Main Menu

Shepherd’s Copyright Policies and Procedures

To encourage students to use legal methods for acquiring copyrighted materials, Shepherd University has implemented the following policies and procedures:

– Copyright infringement and other illegal activities are prohibited under the Acceptable Usage Policy. Violation could result in disciplinary action through the student judicial system, or through the methods described in the Faculty Handbook or Staff Handbook (as appropriate).

– Periodically, we review a summary of the highest bandwidth users. Users with machines that are infected or who have engaged in suspected infringement activities have their network access revoked until their machines can be cleaned of infections. Suspected copyright violators must discuss their activities with the IT Services director before network access is restored.

– Students with machines that fail our network registration process may bring them in to be cleaned, at no cost. Malicious software (often embedded in and delivered with peer-to-peer file sharing software) is also removed. Removal of peer-to-peer software used for copyright infringement is encouraged for all, and required of those whose network access has been revoked for suspected copyright infringement.

– Access to specific types (network ports) of Internet traffic is blocked by default, and open when necessary (e.g., for web, IM, gaming, etc.). Besides reducing the load placed on our network by peer-to-peer traffic, this also reduces the distribution of malicious software. Students and others needing specific ports opened up for legal academic or recreational purposes may request this of IT Services. (For example, playing a massively multi-user online role playing game, but not for downloading the latest action movie before it’s released on DVD.)

You can view a complete and detailed list of guidelines and procedures via the Policies and Procedures link on our website.

Return to Copyright page