Redstone Copyright Infringement Policy
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
The Higher Education Opportunity Act of 2008 (HEOA) includes provisions that are designed to reduce the illegal uploading and downloading of copyrighted material through peer-to-peer (P2P) file sharing. These provisions include requirements that:
- Institutions certify to the Secretary of Education that they have developed plans to “effectively combat” the unauthorized distribution of copyrighted material
- Institutions make an annual disclosure that informs students that the illegal distribution of copyrighted materials may subject them to criminal and civil penalties and describes the steps that institutions will take to detect and punish illegal distribution of copyrighted materials
- Institutions publicize alternatives to illegal file sharing
This document outlines Redstone College’s plan to comply with these requirements.
Redstone College currently employs bandwidth-shaping technology to prioritize network traffic, and blocks students’ ability to access these sites from the student computer networks.
Redstone College responds promptly to legitimate notices or letters of illegal copyright infringement based on the requirements of the Digital Millennium Copyright Act and directs both our Information Technology and Compliance departments to investigate and respond.
Redstone College will cooperate fully with any investigation by public authorities related to illegally downloaded copyrighted information. Students found guilty will be subject to the full extent of fines and penalties imposed, as well as facing automatic loss of Redstone College network access, and possible suspension.
Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or “statutory” damages affixed at not less than $750 and not more than $30,000 per work infringed. For “willful” infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorney fees. For details, see Title 17, United States Code, Sections 504, 505.
Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.
Consistent with our educational principles, we view education as the most important element in combating illegal sharing of copyrighted materials at Redstone. We use a wide variety of methods to inform our community about the law and our internal response to copyright infringement claims:
- In order to use college computing resources, all Students enrolled in Redstone College will endorse a Computer User Agreement that includes a section on copyright compliance.
- Posters are being mounted in student computer labs and Learning Commons to educate students and discourage illegal file sharing.
- Redstone College’s statement concerning the Digital Millennium Copyright Act and our response to infringement claims are published on our public web site as well as on the students’ internal network.
- Language has been added to the Annual Security Report outlining the Digital Millennium Copyright Act, as well as sanctions for non-compliance.
Redstone College does not block access from campus to all legitimate sources of copyrighted material. Although we cannot maintain an up-to-date list of alternatives we point students to the Educause list at http://www.educause.edu/Resources/Browse/LegalDownloading/33381.
Redstone College will review this plan each year to insure it is current and maintains the appropriate and necessary information to effectively combat illegal file sharing, as well as update the methods employed as new technological deterrents become available.