COPYRIGHT AND SECURITY GUIDE FOR COMPANIES AND GOVERNMENTS



Similar documents
Music, Film, TV and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers

PEER-TO-PEER NETWORK

Music, Film, TV and the Internet. A guide for parents and teachers

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Valdosta State University. Information Resources Acceptable Use Policy

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University

Top tips for improved network security

INSTANT MESSAGING SECURITY

Acceptable Usage Policy

If you have any questions about any of our policies, please contact the Customer Services Team.

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

NETWORK AND INTERNET SECURITY POLICY STATEMENT

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

Technology Department 1350 Main Street Cambria, CA 93428

INTERNET ACCEPTABLE USE POLICY

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

North Clackamas School District 12

Acceptable Use Policy

THE HIGH COST OF P2P ON THE ENTERPRISE

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

Protecting personally identifiable information: What data is at risk and what you can do about it

COB 302 Management Information System (Lesson 8)

Computer Network & Internet Acceptable Usage Policy. Version 2.0

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT POLICY AND PROCEDURE

Equipment Needed. Connecting to the Internet

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

How To Monitor The Internet In Idaho

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW

ITU Computer Network, Internet Access & policy ( Network Access Policy )

Policies Concerning the use of Computers

Internet Use Policy and Code of Conduct

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

Computer Security Maintenance Information and Self-Check Activities

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND USAGE POLICY

Network Service, Systems and Data Communications Monitoring Policy

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

Information Security

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

School Information Security Policy

Franciscan University of Steubenville Information Security Policy

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Cyber Essentials Scheme

Internet usage Policy

ResNet Guide. Information & Learning Services. Here to support your study and research

Peer to Peer File Sharing and Copyright Infringement Policy

Hyde School Student Computer Systems Acceptable Use Policy

High Speed Internet - User Guide. Welcome to. your world.

Guidance Regarding Skype and Other P2P VoIP Solutions

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or

DIOCESE OF DALLAS. Computer Internet Policy

Electronic Communications System

2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly.

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Internet & Cell Phone Usage Policy

Information Technology Cyber Security Policy

System and Network Security Policy Internet User Guidelines and Policy. North Coast Council West Canal Road Valley View, Ohio 44125

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

YOUNG PEOPLE, MUSIC & THE INTERNET

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Enterprise K12 Network Security Policy

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Network Security Policy

Information Security Code of Conduct

Version: 2.0. Effective From: 28/11/2014

La Cañada Unified School District Personnel Use of Technology Regulations (AR ) Also known as the Staff Technology and Internet Use Policy

How To Protect Decd Information From Harm

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Information Security. Louis Morgan, CISSP Information Security Officer

Transcription:

COPYRIGHT AND SECURITY GUIDE FOR COPANIES AND GOVERNENTS

DOWNLOAD 25% COPLETE PAGE 02 You are at risk if commercial music, movies or other copyrighted material is on your organisation s computer systems without payment to, or permission from, the rights owners. This guide explains what you can do to protect your organisation against the legal and security risks of copyright theft. CONTENTS 03 04 05 06 07 WHAT ARE THE RISKS? DO YOU HAVE A PROBLE? WHAT CAN BE DONE? SAPLE EO SAPLE POLICY

PAGE 03 WHAT ARE THE RISKS? åß ƒ æ`ω ç ~µ Copyrighted music, films and CIVIL OR CRIINAL LAWSUITS SECURITY BREACHES other material should not be copied on your computer The laws of virtually every country If there is unauthorised copyrighted make it unlawful to copy, distribute material on your organisation s systems, or made available on or put someone else s material systems, you may also be running the internet, without permission åß ƒ æ`ω ç ~µ åß ƒ æ`ω ç ~µ on the internet without their serious risks to your company from the copyright owner. permission. Copyright owners have data, confidentiality and IT security. particular concerns about copyright Illegal Copyright protects creative websites and unlicensed people against this sort of theft over the networks of public file-sharing services the source and corporate organisations, given of much illegal music, film, software unauthorised copying or the scale of damage that can result. and other copyrighted material distribution of their material, are notorious sources of: which amounts to theft åß ƒ æ`ω ç ~µ That is why copyright and other of their livelihood. rights owners regularly take legal Viruses. These destructive action against organisations and elements can crash Without adequate precautions, individuals that violate copyright on individual machines and the computer systems of an file-sharing and other networks. spread through your network. organisation like yours can In June 2005, for example, the A 2004 study by security firm become an illegal distribution music industry found and brought TruSecure found that 45% of hub for copyrighted material. legal proceedings against a software files downloaded from This raises a number of legal medical practice in Germany the most popular unauthorised and security risks for your whose networked computers file-sharing service contained a organisation and employees. computer virus, worm or other malicious code. stored and offered a large number of commercial music files on internet file-sharing services. The risk of legal action is real: research firm Jupiter found in an April 2004 study that 37% of music file-sharers in the UK have cut down on this activity because of the fear of legal action. Spyware. File-sharing software often includes undocumented spyware that reports on computer usage, delivers advertising and other unsolicited files, and can t be removed without substantial time and sometimes computer damage. An NPD Group survey in June 2005 found that 40% of peer-to-peer (P2P) users reported having problems with the amount of spyware, adware and viruses that can be found on these services. 1 Firewall compromise. file-sharing software typically demands an open port between the user s computer and the internet. This is effectively a gaping hole in the firewall that you are using for network security, and opens your systems to millions of anonymous users. Resource drains. Unauthorised music and other copyrighted files can use up gigabytes of your server and PC hard discs. file-sharing also lets users both inside and outside your organisation use your system s resources for downloading, uploading and indexing illegal files which can drain large quantities of your network and internet bandwidth. 1 Source: NPD usicwatch Digital, USA, June 2005

DOWNLOAD 50% COPLETE PAGE 04 One or more of the following signs may indicate that your organisation is at risk from problems of copyright theft: DO YOU HAVE A PROBLE? One or more of the following signs may indicate that your organisation is at risk from problems of copyright theft: You don t know what programmes and files are on your computers and networks. You should take an inventory of software, music, film, games and other copyright material on your networks and computers. Check servers and PCs for large caches of copyright material unrelated to your business. Check whether users have installed file-sharing software without company permission. You don t have an internet firewall, or you have unauthorised traffic on your internet connection. To stop intruders and unauthorised outbound activities, every organisation on the internet should have a firewall. Inbound and outbound rules on internet equipment should be set to block ports and protocols that are commonly misused. Your internet and network connections are very slow. Poor network response times may indicate that you have internal bandwidth hogs or unwanted traffic from file-sharing services. It may also mean that use of such services or other illegal sites has brought viruses, spyware or other destructive elements into your system. You have regular problems with computer viruses. If your systems and computers have been plagued with viruses, or if customers or other external contacts get viruses from you, it may be because users are contracting such viruses on sites and services offering illegal copyright material. You do not have a policy or other controls on what users can do on your computer systems. Besides being a productivity problem, uncontrolled computer use often takes the form of illegal downloading, uploading and indexing of someone else s copyright material.

PAGE 05 4567890-= ertyuiop[] fghjkl; cvbnm,. ^øπ ç ~µ There are several practical steps that you can take to avoid copyright theft on your organisation s computers and systems, and prevent the legal and security problems åß ƒ æ`ω ç ~µ that can result. åß ƒ æ`ω ç ~µ 4567890-= ertyuiop[] fghjkl; xcvbnm,. ^øπ ç ~µ WHAT CAN BE DONE? åß ƒ æ`ω ç ~µ SET A COPANY POLICY Users, managers and IT personnel need to understand that unauthorised copying and transmission of someone else s music or other works is copyright theft, which the organisation does not condone. This is best implemented in your organisation s policy manual and terms and conditions of employment. A sample memo and policy statement are included in this guide (see pages 6 7 or download a copy from www.ifpi.org or www.mpaa.org). åß ƒ æ`ω ç ~µ TAKE COPYRIGHT INVENTORIES any organisations already audit their systems for certain types of copyright material, particularly software. Inventories should also include music and other major types of copyright material. usic files are typically 3 5 megabytes in size, stored in.mp3,.wma or.wav format, and often found in \my music or \shared directories. ovie files are typically 500 to 700 megabytes in size, stored in.avi,.mpg or.mov format. These files can sometimes be included in compressed files like.zip or.rar files. åß ƒ æ`ω ç ~µ DELETE UNAUTHORISED ATERIAL Commercial recordings of music and movie DVDs are virtually never licensed for corporate or other multiple copying, or licensed for internet distribution, except through recognised, legitimate services. You should ask for and keep evidence to show that any copies of copyright material are legal. Private copy, fair use, evaluation copy or other such excuses do not apply to corporate or internet copying. åß ƒ æ`ω ç ~µ CONTROL FILE-SHARING any organisations ban unauthorised software installations and file-sharing activity on their corporate machines as an easy way of reducing copyright and security problems. Software programmes like freeware Digital File Check can scan for, block or remove file sharing software from personal computers (www.ifpi.org or www.mpaa.org). SET FIREWALL RULES Your internet firewall can be configured to screen out infringing files and illicit services in a number of ways. Particular internet addresses, ports or protocols on which file-sharing typically occurs can be blocked. Commercial vendors also offer sophisticated software that can selectively filter copyrighted material. CONTROL WIRELESS ACCESS You should be sure that wireless connections to your network and the internet are encrypted and secure, so that these connections are not hijacked for illegal purposes. Wireless hub software lets you set access codes and the desired level of encryption. WATCH TRAFFIC LEVELS Network monitoring software, which may have been supplied with your network equipment, allows you to check whether users or devices are hogging bandwidth. Check traffic hot spots to see if there is a system problem or illegal activity taking place. AINTAIN VIRUS PROTECTION Anti-virus software can screen out rogue files containing viruses, spyware or other damaging material, and should be installed on every computer. Vendors update this software regularly to take account of new viruses. You should be sure that all copies of anti-virus programmes are run regularly and kept up to date. AINTAIN SPYWARE PROTECTION Similarly, a range of commercial software programmes can find and remove spyware, adware and similar programmes from your organisation s machines. Anti-spyware programmes should be run and updated regularly. DESIGNATE A COPLIANCE OFFICER Someone in your organisation should be responsible for protecting against copyright theft on your systems. The person needs to be sufficiently senior (such as the IT or finance director) to insist on ongoing compliance with your organisation s policy, to remove illicit material promptly, and to deal with notices and disciplinary actions should they arise.

