JMU and other institutions of higher education have responsibilities under the Digital Millennium Copyright Act of 1998 and more recently the Higher Education Opportunity Act of 2008 (HEOA) to combat copyright abuse and discourage illegal distribution of copyrighted materials. In particular, illegal use of peer-to-peer (P2P) file sharing technology is a concern. This site outlines JMU’s program for addressing these requirements and provides information to individuals about their obligations and alternatives under federal copyright law.
JMU’s Plan to Address Unauthorized Distribution of Copyrighted Materials is available at: HIGHER EDUCATION OPPORTUNITY ACT (HEOA) COMPLIANCE PROGRAM and is updated annually. Here is some information about the elements of the plan.
Background
Internet file sharing is risky behavior. The following list provides details on some of the risks associated with file sharing.
- File sharing increases the vulnerability of your computer. Without special care, running most music and file sharing programs allows anyone on the Internet to access files on your computer—presenting security, appropriate use and potential legal issues.
- Distributing copyright protected materials is against the law and can result in lawsuits, fines, network privilege suspension, and/or action by JMU Judicial Affairs or Human Resources
- Use of sharing software can lead to inadvertent sharing of sensitive data. Peer-to-peer sharing software should not be installed under any circumstances on computers handling sensitive personal data. It should only be installed on JMU-owned computers if directly job related. All P2P users should use caution to avoid inadvertently sharing data other than what they have intended.
- Security defects in sharing software can be discovered and exploited allowing others unintended access to your computer and data.
- Criminals use file sharing networks to spread viruses and other malware by presenting them in share lists using innocuous names.
- File sharing traffic can inhibit academic and business functions of the university by inordinately consuming bandwidth intended for these purposes
Individuals who find it necessary to download music and files through internet/P2P file sharing are responsible for configuring their software for safe and legal operation. They should follow specific instructions for disallowing other computers access to their local files.
Annual Notice to the University Community
Since university policy prohibits use of the JMU network to violate copyright law or jeopardize the security of university technology or information resources, this notice distributed annually to all students, faculty, staff and affiliates outlining specific obligations and expectations.
Legal Alternatives for Online Content
Across the Internet myriad sources are available to provide media content within the bounds of copyright law. A list of many such resources pertinent to use by the higher education community is maintained by Educause at: https://www.educause.edu/legalcontent
Resources:
Related JMU Resources/Policies
- General guidance provided by JMU Libraries on use of copyrighted materials https://www.jmu.edu/copyright/
- Information on penalties for violation of copyright https://www.copyright.gov/title17/92chap5.htmlhttps://www.copyright.gov/title17/92appf.pdf
- Resource page outlining risks and safeguards related to media/file sharing –
https://www.jmu.edu/computing/security/runsafe.shtml - JMU Policy #1207: Appropriate Use of Information Technology Resources https://www.jmu.edu/JMUpolicy/1207.shtml
- JMU Policy #1204: Information Security https://www.jmu.edu/JMUpolicy/1204.shtml
- JMU Policy 1205: Data Stewardship Policy https://www.jmu.edu/JMUpolicy/1205.shtml
External References:
- The US Copyright Office: https://www.copyright.gov
- The Copyright Office's FAQ page: https://www.copyright.gov/help/faq/
- The Electronic Frontier Foundation's intellectual property page: https://www.eff.org/issues/intellectual-property