Educause Security Discussion mailing list archives

Re: FW: Notice of Copyright Infringement, Case #: U213042791


From: Frank Barton <bartonf () HUSSON EDU>
Date: Wed, 1 Jun 2016 13:02:45 -0400

Paul, we are looking at a registration system, do you mind sharing what you
use to have students register devices?

Thank You
Frank

On Wed, Jun 1, 2016 at 12:43 PM, Paul Chauvet <chauvetp () newpaltz edu> wrote:

Hi Frank,



When one of these is received, the student is put into a separate VLAN
(wireless or wired) that can only get to academically critical systems such
as the LMS.  If it is their first time, they just have to sign a document
that states that they are aware of the policy (but do not have to admit
guilt or culpability) before getting back online.  They’re advised that the
Help Desk can assist them in disabling any file sharing applications if
needed, and should avoid sharing any passwords.  This information is not
shared outside of IT.



Any subsequent incidents for the same student are referred to Student
Affairs.  Network access is restored upon notification from Student Affairs.



IPs are tracked based on who is logged in (via wireless/wired) at the
time.  We do not NAT students so each student device has a public IPv4
address, which can be tied (via authentication, or via registration) to a
student.



The takedown notices are shared with the students, and (if it isn’t a
first notice) with Student Affairs).



Paul Chauvet

Information Security Officer

State University of New York at New Paltz

845-257-3828

chauvetp () newpaltz edu

[image: emlogo]



*From:* The EDUCAUSE Security Constituent Group Listserv [mailto:
SECURITY () LISTSERV EDUCAUSE EDU] *On Behalf Of *Frank Barton
*Sent:* Wednesday, June 1, 2016 9:53 AM
*To:* SECURITY () LISTSERV EDUCAUSE EDU
*Subject:* Re: [SECURITY] FW: Notice of Copyright Infringement, Case #:
U213042791



This actually is a great segway into the question: how do different
institutions address these takedown notices? are the original takedowns
made public? are there disciplinary consequences to the alleged infringer?
how do you track down who is doing the alleged infringing? (external IP to
internal, IP to person, etc?)



Thank You

Frank



On Wed, Jun 1, 2016 at 9:47 AM, Kevin Wilcox <wilcoxkm () appstate edu>
wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On 1/6/16 09:16, Wendell McCarty wrote:

My apologies to everyone,  my outlook auto suggest selected the
wrong security@ email address.

Please ignore my previous message

Wendell - at least now there is publicly-available, archived proof
that you respond to DMCA takedown notices in a timely fashion!

kmw
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAldO53QACgkQsKMTOtQ3fKGCCACdFlqBTNP9J3/wSsrt+unWREAM
WDYAmwaPRlfOop6AzO8ce7PoK8s3PDUf
=0ODi
-----END PGP SIGNATURE-----





--

Frank Barton

ACMT

IT Systems Administrator

Husson University




-- 
Frank Barton
ACMT
IT Systems Administrator
Husson University


Current thread: