1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in 1998. Provides the legal framework for copyright holders to claim copyright.

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Internet Service Provider Liability Under U.S. Copyright Law Paula Pinha, Attorney-Advisor U.S. Copyright Office East Africa Regional Seminar on: Copyright.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
How Free is Free? Downloading on the Internet U101 - Fall 2012.
Legal Liability under the Digital Millennium Copyright Act and the Communications Decency Act Presented by Daliah Saper Saper Law Offices, LLC.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Boyertown Area School District Acceptable Use Policy.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
1 © 2008 Venable LLP Top 5 Technology Legal Traps for Associations Venable LLP August 24, :45 AM – 12:00 PM ASAE Annual Meeting Los Angeles, CA.
Learn. Perform. Succeed. Protest, Claims, Disputes and Appeals Chapter 7.
101 Dalmatians Consumer Disclosures Presented by Betsy Mayotte Melbourne, Victoria, Australia.
P2P: Dangers, Risks & Copyright Infringement Jodi Ito Information Security Officer, ITS
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 Automated Copyright Notice System (ACNS) September 2003 UNIVERSAL MUSIC GROUP UNIVERSAL STUDIOS.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
INTERNET and CODE OF CONDUCT
Per Anders Eriksson
CONTINUING LEGAL EDUCATION committed to lifelong learning LAW SOCIETY OF SOUTH AFRICA CLE INTERACTIVE SATELLITE SEMINAR THE NEW E-WORLD OF BUSINESS IN.
| 1 ODR CASE STUDY Center for Copyright Information - Independent Review Process Diana N. Didia ODR 2015 | Pace Law School June 5, 2015.
Office of the General Counsel1 COPYRIGHT and the TEACH Act The Technology, Education, and Copyright Harmonization Act Copyright © 2007 Villanova University.
HOSPITAL COPYRIGHT TOOLKIT A Guide to the Canadian Copyright Act A Presentation prepared by Jan Figurski, MLS Mary McDiarmid, MISt, AHIP c2007.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Take-down Notice Workshop Take-down notice process in a nutshell  The take-down notice process is a mechanism for members of the public to notify an ISP.
How is Ownership of Intellectual Property Defined and Enforced in an Inherently Copyable Medium? Venkat Balasubramani, Focal PLLC September 23, 2011.
IDEA 2004 Procedural Safeguards: Legal Rights and Options Mississippi Association of School Superintendent Spring, Mississippi Department of Education.
Disclosure Requirements and Consumer Information David Racculia PHEAA Compliance Services 1.
FHSAA Eligibility and Compliance Allegations And Investigations Florida High School Athletic Association.
HIPAA PRIVACY AND SECURITY AWARENESS.
Viacom v. YouTube: The Future of the Section 512 Safe Harbors? Mary Rasenberger April 2011.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
STATE OF ARIZONA BOARD OF CHIROPRACTIC EXAMINERS Mission Statement The mission of the Board of Chiropractic Examiners is to protect the health, welfare,
FAQs about the new regulatory framework Lucy Rhodes
Class 21 Copyright, Winter, 2010 Online Distribution Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of Chicago
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
1 Procedural Requirements for School Districts and Community Colleges Florida Department of Education Office of Equity and Access Adeola Fayemi, Director.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
1 EDUCAUSE live! November 23, 2009 Jack Bernard University of Michigan HEoA’s P2P pill: Wutza U ta do?
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Civil Rights Training Updated March Why? Civil Rights Regulations are intended to assure that benefits of Child Nutrition Programs are made available.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Library Archiving and Internet Service Provider Status Shirley A. Mason Library Media Specialist 12 July 2008.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
P2P Provisions in the Higher Education Act
The Acceptable Use of Technology
Enforcing Copyright on Campus Networks: Lessons Learned, Next Steps
Ogletree, Deakins, Nash, Smoak & Stewart PC
Cyberethics: A Values-Based Approach
Steve Worona November 3, 2009 EDUCAUSE 2009 – Denver
Copyright Infringement: Don’t let it happen to you!
Internet Service Provider Liability Under U.S. Copyright Law
Family Education Rights and Privacy Act
Retail/Office Space $12.00/SF E Nora Ave. Lease Rate:
Indian Policies and Procedures (IPPs) OASIS December 7, 2017
Student User Agreement and Policy 2022
What is a CA document? Date: Authors: March 2005 March 2005
Presentation transcript:

