Steve Worona November 3, 2009 EDUCAUSE 2009 – Denver

Slides:



Advertisements
Similar presentations
COPYRIGHT AND COPYWRONG Respect Copyright, Celebrate Creativity.
Advertisements

COPYRIGHT BASICS Linda Sharp Marsha Stevenson
Copyright and Digital Cultural Heritage
What’s Yours In Mine: Intellectual Property and Copyright For the Magazine Media Publisher Jim Sawtelle Partner and Co-leader, Media, Publishing and Marketing.
Copyright Law & Your Websites Computer Science 201 November 21, 2005 Sarah Garner, J.D., M.L.I.S. Law Library Director,
Introduction to Copyright Principles © 2005 Patricia L. Bellia. May be reproduced, distributed or adapted for educational purposes only.
Tuesday, January 21, 2014 Review Copyright Basics and Fair Use (for test) Share “Case Research”
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Copyright Law David G. Post Temple Law School Feb. 2004
What is it and why should I care?
Copyright and Fair Use Dan Lee Interim Team Leader for Undergraduate Services and Copyright Librarian March 21, 2007.
© 2004 Steven J. McDonald Steven J. McDonald General Counsel Rhode Island School of Design.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
© 2002 Regents of the University of Michigan For questions or permission requests, contact Jack Bernard,
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
© 2002 Steven J. McDonald What do these have in common? The Mona Lisa The Starr report What I am saying Your idea for a web page The Wexner Center for.
An Introduction to Copyright Central Michigan University Libraries January, 2013.
C OPYRIGHT — W HAT ’ S THE B IG D EAL Copyright in an Academic Setting.
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
CS155b: E-Commerce Lecture 7: Jan. 30, 2001 A Computer Scientist’s View of Copyright Law.
1 Copyright & Other Legal Issues. 2 WHAT IS COPYRIGHT? Copyright is the form of protection provided by the laws of the United States to authors of “original.
Office of the General Counsel1 COPYRIGHT and the TEACH Act The Technology, Education, and Copyright Harmonization Act Copyright © 2007 Villanova University.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Copyright Law in Schools By Fran Rader
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
© 2001 Steven J. McDonald What do these have in common? The Mona Lisa The Starr report What I am saying Your idea for a web page The Guggenheim Musuem.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
NEW SOLUTIONS FOR A DIGITAL WORLD Angela Teal LIBM 6320 FALL 2011.
Copyright and Fair Use Implications for Assistive Technology and Education.
Copyright, Fair Use & You Susan Beck, NMSU Library June 3, 2014.
COPYRIGHT: A Pirate’s Paradise? Prepared form Com 435 by Donna L. Ferullo, J.D. Director University Copyright Office Donna L. Ferullo.
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Future Ready Schools BMA-IBT DEMONSTRATE ETHICAL AND LEGAL ACTIONS WITH REGARDS TO PLAGIARISM, FAIR USE, AND COPYRIGHT LAWS.
COPYRIGHT IS A FORM OF PROTECTION GROUNDED IN THE U.S. CONSTITUTION AND GRANTED BY LAW FOR ORIGINAL WORKS OF AUTHORSHIP FIXED IN A TANGIBLE MEDIUM OF EXPRESSION.
Copyright: Protecting Your Rights at Home and Abroad Michael S. Shapiro Attorney-Advisor United States Patent and Trademark Office.
COPYRIGHT LAW FALL 2008: CLASS 2 Professor Fischer Introduction to Copyright 2: Historical Background AUGUST 20, 2008.
4.1 Chapter 4 Copyrights © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Copyright Multimedia content comes from somewhere Either you make it or you acquire it Who owns the content? Do you or your users have the property rights?
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Becky Albitz Electronic Resources/Copyright Librarian
The Quest for Copyright Understanding Miguel Guhlin
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Technology Fair OWHL Services and Copyright Michael Blake and Elisabeth Tully June 13, 2006.
Becky Albitz Electronic Resources Librarian
4.1 Chapter 4 Copyrights © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Copyright Donna Min Shiroma School Library Services Advanced Technology Research Branch Office of Curriculum, Instruction and Student Support © September.
Works consisting entirely of information that is common property and containing no original authorship. T h e t e r m o f c o p yr i g h t f o r a p a.
COPYRIGHT AND FAIR USE The Appropriate use of Electronic Media in the Classroom: Risks & Benefits.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Christine Tran EDUC  Copyright is a form of protection by the laws of the United States government (title 17, U.S. Code) to the authors of “original.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
6/18/2016 COPYRIGHT AND Fair Use Guidelines “Respect Copyright, Celebrate Creativity”
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
© & Data Donna L. Ferullo, J.D. Director University Copyright Office Purdue University Donna L. Ferullo University Copyright Office.
Disclaimer This presentation is for informational purposes only and does not constitute legal advice.
© 2002 Steven J. McDonald What do these have in common? The Mona Lisa The Starr report What I am saying Your idea for a web page The Guggenheim Museum.
© 2004 Steven J. McDonald.
Margaret Burnett April 2017
P2P Provisions in the Higher Education Act
Copyright in the Classroom
CopyRight or CopyWrong? Fair Use and Faculty Reserves
Copyright Law David G. Post Temple Law School Feb David
Copyright Issues associated with the Regents’ On-Line Degree Program
Evaluation of Tenure-Accruing Faculty
Copyright By: Grace Collins.
All About Copyrighting
Principal Deputy County Counsel
For Bethel University Faculty & Students
© 2013 Sri U-Thong Limited. All rights reserved
Copyright Law and Fair Use
Basic Concepts of Copyright Law and Compliance
Presentation transcript:

Steve Worona November 3, 2009 EDUCAUSE 2009 – Denver An EDUCAUSE Update on Peer-to-Peer File Sharing: Requirements, Options, and the Future Steve Worona November 3, 2009 EDUCAUSE 2009 – Denver

Agenda 1:00-1:15 Introductions 1:15-1:45 Copyright basics, including DMCA 1:45-2:30 Discussion: Campus technology and policy options (for “real” copyright law) 2:30-3:00 Break 3:00-3:45 State and Federal legislation directed at higher education 3:45-4:30 Discussion: HEOA compliance options and requirements

Copyright Basics: U. S. Constitution Article I [the powers of Congress] Section 8. The Congress shall have power… To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries…

Copyright Basics: U. S. Constitution Article I [the powers of Congress] Section 8. The Congress shall have power… To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries…

Copyright Basics: What Can be Copyrighted? How? When? Original works of authorship But the expression, not the idea That are at least minimally creative I can’t copyright this dot: That are fixed in a tangible medium By case law, RAM counts Immediately upon creation Registration is unnecessary “©” is unnecessary

Copyright Basics: Examples Pictorial, graphic, and sculptural works maps, catalogs, reports, dolls Literary, musical, and dramatic works books, text, sheet music Sound recordings Motion pictures Compilations anthologies Architectural works blue prints to buildings Choreographic works dances

Copyright Basics: More Examples Every e-mail you’ve ever written or read The notes you’re taking right now But not the questions you’re asking And maybe or maybe not the words I’m uttering Every Web page And when it comes to songs The words and music The performance

Copyright Basics: Exclusive Rights of Copyright Holders Reproduction of the work in whole or in part Preparation of derivative works E.g., translations, musical arrangements, dramatizations, sound recordings, and second editions Distribution of copies of the work to the public by sale, gift, rental, loan, or other transfer Limited by the “First Sale Doctrine” Public performance of the work Public display of the work

Copyright Basics: Exclusive Rights of Copyright Holders Reproduction of the work in whole or in part Preparation of derivative works E.g., translations, musical arrangements, dramatizations, sound recordings, and second editions Distribution of copies of the work to the public by sale, gift, rental, loan, or other transfer Limited by the “First Sale Doctrine” Public performance of the work Public display of the work Thumbnails? Indexing? Web-page translation? Mash-ups? Sampling? “Framing”? Deep-linking? The Internet Archive? Ringtone as performance? Printing? Forwarding? Et cetera, et cetera

Copyright Basics: Infringement Exercising any of the copyright holder’s exclusive rights A “strict liability offense” (no intent or knowledge needed) Contributory infringement Vicarious infringement Penalties Injunctions Damages $150,000 per infringement (if “willfull”) Loss of profits Destruction of infringing works Attorney’s fees

Copyright Basics: Exceptions/Defenses to Infringement If you are the copyright owner If there is a specific statutory exception If you have express permission If you have an implied license If the work you are using is in the public domain If what you are doing is “fair use”

Copyright Basics: Exceptions/Defenses to Infringement If you are the copyright owner If there is a specific statutory exception If you have express permission If you have an implied license If the work you are using is in the public domain If what you are doing is “fair use”

Copyright Basics: Fair Use (the Four Factors) Purpose and character of the use Personal/educational/transformative v. commercial Nature of the work being used Factual v. creative Amount and substantiality of the portion used in relation to the whole Small v. large, both quantitatively and qualitatively Effect on the market for the original Not of your individual use, but of the type of use

Copyright Basics: Fair Use (the Four Factors) Purpose and character of the use Personal/educational/transformative v. commercial Nature of the work being used Factual v. creative Amount and substantiality of the portion used in relation to the whole Small v. large, both quantitatively and qualitatively Effect on the market for the original Not of your individual use, but of the type of use

