Educause Security Discussion mailing list archives
Re: HEOA Question
From: Steve Worona <sworona () EDUCAUSE EDU>
Date: Tue, 1 Feb 2011 17:42:13 -0500
On the narrow question of "technology-based deterrents", there are four recognized categories:
1. Bandwidth shaping 2. Traffic monitoring to identify the largest bandwidth users3. A vigorous program of accepting and responding to Digital Millennium Copyright Act (DMCA) notices 4. A variety of commercial products designed to reduce or block illegal file sharing
Your plan to combat infringement must include one or more of these. See <http://www.educause.edu/heoa> for more details. Steve -- Steven L. Worona Senior Policy Director EDUCAUSE / 1150 18th St. NW suite 900 / Washington, DC 20036 202-331-5358 / 202-872-4318 fax sworona () educause edu http://www.educause.edu/blog/1033 @SLWorona ----- At 8:43 AM -0700 1/31/11, SCHALIP, MICHAEL wrote:
As an ex-fed myself - I always wonder about compliance with unfunded mandates like HEOA. But - aren't the possible "responses" such that network logs, etc. just one route?.....do you *have* to do the logging thing? There are other "technology-based deterrents" that could be pursued, right?
Current thread:
- HEOA Question William Derwostyp (Jan 31)
- Re: HEOA Question Matthew Gracie (Jan 31)
- Re: HEOA Question Eme Ejike (Jan 31)
- Re: HEOA Question Kevin Wilcox (Jan 31)
- Re: HEOA Question SCHALIP, MICHAEL (Jan 31)
- Re: HEOA Question Steve Worona (Feb 01)
- Re: HEOA Question Bulanda, Dave G (Jan 31)
- Re: HEOA Question Gioia, Matthew P. (Jan 31)
- Re: HEOA Question Bulanda, Dave G (Jan 31)
- Re: HEOA Question Harry E Flowers (flowers) (Feb 02)
- Re: HEOA Question Dave Inman (Feb 03)
- Re: HEOA Question Gioia, Matthew P. (Jan 31)
- Re: HEOA Question Matthew Gracie (Jan 31)
- Re: HEOA Question Cal Frye (Jan 31)
- Re: HEOA Question Jacobson, Dick (Jan 31)
- Re: HEOA Question Dexter Caldwell (Jan 31)
- Re: HEOA Question Jacobson, Dick (Jan 31)