Number 10: To Respond or Not to DMCA Notices Pro –Good faith effort towards content owner concerns. –As a matter of policy and citizenship obligations.

Slides:



Advertisements
Similar presentations
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Advertisements

Giving legal advice how to give legal information without.
EFFECTIVE DOCUMENTATION In Search of Improved Performance.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Political Ideology A consistent set of views about the policies government should pursue (e.g. liberal vs. conservative)
Chapter 18 Torts.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Challenges and Incidents in Higher Ed. About->Presenter Zach Jansen Information Security Officer, Calvin College.
Web Applications: Get a Grip on Privacy Michael Corn CAMP 2008.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
1 Social Media: Strategy and Implementation Are you protected? Amy D. Cubbage & Cynthia L. Effinger.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Little brother is watching you
IMPLICATIONS FOR UNIVERSITY POLICY BL, JISC & MLA BRIEFING, 29/6/2010 Professor Charles Oppenheim
By: Brad Templeton Presented by: Kelly Canales “10 Big Myths about Copyright Explained?”
Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
LIS 600: Foundations of Library and Information Studies Week Six Kevin Rioux, PhD.
A geek in industry or “how to survive in a corporate IT shop”
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
95752:11-1 Security Policy :11-2 Policy Set of detailed rules as to what is allowed on the system and what is not allowed. User Policy System Policy.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Chapter 14: Ethics, Justice and Fair Treatment at Work
ETDC 625 Hardware and Software in Instructional Development Spring 2012 Raymond Nekrasz.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
Social Responsibilities In recent years firms have been held more accountable for the impact of their activities on society. This has arisen due to pressure.
Computer Ethics.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
WHY BUSINESS NEED MEDIATION? dr. sc. Srđan Šimac Judge of the High Commercial Court of the Republic of Croatia and President of Croatian Mediation Association.
Domestic Policy EDUCATION. Domestic Policy Decisions, laws, and programs made by the government which are related to issues in the country. IMPACT: It.
Return to Work Programs Frequently Asked Questions.
“10 Big Myths about copyright” Presented By: Brenton Barnes Summer 06.
Part A – SOCIAL & CULTURAL SUSTAINABILITY AS (3.2): Demonstrate understanding of strategic response to external factors by a business that operates.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Policy Considerations RUCUS BOF IETF 71 - Philadelphia March 10, 2005 John Morris.
University Ethics and Compliance Program. Why do We Have a University Ethics and Compliance Program? #1 The Ethics and Compliance program serves to reflect.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
The Privacy Symposium – Summer 2008 Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach © Aug 2007.
Developing User Accepted Asset Management Networks and Processes Bob Mahaney, CPPS Mgr, Program Accounting & Finance MD Anderson Cancer Center.
Federal Legislation and Higher Education Digital Millennium Copyright Act Compliance and Education Networking 2003 Copyright 2003 Tracy Mitrano.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
A copyright is basically the legal exclusive right of the author of a creative work to control the copying of that work. COPYRIGHT LAWS.
PRIVACY Universities should NOT be allowed to monitor their networks for so-called “improper activity.”
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
New Jersey State League of Municipalities Annual Conference Local Government Communications in a Digital World Atlantic City November 19, 2014 Kenneth.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
“ 10 Big Myths about Copyright Explained” By: Brad Templeton Presented By: Nichole Au December 6, 2007.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Social Media Audit: Labor, Advertising and Corporate Law.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Level 2 Business Studies AS90843 Demonstrate understanding of the internal operations of a large business.
Michael Orshansky The University of Texas at Austin.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Transposition of the E-Commerce directive in Estonia Workshop on Electronic Commerce Directive Belgrade.
 If a company is publicly traded then it is on the stock market  This means that the public can invest in the company with ease  Investments can be.
Presentation transcript:

Number 10: To Respond or Not to DMCA Notices Pro –Good faith effort towards content owner concerns. –As a matter of policy and citizenship obligations of our students. –Just in case… (after all, the RIAA says…). Con –Content owners have NOT shown “good faith!” –We are just the ISP and shouldn’t intercede in matters between users and content owners. –Too much administrative burden. –Legal Rabbit Hole: the more we go down it, the more we might get implicated in it.

Number 9: To be or not to be a Private Network … Pro –Don’t have to comply with CALEA. –Don’t have to worry about rogue copyright violations. –Don’t have to comply with ECPA. Con –Help serve our communities especially with access to the “last mile.” –Eventually distinction won’t matter for CALEA. –Eventually distinction won’t matter for ECPA.

Number 8: To block or not to block social networking sites Pro –Keep young and foolish students out of harm’s way (employers, civil actions). –Maintain the good reputation of an institution, especially certain groups such athletics. –Avoid occasional spam problems. Con –Free speech, let them learn from their mistakes. –It is how they communicate, why should we restrict them? –Hell, they’re fun!

Number 7: To go or not to go with open/community source Pro –The collaborative, higher education past is the future. –It is in the spirit of higher education. –Ultimately it will save us money and be tailored to our needs. Con –The past is past, commercial is the future. –Higher education can’t keep up with commercial products and we shouldn’t fight the trend. –Too much money; let’s pressure vendors to tailor to our needs.

Number 6:To Policy or Not to Policy: e-Discovery Pro –Harmonize the process throughout campus. –Provide proactive information and instructions which saves time in the event of actual litigation. –Good to provide institutional interpretation of law to suit the tradition and culture of school. Con –Stay loose and tuned to specifics of litigation. –It is law anyway, so compliance is implied and policy is not necessary. –Implementation could change with technology, too hard to keep up with static policy/process.

Number 5: To become or not to become web accessible Pro –It is the right thing to do. –It attracts students and employees and helps with retention and alumni. –Have to? (Public) Leg up if we do (Private). –Accessible design is good design: it’s the future! Con –It is expensive. –Administrative burden on the many to help the few –It will restrict innovation on the web, it’s the past!

Number 4:To be or not to be intimidated by Blackboard Pro –They got the power! –They will sue if we don’t go with them. –They got the market share and lots of good people working for them. Con –Fight the power! –They can’t win a suit after the recent Supreme Court decision. –Our institution wants to go with another vendor more consistent with our culture, tradition and needs -- and it is a free, anti-trust country!

Number 3: To Notify or Not to Notify: Breach PII Pro –It’s the law (in a lot of states). –It’s ethical. –It’s good reputation … on balance. Con –It’s bad reputation … on balance. –It’s not the law (in some states … but note liability from other states). –It’s expensive and time consuming.

Number 2: Go or not to go with Commercial for Students Pro –Students use it anyway or don’t mind if we did… –Too expensive to maintain, so give it away… –They are better at it! Con –Commercialization of university services…where to draw the line? –Privacy: we know they scan it, and what will alumni think of those advertisements? –Control over our own systems and data, especially for emergency contacts? –What impact on FERPA obligations? –They are not as good as you think!

Number 1: To Forward or Not RIAA Settlement Letters Pro –In the interests of students; –In the interests of the institution; –Especially if you act on DMCA notices anyway, not a big deal. Con –We are not the RIAA’s handmaidens! –Not in the interests of the institution … “the more I try to leave, the more they try to pull me back in…” –It is a big %^&* deal, a lot of administrative burden and a huge pain in the %^&*()!

Bonus! To be, or not to be, sued by the AAP!