SlideShare una empresa de Scribd logo
1 de 16
Combating Copyright Infringement HEAO P2P Assessing First Year Effectiveness Jerry Bishop TheHigherEdCIO HEOA P2P Assessment by Jerry Bishop is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
What’s required – the law Brief summary of the essential elements
Combating Copyright Infringement Authority: 34 CFR 668.14(b)(30) Effective July 1, 2010 Condition of any Title IV HEA program Institutions must Develop Institutional Plans Implement Technology Deterrents Offer Legal Alternatives
Institutional Plans “…Develop & implement written plans to combat unauthorized distribution of copyrighted materials by users of the institutions network without unduly interfering with the educational and research use of the network.” Components Use of one or more technology-based deterrents Educating community on appropriate use of copyrighted material Procedures for handling unauthorized distributions, including disciplinary procedures Procedures for reviewing effectiveness of the plan
Technology Deterrents Bandwidth shaping Traffic monitoring Accepting & responding to DMCA notices Commercial products to block illegal file sharing
Legal Alternatives Authority: 34 CFR 668.14(b)(30) Offer legal alternatives to illegal downloading or acquiring copyrighted materials Where to buy content commercially Where to find free to use content Periodic reviews of alternatives are required
Consumer Information Authority: 34 CFR 668.43(a)(10) Provide upon request institutional policies and sanctions related to unauthorized distribution of copyright materials Must include: Explicitly inform students of civil and criminal liabilities associated with violations Include summary of penalties for violations of Federal copyright laws Describe policies and disciplinary actions taken for violations Provide one-to-one annual notice to students
Assessing Plan effectiveness Tips for gauging your current risk exposure
Plan Effectiveness You do not have to be an investigator Operational Portion Review written plan and assessment portion Review related policies and procedures Review handling of a sample of suspected violations Technical Portion (really optional) Search for known file sharing applications Scan network drives for signs of collections Check web filtering or blocking tools
Query Results from SCCM Peer-2-Peer Programs on Staff Computers uTorrent 			1 BitTorrent  			1 BitviseTunnelier		1 FileZilla 			9 Others likely exist but do not register Remember, having the application alone it not a violation – there are legitimate uses
Scan Storage Volumes Use disk tools to scan for common filetypes Check sampling of directories with unusually large volumes of content Users home directories and departmental folders  Remind college of policy and prompt for clean-up Include volume and drive data to illustrate Watch for shifting content between locations Follow-up with Pre and Post clean-up results
S:Drive Access Dates by Size May 2011 April 2011
S:Drive Folders Sizes April 2011 May 2011
S:Drive by Filetypes April 2011 May 2011 140 GB .mpg and 93.4 GB .mp3 removed 111 GB .avi increased
Review Web Traffic for P2P Sites
Questions? Jerry Bishop blog.thehigheredcio.com

Más contenido relacionado

Destacado

IT Application Plan
IT Application PlanIT Application Plan
IT Application PlanJerry Bishop
 
Epic Support Model
Epic Support ModelEpic Support Model
Epic Support ModelJerry Bishop
 
IT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using ExcelIT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using ExcelJerry Bishop
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 

Destacado (6)

IT Application Plan
IT Application PlanIT Application Plan
IT Application Plan
 
Epic Support Model
Epic Support ModelEpic Support Model
Epic Support Model
 
Project Request
Project RequestProject Request
Project Request
 
IT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using ExcelIT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using Excel
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 

Similar a HEOA P2P Assessment

Foss Licencing
Foss LicencingFoss Licencing
Foss LicencingFITT
 
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...South Tyrol Free Software Conference
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source GovernanceRogue Wave Software
 
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...Stephanie Hess
 
One Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open EducationOne Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open EducationR. John Robertson
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy MakingDilum Bandara
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy MakingDilum Bandara
 
NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011Arian Ravanbakhsh
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsRobert Grossman
 
Copyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing ActCopyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing ActJune Power
 
IntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetIntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetbibianamchugh
 
'Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions''Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions'Shane Coughlan
 
