Plan for Combating Copyright Abuse as required by Higher Education Opportunity Act

Steve Moon
Information Technology Services
Authorized “Agent” per the
Digital Millennium Act
January 2011

Part 1: The plan to effectively combat copyright infringement

Link to relevant Web page(s)

Current links to UNI policy and information on Copyright

1-2. What technology-based deterrent(s) have you decided to use?
University of Northern Iowa uses Allot’s NetEnforcer to manage bandwidth utilization on campus.  This device is configured to identify and limit the capability of Peer-to-Peer networking on both wired and wireless networks on campus.   In addition by default all inbound ports to client computers on our residential network are blocked at the Internet firewall.  This prevents computers from acting as servers or super nodes in peer to peer networks.

1-3. What mechanism(s) are you using to educate your community?
All new students are required to attend an orientation session on UNI technology. This session addresses copyright infringement and other common policy violations that result through technology.   Community and honesty as it relates to all activities at UNI and Copyright specifically are covered by Student Affairs staff in addition to the technology session.
As part of the registration process for personally owned machines on our Residential Network, ResNet, students are required to view information regarding Copyright Infringement, potential consequences, and UNI procedures for handling alleged violations.
At the start of each school year an email is sent to all currently enrolled students from the Dean of Students Office.  This email provides a number of notifications regarding compliance with federal and state regulations including copyright infringement. 

1-4. What procedures are you using for handling unauthorized distribution of copyrighted material (e.g., monitoring, sanctions, etc.)?
Upon receiving notification of copyright infringement through a takedown notice, Information Technology Services has a set procedure of enforcement.  The infringing user is identified.  A response is sent to the reporting party that UNI acknowledges this request and will resolve the issue.  Offending machines are disconnected from the network and the owner sent a notification of infringement as well as information regarding copyright infringement.  Access to the campus network from the offending machine is reinstated following receipt of a signed Statement on Copyright Infringement and Computer Sharing.
Receipt of a second copyright violation follows a similar procedure with the following exceptions.  Network access is denied to all machines registered to offending party for 30 days; offending party is referred to Dean of Students or Human Resources for disciplinary procedures.

1-5. How are you periodically reviewing the plan? What criteria are you using to determine if it is effectively combating copyright infringement?
Annually the registered DMCA Officer, Network Security staff, ResNet staff, Dean of Students and University Counsel meet to review the effectiveness of the copyright plan.   If the metrics suggest that modification to the plan is needed a recommendation is made for review by ITS and other affected parties.

Part 2: Offering Alternatives

2-1. Link to relevant Web page(s)

2-2. Are you carrying out your own survey of alternatives or linking to one or more lists maintained by others? If the latter, which list(s)?
Rod Library maintains documentation on Copyright Guidelines for Music, containing Public Domain Information. Other downloading sites are provided with the permission of Educause.

2-3. Have you made any special arrangements with one or more content providers to obtain content through legal methods?
The libraries at the University of Northern Iowa license a range of copyrighted musical material for student, faculty and staff usage.

Part 3: Informing the Community

3-1. Link to relevant Web page(s)

3-2. Have you developed your own statement regarding copyright and copyright law in general or are you linking to such statement(s) maintained by others? If the latter, which statement(s)?
UNI’s statement regarding copyright,  was developed internally with input from faculty, staff, students and administration through the ITS advisory process.   The summary of civil and criminal penalties was extract from a US Department of Education letter dated June 4, 2010.

January 2011