DOWNLOAD 75% COPLETE PAGE 06 SAPLE EO You can download a copy of this emo from www.ifpi.org or www.mpaa.org EO TO: FRO: SUBJECT: DATE: DISTRIBUTION LIST) (SENIOR ANAGEENT OFFICIAL) POLICY ON THE USE OF COPYRIGHT ATERIAL (INSERT) The purpose of this memorandum is to remind you of (Organisation s) policy on the use of copyright material on (Organisation s) computers, networks and media. Unauthorised copying and use of copyrighted material is illegal and can expose you and (Organisation) to civil and criminal liability under the copyright law. This applies to all types of copyrighted material, including music, films, games, software and other works. Employees must not put unauthorised copies of copyrighted material on computers, networks or media owned by (Organisation). Nor should employees put unauthorised copyrighted material on the internet, or engage in activities such as peer-to-peer file-sharing that are likely to promote or lead to copyright infringements. (Organisation s) detailed policy on the use of copyright material, which includes possible disciplinary actions for failure to abide by this policy, is attached. (Compliance Officer) will be organising regular audits of all (Organisation) computers and networks to ensure compliance and, if necessary, to remove unauthorised items if you have not done so. Please do not hesitate to contact (Compliance Officer) if you have any questions.

PAGE 07 SAPLE POLICY You can download a copy of this Policy from www.ifpi.org or www.mpaa.org POLICY ON THE USE OF COPYRIGHT ATERIAL (Organisation) respects the copyright of those involved in creating and disseminating copyright material, such as music, films, software, and other literary, artistic and scientific works. (Organisation) employees shall not make, store, transmit or make available unauthorised copies of copyrighted material on (Organisation) systems, equipment or storage media. (Organisation) employees shall not download, upload, store or make available unauthorised copies of copyrighted material via the internet using (Organisation) systems, equipment or storage media. (Organisation) employees shall not install or run peer-to-peer file-sharing software or operate a peer-to-peer index or server on (Organisation) systems or equipment, without (Compliance Officer s) consent. (Compliance Officer) is responsible for carrying out this policy. Any questions as to whether an employee may copy or use copyrighted material in ways covered by this policy should be raised with (Compliance Officer) before proceeding. Any activities or materials that violate this policy are subject to immediate removal, termination and/or forfeiture of the material. (Organisation) employees that violate this policy are subject to discipline as appropriate under the circumstances. Such discipline may include termination. Employee signature and date

DOWNLOAD 100% COPLETE IFPI Secretariat 54 Regent Street London W1B 5RE United Kingdom Tel: +44 (0)20 7878 7900 Fax: +44 (0)20 7878 7950 www.ifpi.org www.pro-music.org otion Picture Association European Office Rue Du Trone, 108 B-1050 Brussels Belgium Tel: +32 (0) 2 778 2711 Fax: +32 (0) 2 778 2700 www.mpaa.org International Video Federation 38 avenue des Arts B-1040 Brussels Belgium Tel: +32 (0) 2 503 40 63 Fax: +32 (0) 2 503 37 19 www.ivf-video.org Published by IFPI, January 2007 Copyright2007, International Federation of the Phonographic Industry (IFPI) All data, copy and images are subject to copyright and may not be reproduced, transmitted or made available without permission from IFPI Designed by elliottyoung +44 (0)845 054 0070