Copyright and the Internet: The DMCA Enacted 1998 Pre-Napster, pre-MP3, pre-WiFi, pre household broadband That is, prehistoric “Safe harbors”, not new copyright restrictions Paraphrasing: A network operator (“service provider”) will not be held liable for infringement of certain types providing the operator has adhered to certain requirements Some of the requirements are general Some depend on the type of network traffic

DMCA: General Safe-Harbor Provisions Must have policy of terminating repeat infringers “in appropriate circumstances” Probably really means terminating their accounts Still… Must accommodate and not interfere with “standard technical measures”

DMCA §512(c): Stored Content Information residing on provider’s systems at the direction of users (remember the era) Provider must not “know” of infringing material That is, specific material, not general knowledge Must designate DMCA agent Must follow “notice and takedown” procedure “expeditiously” General consensus (not without exception): Applies to YouTube, for example, but not your broadband provider or the dorm network

DMCA §512(a): “Passive Conduit” Transitory Communications Transmission not initiated by the provider Material not selected by the provider Recipients not determined by the provider Transmitted with no modification Notice and takedown procedure does not apply For example: Student-owned computer in dorm room served by campus network, your computer in your home served by commercial ISP Beware campus employees (including faculty) and campus-owned computers (including research)

Discussion: Campus Technology/Policy Options What’s your campus policy with respect to blocking, filtering, bandwidth-shaping P2P (etc.)? What’s your campus policy with respect to processing DMCA takedown notices? How does your judicial system deal with infringement? What’s your campus policy regarding “early settlement letters”? What’s your campus policy regarding requests for the identity of claimed infringers with or without a John Doe lawsuit?

Break

The Higher Education Opportunity Act of 2008 (HEOA) Introduced in Senate: June 18, 2007 The Reid surprise: July 19, 2007 (Thursday) Senate version passed: July 24, 2007 House version passed: Feb. 7, 2008 Senate language + “Plans”, Detect, Prevent, … Conference report: July 30, 2008 Valuable clarifications Final passage, House+Senate: July 31, 2008 Signed into law: Aug. 14, 2008 Negotiated Rulemaking: March-May, 2009 NPRM: August 21, 2009 Final regulations: October 29, 2009 Applies to academic year starting July 1, 2010

What the Law Says

What the Law Says

What the Law Doesn’t Say The Secretary of Education shall, on an annual basis, identify (1) the 25 institutions of higher education participating in programs under this title, which have received during the previous calendar year the highest number of written notices from copyright owners, or persons authorized to act on behalf of copyright owners, alleging infringement of copyright by users of the institution’s information technology systems, where such notices identify with specificity the works alleged to be infringed, or a representative list of works alleged to be infringed, the date and time of the alleged infringing conduct together with information sufficient to identify the infringing user, and information sufficient to contact the copyright owner or its authorized representative; and (2) from among the 25 institutions described in paragraph (1), those that have received during the previous calendar year not less than 100 notices alleging infringement of copyright by users of the institution’s information technology systems, as described in paragraph (1). Each eligible institution participating in any program under this title which is among those identified during the prior calendar year by the Secretary pursuant to the above, shall (1) provide evidence to the Secretary that the institution has notified students on its policies and procedures related to the illegal downloading and distribution of copyrighted materials by students as required under section 485(a)(1)(P); (2) undertake a review, which shall be submitted to the Secretary, of its procedures and plans related to preventing illegal downloading and distribution to determine the program’s effectiveness and implement changes to the program if the changes are needed; and (3) provide evidence to the Secretary that the institution has developed a plan for implementing a technology-based deterrent to prevent the illegal downloading or peer-to-peer distribution of intellectual property.

What the Law Doesn’t Say The Secretary of Education shall, on an annual basis, identify (1) the 25 institutions of higher education participating in programs under this title, which have received during the previous calendar year the highest number of written notices from copyright owners, or persons authorized to act on behalf of copyright owners, alleging infringement of copyright by users of the institution’s information technology systems, where such notices identify with specificity the works alleged to be infringed, or a representative list of works alleged to be infringed, the date and time of the alleged infringing conduct together with information sufficient to identify the infringing user, and information sufficient to contact the copyright owner or its authorized representative; and (2) from among the 25 institutions described in paragraph (1), those that have received during the previous calendar year not less than 100 notices alleging infringement of copyright by users of the institution’s information technology systems, as described in paragraph (1). Each eligible institution participating in any program under this title which is among those identified during the prior calendar year by the Secretary pursuant to the above, shall (1) provide evidence to the Secretary that the institution has notified students on its policies and procedures related to the illegal downloading and distribution of copyrighted materials by students as required under section 485(a)(1)(P); (2) undertake a review, which shall be submitted to the Secretary, of its procedures and plans related to preventing illegal downloading and distribution to determine the program’s effectiveness and implement changes to the program if the changes are needed; and (3) provide evidence to the Secretary that the institution has developed a plan for implementing a technology-based deterrent to prevent the illegal downloading or peer-to-peer distribution of intellectual property.

