Policy Statement
Upon formal notification or due to detection, and in accordance with Business - Responsible Use of Information Technology Resources, Business will take all necessary means, including but not limited to temporary disconnection from internet access or the Business network, to stop illegal sharing of copyrighted material by users of Business network services. ITS, as the recipient of formal notifications of illegal file sharing, will pass those notifications, along with an internal cease and desist notice, to any user whose computer has been identified by the claim of copyright violation. Upon receipt of notice, users must remove the named material from their computers.
Reason for Policy
It is illegal to share copyrighted material without express consent from the copyright owner. This policy addresses the Business's legal requirements to respond in a timely manner to electronic copyright infringement notifications.
Who Should Read this Policy
All individuals accessing, storing, sending, receiving, or transmitting any Business data.
Principles
- Peer-to-peer (P2P) file sharing programs are useful tools for exchanging data at high speeds. Perhaps due to this attribute, they are also the primary method for illegally sharing copyrighted material, such as movies, music, television shows, and video games. Upon notification, Business has a legal obligation to forward the notification to the user of the computer indicated in the notification, as well as quickly stop the illegal file sharing.
- Users of P2P programs should be aware that those programs search the contents of the hard drive they are installed on and often start sharing files such as movies and music without explicit notice or prompt to the user.
- Business does not generally survey its network for illegal file sharing but retains the right to do so.
- Business does not generate notices of illegal file sharing. It receives them from multiple groups that use the Digital Millennium Copyright Act (DCMA) as a way of stopping illegal file sharing.
- Business makes a distinction between computers on the Business network that are individually owned (usually these are computers brought to business by employees, contractors or visitors). Users of Business computers will be forwarded copyright violation notifications upon receipt, and will be disconnected from the network and/or internet access upon first receipt of such notifications.
- Users of individually owned computers will be forwarded copyright violation notifications upon receipt, but their computers will only be disconnected from the network or internet upon the receipt of a second violation for the same material.
- In each case, network and internet access will not be reactivated until the user has proved to an ITS technician that the offending material has been removed.
Procedures
Procedure for Responding to Copyright Infringement Claims
Upon receipt of a copyright infringement claim, ITS will:
- Amend to that claim one of three statements (see 'Amendments to Copyright Infringement Notifications' below)
- If necessary, temporarily disable internet access for the computer named in the claim
- Create a support ticket
- Assign a Support Technician to review the computer, remove the offending material, and remove any P2P programs
- If necessary, enable internet access for the computer named in the claim
Amendments to Copyright Infringement Notifications
For first-time recipients, individually owned computers:
We have been informed that you have been sharing copyrighted material. Please IMMEDIATELY cease and desist from sharing the material listed in the following email (below). In addition, please remove all copies of the infringing material, as well as any Peer-to-Peer (P2P) applications that you have installed. Failure to comply with this notice within 48 hours will result in the interruption of your outbound internet access.
For second-time recipients, individually owned computers:
We have been informed that you have been sharing copyrighted material. Please IMMEDIATELY cease and desist from sharing the material listed in the following email (below). As this is the second notification we are sending regarding this material on this computer, your inbound and outbound internet access has been suspended until such time as an ITS Support Technician can verify that all copies of the infringing material, as well as any Peer-to-Peer (P2P) applications that you have installed, have been removed.
The penalties imposed for violation of policy should be defined by the Business Owners
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article