HEOA Compliance Plan
Bellevue University
March 2015
This document outlines Bellevue University’s plan to comply with the Higher Education Opportunity Act (HEOA) regarding its provisions to reduce the illegal uploading and downloading of copyrighted works through peer-to-peer (P2P) file sharing.
In compliance with the Higher Education Opportunity Act (HEOA) of 2008 with regard to peer-to-peer (P2P) file sharing, Bellevue University has taken the following concrete steps to curb illegal downloading on our University computer networks.
Part 1: Informing the Community
1-1. Where can information be found about copyright issues and responsibilities?
Bellevue University has developed a copyright information center to provide its students and staff with up to date information and education. The center provides resources that answer questions about digital copyright, file sharing, and Digital Millennium Copyright Act (DMCA) notification procedures at Bellevue University, what students and staff should do to remain in compliance with copyright law, and what penalties may be incurred.
1-2. What mechanism(s) are you using to educate your community?
Bellevue University's educational objective is to develop, implement, and disseminate knowledge and awareness of copyright and the penalties of infringement of those copyrights. We accomplish our objectives through a variety of mechanisms that include the following:
Part 2: Offering Alternatives
2-1. Are you carrying out your own survey of alternatives or linking to one or more lists maintained by others? If the latter, which list(s)?
There are many legal sources for copyrighted material. We have adopted the EDUCAUSE list of legal alternatives as our official list.
2-2. Have you made any special arrangements with one or more content providers to obtain content through legal methods?
Not currently.
Part 3: Technology based deterrents
3-1. What technology-based deterrent(s) have you decided to use?
Bellevue University deploys the network monitoring solution CopySense from Audible Magic. It distinguishes between legal and illegal file sharing, and it automatically responds to violators with direct messages reminding them of campus network usage policies. It also allows us to implement increasing levels of restriction for repeat offenders.
3-2. What procedures are you using for handling unauthorized distribution of copyrighted material (e.g., monitoring, sanctions, etc.)?
The University responds to all Digital Millennium Copyright Act notices and other copyright violations according to its policies and practices.
Part 4: Review of the plan
4-1. How are you periodically reviewing the plan?
We periodically survey our community to assess the effectiveness of our communications and education effort. We will continue to analyze the impact of our technical efforts to combat illegal file sharing and other aspects of our plans to combat unauthorized distribution of copyrighted materials.