HEOA Copyright and P2P File Sharing Requirements

This page outlines Michigan Tech's plan to comply with the Higher Education Opportunity Act (HEOA) relating to digital copyright infringement and P2P File Sharing by users of the institution's network.

Technology-based Deterrents

  • Michigan Tech deploys bandwidth management devices at the campus network border.
  • Michigan Tech severely rate limits common P2P protocols and applications to limit the impact these aggressive protocols have on the performance of the campus network. Our vendor provides regular update patches as new applications/protocols become known. Michigan Tech applies patches on all network equipment as they become available – subject to scheduling constraints.
  • See "Procedures for Handling Unauthorized Distribution of Copyrighted Material" below.

Community Education and Annual Disclosure

  • Michigan Tech's primary education emphasis occurs at week long new student orientation sessions.
  • Michigan Tech brings in an outside legal authority on online activities, including illegal copyright use, to conduct a mandatory session during orientation. This is supported by optional attendance sessions on the use of our residential network where these topics are emphasized again.

Procedures for Handling Unauthorized Distribution of Copyrighted Material

  • When DMCA violations are received, our Resnet Coordinator handles the University's initial response.
  • Students lose access to the network until they pay an administrative fee and review online materials covering copyright rules. Students must pass an online assessment quiz with a 100% score before access is returned.
  • Subsequent violations are handled by the Office of Student Affairs. Penalties for repeat offenders include loss of network access for a full semester and large fees.
  • Third time offenders face the possibility of expulsion.

Periodic Review of Plan and Assessment Criteria

  • The number and severity of alleged DMCA violations are reviewed annually by the Manager of Resnet, the University Student Judicial Office, and the Director of Telecommunications to determine if changes in discipline procedures or educational materials are needed.
  • Technical deterrents are reviewed annually by the network engineering staff under the direction of the Director of Telecommunications to determine if the technical deterrents remain effective in limiting undesirable traffic.
  • New technology that becomes available is reviewed periodically for deployment by the University's network engineering staff.

Offering Alternatives to Illegal File Sharing

  • Michigan Tech did offer the Ruckus service until the company dissolved. No other cost effective solutions are available at this time.
  • Legal sources of Online Content as compiled by Educause can be viewed at: http://www.educause.edu/legalcontent

Plan created: June 2010
Plan last reviewed/updated:6/25/10