A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester.

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
Advertisements

Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
The digital age of information is not yet a done deal and copyright is not the only potential “block” DRM.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
National and Campus Implementations for P2P and Bandwidth Mark Luker, Vice President, EDUCAUSE Karen R. Petitto, Asst. Professor of Educational Technology.
Challenges and Incidents in Higher Ed. About->Presenter Zach Jansen Information Security Officer, Calvin College.
An Introduction to Internet Piracy Adapted from Internet Piracy Exposed by Guy Hart-Davis.
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
FILE-SHARING The DMCA, RIAA, and you. Copyright  What is a copyright?
Changing the Network Infrastructure– Threats and Possibilities Alex Alben Nobember 6, 2003.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
The digital age of information is not yet a done deal and copyright is not the only potential “block” DRM.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
P2P: Dangers, Risks & Copyright Infringement Jodi Ito Information Security Officer, ITS
Intellectual Property
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
Arguments Against NN - Political Difficulty of designing effective laws Poor legislation may actually cause more harm than good May interfere with existing.
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
Social and Economic Impacts of IT Professor Matt Thatcher.
1 Automated Copyright Notice System (ACNS) September 2003 UNIVERSAL MUSIC GROUP UNIVERSAL STUDIOS.
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
Grade 5 Student Assistants
Cornell Institute for Digital Collections 1 Copyright and Distributed Learning Peter B. Hirtle Director Cornell Institute for Digital Collections
Network Neutrality By: Jacob Hansen CPE 401. Introduction What is network neutrality? Who wants to get rid of it? Why is it important? What is at stake?
Update from the Joint Committee on P2P File Sharing CNI Task Force – Spring, 2004 Mark Luker Steve Worona EDUCAUSE.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.
Managing Digital Rights DRM and beyond Lamoureux, MM 450 April 15, 2008.
1 Good Digital Citizenship: Examining Student Peer-to-Peer Activity at Illinois State University EDUCAUSE Live! David Greenfield, Director Student Technology,
Policy-Induced Computer Science Problems? Background for NYU Public Design Workshop Fred B. Schneider Department of Computer Science Cornell University.
Computer Ethics.
Number 10: To Respond or Not to DMCA Notices Pro –Good faith effort towards content owner concerns. –As a matter of policy and citizenship obligations.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Effective Restrictions on Internet Usage What is our responsibility? & What can I do?
IP5. Allocation of Spectrum Spectrum as property – sold on the market Spectrum as commons – E2E.
CSG Policy Discussion: Copyright Compliance at All Levels Organizers: - Tracy Futhey - Tracy Mitrano - Steve Worona And featuring: - Greg Jackson - Mark.
A Gift of Fire, 2edChapter 6: Intellectual Property1 Intellectual Property.
The digital age of information is not yet a done deal and copyright is not the only potential “block” DRM.
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
Emily Adler, Megan Gasvoda, and Kristine McNally.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Intellectual Property in Peer-to-Peer Networks Artsiom Yautsiukhin Natallia Kokash Intellectual Property Law, 18 October 2005.
Higher Ed versus the RIAA and Vice-Versa — An Update CSG-Dartmouth September 26, 2003 Steve Worona EDUCAUSECSG-Dartmouth September 26, 2003 Steve Worona.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Joint Committee of the Higher Education and Entertainment Communities John C. Vaughn Executive Vice President Association of American Universities November.
Implementation and Policy of Rate Based Billing at Cornell Tracy Mitrano R. David Vernon.
1 EDUCAUSE live! November 23, 2009 Jack Bernard University of Michigan HEoA’s P2P pill: Wutza U ta do?
Discussion Session: Options for Legal Music and Movie Services John Arpino, The George Washington University Ellen Yu Borkowski, University of Maryland.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Compsci 82, Fall Digital Millennium Copyright Act,DMCA l Copyright law of United States  Passed in 1998, general industry support  Controversial.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
DMCA Compliance: Adapting Strategies to Hit a Moving Target Jeff Gimbel
Internet Acceptable Use Policy
P2P Provisions in the Higher Education Act
Enforcing Copyright on Campus Networks: Lessons Learned, Next Steps
Cyberethics: A Values-Based Approach
Columbia Pictures and the Trailer Takedown
By: Justin, Juan, Jian, and Jazlin
PART III Ethical Issues in Business
Higher Ed versus the RIAA and Vice-Versa — An Update
Copyright and Fair Use Doris Van Kampen-Breit
A Better Way Forward For P2P: Voluntary Collective Licensing
CSG Policy Discussion: Copyright Compliance at All Levels
Presentation transcript:

A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester

Background: Joint P2P Committee “Joint Committee” formed about 1.5 years ago, reps from Higher Ed (AAU, Educause, ACE, etc.) and Content (RIAA, MPAA) Why College Campuses? –Kazaa et al. seek out high bandwidth –College students naturally involved The Congressional overlay

Approaches Considered Education: “best practices” documents –Like alcohol on campus in historical context Technology –First approach by Content folks: Sniff and Block –Evolving approach: provide legal alternatives

No Magic Bullets! Most likely outcome: like drinking, we’ll curtail it, some excesses will continue Solution will involve multiple approaches –Enforcement against large violators –Education about what the law actually says –Provision of legit alternatives that offer higher value than stealing (even at positive price)

Technological Interventions Traffic shaping –Ignores subject matter, looks for type of traffic Bandwidth choking –At the pipe or at the port? Pricing network access (ala Cornell) Sniff and block More aggressive intrusion –Disablement from afar?

Can Sniff and Block Ever Win? DMCA worries (overly) about 1 st copy Real problem is subsequent copies Sniff and block in a world of –File compression (not a problem) –Encryption (a large problem) But… P2P won’t work in an encrypted world without software coordination

Some Complexities That darned 1 st Amendment stuff –Detect without violating privacy and free speech goals? Illegal file sharing NOT protected How much of the P2P is music? –Movies, music video, and porn loom large –Some legit traffic too

Enforcement Issues (My View) The “proper” enforcer is copyright holder College and universities should not be enforcers unless legally obligated Always consider “paper” analogy when considering proper action The one difference: control our networks!

What Happens if We Fail? Current status: DMCA provides universities with ISP status –Immune from liability if we follow simple rules Most obvious: Notice and Takedown process Less obvious: If we “know” too much, we can acquire liability

What Happens (cont.) Congress has threatened to “fix” the problem if we don’t Most obvious choice: remove ISP immunity –Would require us to become very intrusive

The End