Main Menu

Technical Methods

Shepherd University uses several technical methods to reduce the copyright infringement activity on its network. One or more technical methods must be employed, pursuant to the Code of Federal Regulations that enforce the HEOA. As of 2009, those methods include bandwidth shaping ()giving lower priority to traffic commonly associated with copyright infringement) and reviewing of the highest bandwidth users on a periodic basis. The review of highest bandwidth users is strictly to discover malicious software (Trojans, spambots, etc.) and those computers that detrimentally affect network performance for other users.

No detailed information is kept longer than is necessary to perform the task. Bandwidth shaping allocates the highest priority traffic to web browsing, email, and streaming media such as YouTube. Interactive gaming and related tasks receive medium priority. Peer-to-peer networking and unrecognized traffic receives the lowest priority.

Return to Copyright page