HEOA Copyright and P2P File Sharing Requirements

This page outlines Michigan Tech's plan to comply with the Higher Education Opportunity Act (HEOA) relating to digital copyright infringement and P2P File Sharing by users of the institution's network.

Technology-based Deterrents

  • Michigan Tech deploys bandwidth management devices at the campus network border.
  • Michigan Tech severely rate limits common P2P protocols and applications to limit the impact these aggressive protocols have on the performance of the campus network. Our vendor provides regular update patches as new applications/protocols become known. Michigan Tech applies patches on all network equipment as they become available – subject to scheduling constraints.
  • See "Procedures for Handling Unauthorized Distribution of Copyrighted Material" below.

Community Education and Annual Disclosure

  • Michigan Tech's primary education emphasis occurs at week long new student orientation sessions.
  • Michigan Tech brings in an outside legal authority on online activities, including illegal copyright use, to conduct a mandatory session during orientation. This is supported by optional attendance sessions on the use of our IT services where these topics are emphasized again.

Procedures for Handling Unauthorized Distribution of Copyrighted Material

  • When DMCA violations are received, IT handles the University's initial response.
  • IT will forward a copy of the DMCA notice to the idnetified student.
  • IT copies the notice to the Office of Academic and Community Conduct. This will be placed in the student's conduct file with their office.

Periodic Review of Plan and Assessment Criteria

  • The number and severity of alleged DMCA violations are reviewed annually.
  • Technical deterrents are reviewed annually by the network engineering staff under the direction of the Director of Telecommunications to determine if the technical deterrents remain effective in limiting undesirable traffic.
  • New technology that becomes available is reviewed periodically for deployment by the University's network engineering staff.

Offering Alternatives to Illegal File Sharing

Plan created: June 2010
Plan last reviewed/updated:3/30/16