Copyright Infringement: Don’t let it happen to you!

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
District networked computers give students access to a variety of educational programs, applications programs as well as the Internet. Providing a safe.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
1 Automated Copyright Notice System (ACNS) September 2003 UNIVERSAL MUSIC GROUP UNIVERSAL STUDIOS.
Internet Bidding: Leveling the Playing Field TUG Conference St. Louis, MO October 8, 2007 Joe Phelan, Director, Info Tech, Inc.
With Microsoft Office 2007 Introductory© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Office 2007 Introductory.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
By: Ada Whyte Educational Applications of Technology Class.
Mattson Middle School One to One Laptop Program September 26, 2012.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Timeline Resource purchasing Textbooks E2T2 Grant Infrastructure Google Apps Literacy Aid Menahga High Five Implementation History.
Information Technology Readying Your Computer on Campus Resident Students.
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Office of Campus Information Security Incident Response Briefing Jeffrey Savoy, CISSP.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Computer Owners’ Forum November 17, 2014 “Oak Crest Connect” and Gmail Oak Crest Resident Web Site:
Copyright and Student Media If it’s not yours, think twice! Candace Perkins Bowen Kent State University THSPA, Oct. 23, 2007.
COPYRIGHT LAW Zahra Hadi Educational Technology EDUC 5302.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Welcome to Your ADP Workforce Now Manager Self Service Web Site
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
MGT 434 Week 4 DQ 1 To purchase this material click below link 434-Week-4-DQ-1 You have just been appointed.
Information Security Planning Considerations for Telecommuting
UW-Madison Guidelines for Managing the Records of Departing Employees*
Software piracy and software patents
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Performing Risk Analysis and Testing: Outsource or In-house
University Technology Update
3 Do you monitor for unauthorized intrusion activity?
INFORMATION TECHNOLOGY NEW USER ORIENTATION
EDUCAUSE DC Policy Office Update
Objectives Explain the purpose and goal of the selling function
Submitting Requests to IT
Advanced Threat Protection
Fix Windows Live Mail Error ID 0X
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
IR Awakens
Cyber Security Challenges & Opportunities.
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Copyright and Student Media
CYB 100 Teaching Effectively-- snaptutorial.com
4 ways to stay safe online 1. Avoid viruses and phishing scams
Building a Security Operations Center
Copyrights and Listing Photographs
Join In Be Secure Presentation
Accessibility Requirements in IT Contracts August 1, 2017
Four Generations of Security Devices Putting IDS in Context
Unit 7 – Organisational Systems Security
GDPR (General Data Protection Regulation)
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
What is Information Security?
Journey to the Cloud – Guidance and Lessons Learned
CONVERCENT INCIDENT REPORTING Employee Training
3 Do you monitor for unauthorized intrusion activity?
Introduction to ONC BOCES Purchasing
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
E-Safety.
Objectives Explain the purpose and goal of the selling function
SysKit Security Manager
3 Do you monitor for unauthorized intrusion activity?
October is National Cybersecurity Awareness Month
Digital Citizenship Policy
One-stop shop to preferred suppliers and contract pricing
Presentation transcript:

Copyright Infringement: Don’t let it happen to you! Jeffrey Savoy, CISSP Office of Cybersecurity

UW-Madison Cyber Security Operations Center (CSOC) One of the goals is to detect and mitigate cyber threats Consists of full time staff and students Hiring two student positions now! https://jobcenter.wisc.edu/jobs/detail/41517 Additional task is the processing of copyright infringement reports

Higher Education Opportunity Act (HEOA) Compliance CSOC is listed as a DMCA agent with United States Copyright Office Responsible for handling reports of copyright infringement originating from campus Why do we handle? Fed law

Recent copyright reporting trends Over 2,000 reports in the last 365 days Infringement in this context is that even if purchase, do not have right to re-distribute. So if use bitorrent for example to grab, you are also potentially sharing it Sample sources of infringement reports Home Box Office Lions Gate Films Warner Bros. Entertainment Inc.

CSOC responsibility is to use the network connection information supplied by the copyright holder to identify the owner of the device, forward the compliant and then track the amount of notices received by the user over time

CSOC receives two general categories of infringement reports: “Cease and desist” Stop distribution and delete any material you do not own “Settlement” Infringer requested to access a web site to make payment Anywhere between $20 - $100 per infringement We did not share your id. Between them and you

Copyright infringement is a violation of the University of Wisconsin “Responsible Use Policy”. The CSOC tracks notices and takes the following actions: Notice Count Action 1st Email warning from the CSOC 2nd Loss of campus wireless and Resnet Internet access until a copyright awareness quiz and computer check up is completed. 3rd CSOC prepares a report to the Dean of Students (loss of campus wireless and Resnet Internet access until the DoS requests restoration)

Stay Safe! Educause web site lists commercial options for various content types

Questions? Team members will be at the Copyright Table