Www.audiblemagic.com Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA 95032 USA 408.399.6405 x145 www.audiblemagic.com Tools to Help Universities.

Slides:



Advertisements
Similar presentations
Peer-to-Peer (P2P) Software Risks Standardized Consumer Disclosures Solution To Be Universally Applied By Complying P2P Software Suppliers Developed by.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Rockingham County Public Schools Technology Acceptable Use Policy
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Understanding Issues in Implementing Technology in the Classroom Legal, Ethical, Social, and Human Issues National Educational Technology Standards for.
Unauthorized Online Usage of Music Files  Streaming on Personal Websites  Downloading From Illegal Websites.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Social and Ethical Issues Rights and responsibilities of Software Developers.
02/12/00 E-Business Architecture
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
CalShares Investigating Voluntary Collective Licensing for Music File-Sharing at UC Berkeley Matt Earp and Andrew McDiarmid May 15, 2008 Advised by Pamela.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
LittleOrange Internet Security an Endpoint Security Appliance.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
INTERNET and CODE OF CONDUCT
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Network security policy: best practices
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Raising awareness in relation to copyright – Facing piracy Christian Sommer Chairman of the Board German Federation against Copyright Theft (GVU)
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Enforcing online rights Ute Decker Senior Legal Adviser, Legal Policy and Regulatory Affairs.
Norman SecureSurf Protect your users when surfing the Internet.
Surveys of Media Access and Consumer Attitudes on Copyright Mike Palmedo & Jimmy Koo March 2011 Photo (cc) Irish Typepad (bit.ly/huMnIf)
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.
Student Orientation. Provides Technical Support and Services Password resets Telephone and voice mail issues CourseDen, Multimedia Services, SITS contact.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 11 Issues in Implementing Technology in Schools START This multimedia product and its contents are.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
This class cannot be shared or copied without the written permission of PracticeWorks Systems, LLC.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Teaching and Learning with Technology Chapter 12 Issues in Implementing Technology in Schools ETEC 562 Spring 2004 Sherri Fetter
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Computer Security By Duncan Hall.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Acceptable Use Policy (Draft)
CHAPTER FOUR OVERVIEW SECTION ETHICS
Avira Antivirus Support via a Dedicated Helpline Number The antivirus software of Avira is recommended as a reliable as well as a proficient software security.
IS4680 Security Auditing for Compliance
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Student User Agreement and Policy 2022
Presentation transcript:

Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities Automate and Implement Their Copyright Policies

Company Confidential Audible Magic Solution Assumptions Peer-to-peer file sharing is being used by students on many university networks for the downloading of copyrighted content There are legitimate uses of peer-to-peer file sharing applications Copyright policies and enforcement processes vary between universities Technology is only one component of the solution to address the problem of piracy on university campuses Education of proper copyright behavior for students/users is important to universities

Company Confidential Alternative For Campuses Standard Approach University receives litigation letters and DMCA notices. Highly manual reactive effort of enforcement. Campus bears the cost of administration. Repeat offenders are disconnected from the network impacting their learning Broad brush educational programs Parental complaints Negative PR Standard Approach University receives litigation letters and DMCA notices. Highly manual reactive effort of enforcement. Campus bears the cost of administration. Repeat offenders are disconnected from the network impacting their learning Broad brush educational programs Parental complaints Negative PR Audible Magic Approach Tools that can be customized for each universities policies and program A automated system of education and administration Immediate education targeted to behavioral offenders Leverage “teachable moment” Focused and graduated escalation of communication and sanctions Promote legitimate P2P usage, discourage illegal P2P usage Audible Magic Approach Tools that can be customized for each universities policies and program A automated system of education and administration Immediate education targeted to behavioral offenders Leverage “teachable moment” Focused and graduated escalation of communication and sanctions Promote legitimate P2P usage, discourage illegal P2P usage

Company Confidential Inside the CopySense Appliance Internet Assembles the Digital File Identifies Digital File by Matching to Registry Applies Business Rule From Registry Collects Copy of Network Traffic Tracks Violations and Applies Sanctions Turnkey product - no software to install Non-inline device – no impact on network performance or reliability Easy installation Automatic updates

Company Confidential CopySense Appliance Provides Copyright Filtering CSA solution can automatically filter the transfers of unauthorized or illegal content – music, movies, software, child pornography Automated Technical Enforcement

Company Confidential Treat Copyright Material in a Manner Similar to Computer Virus Frank Sinatra “Mack The Knife” Daily Show MTV Networks Vance’s Garage Band Vance’s Garage Band Detection Database Ensure academic freedom and privacy by focusing on illegal transfers instead of on users.

Company Confidential CopySense Appliance Provides an Educational and Administration Tool CSA solution can automatically filter the transfers of unauthorized or illegal content – music, movies, software, textbooks, child pornography Automated Technical Enforcement Graduated Education/ Sanctions Maintains association of infringing behavior and users Tracks cumulative violation points Sanctions for repeat or serious offenders Change behavior through feedback and communications

Company Confidential Point System For Violations

Company Confidential Communication and Sanctions Real-time to User Activity “Leveraging the teachable moment”

Company Confidential Repeat Offenders Trigger More Serious User Communication and Sanctions “Automating policy enforcement”

Company Confidential Directing Users to Legitimate Content Services Notice: You have attempted to download copyrighted material. It is against Acme Internet’s network use policy to download or distribute copyright protected material and a violation of copyright law. If you feel this warning is in error, please contact the network services help desk. You Wanted? Every Breath You Take by The Police Why not get the real thing instead? Download free here

Company Confidential Audible Magic’s Solution Automated educational solution for addressing copyright issues related to peer-to-peer file sharing Reducing the administrative cost related to policy enforcement Tools to educate and influence student’s behavior through a series of graduated communications and automated sanctions Take advantage of the ‘teachable moment” Supports legitimate uses of peer-to-peer file sharing systems. Copyright identification using Audible Magic’s industry standard technology allows academic access to peer-to-peer Configurable to ensure compliance with campus privacy policies Installed in over 70 universities