SU home

logan banner logan home site map Logan Library

 

 

Logan Home > About > Policies > HEOA > Copyright Infringement Deterrence Plan

Schreiner University’s Copyright Infringement Deterrence Plan

Goal: Deter the unauthorized distribution of copyrighted digital material, especially audio, video, and software file sharing that involves the use of the campus network for peer-to-peer (P2P) downloading or distribution of copyrighted digital material.

 
Educational Objective: Develop and implement proactive outreach and educational programs that increase student, faculty, and staff knowledge and awareness of copyright protections and the penalties attendant to infringement of those copyrights.

    1. Provide a “Notice to Students” every semester via email that outlines federal law, University policy, campus practices, and the potential internal and external sanctions applicable to copyright infringement, including unauthorized P2P file sharing via the campus network.
    2. Provide a “Notice to Faculty and Staff” every semester via email that outlines federal law, University policy, campus practices, and the potential internal and external sanctions applicable to copyright infringement, including unauthorized P2P file sharing via the campus network.
    3. Forward the “Notice to Students” to Schreiner parents via the Dean of Students electronic newsletter.
    4. Develop and distribute curricula materials on Copyright Infringement and P2P File Sharing for inclusion in the introductory course University 101required of all entering freshmen.
    5. Expand information presented on Logan Library’s website on copyright use rights and responsibilities, copyright infringement, and P2P file sharing; also post there the “Notice to Students” and “Notice to Faculty and Staff”
    6. As possible, include a discussion of copyright infringement and the risks of P2P file sharing as part of the discussions at New Student Orientation, Parents Orientation, New Employee Orientation.  Speak to individual departments as invited.

         
Policy Enforcement Objective:  Maintain and enforce campus copyright policies and procedures in accordance with federal copyright laws and regulations.

    1. Maintain and enforce a clause in the campus appropriate use policy prohibiting the unauthorized duplication, use, or distribution of copyrighted digital materials (including software, music, video, graphics, etc.).
    2. Document, publicize, and adhere to campus procedures for addressing notices and other communications pursuant to the Digital Millennium Copyright Act (DMCA)
    3. Maintain a historical record of policy violators for use in applying progressive discipline to repeat offenders.
    4. Keep all University copyright policies up-to-date with evolving federal regulations

Technology-based Objective: Employ technology-based deterrents to combat illegal P2P file sharing in ways that do not unreasonably impede the use of P2P technology for legitimate University purposes.

    1. To the extent practicable, configure the University's Intrusion Prevention Systems to block and/or otherwise disrupt transmissions employing the P2P networks and protocols that are used almost exclusively for illegal file sharing (e.g., Gnutella, Ares, eDonkey, etc.).
    2. To the extent practicable, implement secure solutions/exceptions that facilitate authorized use of P2P technologies
    3. Utilize Network Access Control and Wireless Network Control systems to prevent offending computers from accessing the campus network until such time as any allegedly infringing materials are removed or otherwise made unavailable from those systems
    4. Monitor the viability of bandwidth shaping as an effective future alternative mechanism for discouraging illegal P2P file sharing


Plan Effectiveness Assessment: Department of Information Services will assess the effectiveness of the above plan in meeting its goal in May of each academic year. The plan will be considered effective if the total number of infringement notices and reports for the preceding academic year is less than five. 

Countable infringement notices and reports include those validated as accurate by IT Network Administration and resulting in University action to force removal of the infringing material and/or an end to its unauthorized distribution. Countable infringement notices and reports may come from any of the following sources: 

 

 

Portions of this plan are based on web documentation produced by Texas State University and are used with permission.

<- Back to HEOA Plan