Federal Legislation and Higher Education Digital Millennium Copyright Act Compliance and Education Networking 2003 Copyright 2003 Tracy Mitrano.

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
WiredSafety and the DMCA Subpoena March 17, 2003
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
2/16/2010 The Family Educational Records and Privacy Act.
EP REVIEW OF INTERIM “POLICY ON POLICIES ”
Stewardship and Custodianship of Electronic Mail Office of Information Technologies University Computer Policy and Law Program Office of Information Technologies.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
"Copyright Kevin Lynch This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
Network security policy: best practices
COPYRIGHT, LEGAL ISSUES & TAKEDOWN. 2 Work priorities Orphan Works ALRC review Copyright and the Digital Economy Creative Commons licenses Legal.
Data Incident Notification Policies and Procedures Tracy Mitrano Steven Schuster ICPL 2006.
Privacy and Security Risks in Higher Education
The New Legal Landscape for Event Industry Social Media Kathryn Carrier, Esq. © 2011 Katy Carrier.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Internet Use by the General Public Guidelines from the AVCC, Content, University IT Systems and the Internet provided framework for addressing copyright.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
An Educational Computer Based Training Program CBTCBT.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Sutton Public Schools Anti-Bullying Law Overview.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
Florida Information Protection Act of 2014 (FIPA).
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Teaching Strategies that Work: Copyright, Fair Use and Digital Learning Renee Hobbs Workshop for the Association of College and Research Libraries April.
ARC Chairperson Training Introduction 1. The Language of Special Education Acronyms 2.
Policy Pickles at Sueme U Seminars in Academic Computing 2005 – Case 5.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
What could we learn from learning outcomes assessment programs in the U.S public research universities? Samuel S. Peng Center for Educational Research.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
STUDENT JUDICIAL AFFAIRS Balancing the Principals of Natural Justice with Requirements of Privacy Legislation CCSJA March 23, 2006 Harry Davis Deborah.
Implementation and Policy of Rate Based Billing at Cornell Tracy Mitrano R. David Vernon.
HEALTH POLICY – A PRIMER. WHAT IS POLICY? A PLAN OR COURSE OF ACTION DESIGNED TO DEFINE ISSUES, INFLUENCE DECISION-MAKING, AND PROMOTE BROAD COMMUNITY.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
ANNOOR ISLAMIC SCHOOL AdvancEd Survey PURPOSE AND DIRECTION.
Staff All Surveys Questions 1-27 n=45 surveys Strongly Disagree Disagree Neutral Agree Strongly Agree The relative sizes of the colored bars in the chart.
Chapter 4: Laws, Regulations, and Compliance
PP 620: Public Policy and Health Administration Unit One Seminar Kris R. Foote, J.D., M.P.A., M.S.W. Kaplan University.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Data Access & New Banner Admin UI Professional Development Session May 11, am Presented by: Management Information Center.
CRJ 422 GENIUS Teaching Effectively/crj422genius.com FOR MORE CLASSES VISIT
Sutton Public Schools Anti-Bullying Law Overview
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Student Confidentiality: The FERPA/HIPAA Facts
Transforming IT Management
CRJ 422 Education for Service-- snaptutorial.com.
CRJ 422 Teaching Effectively-- snaptutorial.com
Move this to online module slides 11-56
The Strategic Content Alliance
CompTIA Security+ Study Guide (SY0-401)
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

Federal Legislation and Higher Education Digital Millennium Copyright Act Compliance and Education Networking 2003 Copyright 2003 Tracy Mitrano

Overview of Federal Legislation Tension between privacy/security of acts such as Family Education Rights and Privacy, Health Insurance Portability Accountability and Financial Services Modernization and sharing of information acts such as USA-Patriot and Homeland Security Acts.

DMCA IT privacy and security implications –Jonathan Whitehead evoked security concerns with peer to peer technologies –Sarah Deutsch spoke about privacy concerns when she addressed the significantly lowered bar for information gathering under the DMCA –Self-help provisions of the draft Patriot Act, which would have allowed copyright holders to “hack” into systems to stop allegedly infringing traffic, struck in the 11 th hour.

What role should higher education play? Vast majority of campuses do not: –Monitor their networks for content Have policies that prohibit as a practice –Do not want to monitor their networks for content For reasons of academic freedom –Do not believe that technical controls, for example the blocking of ports: Are required for compliance Are technically feasible for compliance

Compliance and Education Compliance should be distinguished from enforcement –For a policy on DMCA, compliance is the policy statement. Procedures or protocols outline the administrative steps taken to accomplish that goal. –For example, at Cornell, before the Verizon case, we used to notify user and block if they failed to respond. Automatic referrals to Judicial Administration.

DMCA Compliance at Cornell Cornell has changed the procedure to: –Immediate and simultaneous block of Internet Protocol (IP) address upon receipt of infringement notice and contact to user. –Form letter –Upon receipt of either cease and desist response or assurance that a security breach has been repaired, immediate re-instatement of IP address. –Automatic referral to Judicial Administration

Old Whine in New Bottles Which procedure, old or new, is legal? –Both are! Difference revolves around an interpretation of the term “expeditiously” in DMCA. Which one is better? –Always a balance, but three reasons why we changed: Administrative experience in obtaining the attention of the user Copyright/security complications Verizon case –Last most important: better to protect identity of users

Nota Bene Discipline is not one of the reasons for the change to the new procedure: –IT policy/procedure decision. –Discipline left up to Judicial Administration FYI: First time offenders receive $30.00 fine and no disciplinary record. Repeat offenders receive progressive discipline. Three-time repeat (not multiple) offenders will have account closed for semester. Contrary to recent newspaper accounts, Cornell’s new network billing operation was not intended for and does not have the purpose of “cracking down on file-sharing.”

Education Our philosophy is to couple compliance with education Cornell takes a variety of approaches: –Annual Notice with reply function Dynamic conversation with entire university community fall2002.html –New students must take an on-line tutorial about information technologies packed with policy and security information. If they do not complete after September 15, their network identifier is frozen for usage until they do complete the program.

Education University Computer Policy and Law Program –Speaker’s series which includes a number of speakers on digital copyright, e.g. Georgia Harper Margie Hodges-Shaw Alan Davidson Academic Courses –CIS 515: Culture, Law and Politics of the Internet –Considering more: IT as a topic for freshman writing seminars or even required course in IT for all undergraduates. Talks, seminars and discussions: Make every copyright issue an education moment

Why Compliance and Education? Two prongs are consistent with our role as institutional citizens of American society and our mission as gadflies and educators Maintain our autonomy as distinct institutions –Steer around the pitfalls of either extreme position (on the one hand, flouting the law and on the other enforcement actions, such as monitoring network for content) on the political spectrum Act as a beacon to society about the complicated political concerns of digital copyright

Conclusion “Gladly would I learn, and gladly teach.” Geoffrey Chaucer