It Also Doesn’t Say… Each institution of higher education shall, by January 15 of each year, thoroughly analyze its computer network, including its local area and internal networks, to determine whether it is being used to transmit copyrighted works, and either: (A) Certify that an analysis indicates that the institution’s network, including its local area and internal networks, is not being used to transmit copyrighted works, and that the institution has not received ten or more legally valid notices of infringement in the preceding year from owners of the infringed works or their authorized agents; or (B) Take affirmative steps, including the implementation of effective technology- based deterrents, to prevent the infringement of copyrighted works over the school’s computer and network resources, including over local area networks, and report the policy developed and the affirmative steps taken.

It Also Doesn’t Say… Each institution of higher education shall, by January 15 of each year, thoroughly analyze its computer network, including its local area and internal networks, to determine whether it is being used to transmit copyrighted works, and either: (A) Certify that an analysis indicates that the institution’s network, including its local area and internal networks, is not being used to transmit copyrighted works, and that the institution has not received ten or more legally valid notices of infringement in the preceding year from owners of the infringed works or their authorized agents; or (B) Take affirmative steps, including the implementation of effective technology- based deterrents, to prevent the infringement of copyrighted works over the school’s computer and network resources, including over local area networks, and report the policy developed and the affirmative steps taken.

The Final Regulations - 1 §668.14 Program participation agreement. (b) By entering into a program participation agreement, an institution agrees that— (30) The institution— (i) Has developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include— (A) The use of one or more technology-based deterrents; (B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material, including that described in ァ668.43(a)(10); (C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and (D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance with paragraph (b)(30) of this section will be, including those that prohibit content monitoring; and

The Final Regulations - 2 (ii) Will, in consultation with the chief technology officer or other designated officer of the institution— (A) Periodically review the legal alternatives for downloading or otherwise acquiring copyrighted material; (B) Make available the results of the review in paragraph (b)(30)(ii)(A) of this section to its students through a Web site or other means; and (C) To the extent practicable, offer legal alternatives for downloading or otherwise acquiring copyrighted material, as determined by the institution

The Final Regulations - 3 §668.43 Institutional information. (a) Institutional information that the institution must make readily available upon request to enrolled and prospective students under this subpart includes, but is not limited to— (10) Institutional policies and sanctions related to copyright infringement, including— (i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities; (ii) A summary of the penalties for violation of Federal copyright laws; and (iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system

Some Clarifying Language from the NPRM “The Department believes that some institutions may be able to effectively combat the unauthorized distribution of copyrighted material using only one of the four types of technology-based deterrents (bandwidth shaping, traffic monitoring, accepting and responding to DMCA notices, or a commercial product designed to reduce or block illegal file sharing) while others may need to employ a combination of such deterrents.” (74 FR 42393, emphasis added) “[T]he Department anticipates that individual institutions, national associations, and commercial entities will develop and maintain up-to-date lists that may be referenced for compliance with this provision [to offer legal alternatives].” (74 FR 42393) “The Department will work with representatives of copyright holders and institutions to develop a summary of the civil and criminal penalties for violation of Federal copyright laws to include as part of the Federal Student Aid Handbook that an institution may use to meet this requirement [to provide such information to students].” (74 FR 42392)

And a Bit More… “Rapid advances in information technology mean that new products and techniques are continually emerging. Technologies that are promising today may be obsolete a year from now and new products that are not even on the drawing board may, at some point in the not too distant future, prove highly effective. The Conferees intend that this Section be interpreted to be technology neutral and not imply that any particular technology measures are favored or required for inclusion in an institution’s plans. The Conferees intend for each institution to retain the authority to determine what its particular plans for compliance with this Section will be, including those that prohibit content monitoring. The Conferees recognize that there is a broad range of possibilities that exist for institutions to consider in developing plans for purposes of complying with this Section.”

“Technology-Based Deterrents” (in case you missed the list) Bandwidth shaping Traffic monitoring Accepting and responding to DMCA notices A commercial product designed to reduce or block illegal file sharing

Discussion: HEOA Compliance Options/Requirements What technology-based deterrent(s) can/will/should you to use? What “relevant assessment criteria” do you think you might use? How much will you have to change what you’re already doing? How much effort will it take to document the plan? Do you have any plans to contract for some commercial (or non-commercial) content- distribution system?

End