Topics Map > UW-Madison > CIO > Intellectual Property
Topics Map > UW-Madison > Cybersecurity > Education, Training and Awareness

UW-Madison - CIO - Copyright Infringement

UW-Madison procedures on copyright infringement apply if you illegally download or upload copyrighted material while using UW-Madison Information Technology (IT) resources.

  • Of interest to:
    • Alumni
    • Applicants
    • Community
    • Faculty
    • Guests
    • IT Security Staff
    • IT Staff
    • Staff
    • Students
    • Visitors
  • Subjects:
    • Cloud Services
    • Copyright
    • Cybersecurity
    • Intellectual Property
    • Mobile Devices
    • Personally-owned Dev.
  • Cybersecurity:
    • Education and Training
  • Data Handling Activities:   
    • Business Use
    • Collection
    • Distribution

UW-Madison supports the rights of intellectual property owners as defined by law. This includes all forms of intellectual property regardless of how it is obtained or shared.

Illegal downloading and sharing using “peer-to-peer” file sharing software has been a chronic problem all over the world. Copyright owners of music, movies and other works are increasingly vigilant in protecting their property rights.

The UW-Madison policy on Responsible Use of Information Technology specifically prohibits illegal downloading, distribution, copying of materials or other activities that violate intellectual property laws, including copyright.

When notified of alleged copyright infringement, the university investigates, provides information, and takes corrective action as required by law.

Below are links to some resources to assist in understanding UW-Madison policies and procedures on copyright infringement, peer-to-peer file sharing, and copyright law.

Responsible Use of Information Technology Policy

Possible penalties for violating copyright law

UW-Madison procedures for investigating and responding to alleged copyright violations

Some legal sources of music and other copyrighted material

UW-Madison Copyright Infringement Compliance Plan (PDF)


Keywords:policies definitions guidelines index policy procedures recommendations requirements statement definition guideline procedure recommendation requirement requirements statements, administrators alumni applicants community faculty guests it-security-staff it-staff managers parents students supervisors visitors administration information-technology security, cloud-services copyright intellectual-property mobile-devices network cloud devices intellectual mobile networking property telecommunications, business-use collection monitoring distribution, education-and-training education awareness training seta copyrighted-data copyright   Doc ID:58840
Owner:GARY D.Group:IT Policy
Created:2015-12-10 08:49 CDTUpdated:2016-11-27 16:42 CDT
Sites:IT Policy
Feedback:  2   2