1-2. What technology-based deterrent(s) have you decided to use?
We are using our firewall's application content filtering capabilities to block peer-to-peer application activity. We are also using bandwidth shaping to throttle general HTTP traffic.
1-3. What mechanism(s) are you using to educate your community?
Beginning of each semester sending "Information Security Best Practices" e-mail to all students, faculty and staff with information and URL. Scheduling speaking engagements to "Freshmen Orientation" events. Quarterly IT newsletter includes security and copyright tips.
1-4. What procedures are you using for handling unauthorized distribution of copyrighted material (e.g., monitoring, sanctions, etc.)?
Investigate instances that we discover either by TROY abuse tickets, DMCA notices, through network traffic discovery (high bandwidth) or student's network storage drive (music/movie files) discovery. Notification of students by Resnet department via e-mail of infraction and the incident will be turned over to the Dean of Students Office for a judgment hearing.
1-5. How are you periodically reviewing the plan? What criteria are you using to determine if it is effectively combating copyright infringement?
By monitoring the amount of TROY copyright infringement abuse tickets, DMCA notices received and internal incidents. Student feedback from information security communications.
In connection with a student's admission, readmission, enrollment, or status in the university:
A student gives false information to the university concerning any matter which may properly be considered in that connection; or
A student knowingly withholds from the University any information requested by the University.
In connection with the taking of, or in contemplation of the taking of any examination by any person:
A student knowingly discovers or attempts to discover the contents of an examination before the contents are revealed by the instructor;
A student obtains, uses, attempts to obtain or use, or supplies or attempts to supply to any person, any unauthorized material or device;
A student uses, attempts to use, or supplies or attempts to supply to any person any material or device dishonestly.
Where the work affects or might affect a student's grade, credit, or status in the university, a student represents to be his or her own any work that is not the product of his or her own study and efforts (known as plagiarism).Also reference the U.S. Copyright Office.