Summary of the CSG Workshop on the Misappropriation of Copyrighted Materials Educause Policy Conference Arlington, Virginia May 8, 2008 Charles F. Leonhardt.

Slides:



Advertisements
Similar presentations
European Network on Roma Community and Social Inclusion Proposal for the Operational and Organisational Structure Sevilla, 24 & 25 January 2008.
Advertisements

Starting an ESC Chapter in Your State. Energy Services Coalition Mission To promote the benefits of, provide education on, and serve as an advocate for.
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
IT Governance: Prioritizing Projects through Inclusivity, Communications and Transparency Stephen A. Vieira CIO and Executive Director of IT The Community.
Establishing an Existing and Emerging Technologies Committee on your Campus AHEAD 2014 Presented by UAB Disability Support Services and UAB Legal Counsel:
The Future of KATAC Tammy Duddy University of Louisville March 13, 2013.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
DARE: building a networked academic repository in the Netherlands ICOLC October 25 Ronald Dekker Delft University of Technology Library.
The Cathedral, The Bazaar, and the Academy Mitchell Kapor EDUCAUSE October 2004.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
® ® Global Advisory Council (GAC) Outreach overview, Jan 2011 Mark Reichardt, President and CEO Open Geospatial Consortium © 2011 Open Geospatial Consortium.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Overview of Nursing Informatics
A sample Service Oriented Architecture for Integrating Government Lines of Business.
IT Governance and Management
OKI Focus Groups at Educause, October 2002 Page 1 Open Knowledge Initiative Educause Focus Group Geoff Collier and Robby Robson, Eduworks Educause 2002,
HAN – Technology Update June Ezra Roizen Technology consultant and investment banker Author of The Roizen Report – a twice monthly column on technology.
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Documenting Network Design
Nuclear Energy in the 21 st Century BEIJING 2009 International Ministerial Conference April 2009.
SIF Association Membership – what does it mean for your district?
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Headlight: Social Networking Steve Holbrook IBM, AC rep 14 May 2012.
Communication strategy and techniques to launch InnovMed Dr. Fatma H. Sayed Vienna meeting 25 June 2007.
Connect communicate collaborate Campus Best Practices Gunnar Bøe, Section Manager, Campus Networks and Systems, UNINETT Skopje, 15 Sept
Why the Alliance was Formed Rising rates of overweight and obesity; 50% of adults are not active enough for health benefits; Concern about dietary practices.
Update from the Joint Committee on P2P File Sharing CNI Task Force – Spring, 2004 Mark Luker Steve Worona EDUCAUSE.
Parents Working Together to Shape Education in Elk Island Public Schools (EIPS) ASCA School Councils Connection Conference 08 Saturday, April 26, 2008.
The Transformation Center Helping Good Ideas Travel Faster Cathy Kaufmann, MSW Executive Director, OHA Transformation Center.
Mid-Michigan Digital Practitioners, March 14, 2014 The National Digital Stewardship Alliance Agenda Mid-Michigan Digital Practitioners Meeting Abigail.
Building an International Community for Broadening Participation in Computing Teresa Dahlberg College of Computing and Informatics UNC Charlotte
A Business Case for strategic thinking Technology Grantmaking.
CSG Policy Discussion: Copyright Compliance at All Levels Organizers: - Tracy Futhey - Tracy Mitrano - Steve Worona And featuring: - Greg Jackson - Mark.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
WATER, WATER EVERYWHERE? The Water Resources Management Committee of the American Public Works Association.
Extension Policy Statements on Public Issues Education Strengthening the Role of the University L. Steven Smutko North Carolina State University.
Higher Ed versus the RIAA and Vice-Versa — An Update CSG-Dartmouth September 26, 2003 Steve Worona EDUCAUSECSG-Dartmouth September 26, 2003 Steve Worona.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Public Health Data Standards Consortium
Russ Hobby Program Manager Internet2 Cyberinfrastructure Architect UC Davis.
Extension Leadership Councils A Partner in Extension Education Barbara A. Board Extension Specialist, Program and Leadership Development 231 Smyth Hall.
Joint Committee of the Higher Education and Entertainment Communities John C. Vaughn Executive Vice President Association of American Universities November.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
EDUCAUSE 2005 Annual Conference October 19, 2005.
Energy Efficiency Action Plan Kathleen Hogan Director, Climate Protection Partnerships Division U.S. Environmental Protection Agency NARUC Winter Meetings.
Does the Third Package provide the European TSO associations with the tools necessary to find solutions to the European energy challenge ? Nigel Sisman,
Implementation and Policy of Rate Based Billing at Cornell Tracy Mitrano R. David Vernon.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Jan. 16, 2006 C /09Chair, IEEE Opening January 2006 Interim Session #18 Jerry Upton- Chair Gang Wu – Procedural.
SUBCOMMITTEE ON HYDROLOGY Overall Goal – from purpose statement: “To improve the availability and reliability of (surface water) information needed for.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
FMDG FMDG at Virginia Tech: A Synergestic Approach Virginia Tech Facilities Managers' Development Group : A Synergistic Approach Dawn Maxey, Facilities.
Common Solutions Group Duke University Jan 2001 Logistics Karen Kitchen’s Announcements Sessions are recorded.
The implementation programme for the 2008 SNA and supporting statistics UNECE special session on National Accounts for economies in transition Geneva,
Ian Bird GDB CERN, 9 th September Sept 2015
BCOM 7 Establishing a Framework for Business Communication 1 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated,
Clinical, Technical, Organizational and Financial Barriers to Interoperability Task Force August 25, 2015 Paul Tang, chair.
2 United States Department of Education, Privacy Technical Assistance Center 1 Western Suffolk BOCES Data Breach Exercise.
EMPOWERMENT THROUGH EDUCATION Business Retention and Expansion Task Force Workshop Joe Lucente Assistant Professor and Extension Educator OSU Extension.
TAIEX-REGIO Workshop on Applying the Partnership Principle in the European Structural and Investment Funds Bratislava, 20/05/2016 Involvement of Partners.
Influencing the Progress of Advanced Core Technologies
Click here to start your journey through the VOPE toolkit
IFX Forum Overview September 28, 2015 © Copyright IFX Forum, Inc
Click here to start your journey through the VOPE toolkit
Research Computing Survey Results
Higher Ed versus the RIAA and Vice-Versa — An Update
4th Annual Conference on Technology and Standards Washington
Presentation transcript:

