What Does it Involve?
This method involves systematically trawling and analyzing large collections of data to identify overarching patters and relations (for example in computer linguistics, biomedicine, or bioinformatics).
What's the Problem?
The systematic, continuous mining and downloading of licensed content (text and/or data extraction) is generally seen by providers as unauthorized use.
Publishers monitor frequency of access, and in such cases will bar access to individual addresses or the entire UZH IP range.
This also applies when the provider does not publish any explicit limit on downloads on its website or in the agreement.
What Are You Able or Allowed to Do?
In most cases an additional license, which has to be paid for, is required – usually in conjunction with specific API access.
We'll be happy to help. Please contact us in good time.