Copyright

Copyright:

As a community of artists, writers, musicians, filmmakers and scholars whose careers will be spent creating intellectual property, we encourage our entire community to respect the property of others.  Downloading anything onto your machine from untrustworthy P2P (peer-to-peer) sources or Web sites not only exposes you to viruses, worms and spyware, but often violates the Copyright laws, and can lead to suspension of network privileges, or to lawsuits from Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA), or the Business Software Alliance (BSA).  Please remember that theft is a crime, and that nothing in cyberspace is truly anonymous.

Copyright protections are created when words are put on paper, transmitted via e-mail, when music is recorded, software is written, or when an image is created.  Once done, the work is protected by copyright - no formal copyright registration or seal is required for copyright protection to be in effect.  If someone else wants to use the work, they must get permission from its creator.

Copyrighted material includes almost all forms of original expression fixed in tangible medium even if no formal copyright notice is filed or attached.  However, you cannot copyright any idea, process, system, method of operation, concept or principle, regardless of the form in which it is described. 

Copyright infrigement is any reproduction (download), display, distribution (upload), creation of derivative works, or public performance of copyrighted work without permission of the copyright owner.

Federal Copyright Law and College Policy prohibit the copying and/or distribution of copyrighted material without the permission of the copyright owner. Copyrighted materials include but are not limited to text, graphics, art, photographs, music, film, and software. 

Peer-to-peer (P2P) software such as BitTorrent that is often used to share music, movies and other media may lead to violation of copyright lawa.  Most P2P software automatically shares anything that you download by default - so if you downloaded the latest Hollywood blockbuster to watch it , you would also be helping to distribute an illegal copy to others by sharing the contents of your machine with the world.

If you use any P2P software for legitimate purposes, as a security precaution, you should disable its file sharing component.  There is an IU Web site with details on disabling file-sharing for most P2P software: http://protect.iu.edu/cybersecurity/safeonline/filesharing/disable


Digital Millennium Copyright Act (DMCA)

The DMCA can be reviewed at: http://www.copyright.gov/legislation/dmca.pdf

An overview of the act can be found at: http://www.arl.org/pp/ppcopyright/copystatutes/lutzker.shtml

To report alleged copyright infringements on Purchase College computers, please contact the College's designated DMCA Agent:

Bill Junor
Director of Campus Technology  Services 
Purchase College, SUNY
735 Anderson Hill Rd.
Purchase, NY 10577
Tel. 914.251.6460
Fax 914.251.6476



Purchase College DMCA Notification Policy / Procedure for DMCA Infringement Reports - September 2008

Pursuant to the provisions of the Digital Millennium Copyright Act, Purchase College receives DMCA Copyright Infringement Notices alleging that computer(s) registered to Purchase College IP addresses are allegedly illegally infringing on copyrighted materials belonging to others.  Infringement of copyright is a violation of Federal law, and the violator is subject to both substantial fines and civil damages.

Under the DMCA, as an Internet Service Provider (ISP), the College is obligated to expeditiously remove or disable the allegedly infringing material and notify the subscriber of its actions in what is referred to as “notice and take down procedure.”  The Purchase College DMCA Infringement Procedure is as follows: 

1. RIAA, MPAA and various agents report alleged copyright infringements to the college’s named DMCA agent, CTS.

2. CTS identifies the computer, the room, and the owner of the computer, and records the DMCA case number, name, other information in a DMCA incident report ticket.

3. CTS places the computer in question into a restricted network

4. The computer owner’s name is forwarded to the Vice President of Student Affairs and to the Office of Community Standards in the form of a DMCA Violation Letter that includes the specific information contained in the Violation Notice received by the College.

5. Student Affairs Refers student to the Office of Community Standards for possible disciplinary action.

6. VP Student Affairs or the Office of Community Standards will notify CTS if/when the individual’s computer should be removed from the restricted network once the Office of Community Standards has completed its process.

The College also recommends  that all students take the University of Texas Copyright Crash Course, take their Copyright Tutorial, or take other appropriate steps to further their understanding of copyright infringement.


Counter Notice

Under the DMCA, the College is obligated to inform you of certain requirements of that Act.  You have the right under the Act to send a counter notice that you are not in violation or that the violation has ceased.  That notice must be in the form required by the Act, and you are advised to seek legal counsel at your expense for appropriate advice on the form of any counter-notice.  The specific statutory language is as follows: (17 USC 512(g)(3)): Contents of Counter-Notification: To be effective under this subsection, a counter notification must be a written communication provided to the service provider’s designated agent that includes substantially the following:

(A)          A physical or electronic signature of the subscriber.
(B)           Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled.
(C)           A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled.
(D)          The subscriber’s name, address, and telephone number, and a statement that the subscriber consents to the jurisdiction of Federal District Court for the judicial district in which the address is located, or if the subscriber’s address is outside of the United States, for any judicial district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notification under subsection ©(1)© or an agent of such person.

The above is provided for your information only, not as advice, nor is it an attempt at stating the law or your responsibility.  You should review the entire Act with your attorney. 


College Computer Network Users: if you lose access due to an alleged violation

If you receive an official notice from the College of an alleged copyright violation and have had your network access restricted, please contact the Office of Student Affairs to find out how you can have your network access restored:

Office of the Vice President
for Student Affairs
Student Services 316L
Purchase College
735 Anderson Hill Rd.
Purchase, NY 10577-1400
(914) 251-6030
Fax: (914) 251-6034
student-affairs@purchase.edu

 


CTS Knowledge Base

CTS Work Order System

New* Manage Your Mailbox Space (2014)

Email Password Reset (Student)

Email Password Reset (Faculty/Staff)

Self Service Reset Password Manager (SSRPM)

CTS
SS0025 Basement
Mon-Thur 8am-9:45pm
Fri 8am-6:45pm
(summer 2013 Fridays open until 5 pm)
Monday-Friday from 8am-5pm when no classes in session
Purchase College
735 Anderson Hill Rd.
Purchase, NY 10577-1400
Tel (914) 251-6465
Fax (914) 251-6493