Policies and Guidelines
The Higher Education Opportunity Act (HEOA)
In summary, the Act stipulates that each institution must:
Use technology-based deterrents
The University of Houston uses several technologies to track down
copyright violations. Historically, UH has employed packet shaping and
band width monitoring to limit and find illegal file sharing systems.
Currently, we review and correlate logs collected to assist in finding
violators. Once found, the violator is informed of his infraction and
notified of his responsibility to cease and desist. In the Fall of 2010,
the University of Houston will be implementing a new technology tool
(Red Lambda Integrity software) to aid in this effort.
Have policies in place
The University of Houston prints and distributes its Student Handbook
yearly to all faculty, staff and students. Included in the handbook is
the university's policy on Copyright Laws. This section refers to the
University of Houston System Administrative Memoranda (SAM) Number:
07.A.04 Digital Millennium Copyright Act. This is the official policy
for the University of Houston System. To better inform students as to
the consequences, a change in language is planned for the next edition
of the Student Handbook.
Conduct Educational Programs
The University of Houston offers the Computer Security Awareness
Training for Students (CSATS) program. This program is designed to
ensure students are aware of computer security issues including
illegally downloading music. The program also provides information
about how to download music and other copyrighted information safely and
legally without violating the Digital Millennium Copyright Act (DMCA).
The handout material for the students includes a listing of sites where
students can legally download music and other copyrighted material.
Have a procedure for handling reports of copyright infringement including disciplinary procedures.
All reports of illegal file sharing and/or copyright infringement are
investigated by the university's information security group. If
warranted, the Dean of Students Office or the Human Resources Department
is engaged in disciplinary action.
Have procedures in place to periodically review the effectiveness of the approaches being used
The effectiveness of this program is reviewed monthly by the University
Information Technology Information Security Group. This is a Key
Performance Indicator (KPI) for that group. In addition, monthly
reports are made to the State of Texas Department of Information
Resources and the outcome of this program is included in the Annual
Information Security Report which is reviewed by the senior leadership
of the university.
Have legal Alternatives for the Students to use
The University of Houston not only provides a list of legal alternatives
in our policy and education programs but we also provide convenient
access through our iTunesU service.
