- From: <benedict.whittamsmith@thomsonreuters.com>
- Date: Wed, 7 Sep 2016 08:05:42 +0000
- To: <vrodriguez@fi.upm.es>, <public-poe-wg@w3.org>
- Message-ID: <4C86198BF10EF549BC496C7F215A9CC70CC8A1DF@C111MFBLMBX07.ERF.thomson.com>
Hi Victor,
How would you express this looser constraint in ODRL 2.1? If it’s not possible surely it’s a candidate requirement?
Ben
From: Víctor Rodríguez Doncel [mailto:vrodriguez@fi.upm.es]
Sent: 07 September 2016 08:59
To: public-poe-wg@w3.org
Subject: Re: One by one, but not in bulk
Hi,
The constraint does not need to be precise. This would be in line with the European Database Directive, which reads...
The repeated and systematic extraction and/or re-utilization of insubstantial parts of the contents of the database [...] shall not be permitted.
This would be indirectly supported by UC2 on Data on the Web, although it has not been made explicit nor will have direct impact in the list of requirements.
Regards,
Víctor
El 07/09/2016 a las 9:49, benedict.whittamsmith@thomsonreuters.com<mailto:benedict.whittamsmith@thomsonreuters.com> escribió:
Hmm, my own feeling is that the UCR should contain UCs that lead to requirements (giving us a clear criteria for inclusion) but we can pick from a wider set (and the mail archives will be a useful source) for the primer.
Simon, Michael - what is your sense?
Ben
-----Original Message-----
From: Phil Archer [mailto:phila@w3.org]
Sent: 07 September 2016 08:31
To: Renato Iannella; W3C POE WG
Subject: Re: One by one, but not in bulk
This is helpful, thank you.
Should I still write the use case? IMO, where we have cases like this
that ODRL can handle already, it's about explanation in the Primer, but
how are we going to capture these now, if not in the UCR?
Phil
On 07/09/2016 08:22, Renato Iannella wrote:
And if we add:
odrl:prohibition
odrl:action odrl:extract;
We should then support Phil’s use case.
Renato Iannella, Monegraph
Co-Chair, W3C Permissions & Obligations Expression (POE) Working
Group
--
Phil Archer
W3C Data Activity Lead
http://www.w3.org/2013/data/
https://urldefense.proofpoint.com/v2/url?u=http-
3A__philarcher.org&d=CwIDaQ&c=4ZIZThykDLcoWk-
GVjSLm9hvvvzvGv0FLoWSRuCSs5Q&r=GQ6xvz2BG1vCgiGGeLHdL1qJLbLUqYG6W19eFBlz
nzDGH3wjzyriGVJemENTKsgx&m=gNgdg5fNZlxzyr0FrPumBt3ggvTKea1yDdLggSux7UU&
s=7MRHUGCCB7S2iCF5nwQMLHRfZ3dSgIZFRYXWik_xkqM&e=
+44 (0)7887 767755
@philarcher1
--
Víctor Rodríguez-Doncel
D3205 - Ontology Engineering Group (OEG)
Departamento de Inteligencia Artificial
ETS de Ingenieros Informáticos
Universidad Politécnica de Madrid
Campus de Montegancedo s/n
Boadilla del Monte-28660 Madrid, Spain
Tel. (+34) 91336 3753
Skype: vroddon3
________________________________
[Image removed by sender. Avast logo]<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.avast.com_sig-2Demail-3Futm-5Fmedium-3Demail-26utm-5Fsource-3Dlink-26utm-5Fcampaign-3Dsig-2Demail-26utm-5Fcontent-3Demailclient&d=CwMDaQ&c=4ZIZThykDLcoWk-GVjSLm9hvvvzvGv0FLoWSRuCSs5Q&r=GQ6xvz2BG1vCgiGGeLHdL1qJLbLUqYG6W19eFBlznzDGH3wjzyriGVJemENTKsgx&m=vrvMkOpQo1cOJIsDX4WDIEb-yLfC9IbYkre7WaNw2Y0&s=FIowelkP2OyHSAVEKbkgPcTlCt3J-21rSBxJSMQ4HsU&e=>
El software de antivirus Avast ha analizado este correo electrónico en busca de virus.
www.avast.com<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.avast.com_sig-2Demail-3Futm-5Fmedium-3Demail-26utm-5Fsource-3Dlink-26utm-5Fcampaign-3Dsig-2Demail-26utm-5Fcontent-3Demailclient&d=CwMDaQ&c=4ZIZThykDLcoWk-GVjSLm9hvvvzvGv0FLoWSRuCSs5Q&r=GQ6xvz2BG1vCgiGGeLHdL1qJLbLUqYG6W19eFBlznzDGH3wjzyriGVJemENTKsgx&m=vrvMkOpQo1cOJIsDX4WDIEb-yLfC9IbYkre7WaNw2Y0&s=FIowelkP2OyHSAVEKbkgPcTlCt3J-21rSBxJSMQ4HsU&e=>
Attachments
- image/jpeg attachment: _WRD000.jpg
Received on Wednesday, 7 September 2016 08:07:30 UTC