SlideShare a Scribd company logo
GAMABrief:	

What Every School Needs to Know About Copyright Law
Introduc)on	
  

!

Technology in the classroom is nothing new, but with the rise of smartphones, smart boards and tablet computing, the way
teachers and students use and engage with media continues to grow and evolve. Any time educational content is used, shared or
created, whether by teachers or by students, IP laws and, specifically, copyright laws, are implicated. Administrators, teachers and
students must all be aware of what activity is freely permissible under U.S. Copyright Law, and what sort of activities might run
afoul of the law.	


!
Copyright	
  Basics	
  
!

U.S. copyright law protects a work from the moment it is created, or “fixed,” in a tangible medium of expression. Copyright
protection ensures that only the author or creator of the work has the right to reproduce, transmit, distribute, perform and make
derivative copies of the work. “Works” that can be protected by copyright law include things like books, photographs, films,
drawings, paintings, musical works, sound recordings, sculptures and even computer code.	


!

Since teaching demands the use and reproduction of books, pictures, films and other media, both in hard copy forms and online, it
is imperative that schools be aware of what sort of media are being consumed.	


!
Sharing	
  Media	
  in	
  the	
  Classroom:	
  The	
  Do’s	
  &	
  Don’ts	
  for	
  Teachers	
  
!

With schools facing rising costs and stretched budgets, it is important for teachers to know when it is permissible to photocopy a
book, include photos in presentations or show a film to a class without first paying a licensing fee or obtaining consent from the
creator. 	


!

Generally speaking, any time a teacher copies a book without the author’s permission, the teacher has infringed the author’s work.
Yet, U.S. copyright law makes room for many uses of copyrighted work under a legal doctrine known as “fair use.” Essentially, the
doctrine permits individuals to use portions of another’s copyrighted work, so long as the use does not harm the original author
in any way. 	


!

Determining whether a use is “fair” is notoriously difficult, and different courts will often come to different conclusions on the
same set of facts. The following is a general guideline set of guidelines that teachers can use to determine whether their use of
material for the classroom is “fair.”	


!

For	
  video	
  media:	
  Using DVDs, videotapes or tapes made from television broadcasts in an instructional setting (i.e. a classroom) is
generally permissible. Using video media in a multipurpose room or for a student movie club is not permissible without prior
authorization from the copyright owner.	


!

For	
   print	
   media: Making a photocopy for each student in the classroom of shorter works (less than 2,500 words) is permissible.
For longer works, making a photocopy of no more than 10% of the work is generally permissible. But, making photocopies from a
book that was not acquired legally, regardless of how much is copied, will run afoul of copyright laws.	


!

For	
  other	
  media: Other media such as software, music and images present even more complex issues. Generally, a school must
acquire educational software licenses for every student who will use a software program, while use of images and music for
instructional purposes are generally permissible, so long as the images and music are not posted on the Internet without the
copyright owner’s permission.	


!

A  GAMA  White  Paper  produced  by  Brandon  Wiebe                                                                                          ©  2014.  Gagnier  Margossian  LLP.    All  rights  reserved.  
When	
  a	
  Student	
  Infringes	
  Another’s	
  Copyright	
  Using	
  a	
  School	
  Computer	
  

!

The introduction of Internet access on campus further complicates intellectual property issues for a school. With free access to
the Internet, students may be able to illegally copy and distribute protected works – most notably songs and movies – through
the use of file sharing networks. As the owners and managers of the computers on which the infringement occurred, schools
could potentially face liability in their own right for aiding in that infringement. This is known as “contributory” or “vicarious” liability.	


!

U.S. copyright law does provide a way for colleges and universities to mitigate this risk. If non-profit institutions of higher
education take certain measures, including informing their students about their obligations under copyright laws, they can take
advantage of a “safe harbor” passed as part of the Digital Millennium Copyright Act (DMCA).	


!

There is no similar safe harbor provision targeted directly towards primary and secondary schools. Yet, the DMCA does allow any
organization that provides Internet services to obtain immunity for copyright infringement if the organization follows a detailed list
of procedures.	


!

A copyright attorney can help schools at all levels more fully understand their intellectual property risks and develop strategies to
allay those risks.	


!
Managing	
  Your	
  School’s	
  IP	
  Liabili)es:	
  Adop)ng	
  an	
  IP	
  Policy	
  
!

Every school needs a network or content usage policy. A comprehensive policy will include references to copyright law and will
layout exactly what sort of behavior is and is not permissible on school computers. For example, file sharing through peer-to-peer
networks like BitTorrent should be prohibited, as a school could incur liability if a student engages in copyright infringement using
school property. Similarly, student use of school computers to directly repost or share images or music on the Internet should
generally not be allowed without direct supervision and guidance from teachers.	


!

To put this content usage policy into effect, schools should also take the time to train their faculty and administration on the value
of copyright and other IP law. Teachers should, in turn, make students aware of what activity is permissible online. Such a lesson
could tie in the legal boundaries of copyright law with the moral implications of plagiarism and academic integrity. Teachers can
describe when a student can permissibly quote a book in an essay, use someone else’s photograph in a project or play a popular
song during a presentation. Teachers can also explain to students how students can protect their own original work.	


!

In crafting a comprehensive content policy, schools should rely on the expertise of an intellectual property attorney to help them
understand the nuances of IP law.	


!
Make	
  Copyright	
  Work	
  for	
  You:	
  Mone)zing	
  Your	
  Teaching	
  Materials	
  
!

On the flip side, school districts may be able to use copyright laws to generate additional revenue from their curricula. Many
school districts have already taken advantage of their unique curriculum, lesson plans and instructional tools by packaging and
selling or licensing them to teachers around the country.	


!

While all private schools are probably able to copyright their work, only some public schools around the country will be able to
avail themselves of federal copyright protection. This is because the U.S. Copyright Act specifically does not extend copyright
protection to works created by federal government employees. The law is silent, however, as to the rights of state government
employees, such as public school teachers. Due to this discrepancy, courts have decided that it is up to each state to extend
copyright protection to their government employees.	


!

Some states, such as California, have taken advantage of this and extended copyright protection specifically to educators within
the state. This means that California school districts can use federal copyright law to protect, license and sell their teaching
materials. 	


!

Teachers who wish to sell their curricula should be careful, though, as the school district may actually own the rights to any work a
teacher creates while he or she is on the job. An attorney can help determine copyright ownership and draft effective licensing
agreements that can generate value for all parties involved.
!

Gagnier	
  Margossian	
  LLP	
  provides	
  comprehensive	
  intellectual	
  property	
  and	
  digital	
  strategy	
  counsel	
  for	
  school	
  districts.	
  For	
  more	
  
informa)on,	
  contact	
  consult@gamallp.com	
  or	
  call	
  us	
  at	
  415.766.4591.	
  

!
!
!
!

Internet	

Intellectual Property	

Privacy	

Social Media	

Technology	

The Good Stuff

#nerdlawyers
Los Angeles

Sacramento

San Francisco

T: 415.766.4591	

F: 909.972.1639	

E: consult@gamallp.com	


!
!

gamallp.com	

@gamallp

More Related Content

What's hot

Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013
Cheryl Vann
 
Copyright Clarity: Yes You Can Use Copyrighted Material for Digital Learning
Copyright Clarity: Yes You Can Use Copyrighted Material for Digital LearningCopyright Clarity: Yes You Can Use Copyrighted Material for Digital Learning
Copyright Clarity: Yes You Can Use Copyrighted Material for Digital Learning
Renee Hobbs
 
Copyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part IIICopyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part III
Renee Hobbs
 
The Road to Copyright Clarity, Part 2
The Road to Copyright Clarity, Part 2The Road to Copyright Clarity, Part 2
The Road to Copyright Clarity, Part 2
Renee Hobbs
 
Copyright and online learning at a time of crisis - FIL Online Nov 2020
Copyright and online learning at a time of crisis - FIL Online Nov 2020Copyright and online learning at a time of crisis - FIL Online Nov 2020
Copyright and online learning at a time of crisis - FIL Online Nov 2020
Jane Secker
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Copyright
CopyrightCopyright
Copyright
Craig Nansen
 
Copyright for educators_09v4-presentation
Copyright for educators_09v4-presentationCopyright for educators_09v4-presentation
Copyright for educators_09v4-presentation
Renee Setser
 
Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11
Joyce Kasman Valenza
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5Dara Cepeda, M. Ed.
 
TAFE NSW - Copyright for Educators webinar
TAFE NSW - Copyright for Educators webinarTAFE NSW - Copyright for Educators webinar
TAFE NSW - Copyright for Educators webinar
National Copyright Unit, Education Council
 
Can Students Use Images in their Writing?
Can Students Use Images in their Writing? Can Students Use Images in their Writing?
Can Students Use Images in their Writing?
Renee Hobbs
 
BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade Reading
TuPham99
 
Lesson1 tools for the classroom
Lesson1 tools for the classroomLesson1 tools for the classroom
Lesson1 tools for the classroom
3610Instructor
 
Copyright
CopyrightCopyright
Copyright
MSAD 75
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolioNicole Wingate
 
TAFE NSW - NCU webinar
TAFE NSW - NCU webinarTAFE NSW - NCU webinar
Legal Challenges Of Successful Entrepreneurship In An Internet Age
Legal Challenges Of Successful Entrepreneurship In An Internet AgeLegal Challenges Of Successful Entrepreneurship In An Internet Age
Legal Challenges Of Successful Entrepreneurship In An Internet Agegcecs2009
 

What's hot (20)

Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013Darnell - Wilkes Course ED5001 Oct/2013
Darnell - Wilkes Course ED5001 Oct/2013
 
Copyright Clarity: Yes You Can Use Copyrighted Material for Digital Learning
Copyright Clarity: Yes You Can Use Copyrighted Material for Digital LearningCopyright Clarity: Yes You Can Use Copyrighted Material for Digital Learning
Copyright Clarity: Yes You Can Use Copyrighted Material for Digital Learning
 
Copyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part IIICopyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part III
 
The Road to Copyright Clarity, Part 2
The Road to Copyright Clarity, Part 2The Road to Copyright Clarity, Part 2
The Road to Copyright Clarity, Part 2
 
Cooking up a storm paul haigh
Cooking up a storm paul haighCooking up a storm paul haigh
Cooking up a storm paul haigh
 
Copyright and online learning at a time of crisis - FIL Online Nov 2020
Copyright and online learning at a time of crisis - FIL Online Nov 2020Copyright and online learning at a time of crisis - FIL Online Nov 2020
Copyright and online learning at a time of crisis - FIL Online Nov 2020
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Copyright
CopyrightCopyright
Copyright
 
Copyright for educators_09v4-presentation
Copyright for educators_09v4-presentationCopyright for educators_09v4-presentation
Copyright for educators_09v4-presentation
 
Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-5
 
TAFE NSW - Copyright for Educators webinar
TAFE NSW - Copyright for Educators webinarTAFE NSW - Copyright for Educators webinar
TAFE NSW - Copyright for Educators webinar
 
Can Students Use Images in their Writing?
Can Students Use Images in their Writing? Can Students Use Images in their Writing?
Can Students Use Images in their Writing?
 
BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade Reading
 
Lesson1 tools for the classroom
Lesson1 tools for the classroomLesson1 tools for the classroom
Lesson1 tools for the classroom
 
Copyright
CopyrightCopyright
Copyright
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolio
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
TAFE NSW - NCU webinar
TAFE NSW - NCU webinarTAFE NSW - NCU webinar
TAFE NSW - NCU webinar
 
Legal Challenges Of Successful Entrepreneurship In An Internet Age
Legal Challenges Of Successful Entrepreneurship In An Internet AgeLegal Challenges Of Successful Entrepreneurship In An Internet Age
Legal Challenges Of Successful Entrepreneurship In An Internet Age
 

Similar to GAMABrief: What Every School Needs to Know About Copyright Law

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Copyright for educators
Copyright for educatorsCopyright for educators
Copyright for educators
Texas Master Naturalist
 
Copyright and fair use
Copyright and fair useCopyright and fair use
Copyright and fair use
DrJasonBeach
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4Dara Cepeda, M. Ed.
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
Issues In School Libraries Copyright & Access
Issues In School Libraries  Copyright & AccessIssues In School Libraries  Copyright & Access
Issues In School Libraries Copyright & Access
lindaalv
 
Copyright
CopyrightCopyright
CopyrightNZshare
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpointEdtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpointDara Cepeda, M. Ed.
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentationYvetteBarron01
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpointEdtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpointDara Cepeda, M. Ed.
 
Copyright crash course
Copyright crash courseCopyright crash course
Copyright crash course
Dara Cepeda, M. Ed.
 
Casanova juanitap.~edtc6340.65copyrightrevision4
Casanova juanitap.~edtc6340.65copyrightrevision4Casanova juanitap.~edtc6340.65copyrightrevision4
Casanova juanitap.~edtc6340.65copyrightrevision4
jpc6760
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3jpc6760
 
Copyright in the classroom
Copyright in the classroomCopyright in the classroom
Copyright in the classroom
ldarin
 
Copyright policy critique
Copyright policy critiqueCopyright policy critique
Copyright policy critiqueLaurie Roberts
 
Edtc 6340-66 copyright crash course alberto tudon
Edtc 6340-66 copyright crash course  alberto tudonEdtc 6340-66 copyright crash course  alberto tudon
Edtc 6340-66 copyright crash course alberto tudon
albertotudon
 
Copyright crashcourse coram(3)6340.64
Copyright crashcourse coram(3)6340.64Copyright crashcourse coram(3)6340.64
Copyright crashcourse coram(3)6340.64Cora Mendez
 
Copyright
CopyrightCopyright
Copyright
secretsvicky
 
Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3
jpc6760
 
Copyright and fair use in education
Copyright and fair use in educationCopyright and fair use in education
Copyright and fair use in education
ArlenePowellEscoffer
 

Similar to GAMABrief: What Every School Needs to Know About Copyright Law (20)

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Copyright for educators
Copyright for educatorsCopyright for educators
Copyright for educators
 
Copyright and fair use
Copyright and fair useCopyright and fair use
Copyright and fair use
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Issues In School Libraries Copyright & Access
Issues In School Libraries  Copyright & AccessIssues In School Libraries  Copyright & Access
Issues In School Libraries Copyright & Access
 
Copyright
CopyrightCopyright
Copyright
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpointEdtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentation
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpointEdtc 6340.66 dara_cepeda_copyrightcc_powerpoint
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint
 
Copyright crash course
Copyright crash courseCopyright crash course
Copyright crash course
 
Casanova juanitap.~edtc6340.65copyrightrevision4
Casanova juanitap.~edtc6340.65copyrightrevision4Casanova juanitap.~edtc6340.65copyrightrevision4
Casanova juanitap.~edtc6340.65copyrightrevision4
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3
 
Copyright in the classroom
Copyright in the classroomCopyright in the classroom
Copyright in the classroom
 
Copyright policy critique
Copyright policy critiqueCopyright policy critique
Copyright policy critique
 
Edtc 6340-66 copyright crash course alberto tudon
Edtc 6340-66 copyright crash course  alberto tudonEdtc 6340-66 copyright crash course  alberto tudon
Edtc 6340-66 copyright crash course alberto tudon
 
Copyright crashcourse coram(3)6340.64
Copyright crashcourse coram(3)6340.64Copyright crashcourse coram(3)6340.64
Copyright crashcourse coram(3)6340.64
 
Copyright
CopyrightCopyright
Copyright
 
Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3
 
Copyright and fair use in education
Copyright and fair use in educationCopyright and fair use in education
Copyright and fair use in education
 

More from Christina Gagnier

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
Christina Gagnier
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
Christina Gagnier
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
Christina Gagnier
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
Christina Gagnier
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
Christina Gagnier
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Christina Gagnier
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
Christina Gagnier
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
Christina Gagnier
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
Christina Gagnier
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
Christina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Christina Gagnier
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
Christina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
Christina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
Christina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
Christina Gagnier
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
Christina Gagnier
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
Christina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
Christina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Christina Gagnier
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
Christina Gagnier
 