Summary of the CSG Workshop on the Misappropriation of Copyrighted Materials Educause Policy Conference Arlington, Virginia May 8, 2008 Charles F. Leonhardt Georgetown University (for the CSG Membership)

What is the CSG? The Common Solutions Group is comprised of 28 major research universities institutions and higher education IT consortia involved with intensively networked communities who work together to create a common infrastructure and toolsets required for the future at our institutions. Where feasible, these common solutions are provided by commercial providers under contract to the CSG universities. Where commercial solutions are infeasible, highly talented individuals from participating CSG universities are commissioned to provide them. The CSG meets three times a year to share knowledge and concerns among CIOs, lead technologists, and others from our membership. These typically are hosted on a university campus. The last meeting was held at Virginia Tech on January 9-11, 2008.

Selection of Topics Long and Short Workshops and Policy Discussions for the “next” meeting are nominated and voted upon at the “current” meeting. “Issues around the Misappropriation of Copyrighted Materials” received the most votes for the full-day long workshop at Virginia Tech during the September meeting at MIT. “Most votes” for any category are a good indication of “what’s hot” in higher education. Workshop Coordinators are required. The long workshop at VT was very ably coordinated by Greg Jackson (Univ of Chicago), Charles Antonelli (Univ of Michigan), Steve Worona (Educause), and Oren Sreebny (Univ of Washington).

Rationale for the Workshop Unauthorized online sharing of copyrighted material challenges copyright holders, network operators, and media customers alike. To better understand the role current technologies might play in addressing these challenges, the CSG invited leading vendors of detection and suppression technologies to present and discuss the architecture and implementation of their products at an intensive workshop at Virginia Tech on January 9.

Rationale for the Workshop The workshop grew out of earlier discussions sponsored by the Technology Task Force of the Joint Committee of the Higher Education and Entertainment Communities, chaired by Brit Kirwan of the University System of Maryland and Cary Sherman of the RIAA. Three vendors (Audible Magic, Red Lambda, and SafeMedia) each described their technology, participated in a panel discussion, and then answered questions from approximately one hundred workshop participants.

Long Workshop Agenda Overview of the Long Workshop, Introductions Technical Presentations from Infringement-Suppression Technology Vendors: Audible Magic Red Lambda SafeMedia General questions & discussion Campus Counsel Panel Steve McDonald (Rhode Island School of Design) Beth Cate (Indiana University) Lee Smith (University of Texas, Austin) Jack Bernard (University of Michigan) Policy Panel Mark Bruhn (Indiana University) Bill Clebsch (Stanford) Tracy Mitrano (Cornell) Kent Wada (UCLA)

Audible Magic Audible Magic ’ s CopySense technology: Reliably identifies only material that is registered with the vendor. Is not “ savvy ” as even modest encryption enables peer-to-peer traffic to bypass Audible Magic detection.

Red Lambda Red Lambda ’ s cGrid technology: Detects traffic patterns rather than actually suppressing infringement. Requires considerable administrative expense as well as specific network architecture and management tools to translate identification of patterns into suppression of infringement.

SafeMedia SafeMedia ’ s Clouseau technology: Blocks any communications its vendor deems undesirable. Disturbingly, network operators can not override this blocking locally, even if the vendor blocks important non-infringing communications or otherwise disrupts network operations and effectiveness.

Summary Observations Although each of the technologies we discussed “ works ” in a narrow technical sense, it is the sense of CSG workshop participants that “ current products cannot stop all (or even most) unauthorized sharing of Copyrighted material without interfering with the efficiency of the networks essential to research and teaching in higher education. ”

Summary Observations Current technologies can affect unauthorized sharing. However: Their effectiveness is very limited. They can suppress legitimate traffic along with infringing traffic. They are expensive.

Summary Observations Although new approaches may yield effective, inexpensive, operationally benign infringement- suppression technologies in the future, Implementing current technologies simply will: Increase tuition and research costs Degrade network performance while yielding only modest effects on unauthorized sharing

It’s Not a Technology Problem! Business and policy challenges surrounding online media continue to evolve. The technology of online media distribution and sharing - both legal and illegal - also is evolving. Given the limited ability of technology to reduce unauthorized online sharing, which the CSG workshop made abundantly clear, effectively mitigating online copyright infringement requires much more than technological solutions!

Education of Consumers is Key The challenge is fundamentally educational, and it must be addressed throughout formal and continuing education. The educational message will become far more effective as more appealing legal distribution mechanisms emerge. And the educational message must be reinforced by appropriate penalties for non-compliance that are fairly, diligently, and uniformly imposed, as is the case today within most research universities. CSG members remain eager to collaborate with other interested parties in a multi-faceted approach to the challenge.

More Information At the CSG Website you will find: The formal CSG statement of summary observations from the workshop, and web links to responses from each of the three vendors as they choose to make one. Copies of the presentations delivered throughout the day (under “ Past Meetings / Virginia Tech ” ) More information about the CSG and its membership.