, nor the necessary securing of presenters' permission. The policy is also not applicable to videos provided by the presenters/authors themselves as ancillary or illustrative material in their presentation. Further, because the use and usefulness/value of videos as well as how they are realized are both rapidly evolving and rife with uncertainty, this policy is only intended to be in effect for a period of three years. The provisions of this policy should provide significant flexibility to allow experimenting with the use and reuse of videos of paper presentations, while ensuring that their potential value remains with the DL It will be re-evaluated at the end of this period to determine if changes are warranted in light of the additional experience that will have been accumulated by that time.
When videos are created that record paper presentations at ACM conferences, the following shall apply:
1. The video inherits the access rights applicable to the paper on which it is based.
2. ACM holds ownership rights to the video.
It is worth clarifying some of the implications of both aspects of this policy.
The inheritance of access rights implies that if a paper is available as open access (OA) the video will also be OA. In other words, like the paper, the video will be freely accessible to all through the DL.
Videos may also be posted collectively in other ACM repositories associated with the DL, e.g., the ACM YouTube channel.
Note that the ACM Digital Library supports different video formats including streaming video and the ability to download the video file which may be embedded in the presenter’s personal home page or his or her own institutional repository page.
The second aspect implies that ACM owns the video whether the paper is Open Access or not. However, ownership of the video by ACM still allows its re-use in new works by the presenter. In other words, the presenter retains the right to edit the ACM video of his or her presentation and include all or part of it in new works of his or her own. This extends to the video of the presenter the same re-use rights an author has for the paper (even when ACM owns the copyright to it).
Note also that, as with papers, anyone, including obviously the presenter and authors, may re-use the video in classroom teaching.
Like any rule, the above policy may warrant exceptions.
Requests for exceptions should be directed to the Publications Board Chairs, and should be accompanied by a succinct description of the motivation and justification for the request, as well as a detailed plan for evaluating how the granting of the exception was successful in quantitatively realizing its goal.
ACM's prestigious conferences and journals are seeking top-quality papers in all areas of computing and IT. It is now easier than ever to find the most appropriate venue for your research and publish with ACM.
Written by leading domain experts for software engineers, ACM Case Studies provide an in-depth look at how software teams overcome specific challenges by implementing new technologies, adopting new practices, or a combination of both. Often through first-hand accounts, these pieces explore what the challenges were, the tools and techniques that were used to combat them, and the solution that was achieved.
ACM Queue’s “Research for Practice” is your number one resource for keeping up with emerging developments in the world of theory and applying them to the challenges you face on a daily basis. RfP consistently serves up expert-curated guides to the best of CS research, and relates these breakthroughs to the challenges that software engineers face every day. In this installment of RfP is by Nitesh Mor, a PhD candidate at UC Berkeley working on the next generation of globally distributed computer systems with a special focus on data security and privacy. Titled “Edge Computing,” this RfP gives an overview of some of the most exciting work being done in the area of computing infrastructures and applications. It provides an academic view of edge computing through samples of existing research whose applications will be highly relevant in the coming years.