台湾swag

Copyright Compliance

The idea that granting the creators and owners of original intellectual works will stimulate the creation of such works is as old as our nation. Federal copyright protections are intended to strike a balance between preserving the intellectual property rights of those who create writings, works of art, software, and other forms of intellectual property – including the right to control the use of such works and to profit from their use – and the need for widespread access and availability of such works for teaching, scholarship, and criticism.

The Office of General Counsel regularly fields questions regarding specific uses of intellectual property and their relationship to copyright protections. While the materials presented here are intended as a general guide, the University of North Georgia faculty and staff are encouraged to seek clarification from the Office of General Counsel whenever there is doubt concerning the use of copyrighted materials. The following information applies only to copyrighted materials. It does not apply to materials that are in the public domain or un-copyrighted governmental materials. Guidelines for appropriate attribution of excerpted or quoted works apply to all works, whether or not copyrighted.

What materials are copyrighted?

Though the United States Copyright Office offers a registration process to those interested in obtaining the maximum protection for their copyrighted materials, the registration is merely a formal recognition of a right that exists automatically by operation of law. In fact, any of the categories of work recognized under the Copyright Act is automatically subject to copyright protections the moment is recorded in any form, be it electronic, painted on a canvas, or scrawled on a legal pad.

Materials in the Public Domain

Materials that are in the public domain are not subject to copyright protections, and may be copied, displayed, and distributed at will. Materials may enter the public domain through expiration of the copyright, by the decision of the copyright owner to place the materials in the public domain, or by virtue of the fact that the materials were not subject to copyright protections to begin with (such as is the case with many government document). Naturally, the availability of materials in the public domain does not excuse their use without appropriate attribution.

The question of what materials are in the public domain may be complex, because a single item might be subject to more than one copyright, not all of which might have expired. Consider these scenarios:

A compact disc containing a recording of a modern pianist playing J.S. Bach’s Inventions. The works were written in 1723 and are in the public domain, but the recording of the much more recent performance of the works may still be subject to copyright.

A compact disc containing a transcribed recording of a 78 rpm record, manufactured in 1910, of a pianist playing J.S. Bach’s Inventions. In this case, both the music itself and the 1910 recording of it have passed into the public domain. However, the compact disc might contain edits, alterations, or compilations of music that would, in their own right, be subject to copyright.

Deciphering copyrights isn’t impossible, but it does take a bit of analysis at times, with an eye toward just what rights are owned by what parties.

Materials that are in the public domain are not subject to copyright protections, and may be copied, displayed, and distributed at will. Materials may enter the public domain through expiration of the copyright, by the decision of the copyright owner to place the materials in the public domain, or by virtue of the fact that the materials were not subject to copyright protections to begin with (such as is the case with many government document). Naturally, the availability of materials in the public domain does not excuse their use without appropriate attribution.

The question of what materials are in the public domain may be complex, because a single item might be subject to more than one copyright, not all of which might have expired. Consider these scenarios:

A compact disc containing a recording of a modern pianist playing J.S. Bach’s Inventions. The works were written in 1723 and are in the public domain, but the recording of the much more recent performance of the works may still be subject to copyright.

A compact disc containing a transcribed recording of a 78 rpm record, manufactured in 1910, of a pianist playing J.S. Bach’s Inventions. In this case, both the music itself and the 1910 recording of it have passed into the public domain. However, the compact disc might contain edits, alterations, or compilations of music that would, in their own right, be subject to copyright.

Deciphering copyrights isn’t impossible, but it does take a bit of analysis at times, with an eye toward just what rights are owned by what parties.

Clearing Up the Confusion

While the Fair Use Doctrine and the TEACH Act exist for the purpose of encouraging (or at least permitting) reasonable use of copyrighted materials in educational settings, the uncertainty these rules create, coupled with at times aggressive enforcement by copyright holders, renders these laws only partially effective in creating for instructors a “safe harbor” within which they may be assured that their actions are not subject to challenge. Where doubt exists, permission for particular uses of copyrighted materials (a license) may be sought from the copyright holders. Whether this will be possible in a particular case depends on how easy or difficult it is to locate the owner of the copyright, and that owner’s willingness to permit the desired use of the materials at no cost, or at a manageable cost. But where written permission for specific uses of copyrighted materials are first secured, there need be no doubt as to whether that use will (or will not) be protected under fair use rules. Stanford University Library publishes an excellent practical guide to those interested in securing copyright permissions, the . Many copyright owners are participate in the , a clearinghouse useful for obtaining copyright permissions for a broad range of copyrighted materials.

Music Performance Licenses

Live public performance of copyrighted music is, in most cases, covered under one of the blanket license agreements the University maintains with ASCAP, BMI, and SESAC. Such licenses also cover public use of recorded music, such as that played in public spaces, telephone hold music, and the University radio station. Questions about specific uses permitted under these licenses should be referred to the Office of General Counsel.

Live public performance of copyrighted music is, in most cases, covered under one of the blanket license agreements the University maintains with ASCAP, BMI, and SESAC. Such licenses also cover public use of recorded music, such as that played in public spaces, telephone hold music, and the University radio station. Questions about specific uses permitted under these licenses should be referred to the Office of Legal Affairs.

File Sharing

Various pieces of software floating around on the Internet and elsewhere enable users to illegally download unlicensed music, videos, or software for free, and to share those files with others who would also like free access to these materials. Not everyone agrees that this practice ought to be illegal, but nobody can deny that it is. Trade organizations such as the Recording Industry Association of America (RIAA) are aggressively opposing free file-sharing. The RIAA is filing suits against college and university students who have copyrighted materials available for file-sharing on their computers.

The RIAA and other trade groups regularly notify University of North Georgia of the presence of unlicensed materials in file-sharing programs on machines hooked to our network. Under the law, University of North Georgia could face liability if it fails to disable the account and notify the account holder why this has happened. To prevent this, we move quickly to fulfill our legal duties and prevent further distribution of unlicensed files over our network.

A lot of University of North Georgia students have been getting these notices from the Office of General Counsel. Because having illegal file-sharing software and content on a computer hooked to our network is a violation of University of North Georgia’s computer use policy, the names of students about whom we receive these notices are turned over to Judicial Affairs.

The Office of General Counsel moves quickly to protect the University from liability in these situations. Students should work with Information Technology Services to restore their online accounts.

The Office of General Counsel exists for the purpose of serving the legal needs of the University, and cannot offer students legal advice in these matters. A few words of general information might be in order, however:

The RIAA and the other industry groups do sometimes sue students. Just because you get a notice from the Office of General Counsel doesn’t mean you are being sued. The Office of General Counsel does not know whether you are being sued or not. If you require legal advice, you will need to contact your own attorney.

Not all downloaded music, videos, and software is illegal. For example, providers such as iTunes, Napster, and Ruckus provide legal licensed product. Realize, however, that just because you are rightfully in possession of a music file does not give you the right to distribute it to others via file-sharing software.

The RIAA and other industry groups have technological means to sniff out the presence of file-sharing software loaded with unlicensed content. Please don’t think that illegal file-sharing won’t be noticed — the RIAA catches infringers every day.

More information about file-sharing is available online through the  and the .

FAQ

What is “Phishing” and how can I avoid being hooked?

Phishing is a scam that’s becoming widespread and is costing innocent victims money, time, and aggravation.

Here’s How it Works

The phisher send an e-mail that looks like it came from a legitimate business. It might look quite plausible, incorporating graphics and logos and such. Commonly used are banks (both national and local), credit card companies, online vendors such as Amazon, and PayPal. You get an e-mail from the entity that tells you that the details of your account have been lost in a computer crash, or they have detected some illegal activity in your account, or some other cover story. To correct it, you are told, all you need to do is click on the link the phisher will helpfully provide and follow the instructions.

What Should I do?

Do NOT click the link in the email. The link would take you to another page, doctored to look like a legitimate corporate page, where you would be asked to enter your account information. Identity thieves would use this information to open accounts and borrow money in your name. But you might be in trouble even if you don’t enter the information, because simply clicking on the link can infect your computer with viruses or other nasty programs designed to read your passwords and credit card numbers and send them to the thieves over the internet.

Remember that legitimate businesses should not send you e-mails asking you for account information. We suggest you just delete them right away.

The Anti-Phishing Work Group (APWG) new window publishes up-to-date information on this ever-evolving criminal phenomenon.

The Office of General Counsel supports efforts to protect students and employees from identity theft. Download our identity theft prevention guide.