Staff Handbook



Staff Handbook PDF


5.5.3 Digital and Electronic Copyright Infringement Policy (DECIP)

Copying, downloading, storing, displaying, or distributing copyrighted material using University systems or networks without the express permission of the copyright owner, except as otherwise allowed under the copyright law, is prohibited. Under the Federal Digital Millennium Copyright Act of 1998, repeat infringements of copyright by a user can result in termination of the user's access to University systems and networks, and further prosecution as is warranted by state and Federal Laws and the Federal Digital Millennium Copyright Act of 1998. 
 
The Higher Education Opportunity Act (34 C.F.R. Section 668) by the United States Congress and signed into law on August 14, 2008, requires educational institutions to be proactive in the prevention of illegal downloading and copyright infringement. The following is Jackson State University’s policy regarding illegal peer-to-peer file sharing.
 
It is the policy of Jackson State University (JSU) that any illegal peer-to-peer file sharing ( for example: Bear Share, Limewire, WinMX, etc.) over the University's network is prohibited.  All users who access the Jackson State University network acknowledge that they are aware of and agree to this and all University policies.
 
College/Unit Policy Officer: A person with responsibility for issues having broad-based policy implications for students, faculty, and staff in the college/unit; an Associate Dean or similar position.
 
Copyright law: The Copyright Law of the United States of America contained in Title 17 of the United States Code (U.S.C) is available at http://lcweb.loc.gov/copyright/title17/ and protects “original works of authorship fixed in a tangible medium of expression” for a limited period (17 U.S.C. §102).  Copyright protection includes, for instance, the legally secured right to publish and sell the substance and form of a literary, artistic, or musical work.  The federal copyright statute governs the reproduction of works of authorship.  In general, works governed by copyright law include such traditional works of authorship as books, photographs, music, drama, video and sculpture, and also software, multimedia, and databases.  Copyrighted works are protected regardless of the medium in which they are created or reproduced; thus, copyright extends to digital works and works transformed into a digital format.
 
Copyright Infringement: Copying, storing, displaying, or distributing copyrighted material using University systems or networks without the express permission of the copyright owner, except as otherwise allowed under the copyright law, is prohibited.  Under the Federal Digital Millennium Copyright Act of 1998, repeat infringements of copyright by a user can result in termination of the user's access to University systems and networks, and further prosecution as is warranted by state and Federal Laws and the Federal Digital Millennium Copyright Act of 1998.
 
Electronic Communications: The use of computers and network systems in the communicating or posting of information or material by way of electronic mail, bulletin boards, or other such electronic tools.
 
Illegal Downloads: To transfer files or data from one computer to another without the permission of the copyright owner
 
Network Systems: Includes voice, video and data networks, switches, routers, wireless devices, and storage devices.
 
Peer to Peer File Sharing: Allows internet users to transfer digital files directly from computer to computer
 
System or Network Administrator: A university employee responsible for managing the operation or operating system environments of computers or network systems, respectively.
 
University Computers and Network Systems (University Systems): Computers, networks, servers, and other similar devices that are administered by the university and for which the university is responsible.  Throughout this policy, the shortened term "university systems" is used to mean all university computers and network systems.
 
The distribution of copyrighted materials over the Internet for which the distributor does not have permission is a violation of the Digital Millennium Copyright Act of 1998 (“DMCA”). Most of the music, games or videos downloaded through file-sharing programs lack permission of the copyright owner.

Jackson State University receives notices of copyright infringement under the DMCA. These notices come from software or entertainment industries that focus their Internet scans for specific games, songs or videos.   To alleviate its potential liability, Jackson State University must respond to these notices expeditiously and will take the following steps:

  1. Upon receipt of notification, the Department of Computing and Communications (DCC) must identify the source of the complaint. 
  2. The DCC must confirm a cease and desist action and/or request to the copyright agent. 
  3. The DCC must disable the IP address from which the complaint originated.
  4. The Department of Computing and Communications and the respective department head will meet with the party to explain the complaint and advise on how to remove the copyrighted material from the involved machine(s). 
  5. Once the information has been removed, The Department of Computing and Communications will be authorized to re-enable the IP address.
  6. If the individual ignores the request, access will not be restored until proof can be furnished that the copyrighted material no longer exists on the individual’s computer or associated devices.
  7. On the second violation, the party risks having its access to the University Email System and resources permanently disabled. 
  8. Appeals: Individuals may appeal findings or rulings to the appropriate designated personnel (See Section A and B of this policy on Repeat Infringes and Due Process and Appeals).
Legal Alternatives for Downloading
 
The following legal alternatives for downloading materials from the Internet are available.  Jackson State University does not endorse any specific commercial product and endorses the sites below only that they provide legal alternatives for downloading music, movies, and books. 
 
