HEOA P2P Assessment


Published on

This presentation provides and overview of 34CFR668 for HEOA P2P requirements. It is offered in concert with an assessment program also on SlideShare and the post on blog.thehigheredcio.com.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • This chart shows the breakdown of all files on the S:\\\\ drive based on the date they were last accessed. This data suggests most of the files are actively being used if only for viewing.
  • This chart shows the total amount of disk space used by each folder on the S:\\\\ drive. Although some folders that are large are expected, the unexpected finding is that most departmental folders are small.
  • This Chart shows the breakdown of all files on the S:\\ drive based on the file types. The top filetypes includes several image and media filetypes.
  • HEOA P2P Assessment

    1. 1. Combating Copyright Infringement HEAO P2P Assessing First Year Effectiveness<br />Jerry Bishop<br />TheHigherEdCIO<br />HEOA P2P Assessment by Jerry Bishop is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.<br />
    2. 2. What’s required – the law<br />Brief summary of the essential elements<br />
    3. 3. Combating Copyright Infringement<br />Authority: 34 CFR 668.14(b)(30)<br />Effective July 1, 2010<br />Condition of any Title IV HEA program<br />Institutions must<br />Develop Institutional Plans<br />Implement Technology Deterrents<br />Offer Legal Alternatives<br />
    4. 4. Institutional Plans<br />“…Develop & implement written plans to combat unauthorized distribution of copyrighted materials by users of the institutions network without unduly interfering with the educational and research use of the network.”<br />Components<br />Use of one or more technology-based deterrents<br />Educating community on appropriate use of copyrighted material<br />Procedures for handling unauthorized distributions, including disciplinary procedures<br />Procedures for reviewing effectiveness of the plan<br />
    5. 5. Technology Deterrents<br />Bandwidth shaping<br />Traffic monitoring<br />Accepting & responding to DMCA notices<br />Commercial products to block illegal file sharing<br />
    6. 6. Legal Alternatives<br />Authority: 34 CFR 668.14(b)(30)<br />Offer legal alternatives to illegal downloading or acquiring copyrighted materials<br />Where to buy content commercially<br />Where to find free to use content<br />Periodic reviews of alternatives are required<br />
    7. 7. Consumer Information<br />Authority: 34 CFR 668.43(a)(10)<br />Provide upon request institutional policies and sanctions related to unauthorized distribution of copyright materials<br />Must include:<br />Explicitly inform students of civil and criminal liabilities associated with violations<br />Include summary of penalties for violations of Federal copyright laws<br />Describe policies and disciplinary actions taken for violations<br />Provide one-to-one annual notice to students<br />
    8. 8. Assessing Plan effectiveness<br />Tips for gauging your current risk exposure <br />
    9. 9. Plan Effectiveness<br />You do not have to be an investigator<br />Operational Portion<br />Review written plan and assessment portion<br />Review related policies and procedures<br />Review handling of a sample of suspected violations<br />Technical Portion (really optional)<br />Search for known file sharing applications<br />Scan network drives for signs of collections<br />Check web filtering or blocking tools<br />
    10. 10. Query Results from SCCM<br />Peer-2-Peer Programs on Staff Computers<br />uTorrent  1<br />BitTorrent   1<br />BitviseTunnelier 1<br />FileZilla  9<br />Others likely exist but do not register<br />Remember, having the application alone it not a violation – there are legitimate uses<br />
    11. 11. Scan Storage Volumes<br />Use disk tools to scan for common filetypes<br />Check sampling of directories with unusually large volumes of content<br />Users home directories and departmental folders <br />Remind college of policy and prompt for clean-up<br />Include volume and drive data to illustrate<br />Watch for shifting content between locations<br />Follow-up with Pre and Post clean-up results<br />
    12. 12. S: Drive Access Dates by Size<br />May 2011<br />April 2011<br />
    13. 13. S: Drive Folders Sizes<br />April 2011<br />May 2011<br />
    14. 14. S: Drive by Filetypes<br />April 2011<br />May 2011<br />140 GB .mpg and 93.4 GB .mp3 removed<br />111 GB .avi increased<br />
    15. 15. Review Web Traffic for P2P Sites<br />
    16. 16. Questions?<br />Jerry Bishop<br />blog.thehigheredcio.com<br />