More from Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

GAMABrief: What Every School Needs to Know About Copyright Law

  • 1. GAMABrief: What Every School Needs to Know About Copyright Law Introduc)on   ! Technology in the classroom is nothing new, but with the rise of smartphones, smart boards and tablet computing, the way teachers and students use and engage with media continues to grow and evolve. Any time educational content is used, shared or created, whether by teachers or by students, IP laws and, specifically, copyright laws, are implicated. Administrators, teachers and students must all be aware of what activity is freely permissible under U.S. Copyright Law, and what sort of activities might run afoul of the law. ! Copyright  Basics   ! U.S. copyright law protects a work from the moment it is created, or “fixed,” in a tangible medium of expression. Copyright protection ensures that only the author or creator of the work has the right to reproduce, transmit, distribute, perform and make derivative copies of the work. “Works” that can be protected by copyright law include things like books, photographs, films, drawings, paintings, musical works, sound recordings, sculptures and even computer code. ! Since teaching demands the use and reproduction of books, pictures, films and other media, both in hard copy forms and online, it is imperative that schools be aware of what sort of media are being consumed. ! Sharing  Media  in  the  Classroom:  The  Do’s  &  Don’ts  for  Teachers   ! With schools facing rising costs and stretched budgets, it is important for teachers to know when it is permissible to photocopy a book, include photos in presentations or show a film to a class without first paying a licensing fee or obtaining consent from the creator. ! Generally speaking, any time a teacher copies a book without the author’s permission, the teacher has infringed the author’s work. Yet, U.S. copyright law makes room for many uses of copyrighted work under a legal doctrine known as “fair use.” Essentially, the doctrine permits individuals to use portions of another’s copyrighted work, so long as the use does not harm the original author in any way. ! Determining whether a use is “fair” is notoriously difficult, and different courts will often come to different conclusions on the same set of facts. The following is a general guideline set of guidelines that teachers can use to determine whether their use of material for the classroom is “fair.” ! For  video  media:  Using DVDs, videotapes or tapes made from television broadcasts in an instructional setting (i.e. a classroom) is generally permissible. Using video media in a multipurpose room or for a student movie club is not permissible without prior authorization from the copyright owner. ! For   print   media: Making a photocopy for each student in the classroom of shorter works (less than 2,500 words) is permissible. For longer works, making a photocopy of no more than 10% of the work is generally permissible. But, making photocopies from a book that was not acquired legally, regardless of how much is copied, will run afoul of copyright laws. ! For  other  media: Other media such as software, music and images present even more complex issues. Generally, a school must acquire educational software licenses for every student who will use a software program, while use of images and music for instructional purposes are generally permissible, so long as the images and music are not posted on the Internet without the copyright owner’s permission. ! A  GAMA  White  Paper  produced  by  Brandon  Wiebe                                                                                          ©  2014.  Gagnier  Margossian  LLP.    All  rights  reserved.  
  • 2. When  a  Student  Infringes  Another’s  Copyright  Using  a  School  Computer   ! The introduction of Internet access on campus further complicates intellectual property issues for a school. With free access to the Internet, students may be able to illegally copy and distribute protected works – most notably songs and movies – through the use of file sharing networks. As the owners and managers of the computers on which the infringement occurred, schools could potentially face liability in their own right for aiding in that infringement. This is known as “contributory” or “vicarious” liability. ! U.S. copyright law does provide a way for colleges and universities to mitigate this risk. If non-profit institutions of higher education take certain measures, including informing their students about their obligations under copyright laws, they can take advantage of a “safe harbor” passed as part of the Digital Millennium Copyright Act (DMCA). ! There is no similar safe harbor provision targeted directly towards primary and secondary schools. Yet, the DMCA does allow any organization that provides Internet services to obtain immunity for copyright infringement if the organization follows a detailed list of procedures. ! A copyright attorney can help schools at all levels more fully understand their intellectual property risks and develop strategies to allay those risks. ! Managing  Your  School’s  IP  Liabili)es:  Adop)ng  an  IP  Policy   ! Every school needs a network or content usage policy. A comprehensive policy will include references to copyright law and will layout exactly what sort of behavior is and is not permissible on school computers. For example, file sharing through peer-to-peer networks like BitTorrent should be prohibited, as a school could incur liability if a student engages in copyright infringement using school property. Similarly, student use of school computers to directly repost or share images or music on the Internet should generally not be allowed without direct supervision and guidance from teachers. ! To put this content usage policy into effect, schools should also take the time to train their faculty and administration on the value of copyright and other IP law. Teachers should, in turn, make students aware of what activity is permissible online. Such a lesson could tie in the legal boundaries of copyright law with the moral implications of plagiarism and academic integrity. Teachers can describe when a student can permissibly quote a book in an essay, use someone else’s photograph in a project or play a popular song during a presentation. Teachers can also explain to students how students can protect their own original work. ! In crafting a comprehensive content policy, schools should rely on the expertise of an intellectual property attorney to help them understand the nuances of IP law. ! Make  Copyright  Work  for  You:  Mone)zing  Your  Teaching  Materials   ! On the flip side, school districts may be able to use copyright laws to generate additional revenue from their curricula. Many school districts have already taken advantage of their unique curriculum, lesson plans and instructional tools by packaging and selling or licensing them to teachers around the country. ! While all private schools are probably able to copyright their work, only some public schools around the country will be able to avail themselves of federal copyright protection. This is because the U.S. Copyright Act specifically does not extend copyright protection to works created by federal government employees. The law is silent, however, as to the rights of state government employees, such as public school teachers. Due to this discrepancy, courts have decided that it is up to each state to extend copyright protection to their government employees. ! Some states, such as California, have taken advantage of this and extended copyright protection specifically to educators within the state. This means that California school districts can use federal copyright law to protect, license and sell their teaching materials. ! Teachers who wish to sell their curricula should be careful, though, as the school district may actually own the rights to any work a teacher creates while he or she is on the job. An attorney can help determine copyright ownership and draft effective licensing agreements that can generate value for all parties involved.
  • 3. ! Gagnier  Margossian  LLP  provides  comprehensive  intellectual  property  and  digital  strategy  counsel  for  school  districts.  For  more   informa)on,  contact  consult@gamallp.com  or  call  us  at  415.766.4591.   ! ! ! ! Internet Intellectual Property Privacy Social Media Technology The Good Stuff #nerdlawyers Los Angeles Sacramento San Francisco T: 415.766.4591 F: 909.972.1639 E: consult@gamallp.com ! ! gamallp.com @gamallp