5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009

Slides:



Advertisements
Similar presentations
4.02 Compliance Training Brian A. Dahl Senior Counsel Takeda Pharmaceuticals North America, Inc. November 14, 2003.
Advertisements

State Authorization Program Integrity Final Rule.
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
Auditing, Assurance and Governance in Local Government
EXPORT CONTROLS. Export Controls are established to implement treaties and national security laws, generally protect national security and to combat terrorism.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Service Provider Title VI Training Civil Rights Act of 1964 Presented By: Tennessee Department of Intellectual and Developmental Disabilities.
Boyertown Area School District Acceptable Use Policy.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Unlawful Internet Gambling Enforcement Act Final Rule Joseph Baressi June 3, 2009.
101 Dalmatians Consumer Disclosures Presented by Betsy Mayotte Melbourne, Victoria, Australia.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Byron Scott | Nov U.S. Department of Education 2012 Fall Conference Foreign Schools Consumer Information Session 37.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Per Anders Eriksson
Class 7 Internet Privacy Law Your Digital Afterlife.
June 6, 2007 TAC Meeting NERC Registration Issues Andrew Gallo, Assistant General Counsel, Litigation and Business Operations ERCOT Legal Dept.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
THE PUBLIC DUTY TO PROMOTE EQUALITY Tess Gill There are currently three public sector equality duties: Race Disability Gender WHAT ARE THE EQUALITY DUTIES?
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
Office of the General Counsel1 COPYRIGHT and the TEACH Act The Technology, Education, and Copyright Harmonization Act Copyright © 2007 Villanova University.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Service Organization Control (SOC) Reporting Options and Information
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Federal Emphasis on Accountability in Higher Education and Regional Accreditation Processes Carla D. Sanderson Commissioner, Southern Association of Colleges.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Consumer Information David Bergeron Jessica Finkel U.S. Department of Education.
Hoover City Schools Preventing Sexual Harassment Hoover City Schools Policy 5.14.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
March 17, Open Source Release of NASA Software GSA/GWU Open Source in Government Conference NASA Open Source Legal Team.
Bilingual Students and the Law n Title VI of the Civil Rights Act of 1964 n Title VII of the Elementary and Secondary Education Act - The Bilingual Education.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Chapter 19: Ethical Responsibilities Chapter 19 Ethical Responsibilities.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
National Center for Information and Technical Support for Postsecondary Students with Disabilities (NCITSPSD) NCITSPSD Technical Assistance Workshop Orientation.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Chapter 21 Internal, Operational, and Compliance Auditing McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Joint Committee of the Higher Education and Entertainment Communities John C. Vaughn Executive Vice President Association of American Universities November.
DOC Web Policies & Best Practices Jennifer Hammond NOAA Research WebShop 2002 August 7, 2002.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
1 EDUCAUSE live! November 23, 2009 Jack Bernard University of Michigan HEoA’s P2P pill: Wutza U ta do?
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
1 The balance between access to public information and personal data protection: The German Experience Sven Hermerschmidt, Office of the Federal Commissioner.
Library Archiving and Internet Service Provider Status Shirley A. Mason Library Media Specialist 12 July 2008.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
EXPORT CONTROLS.
Section 504 training.
DOL Employee Benefit Plan Audits & How to Prepare
P2P Provisions in the Higher Education Act
Enforcing Copyright on Campus Networks: Lessons Learned, Next Steps
Ogletree, Deakins, Nash, Smoak & Stewart PC
Cyberethics: A Values-Based Approach
Steve Worona November 3, 2009 EDUCAUSE 2009 – Denver
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Understanding the Section 504 Process
Understanding the Section 504 Process
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
For Bethel University Faculty & Students
Presentation transcript:

5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November

5/21/2015 (2)  HEOA “peer-to-peer” provisions  Legislative and ED intent  “Unauthorized distribution of copyrighted material” regulations  What to do?

5/21/2015 (3) HEOA “P2P” Provisions

5/21/2015 (4) HEA (as amended) §485 (a) INFORMATION DISSEMINATION ACTIVITIES.— (1)Each eligible institution participating in any program under this title shall carry out information dissemination activities … The information required by this section shall accurately describe … (P)institutional policies and sanctions related to copyright infringement, including— (i)an annual disclosure that explicitly informs students that unauthorized distribution of copyrighted material, including unauthorized peer-to- peer file sharing, may subject the students to civil and criminal liabilities; (ii)a summary of the penalties for violation of Federal copyright laws; and (iii)a description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in unauthorized distribution of copyrighted materials using the institution’s information technology system;

5/21/2015 (5) (a) REQUIRED FOR PROGRAMS OF ASSISTANCE; CONTENTS.—In order to be an eligible institution for the purposes of any program authorized under this title, an institution must … enter into a program participation agreement … with the following requirements: … (29) The institution certifies that the institution— (A) has developed plans to effectively combat the unauthorized distribution of copyrighted material, including through the use of a variety of technology-based deterrents; and (B) will, to the extent practicable, offer alternatives to illegal downloading or peer-to-peer distribution of intellectual property, as determined by the institution in consultation with the chief technology officer or other designated officer of the institution. HEA (as amended) §487

5/21/2015 (6) Legislative and ED Intent

5/21/2015 (7) HR Conf. Rep. 110­803 (2008) …The Conferees intend that this Section be interpreted to be technology neutral and not imply that any particular technology measures are favored or required for inclusion in an institution’s plans. The Conferees intend for each institution to retain the authority to determine what its particular plans for compliance with this Section will be, including those that prohibit content monitoring. The Conferees recognize that there is a broad range of possibilities that exist for institutions to consider in developing plans for purposes of complying with this Section.”

5/21/2015 (8) HR Conf. Rep. 110­803 (2008) “…Experience shows that a technology-based deterrent can be an effective element of an overall solution to combat copyright infringement, when used in combination with other internal and external solutions to educate users and enforce institutional policies. Effective technology-based deterrents are currently available to institutions of higher education through a number of vendors. These approaches may provide an institution with the ability to choose which one best meets its needs, depending on that institution’s own unique characteristics, such as cost and scale. These include bandwidth shaping, traffic monitoring to identify the largest bandwidth users, a vigorous program of accepting and responding to Digital Millennium Copyright Act (DMCA) notices, and a variety of commercial products designed to reduce or block illegal file sharing…”

5/21/2015 (9) “…The Department believes that some institutions may be able to effectively combat the unauthorized distribution of copyrighted material using only one of the four types of technology-based deterrents (bandwidth shaping, traffic monitoring, accepting and responding to DMCA notices, or a commercial product designed to reduce or block illegal file sharing) while others may need to employ a combination of such deterrents…” 74:161 Federal Register (2009)

5/21/2015 (10) “…The Department believes that some institutions may be able to effectively combat the unauthorized distribution of copyrighted material using only one of the four types of technology-based deterrents (bandwidth shaping, traffic monitoring, accepting and responding to DMCA notices, or a commercial product designed to reduce or block illegal file sharing) while others may need to employ a combination of such deterrents…” 74:161 Federal Register (2009)

5/21/2015 (11) “Unauthorized Distribution of Copyrighted Material” Regulations (published 29 October 2009)

5/21/2015 (12) §668.14(b)(30)(i)

5/21/2015 (13) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (14) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (15) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (16) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (17) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (18) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (19) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (20) […the institution must have…] developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material… ; (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance … will be, including those that prohibit content monitoring

5/21/2015 (21) §668.14(b)(30)(ii) […and will…] in consultation with the chief technology officer or other designated officer of the institution— (A) Periodically review the legal alternatives for downloading or otherwise acquiring copyrighted material; (B) Make available the results of the … to its students through a Web site or other means; and (C) To the extent practicable, offer legal alternatives for downloading or otherwise acquiring copyrighted material, as determined by the institution

5/21/2015 (22) §668.14(b)(30)(ii) […and will…] in consultation with the chief technology officer or other designated officer of the institution— (A) Periodically review the legal alternatives for downloading or otherwise acquiring copyrighted material; (B) Make available the results of the … to its students through a Web site or other means; and (C) To the extent practicable, offer legal alternatives for downloading or otherwise acquiring copyrighted material, as determined by the institution

5/21/2015 (23) §668.43(a)(10) […and the institution must make available upon request…] Institutional policies and sanctions related to copyright infringement, including— (i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities; (ii) A summary of the penalties for violation of Federal copyright laws; and (iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system.

5/21/2015 (24) §668.43(a)(10) […and the institution must make available upon request…] Institutional policies and sanctions related to copyright infringement, including— (i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities; (ii) A summary of the penalties for violation of Federal copyright laws; and (iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system.

5/21/2015 (25) §668.43(a)(10) […and the institution must make available upon request…] Institutional policies and sanctions related to copyright infringement, including— (i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities; (ii) A summary of the penalties for violation of Federal copyright laws; and (iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system.

5/21/2015 (26) §668.43(a)(10) […and the institution must make available upon request…] Institutional policies and sanctions related to copyright infringement, including— (i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities; (ii) A summary of the penalties for violation of Federal copyright laws; and (iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system.

5/21/2015 (27) What To Do?

5/21/2015 (28)  Develop & implement a written plan  Technology-based deterrent(s)  Procedures for handling & discipline  Education & communication  Periodic review using relevant criteria  Review & offer legal alternatives  EDUCAUSE maintaining public list  Actively inform students  Describe policies, disciplinary procedures, & consequences  Institutional  Federal (ED & others preparing standard)  Explicitly inform students

5/21/2015 (29) ?/! Greg Jackson