SlideShare une entreprise Scribd logo
1  sur  16
Combating Copyright Infringement HEAO P2P Assessing First Year Effectiveness Jerry Bishop TheHigherEdCIO HEOA P2P Assessment by Jerry Bishop is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
What’s required – the law Brief summary of the essential elements
Combating Copyright Infringement Authority: 34 CFR 668.14(b)(30) Effective July 1, 2010 Condition of any Title IV HEA program Institutions must Develop Institutional Plans Implement Technology Deterrents Offer Legal Alternatives
Institutional Plans “…Develop & implement written plans to combat unauthorized distribution of copyrighted materials by users of the institutions network without unduly interfering with the educational and research use of the network.” Components Use of one or more technology-based deterrents Educating community on appropriate use of copyrighted material Procedures for handling unauthorized distributions, including disciplinary procedures Procedures for reviewing effectiveness of the plan
Technology Deterrents Bandwidth shaping Traffic monitoring Accepting & responding to DMCA notices Commercial products to block illegal file sharing
Legal Alternatives Authority: 34 CFR 668.14(b)(30) Offer legal alternatives to illegal downloading or acquiring copyrighted materials Where to buy content commercially Where to find free to use content Periodic reviews of alternatives are required
Consumer Information Authority: 34 CFR 668.43(a)(10) Provide upon request institutional policies and sanctions related to unauthorized distribution of copyright materials Must include: Explicitly inform students of civil and criminal liabilities associated with violations Include summary of penalties for violations of Federal copyright laws Describe policies and disciplinary actions taken for violations Provide one-to-one annual notice to students
Assessing Plan effectiveness Tips for gauging your current risk exposure
Plan Effectiveness You do not have to be an investigator Operational Portion Review written plan and assessment portion Review related policies and procedures Review handling of a sample of suspected violations Technical Portion (really optional) Search for known file sharing applications Scan network drives for signs of collections Check web filtering or blocking tools
Query Results from SCCM Peer-2-Peer Programs on Staff Computers uTorrent 			1 BitTorrent  			1 BitviseTunnelier		1 FileZilla 			9 Others likely exist but do not register Remember, having the application alone it not a violation – there are legitimate uses
Scan Storage Volumes Use disk tools to scan for common filetypes Check sampling of directories with unusually large volumes of content Users home directories and departmental folders  Remind college of policy and prompt for clean-up Include volume and drive data to illustrate Watch for shifting content between locations Follow-up with Pre and Post clean-up results
S:Drive Access Dates by Size May 2011 April 2011
S:Drive Folders Sizes April 2011 May 2011
S:Drive by Filetypes April 2011 May 2011 140 GB .mpg and 93.4 GB .mp3 removed 111 GB .avi increased
Review Web Traffic for P2P Sites
Questions? Jerry Bishop blog.thehigheredcio.com

Contenu connexe

En vedette

En vedette (6)

IT Application Plan
IT Application PlanIT Application Plan
IT Application Plan
 
Epic Support Model
Epic Support ModelEpic Support Model
Epic Support Model
 
Project Request
Project RequestProject Request
Project Request
 
IT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using ExcelIT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using Excel
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 

Similaire à HEOA P2P Assessment

Foss Licencing
Foss LicencingFoss Licencing
Foss Licencing
FITT
 
IntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetIntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMet
bibianamchugh
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
rhetttrevannion
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash Course
FINOS
 

Similaire à HEOA P2P Assessment (20)

Foss Licencing
Foss LicencingFoss Licencing
Foss Licencing
 
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source Governance
 
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
 
One Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open EducationOne Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open Education
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy Making
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy Making
 
File000168
File000168File000168
File000168
 
NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data Platforms
 
Copyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing ActCopyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing Act
 
IntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetIntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMet
 
'Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions''Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions'
 
Legal Tech Ethics
Legal Tech EthicsLegal Tech Ethics
Legal Tech Ethics
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash Course
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash Course
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

HEOA P2P Assessment

  • 1. Combating Copyright Infringement HEAO P2P Assessing First Year Effectiveness Jerry Bishop TheHigherEdCIO HEOA P2P Assessment by Jerry Bishop is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
  • 2. What’s required – the law Brief summary of the essential elements
  • 3. Combating Copyright Infringement Authority: 34 CFR 668.14(b)(30) Effective July 1, 2010 Condition of any Title IV HEA program Institutions must Develop Institutional Plans Implement Technology Deterrents Offer Legal Alternatives
  • 4. Institutional Plans “…Develop & implement written plans to combat unauthorized distribution of copyrighted materials by users of the institutions network without unduly interfering with the educational and research use of the network.” Components Use of one or more technology-based deterrents Educating community on appropriate use of copyrighted material Procedures for handling unauthorized distributions, including disciplinary procedures Procedures for reviewing effectiveness of the plan
  • 5. Technology Deterrents Bandwidth shaping Traffic monitoring Accepting & responding to DMCA notices Commercial products to block illegal file sharing
  • 6. Legal Alternatives Authority: 34 CFR 668.14(b)(30) Offer legal alternatives to illegal downloading or acquiring copyrighted materials Where to buy content commercially Where to find free to use content Periodic reviews of alternatives are required
  • 7. Consumer Information Authority: 34 CFR 668.43(a)(10) Provide upon request institutional policies and sanctions related to unauthorized distribution of copyright materials Must include: Explicitly inform students of civil and criminal liabilities associated with violations Include summary of penalties for violations of Federal copyright laws Describe policies and disciplinary actions taken for violations Provide one-to-one annual notice to students
  • 8. Assessing Plan effectiveness Tips for gauging your current risk exposure
  • 9. Plan Effectiveness You do not have to be an investigator Operational Portion Review written plan and assessment portion Review related policies and procedures Review handling of a sample of suspected violations Technical Portion (really optional) Search for known file sharing applications Scan network drives for signs of collections Check web filtering or blocking tools
  • 10. Query Results from SCCM Peer-2-Peer Programs on Staff Computers uTorrent  1 BitTorrent   1 BitviseTunnelier 1 FileZilla  9 Others likely exist but do not register Remember, having the application alone it not a violation – there are legitimate uses
  • 11. Scan Storage Volumes Use disk tools to scan for common filetypes Check sampling of directories with unusually large volumes of content Users home directories and departmental folders Remind college of policy and prompt for clean-up Include volume and drive data to illustrate Watch for shifting content between locations Follow-up with Pre and Post clean-up results
  • 12. S:Drive Access Dates by Size May 2011 April 2011
  • 13. S:Drive Folders Sizes April 2011 May 2011
  • 14. S:Drive by Filetypes April 2011 May 2011 140 GB .mpg and 93.4 GB .mp3 removed 111 GB .avi increased
  • 15. Review Web Traffic for P2P Sites
  • 16. Questions? Jerry Bishop blog.thehigheredcio.com

Notes de l'éditeur

  1. This chart shows the breakdown of all files on the S:\\\\ drive based on the date they were last accessed. This data suggests most of the files are actively being used if only for viewing.
  2. This chart shows the total amount of disk space used by each folder on the S:\\\\ drive. Although some folders that are large are expected, the unexpected finding is that most departmental folders are small.
  3. This Chart shows the breakdown of all files on the S:\\ drive based on the file types. The top filetypes includes several image and media filetypes.