Shepherd University logo Information Technology
Services
SEARCH    
Home | About | Undergraduate | Graduate | Prospective | Current | Athletics | Alumni | Faculty/Staff   


I. T. Services


For Students

For Faculty/Staff

I. T. Services Policies and Procedures

Frequently Asked Questions

About Us and Contacts



Technical Methods

Shepherd University uses several technical methods to reduce the copyright infringement activity on its network. One or more technical methods must be employed, pursuant to the Code of Federal Regulations that enforce the HEOA. As of 2009, those methods include bandwidth shaping (giving lower priority to traffic commonly associated with copyright infringement) and reviewing of the highest bandwidth users on a periodic basis. The review of highest bandwidth users is strictly to discover malicious software (Trojans, spambots, etc.) and those computers that detrimentally affect network performance for other users.

No detailed information is kept longer than is necessary to perform the task. Bandwidth shaping allocates the highest priority traffic to web browsing, email, and streaming media such as YouTube. Interactive gaming and related tasks receive medium priority. Peer-to-peer networking and unrecognized traffic receives the lowest priority.




Shepherd University | I. T. Services | P.O. Box 5000 | Shepherdstown, WV | 25443-5000
User Support Desk 304-876-5457 | Main Number 304-876-5245 | email: support@shepherd.edu