US Environmental Protection Agency Office of Environmental Information GUIDELINES



Similar documents
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION

Software Asset Management Guide

Anchor Bay Schools Software Policy

Software Piracy: What You Should Know

Software Licensing and Compliance Guide

All individuals with access to Twin Falls School District technology and computer networks will:

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

THREE RIVERS COMMUNITY COLLEGE INFORMATION TECHNOLOGY REGULATION

University of Hartford. Software Management and Compliance Guidelines

Responsible Use of Technology and Information Resources

SUBSCRIPTION SERVICES.

Caldwell Community College and Technical Institute

Workplace Policies. Computer Software (Unauthorized Copying)

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006)

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

Software compliance policy

MDM Zinc 3.0 End User License Agreement (EULA)

4.0 ISSUANCE OF REGULATIONS/STANDARD OPERATING PROCEDURES

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

ecopy Business Automation Services Software License Agreement

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

Chicago State University Computer Usage Policy

3. Electronic Mail ( )

Internet Acceptable Use and Software Installation Policy

Software Asset Management Toolkit

COLLINS CONSULTING, Inc.

III. RESPONSIBILITIES

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff

Information Technology Security Policies

DIOCESE OF DALLAS. Computer Internet Policy

COMPUTER AND NETWORK USAGE POLICY

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Valdosta State University. Information Resources Acceptable Use Policy

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

Information Resources Security Guidelines

DRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND

U.S. Chemical Safety and Hazard Investigation Board

Grand Rapids Public Schools

Riverside School Board

Department of Homeland Security Management Directives System MD Number: Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT

DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.

Software Policy. Software Policy. Policy and Guidance. June 2013

Franklin Technology Center s Code of Conduct

MUSIC, VIDEO AND SOFTWARE PIRACY POLICY

Code of Business Conduct and Ethics THE WOODBRIDGE WAY. integrity honesty respect responsibility

AP 417 Information and Communication Services

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY

Insider Trading Policy

Technology Department 1350 Main Street Cambria, CA 93428

MOTORCAR PARTS OF AMERICA, INC. CODE OF BUSINESS CONDUCT AND ETHICS ADOPTED EFFECTIVE JANUARY 15, 2015

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Information Technology Acceptable Use Policy

THE SOFTWARE MAY NOT BE SOLD, TRANSFERRED, OR FURTHER DISTRIBUTED EXCEPT AS AUTHORIZED BY LICENSOR.

North Clackamas School District 12

University of South Wales Software Policies

How to protect yourself. against piracy

VIETNAM LAWS ONLINE DATABASE License Agreement Multi-user Subscription

Whitefish School District. PERSONNEL 5510 page 1 of 5 HIPAA

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Riverside Community College District Policy No General Institution

State and Local Sales and Compensating Use Taxes Imposed on Certain Sales of Computer Software

RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES

CSCA0101 Computing Basics CSCA0101 COMPUTING BASICS. Chapter 7 Software

Delaware State University Policy

SM ENERGY COMPANY CODE OF BUSINESS CONDUCT AND CONFLICT OF INTEREST POLICY

CODE OF ETHICS AND BUSINESS CONDUCT

SAMPLE RETURN POLICY

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

Defending Your Organization from the Software Police

Trelligence, Inc. Reseller Agreement

Herscher Community Unit School District #2. PURCHASE ORDER POLICIES and PROCEDURES

.scot Registration Policy

IMPLEMENTATION DETAILS

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

Sempra Energy Corporate Compliance and Ethics Plan This page is managed by the Director of Business Conduct (Last revised on )

END USER LICENSE AGREEMENT ( EULA )

DOT.Comm Oversight Committee Policy

BRIGHAM AND WOMEN S HOSPITAL

Acceptable Use Policy

Odessa College Use of Computer Resources Policy Policy Date: November 2010

DUUS Information Technology (IT) Acceptable Use Policy

LiveOn Web Conference System Service Terms of Use

Sole Ownership Partnership Corporation Part A. General Information

How to Survive a Software Audit through Effective Software Management. By John Tomeny, Sassafras Software Inc.

Business Conduct, Compliance and Ethics Program. important

Maintenance and Support Agreement

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

Business Software Certification Programme

JOINT AGREEMENT ON GUIDANCE ON DISCIPLINARY PROCEDURES IN FURTHER EDUCATION COLLEGES

Acceptable Use Policy

Transcription:

US Environmental Protection Agency Office of Environmental Information GUIDELINES for the Software Management and Piracy Policy June 2003 IO 2104-G-01.0 (no former number) Purpose: Audience: The Environmental Protection Agency s (EPA) Software Management and Piracy Policy requires EPA to acquire, manage, and use computer software in compliance with applicable laws and licensing restrictions to guard against use of counterfeit software or software that violates licensing restrictions. Mismanagement of copyrighted and/or licensed computer software conflicts with fundamental government and EPA values regarding the protection of intellectual property. These guidelines, based on the Federal IO (hief Information Officer) ouncil s guidelines, give recommendations for implementing the Policy and Executive Order 13103 on omputer Software Piracy. These guidelines for implementing the Agency s Software Management and Piracy Policy are for use by all EPA personnel, agents or others authorized to work or conduct business: in an EPA facility, in a flexiplace work arrangement, or from any other remote location while conducting authorized EPA activities. These guidelines also are applicable to, and may be used by, EPA contractors and recipients of EPA financial assistance, such as grants, Interagency Agreements (IAGs), and loans. Related Environmental Protection Agency s (EPA) Software Management and Documents: Piracy Policy (Agency Directive 2165.1 - May 15, 2003) Policy and Executive Order 13103 on omputer Software Piracy ( http://www.gsa.gov/attachments/gsa_publiations/extpub/19.pdf ) EPA s Directive 2100, IRM Policy Manual EPA Directive 2195 A1, EPA Information Security Manual EPA Delegation of Authority 1-84, Information Resources Management ( http://intranet.epa.gov/rmpolicy/ads/dm/1-84_534.htm ) hief Information Officers (IO) ouncil model policy on Implementing the Executive Order on omputer Software Piracy (June 2000) Page 1

hief Information Officers (IO) ouncil Guidelines for Implementing the EO 13103 on omputer Software Piracy. (August 1999) EPA LAN Operating Procedures (LOPS) 2002 hapter 2.3, Licensing hapter 3, Support Roles, Responsibilities and Resources NTSD Operational Directives: 100.02: ontracts for Third Party Software Packages 270.04: Personal omputers Security 270.05: Personal omputers onfiguration and Inventory Management EPA Order 2195.1 A4, Agency Network Security Policy Standards of Ethical onduct for Employees of the Executive Branch, U.S. Office of Government Ethics, September1999 EPA Order 3120.1, onduct and Discipline, or successor documents EPA Order 2100.3, Limited Personal Use of Government Office Equipment Guidelines: To best meet the requirements under EPA s Software Management and Piracy Policy, each Agency Office should establish auditable procedures to ensure that all software purchased or acquired adheres to EPA s policy on software management and piracy. To avoid purchasing or installing illegal software, each program office should: Purchase software from reputable resellers: validate licenses from these resellers and demand proper license and accompanying materials; Document and verify appropriate licenses: verify that the licenses authorize EPA to distribute and use the software; Maintain a record keeping system: keep track of appropriate documentation for each software license; Train personnel: learn how to track and identify software misuse; Information on how to detect and/or avoid computer software piracy should be included as appropriate to Agency personnel in the Agency Information Security Awareness training. Additional training may be provided to LAN managers and Novell Administrators for tracking and monitoring licenses. Executive Order 13103 (Section 1(c)) requires that government contractors and recipients of Federal grants and loans must have "appropriate systems and controls in place to ensure that Federal funds are Page 2

not used to acquire, operate, or maintain computer software in violation of applicable copyright laws." If EPA becomes aware that contractors or recipients are using Federal funds to acquire, operate, or maintain unlicensed software and determine that such actions may affect the integrity of the Agency's contracting and financial assistance processes, EPA is required to "take such measures, including the use of certifications or written assurances, as deemed appropriate and consistent with the requirements of law. Types of Pirated Software: opies of software are normally sold to end users and are subject to the software publisher s license agreement. That agreement typically restricts how, and to whom, software copies may be distributed. Agency software purchasers should review the applicable license and ensure that its use of the software will not violate any restrictions imposed by the software publisher. Types of pirated software or licensing violations include: Software that has been illegally copied; Software that has been reproduced and/or distributed in violation of a software license Examples of pirated software include: ounterfeit software: unauthorized copies of software that are duplicated with the intent of directly imitating the copyrighted product. ounterfeit software is typically reproduced and distributed in a form to make the product appear legitimate and thus may include sophisticated efforts to replicate packaging, documentation, registration, logos, and security features. ompilation Ds: unauthorized copies of multiple software programs that are compiled onto a single D. ompilation Ds typically include software programs published by a variety of software publishers. Hard-disk loaded software: unauthorized copies of software loaded by the hardware dealer onto the hard disk of the computer and then offered to the customer as a free or heavily discounted incentive to purchase the computer. Online pirated software: unauthorized copies of software that are distributed and downloaded via the Internet. Other illegally copied software: software that is copied from Page 3

disks, Ds, or other machines without authorization of the copyright owner. Misused Software: License misuse occurs when legitimate copies of software are distributed and used in violation of the applicable license agreement. Examples of license misuse include: Original Equipment Manufacturer ("OEM") software: OEM software is licensed and specifically marked for distribution with new computer hardware. License misuse occurs when OEM software is "unbundled" from the computer and distributed to, and used by, the end user as a standalone product, often at a heavily discounted price. Academic Versions: Academic software is manufactured, licensed and specifically marked for distribution to educational institutions and students at reduced prices. License misuse occurs when academic software is distributed to, and used by, a non-academic end user. "Not for Resale" software: NFR software is marked "not for resale" and typically is distributed as promotional or sample product and not licensed for commercial distribution and use. License misuse occurs when NFR software is distributed in violation of its resale restrictions. Fulfillment Software: Fulfillment software is licensed solely for distribution to mid- or large-sized end users that currently possess a volume license agreement or valid site license. Fulfillment software is typically distributed in a D jewel case without the packaging or materials that accompany retail product. The fulfillment media is not itself licensed product. License misuse occurs when fulfillment software is distributed to, and used by, end users that lack the necessary licenses for use of the underlying product. Software Upgrades: Upgraded versions of software programs are licensed and specifically marked for distribution to end users that currently possess a valid license for the original product. License misuse occurs when upgrades are distributed to, and used by, end users that lack a license for the original product. Typically, OEM, Fulfillment and other non-retail products are distributed Page 4

without the colorful packaging and materials that accompany full retail products. Accordingly, these non-retail products are easier to counterfeit. Thus, Agency employees should be aware that deeply discounted non-retail software may in fact be counterfeit. onsequences: Employees are expected to adhere to the Standards of Ethical onduct for Employees of the Executive Branch, and to EPA ORDER 3120.1, onduct and Discipline, or successor documents. An EPA employee, EPA contractor, or recipient of EPA financial assistance may be held personally liable for willful, deliberate violations of copyright laws (e.g., loading and/or using unlicensed, copyrighted software on Agency work stations). Penalties may include, but are not limited to, a letter of warning, a letter of reprimand, suspension without pay, dismissal, or other penalties in accordance with applicable law and/or Agency rules and regulations, which can include criminal or civil penalties. The severity of the violation or the pattern of violation will be considered when determining the action taken. Violations should be reported to the applicable supervisor or manager, Senior Information Resources Management Official (SIRMO), IRM Branch hief, or Information Security Officer (ISO) for enforcement or disciplinary actions. Definitions: Software: Includes stand-alone software programs, Original Equipment Manufacturer ( OEM ) or bundled software, new and upgraded versions of software, or any other licensed software. Piracy: Illegally copying software, using software that violates licensing restrictions, and/or other misuse of the license agreement. Additional Information: For more information on protecting your program office or Region from purchasing or installing pirated software, please contact your Senior Information Resources Management Official (SIRMO) or IRM Branch hief. For more information on these guidelines, please contact the Office of Environmental Information, Office of Technology and Planning, Information Technology Policy and Planning Division (OEI/OTOP/ITPPD). Page 5

These and other EPA information management and technology policies, procedures and guidelines may be viewed on the following EPA Intranet web sites: < http://intranet.epa.gov/rmpolicy/infoman.htm < http://intranet.epa.gov/rmpolicy/index.htm APPROVED: /s/ 06/13/03 Mark Day, Director Date Office of Technology Operations and Planning Page 6