Basic information and resources for students, faculty, and staff.
Subjects: General Guides

Information Technology Services

Shepherd University's Information Technology Services maintains web pages to inform students about unauthorized sharing of copyrighted material.  These pages can be found through the link below.

ILL

Scarborough Library's Interlibrary Loan Request form requires patrons to state whether they do or do not agree with the copyright restrictions specified--namely that the requested materials are to be used for private study, scholarship, or research.

Course Reserves

Scarborough Library's Course Reserve Form requires instructors to sign a statement that their reserve materials comply with Section 107 of the Copyright Law, otherwise known as fair use.

IT Services Acceptable Use Policy

From the IT Services Acceptable Use Policy:

You have been assigned an account for completing assigned classwork, the purpose stated on the "Shepherd University Computer Account Request Form", or the required duties of your position. This resource is a privilege, not a right, and as such may be revoked if your use:

...

3) violates software licensing agreements,

4) violates any law, including but not limited to copyright, obscenity, or defamation law;

...

Shepherd University may take disciplinary action, which may include, but is not necessarily limited to:

1) recommendations for suspension or termination,

2) legal action to recover damages,

3) referral to law enforcement authorities.


The University reserves the right to suspend or revoke, with or without advance notice, any account when necessary for an administrative purpose.

This policy may be changed at any time without prior notice, and may be viewed via Rail.

IT Services Copyright Policies and Procedures

From the IT Services Copyright Policies and Procedures Page:

To encourage students to use legal methods for acquiring copyrighted materials, Shepherd University has implemented the following policies and procedures:

• Copyright infringement and other illegal activities are prohibited under the Acceptable Usage Policy. Violation could result in disciplinary action through the student judicial system, or through the methods described in the Faculty Handbook or Staff Handbook (as appropriate).

• Periodically, we review a summary of the highest bandwidth users. Users with machines that are infected or who have engaged in suspected infringement activities have their network access revoked until their machines can be cleaned of infections. Suspected copyright violators must discuss their activities with the IT Services director before network access is restored.

• Students with machines that fail our network registration process may bring them in to be cleaned, at no cost. Malicious software (often embedded in and delivered with peer-to-peer file sharing software) is also removed. Removal of peer-to-peer software used for copyright infringement is encouraged for all, and required of those whose network access has been revoked for suspected copyright infringement.

• Access to specific types (network ports) of Internet traffic is blocked by default, and open when necessary (e.g., for web, IM, gaming, etc.). Besides reducing the load placed on our network by peer-to-peer traffic, this also reduces the distribution of malicious software. Students and others needing specific ports opened up for legal academic or recreational purposes may request this of IT Services. (For example, playing a massively multi-user online role playing game, but not for downloading the latest action movie before it’s released on DVD.)