SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Combating Copyright Infringement HEAO P2P Assessing First Year Effectiveness Jerry Bishop TheHigherEdCIO HEOA P2P Assessment by Jerry Bishop is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
What’s required – the law Brief summary of the essential elements
Combating Copyright Infringement Authority: 34 CFR 668.14(b)(30) Effective July 1, 2010 Condition of any Title IV HEA program Institutions must Develop Institutional Plans Implement Technology Deterrents Offer Legal Alternatives
Institutional Plans “…Develop & implement written plans to combat unauthorized distribution of copyrighted materials by users of the institutions network without unduly interfering with the educational and research use of the network.” Components Use of one or more technology-based deterrents Educating community on appropriate use of copyrighted material Procedures for handling unauthorized distributions, including disciplinary procedures Procedures for reviewing effectiveness of the plan
Technology Deterrents Bandwidth shaping Traffic monitoring Accepting & responding to DMCA notices Commercial products to block illegal file sharing
Legal Alternatives Authority: 34 CFR 668.14(b)(30) Offer legal alternatives to illegal downloading or acquiring copyrighted materials Where to buy content commercially Where to find free to use content Periodic reviews of alternatives are required
Consumer Information Authority: 34 CFR 668.43(a)(10) Provide upon request institutional policies and sanctions related to unauthorized distribution of copyright materials Must include: Explicitly inform students of civil and criminal liabilities associated with violations Include summary of penalties for violations of Federal copyright laws Describe policies and disciplinary actions taken for violations Provide one-to-one annual notice to students
Assessing Plan effectiveness Tips for gauging your current risk exposure
Plan Effectiveness You do not have to be an investigator Operational Portion Review written plan and assessment portion Review related policies and procedures Review handling of a sample of suspected violations Technical Portion (really optional) Search for known file sharing applications Scan network drives for signs of collections Check web filtering or blocking tools
Query Results from SCCM Peer-2-Peer Programs on Staff Computers uTorrent 			1 BitTorrent  			1 BitviseTunnelier		1 FileZilla 			9 Others likely exist but do not register Remember, having the application alone it not a violation – there are legitimate uses
Scan Storage Volumes Use disk tools to scan for common filetypes Check sampling of directories with unusually large volumes of content Users home directories and departmental folders  Remind college of policy and prompt for clean-up Include volume and drive data to illustrate Watch for shifting content between locations Follow-up with Pre and Post clean-up results
S:Drive Access Dates by Size May 2011 April 2011
S:Drive Folders Sizes April 2011 May 2011
S:Drive by Filetypes April 2011 May 2011 140 GB .mpg and 93.4 GB .mp3 removed 111 GB .avi increased
Review Web Traffic for P2P Sites
Questions? Jerry Bishop blog.thehigheredcio.com

Mais conteúdo relacionado

Destaque

IT Application Plan
IT Application PlanIT Application Plan
IT Application PlanJerry Bishop
 
Epic Support Model
Epic Support ModelEpic Support Model
Epic Support ModelJerry Bishop
 
IT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using ExcelIT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using ExcelJerry Bishop
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 

Destaque (6)

IT Application Plan
IT Application PlanIT Application Plan
IT Application Plan
 
Epic Support Model
Epic Support ModelEpic Support Model
Epic Support Model
 
Project Request
Project RequestProject Request
Project Request
 
IT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using ExcelIT Project Portfolio Planning Using Excel
IT Project Portfolio Planning Using Excel
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 

Semelhante a HEOA P2P Assessment

Foss Licencing
Foss LicencingFoss Licencing
Foss LicencingFITT
 
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...South Tyrol Free Software Conference
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source GovernanceRogue Wave Software
 
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...Stephanie Hess
 
One Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open EducationOne Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open EducationR. John Robertson
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy MakingDilum Bandara
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy MakingDilum Bandara
 
NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011Arian Ravanbakhsh
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsRobert Grossman
 
Copyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing ActCopyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing ActJune Power
 
IntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetIntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetbibianamchugh
 
'Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions''Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions'Shane Coughlan
 
Legal Tech Ethics
Legal Tech EthicsLegal Tech Ethics
Legal Tech EthicsAaron Vick
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxrhetttrevannion
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseFINOS
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseOpen Source Strategy Forum
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Source Code Control Limited
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Mike Linksvayer
 

Semelhante a HEOA P2P Assessment (20)

Foss Licencing
Foss LicencingFoss Licencing
Foss Licencing
 
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...SFSCON23 - Niharika Singhal - The ZOOOM Framework  Legal aspects of FOSS and ...
SFSCON23 - Niharika Singhal - The ZOOOM Framework Legal aspects of FOSS and ...
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source Governance
 
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
Nasig 2019 Pre-conference - Contract Construction: Creating an Effective Lice...
 
One Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open EducationOne Standard to rule them all?: Descriptive Choices for Open Education
One Standard to rule them all?: Descriptive Choices for Open Education
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy Making
 
Acceptable Use Policy Making
Acceptable Use Policy MakingAcceptable Use Policy Making
Acceptable Use Policy Making
 
File000168
File000168File000168
File000168
 
NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011NARA and Social Media, Spring 2011
NARA and Social Media, Spring 2011
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data Platforms
 
Copyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing ActCopyright and Access Right: A Balancing Act
Copyright and Access Right: A Balancing Act
 
IntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMetIntelliDrive Mobility Workshop - TriMet
IntelliDrive Mobility Workshop - TriMet
 
'Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions''Using OpenChain as a framework for M&A transactions'
'Using OpenChain as a framework for M&A transactions'
 
Legal Tech Ethics
Legal Tech EthicsLegal Tech Ethics
Legal Tech Ethics
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash Course
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash Course
 
Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?Open Source Software GPL Compliance – Should Organisations Care?
Open Source Software GPL Compliance – Should Organisations Care?
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
 

Último

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Último (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

HEOA P2P Assessment

  • 1. Combating Copyright Infringement HEAO P2P Assessing First Year Effectiveness Jerry Bishop TheHigherEdCIO HEOA P2P Assessment by Jerry Bishop is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
  • 2. What’s required – the law Brief summary of the essential elements
  • 3. Combating Copyright Infringement Authority: 34 CFR 668.14(b)(30) Effective July 1, 2010 Condition of any Title IV HEA program Institutions must Develop Institutional Plans Implement Technology Deterrents Offer Legal Alternatives
  • 4. Institutional Plans “…Develop & implement written plans to combat unauthorized distribution of copyrighted materials by users of the institutions network without unduly interfering with the educational and research use of the network.” Components Use of one or more technology-based deterrents Educating community on appropriate use of copyrighted material Procedures for handling unauthorized distributions, including disciplinary procedures Procedures for reviewing effectiveness of the plan
  • 5. Technology Deterrents Bandwidth shaping Traffic monitoring Accepting & responding to DMCA notices Commercial products to block illegal file sharing
  • 6. Legal Alternatives Authority: 34 CFR 668.14(b)(30) Offer legal alternatives to illegal downloading or acquiring copyrighted materials Where to buy content commercially Where to find free to use content Periodic reviews of alternatives are required
  • 7. Consumer Information Authority: 34 CFR 668.43(a)(10) Provide upon request institutional policies and sanctions related to unauthorized distribution of copyright materials Must include: Explicitly inform students of civil and criminal liabilities associated with violations Include summary of penalties for violations of Federal copyright laws Describe policies and disciplinary actions taken for violations Provide one-to-one annual notice to students
  • 8. Assessing Plan effectiveness Tips for gauging your current risk exposure
  • 9. Plan Effectiveness You do not have to be an investigator Operational Portion Review written plan and assessment portion Review related policies and procedures Review handling of a sample of suspected violations Technical Portion (really optional) Search for known file sharing applications Scan network drives for signs of collections Check web filtering or blocking tools
  • 10. Query Results from SCCM Peer-2-Peer Programs on Staff Computers uTorrent  1 BitTorrent   1 BitviseTunnelier 1 FileZilla  9 Others likely exist but do not register Remember, having the application alone it not a violation – there are legitimate uses
  • 11. Scan Storage Volumes Use disk tools to scan for common filetypes Check sampling of directories with unusually large volumes of content Users home directories and departmental folders Remind college of policy and prompt for clean-up Include volume and drive data to illustrate Watch for shifting content between locations Follow-up with Pre and Post clean-up results
  • 12. S:Drive Access Dates by Size May 2011 April 2011
  • 13. S:Drive Folders Sizes April 2011 May 2011
  • 14. S:Drive by Filetypes April 2011 May 2011 140 GB .mpg and 93.4 GB .mp3 removed 111 GB .avi increased
  • 15. Review Web Traffic for P2P Sites
  • 16. Questions? Jerry Bishop blog.thehigheredcio.com

Notas do Editor

  1. This chart shows the breakdown of all files on the S:\\\\ drive based on the date they were last accessed. This data suggests most of the files are actively being used if only for viewing.
  2. This chart shows the total amount of disk space used by each folder on the S:\\\\ drive. Although some folders that are large are expected, the unexpected finding is that most departmental folders are small.
  3. This Chart shows the breakdown of all files on the S:\\ drive based on the file types. The top filetypes includes several image and media filetypes.