1

What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright infringement in the digital world. 2

What is the DMCA? Affects Internet Service Providers (“ISPs”), including campus networks. ISPs are generally not liable for content sent over, or stored on, their network provided that they take certain actions when notified of a violation. 3

Are all Violations the Same? No. There is a difference between violations on institutionally owned machines and servers (512[c]) and on personal devices that are on the institution’s network (512[a]). 4

What is the DMCA? Safe Harbor for Passive Conduit under DMCA §512(a) (no action necessary). A campus network is eligible for Safe Harbor under DMCA §512(c) if it: – Designates a DMCA Registered Agent; – Had no prior knowledge or financial benefit from copyright infringements; and – Complies with Takedown Notices. 5

Becoming your Institution’s DMCA Registered Agent 6

The DMCA Notice To be effective, a DMCA “notice” must be a written communication to a service provider’s designated agent that includes substantially the following: a physical or electronic signature of a person authorized to act on behalf of the owner; identification of the copyrighted work alleged to be infringed; identification of the material claimed to be infringing or which is the subject of infringing activity; information sufficient to allow the ISP’s designated agent to contact the complaining party, e.g., address, telephone number, and address; a statement that the complaining party has a good faith belief that use of the material is unauthorized; and a statement that the information in the notice is accurate and, under penalty of perjury, that the complaining party is authorized to act on behalf of the owner. 7

Some Thoughts on DMCA Compliance 8

Questions 9

Higher Education Opportunity Act HEOA signed into law in 2008 Negotiated rule making process failed DoE followed the compromises anyway Proposed Regulations in August 2009 Final Regulations in October 2009 Went into Effect August

Among the Thousands of Requirements… 1. Notification 2. Written Plan (see NACUA Note for more info) P2P Regulations 11

Notification Include with other notices (College Handbook) Three Parts: 1.a statement that unauthorized distribution of copyrighted material may bring civil and criminal penalties (We suggest “Unauthorized distribution of copyrighted material may bring civil and criminal penalties.”); 2.a summary of the penalties for violating copyright law; and 3.a description of the college’s specific policies. EDUCAUSE list of “Role Model” campuses:

Written Plan Six Parts: 1.Have a written policy; 2.Include procedures for handling unauthorized distribution; 3.Include use of ≥ 1 technology-based deterrents; 4.Periodically review legal alternatives; 5.May offer legal alternatives as deemed appropriate; and 6.Periodically review the plan. 13

Written Plan 1.Have a written policy: Applies to all network users, not just students. Need not interfere with research requirements or business practices. Must include an educational component. Method of education is left to the Institution. 14

The Lowdown on the Download: Legal, Technical and Practical Information about File Sharing Written Plan 2. Include procedures for handling unauthorized distribution: Active monitoring not required. Respond when notified. Must include disciplinary process (potentially). 15

The Lowdown on the Download: Legal, Technical and Practical Information about File Sharing Written Plan 3.Include use of ≥ 1 technology-based deterrents: Regulations are technology neutral. You need not buy anything. Deference to Institution. Deterrents include: Packet shaping; Content filters; Accepting and responding to DMCA notices. 16

The Lowdown on the Download: Legal, Technical and Practical Information about File Sharing Written Plan 4. Periodically review legal alternatives: Publish on Institution Web site. EDUCAUSE is cataloging legal alternatives. 5. May offer legal alternatives as deemed appropriate: Only to the extent practicable. 6. Periodically review the plan: Institution determines relevant assessment criteria. Periodic not defined (at least annually should be sufficient). 17

Some Thoughts on HEOA Compliance 18

Questions 19

The FAQ: