Search This Site


Main menu

Copyrights of Digital Materials and Software Standard

Table of Contents

1.  Purpose and Background
2.  Standard
3.  Definitions
4.  Related Links
5.  Exceptions

[Return to Library]

1. Purpose and Background

Users must not use the University’s IT resources to access, use, copy, distribute or otherwise reproduce or make available to others any copyright-protected materials, including digital materials and software, except as permitted under copyright law (especially with respect to “fair use”) or specific license (see Acceptable Use of the University’s Information Technology Resources (IRM-002)).

[Table of Contents]

2. Standard

The software provided through the University for its users may be used only as specified in the various software licenses.

The University regards violation of this policy as a serious matter, and any such violation is without its consent and is subject to disciplinary action. Repeated violations will result in loss of computing privileges, among other sanctions.

Pursuant to 37 CFR 201.38, the University has designated the following person (DMCA Agent) to receive notification from copyright owners of claimed infringement of copyright:

Robert M. Tyler 
Claimed Copyright Infringement

Office of the University Counsel
University of Virginia
Madison Hall, Third Floor
PO Box 400225
Charlottesville, VA 22904-4225

(telephone) (434) 297-7624 
(facsimile) (434) 982-3070
(email) [email protected]

Procedures: The University’s procedures for handling copyright issues are available at Copyrights of Digital Materials and Software Procedures.

[Table of Contents]

3. Definitions

See the list of definitions for the Acceptable Use, Data Protection, Information Security, and Privacy & Confidentiality policies.

[Table of Contents]

4. Related Links

[Table of Contents]

5. Exceptions

If you think you need to request an exception to these requirements, please refer to the Exceptions Process.

[Table of Contents]

APPROVER: Chief Information Officer

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

Complete Report Form