article thumbnail

How to license mixed media, without a law degree

Beth's Blog: How Nonprofits Can Use Social Media

s licensing and that of the sound bite? When deciding where to indicate licensing information, it is again a case of ???more on Magnatune there is a clear link to license information for that album. Currently this is only possible with MP3 audio files through embedding of metadata. into the file itself.

License 50
article thumbnail

Top 10 Sources for Free Images

Tech Soup

You can add other criteria as well, such as type of file (like JPG only), type of image (like only faces), and even colors you want in the image. Flickr is one of our go-to places for Creative Commons- licensed images. You can search by topic, location, type, author, license, and source. You can also search files by tags.

Images 36
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Due diligence before you donate

ASU Lodestar Center

Also, be on the lookout for questionable charities that have a name that closely resembles the name of a well-known, legitimate charity; some sound-alike charities are scams. The organization's IRS Form 990, which must be filed by all organizations that claim tax-exempt nonprofit status, can usually be found with a Google search.

article thumbnail

Learning Journal: Experimenting With Adding Music to Web Videos

Beth's Blog: How Nonprofits Can Use Social Media

Why add KB or MB to the file size when my content instructional. Creative Commons and flexible copyright licenses as well as lots of talented musicians who want you to use their work (provided you respect the terms of the license) make it fairly easy to find really good music. Finding Good Quality Music Sources Isn't Impossible.

Music 50
article thumbnail

Security Awareness Tips for LMS Administrators

Forj

Professional License Number. Trojans arrive under a variety of subterfuges—email attachments and file downloads are most common. Attackers are practiced at sounding convincing and can persuade a victim to convey critical information like passwords. A few examples of PII are: Name. Date of Birth. Social Security number.

article thumbnail

Bridging the Digital Divide? Tell Us About It!

Tech Soup

That sounds great. In entering a submission, the individual or group grants the Sponsor a non-exclusive, irrevocable, perpetual, worldwide, royalty-free, transferable, sub-licensable license and right to use, perform, exhibit, reproduce, distribute, and/or otherwise exploit the story any manner and in any media now known or hereafter devised.

Digital 70
article thumbnail

Bridging the Digital Divide? Tell Us About It!

Tech Soup

That sounds great. In entering a submission, the individual or group grants the Sponsor a non-exclusive, irrevocable, perpetual, worldwide, royalty-free, transferable, sub-licensable license and right to use, perform, exhibit, reproduce, distribute, and/or otherwise exploit the story any manner and in any media now known or hereafter devised.

Digital 65