In July I attended the UKCoRR Members Day and delivered a presentation on the subject of approaching publishers for permission from the perspective of someone working in open access/repository support. The title of the presentation was ‘Requesting permission: approaching publishers, lessons learned, and the many successes!’ Here’s a link to the presentation in the St Andrews Research Repository: https://research-repository.st-andrews.ac.uk/handle/10023/11261
In this blog post I’ll go over some of the points from the presentation that I think struck a chord with the audience, with the overall intention of explaining the rationale behind our processes. Before I begin, I must say that I am very grateful to the other attendees on the day who shared their experiences in the Q&A, as well as after the event. It was really encouraging to hear from so many colleagues who have experienced similar stumbling blocks as we have, and it was especially useful to hear from those who do things differently to us at St Andrews.
I had noticed the issue of publisher permissions popping up on the UKCoRR email list on a number of occasions, often in relation to specific publishers who don’t have a public open access or author self-archiving policy. Additionally, a Google Doc listing publishers and their responses to requests to archive book chapters has been circulated many times, and indeed was the subject of numerous discussions on the Members Day as well. This brings me to the first point from my presentation that I felt was perhaps the most illuminating, and this is the fact that most of our permission requests are actually for articles published in journals and conference proceedings (see figure 1). Perhaps not the most shocking expose on the face of it, but if you factor in REF2021 compliance it is in fact quite significant. This is because 60% of our permissions requests are for outputs potentially in scope for the REF open access policy. So, I argued, having an effective permissions policy can potentially affect an institution’s approach to their REF return and level of exceptions required.
|Figure 1 - Item types|
Another perhaps less ‘sticky’ and more ‘carroty’ reason for all this comes down to effective curation of our research outputs. Many of the items in our repository are archived on the basis of successful permission requests for print-only publications, and so are often unique as they cannot be found online anywhere else. So, I explained my thoughts about digital preservation and the duty of care we have for this rare part of our collections. Part of this duty of care is ensuring permissions are well thought out, and that ensuing replies are clear and unambiguous. But, as I explained, no matter how careful you may be, I expect that risk management will always play a part in any decision to host third party copyright material online.
So, how do we do it? From the outset I want to state that I don’t believe our process is perfect by any means. And, although we have had an overwhelming amount of success there are caveats, but more on that later!
|Figure 2 - Permissions workflow|
|Figure 3 - Permissions spreadsheet|
The vast majority of responses come back in the form of emails, often but not always from editors of the journals themselves. As I said before these are filed away and retained as proof that permission has been attained. But, a question I posed at the end of my presentation was: does this actually protect our collection? It would seem common sense to suggest that items that are archived on the basis of an email are less protected than items that are archived in response to a signed letter. But is this actually the case? Might both forms of response be equally fallacious if in fact the issuer of the permission response is not vetted for authenticity (whatever that would mean). I don’t have an answer for this, so this is the point at which I ended my presentation and opened the debate to the floor.
My enduring impression from speaking to colleagues on the day was that each institution has a clear understanding of the level of risk they are willing to take, even if it is not enshrined in policy. Generally speaking my colleagues and I in the Open Access team at St Andrews tend to err on the side of caution and risk aversion, but from speaking to colleagues at other institutions my feeling is that we could perhaps afford to be less so. At any rate, the question of how we can protect these unique parts of our collections lingers on I’m afraid, and I suppose ultimately it is always going to be a balancing act between collection growth and collection sustainability.
Principal Library Assistant (Scholarly Communications)