Legal Tech Ethics
Legal Tech EthicsLegal Tech Ethics
Legal Tech EthicsAaron Vick
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxrhetttrevannion
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseFINOS
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseOpen Source Strategy Forum
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Source Code Control Limited
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Mike Linksvayer
 

Similar a HEOA P2P Assessment (20)

Foss Licencing
Foss LicencingFoss Licencing
Foss Licencing
 
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source Governance
 
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
 
One Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open EducationOne Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open Education
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy Making
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy Making
 
File000168
File000168File000168
File000168
 
NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data Platforms
 
Copyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing ActCopyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing Act
 
IntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetIntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMet
 
'Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions''Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions'
 
Legal Tech Ethics
Legal Tech EthicsLegal Tech Ethics
Legal Tech Ethics
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash Course
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash Course
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

HEOA P2P Assessment

  • 1. Combating Copyright Infringement HEAO P2P Assessing First Year Effectiveness Jerry Bishop TheHigherEdCIO HEOA P2P Assessment by Jerry Bishop is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
  • 2. What’s required – the law Brief summary of the essential elements
  • 3. Combating Copyright Infringement Authority: 34 CFR 668.14(b)(30) Effective July 1, 2010 Condition of any Title IV HEA program Institutions must Develop Institutional Plans Implement Technology Deterrents Offer Legal Alternatives
  • 4. Institutional Plans “…Develop & implement written plans to combat unauthorized distribution of copyrighted materials by users of the institutions network without unduly interfering with the educational and research use of the network.” Components Use of one or more technology-based deterrents Educating community on appropriate use of copyrighted material Procedures for handling unauthorized distributions, including disciplinary procedures Procedures for reviewing effectiveness of the plan
  • 5. Technology Deterrents Bandwidth shaping Traffic monitoring Accepting & responding to DMCA notices Commercial products to block illegal file sharing
  • 6. Legal Alternatives Authority: 34 CFR 668.14(b)(30) Offer legal alternatives to illegal downloading or acquiring copyrighted materials Where to buy content commercially Where to find free to use content Periodic reviews of alternatives are required
  • 7. Consumer Information Authority: 34 CFR 668.43(a)(10) Provide upon request institutional policies and sanctions related to unauthorized distribution of copyright materials Must include: Explicitly inform students of civil and criminal liabilities associated with violations Include summary of penalties for violations of Federal copyright laws Describe policies and disciplinary actions taken for violations Provide one-to-one annual notice to students
  • 8. Assessing Plan effectiveness Tips for gauging your current risk exposure
  • 9. Plan Effectiveness You do not have to be an investigator Operational Portion Review written plan and assessment portion Review related policies and procedures Review handling of a sample of suspected violations Technical Portion (really optional) Search for known file sharing applications Scan network drives for signs of collections Check web filtering or blocking tools
  • 10. Query Results from SCCM Peer-2-Peer Programs on Staff Computers uTorrent  1 BitTorrent   1 BitviseTunnelier 1 FileZilla  9 Others likely exist but do not register Remember, having the application alone it not a violation – there are legitimate uses
  • 11. Scan Storage Volumes Use disk tools to scan for common filetypes Check sampling of directories with unusually large volumes of content Users home directories and departmental folders Remind college of policy and prompt for clean-up Include volume and drive data to illustrate Watch for shifting content between locations Follow-up with Pre and Post clean-up results
  • 12. S:Drive Access Dates by Size May 2011 April 2011
  • 13. S:Drive Folders Sizes April 2011 May 2011
  • 14. S:Drive by Filetypes April 2011 May 2011 140 GB .mpg and 93.4 GB .mp3 removed 111 GB .avi increased
  • 15. Review Web Traffic for P2P Sites
  • 16. Questions? Jerry Bishop blog.thehigheredcio.com

Notas del editor

  1. This chart shows the breakdown of all files on the S:\\\\ drive based on the date they were last accessed. This data suggests most of the files are actively being used if only for viewing.
  2. This chart shows the total amount of disk space used by each folder on the S:\\\\ drive. Although some folders that are large are expected, the unexpected finding is that most departmental folders are small.
  3. This Chart shows the breakdown of all files on the S:\\ drive based on the file types. The top filetypes includes several image and media filetypes.