Policy on Copyright Infringement and Peer-to-Peer Abuse
Policy Number: TS-InfoSec-001
Policy Title: UIC Policy on Copyright Infringement and Peer-to-Peer Abuse
Vice Chancellor/Associate Chancellor: Vice Chancellor for Innovation
Unit Responsible for Policy: Technology Solutions
Effective Date: September 22, 2011 (Version 1.00)
Last Review Date: September 7, 2021
Contacts: Chief Information Security and Privacy Officer
Policy Statement:
- Consequences for copyright infringement and peer-to-peer abuse
- If a notification of copyright infringement is received by Technology Solutions, we will take the following actions:
- If user is known, suspend the user's wireless access
- Create a network filter specifying the MAC address of the device to prevent it from connecting to the university network.
If the reported device is a university/department device, we will notify the Network Security Liaison (NETSEC) for that department. It is then the responsibility of the NETSEC to determine the identity of the user of the machine and report this information to the Information Security and Privacy Office. The user also needs to be instructed to contact the Information Security and Privacy Office at 312-413-0003 option 3 (3-0003 option 3 from campus).
If the reported device is in use by a student, they are required to contact the Information Security and Privacy office at 312-413-0003 option 3 (3-0003 option 3 from campus).
- If a notification of copyright infringement is received by Technology Solutions, we will take the following actions:
- How to become compliant and regain access to network services
- Upon contacting the Information Security and Privacy Office, the identified individual will be instructed to perform the following to become compliant and regain network services:
- Remove all peer-to-peer file sharing software from the device
- Delete all illegally obtained and infringing files (music, movies, software, and other media)
- Send an email to security@uic.edu stating that they have completed all tasks towards becoming compliant, that they understand the requirements of the policy and law, and that they will not repeat the offense
- Upon contacting the Information Security and Privacy Office, the identified individual will be instructed to perform the following to become compliant and regain network services:
- Repeat offenses
- If a subsequent notification is received for an individual, the above process will be repeated along with the following:If the repeat offender is a student, a complaint will be filed with the Office of the Vice Chancellor for Student Affairs. The outcome of the incident will be determined by a Student Judicial Affairs Administrative Action Meeting or Hearing.In the case of faculty/staff repeat offenders, the Information Security and Privacy Office will contact the Dean for the offender's department, the Assistant Vice President for Human Resources, and University (Legal) Counsel.The individual's wireless access will remain suspended and the device will continue to be unable to access the network until an outcome is determined by the appropriate parties.Failure to respond to inquiries or attend meetings scheduled with the Technology Solutions, the Dean of Students, or any other University Department or Official concerned with the disciplinary process will result in the suspension of access to all network resources (not including Blackboard) and may result in an academic hold.
Requirements and Conditions: N/A
Reason for Policy: N/A
Minority Impact Statement: The policy does not have any disproportionate or unique impact on UIC’s minority students, staff, or faculty.
Who Should Read the Policy: All students, faculty, staff, and administrators at UIC.
Definitions: N/A
Procedures: N/A
Forms: N/A
Related Laws, Regulations, Statutes, and Policies: N/A
Resources:
University Resources
- UIC Office of the Dean of Students - Student Disciplinary Policy
- UIC Policy on Sharing Copyright Works
External Resources
- EDUCAUSE: Legal Sources of Online Content
- EDUCAUSE: Higher Education Opportunity Act (HEOA)
- The Digital Millennium Copyright Act of 1998
Policy History:
Approved by:
Approved date:
Approved as: