Search Information Security site

 

Copyrights of Digital Materials and Software Standard

Table of Contents

1.  Purpose and Background
2.  Standard
3.  Definitions
4.  Related Links
5.  Exceptions

[Return to Library]

1. Purpose and Background

Users must not use the University’s IT resources to access, use, copy, distribute or otherwise reproduce or make available to others any copyright-protected materials, including digital materials and software, except as permitted under copyright law (especially with respect to “fair use”) or specific license (see Acceptable Use of the University’s Information Technology Resources (IRM-002)).

[Table of Contents]

2. Standard

The software provided through the University for its users may be used only as specified in the various software licenses.

The University regards violation of this policy as a serious matter, and any such violation is without its consent and is subject to disciplinary action. Repeated violations will result in loss of computing privileges, among other sanctions.

Pursuant to 37 CFR 201.38, the University has designated the following person (DMCA Agent) to receive notification from copyright owners of claimed infringement of copyright:

Robert M. Tyler 
Claimed Copyright Infringement

Office of the University Counsel
University of Virginia
Madison Hall, Third Floor
PO Box 400225
Charlottesville, VA 22904-4225

(telephone) (434) 297-7624 
(facsimile) (434) 982-3070
(email) DMCA@Virginia.EDU

Procedures: The University’s procedures for handling copyright issues are available at Copyrights of Digital Materials and Software Procedures.

[Table of Contents]

3. Definitions

For a comprehensive list of the definitions found in the Acceptable Use, Data Protection, Information Security, and Privacy & Confidentiality policies, please click here.

[Table of Contents]

4. Related Links

[Table of Contents]

5. Exceptions

If you think you need to request an exception to these requirements, please refer to the Exceptions Process.

[Table of Contents]

APPROVER: Chief Information Officer

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security Office will evaluate the report and provide a full investigation.

Complete Report Form