Topics Map > UW-Madison > CIO > Intellectual Property
Topics Map > UW-Madison > Cybersecurity > Education, Training and Awareness

UW-Madison - CIO - Copyright Infringement

UW-Madison procedures on copyright infringement apply if you illegally download or upload copyrighted material while using UW-Madison Information Technology (IT) resources.

 
  • Of interest to:
    • Alumni
    • Applicants
    • Community
    • Faculty
    • Guests
    • IT Security Staff
    • IT Staff
    • Staff
    • Students
    • Visitors
  • Subjects:
    • Cloud Services
    • Copyright
    • Cybersecurity
    • Intellectual Property
    • Mobile Devices
    • Personally-owned Dev.
  • Cybersecurity:
    • Education and Training
  • Data Handling Activities:   
    • Business Use
    • Collection
    • Distribution
 

UW-Madison supports the rights of intellectual property owners as defined by law. This includes all forms of intellectual property regardless of how it is obtained or shared.

Illegal downloading and sharing using “peer-to-peer” file sharing software has been a chronic problem all over the world. Copyright owners of music, movies and other works are increasingly vigilant in protecting their property rights.

The UW System - Acceptable Use of Information Technology prohibits illegal use. This includes downloading, distribution, or other activities that violate copyright law.

When notified of alleged copyright infringement, the university investigates, provides information, and takes corrective action as required by law.

Below are links to some resources to assist in understanding UW-Madison policies and procedures on copyright infringement, peer-to-peer file sharing, and copyright law.

UW System Acceptable Use Of Information Technology Resources

Possible penalties for violating copyright law

UW-Madison procedures for responding to alleged copyright violations

Some legal sources of music and other copyrighted material

UW-Madison Copyright Infringement Compliance Plan (PDF)

 



Keywords:policies definitions guidelines index policy procedures recommendations requirements statement definition guideline procedure recommendation requirement requirements statements, administrators alumni applicants community faculty guests it-security-staff it-staff managers parents students supervisors visitors administration information-technology security, cloud-services copyright intellectual-property mobile-devices network cloud devices intellectual mobile networking property telecommunications, business-use collection monitoring distribution, education-and-training education awareness training seta copyrighted-data copyright   Doc ID:58840
Owner:GARY D.Group:IT Policy
Created:2015-12-10 07:49 CSTUpdated:2017-11-06 14:44 CST
Sites:IT Policy
CleanURL:https://kb.wisc.edu/itpolicy/cio-copyright-infringement
Feedback:  2   2