 
Federal and State Penalties
  • Federal Law provides severe civil and criminal penalties for the unauthorized reproduction, distribution, rental or digital transmission of copyrighted sound recordings (Title 17, United States Code, Sections 501 and 506).  Code available at http://lcweb.loc.gov/copyright/title17/.  Criminal penalties for first-time offenders can be as high as five years in prison and $250,000 in fines. 
  • Civil penalties can run into many thousands of dollars in damages and legal fees. The minimum penalty is $750 per item (song, video, etc). 
  • The “No Electronic Theft Law” (NET Act) is similar on copyright violations that involve digital recordings.  Congress enacted the No Electronic Theft (NET) Act in 1997 to facilitate prosecution of copyright violation on the Internet.  The NET Act makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or receives no private financial gain.  Prior to this law being passed, people who intentionally distributed copied software over the Internet did not face criminal penalties if they did not profit from their actions.  Electronic copyright infringement carries a maximum penalty of three years in prison and a $250,000 fine.
 
Mississippi Code:
 
Violations:
Violations of these policies may result in the immediate suspension of computer account and network access pending investigation of circumstances and may lead to their eventual revocation. Serious violations of the policy will be referred directly to the appropriate University or outside authorities.  Unauthorized use of University computing facilities can be a criminal offense.  The penalties may be as severe as suspension or dismissal from the University and/or criminal prosecution.
 
Violators of this policy will be dealt with according to the details outlined in the University’s Digital and Electronic Copyright Infringement Policy and the Information and Data Security and Email Systems Policy.  Those who cannot accept these standards of behavior will be denied use of JSU’s computers or network systems.  Violators may also be subject to penalties under University regulations and under state and federal laws.
 
A.  Repeat Infringes
Jackson State University will terminate all network access for anyone who repeatedly infringes on the rights of copyright holders.  Access may also be terminated where the University reasonably believes significant infringement has occurred.
 
  • For Students: Upon a second notification of infringement, students’ network access will be suspended and the matter will be referred to the Associate Dean of Student Development and Judicial Services.  At the discretion of Jackson State University’s Judicial Services, civil and criminal charges may be brought against the student.  (Please see Appendix A: Academic Policies-Academic Dishonesty: Unauthorized/Illegal Web Use, pg. 20 of the Jackson State University Student Handbook 2008-2009, and as amended).
  • For Faculty/Staff: Upon a second notification, the appropriate senior officer of the college or department will determine the action to be taken.
  • For Guest/Other Prospective Users: Please see the policy 5.5.3, Digital and Electronic Copyright Infringement.
 
B.  Due Process and Appeals
A person who has allegedly violated this policy shall not suffer any permanent adverse action until being given the opportunity to present information to the appropriate decision maker or committee.  This opportunity to be heard shall be considered an appeal of any temporary action.  The alleged violator shall have fourteen (14) days from his/her notification of the specific accusation or activity in order to exercise this due process provision.  Requests for the due process procedure shall be in writing (with a copy) and forwarded to the Department of Computing & Communications according to the following:
 
  • for students, the Associate Dean of Student Development and Judicial Services;
  • for staff, the Executive Director of Human Resources;
  • for faculty, the Provost;
  • for contractors/vendors, the Vice President for Business and Finance.
 
The preceding decision maker may delegate these responsibilities to another person or committee, so long as a meaningful opportunity to be heard is provided the accused.
 
C.  Who to Contact
If you have a concern about the use of copyrighted material on the University network or domain, please contact the agent designated to respond to reports alleging copyright infringement.
 
Designated Agent
The designated agent for the University to receive notification of claimed infringement under Title II of the DMCA is the Department of Computing & Communications, Voice: 601.979.2005 ~ Fax: 601.979.0425 ~ Email:occc@jsums.edu
 
D.  DECIP Electronic Acknowledgment Form
 
These guidelines are intended to explain the policies and procedures that Jackson State University (JSU) follows in responding to notifications of alleged copyright infringements on the University network.  This policy applies to all users of University facilities and services, including employees (faculty and staff), students, guests, contractors, and other prospective users.  All users of University technology must electronically acknowledge that they are aware of and agree to this policy by completing the “Electronic Acknowledgement Form” and forwarding the original completed form to the following:
 
DECIP Electronic Acknowledgment Form