Educause Security Discussion mailing list archives

Re: HEOA Question


From: Steve Worona <sworona () EDUCAUSE EDU>
Date: Tue, 1 Feb 2011 17:42:13 -0500

On the narrow question of "technology-based deterrents", there are four recognized categories:

   1. Bandwidth shaping
   2. Traffic monitoring to identify the largest bandwidth users
3. A vigorous program of accepting and responding to Digital Millennium Copyright Act (DMCA) notices 4. A variety of commercial products designed to reduce or block illegal file sharing

Your plan to combat infringement must include one or more of these.

See <http://www.educause.edu/heoa> for more details.

Steve
--
Steven L. Worona
Senior Policy Director
EDUCAUSE / 1150 18th St. NW suite 900 / Washington, DC 20036
202-331-5358 / 202-872-4318 fax
sworona () educause edu http://www.educause.edu/blog/1033 @SLWorona
-----
At 8:43 AM -0700 1/31/11, SCHALIP, MICHAEL wrote:
As an ex-fed myself - I always wonder about compliance with unfunded mandates like HEOA. But - aren't the possible "responses" such that network logs, etc. just one route?.....do you *have* to do the logging thing? There are other "technology-based deterrents" that could be pursued, right?


Current thread: