Copyright at CSUDH: Excerpts from CSU Dominguez Hills Policies
Procedure for Managing Copyright Infraction Notices
[Get Adobe Acrobat Reader here]
- PM 2009-12, "Use of Information Technology Resources and Electronic Mail Systems or Services [PDF]"
- P. 2: "Failure to so conduct oneself in compliance with this policy may result in the denial of access to the University's information technology resources and/or electronic mail systems or services in part or in whole."
- P. 3: "The University may restrict or prohibit the use of its information technology resources and/or its electronic mail systems or services in response to complaints presenting evidence of violations of University policies or state or federal laws. When it has been determined that there has been a violation, the University may restrict or prohibit access by an offending party to its information technology resources or its electronic mail systems or services through University-owned or other computers or remove or limit access to material posted on University-owned computers or networks."
- P. 7: "The contents of all electronic communications and Web publications shall conform to federal and state laws and University policies regarding protection of intellectual property, including laws and policies concerning copyright, patents and trademarks. When the content and distribution of electronic communications and Web publications exceed 'fair use' as defined by the federal Digital Millennium Copyright Act of 1998 and the Technology, Education and Copyright Harmonization Act of 2002 (TEACH Act), users of information technology resources shall secure appropriate permission to distribute protected material in any form, including text, photographic images, audio, video, graphic illustrations and computer software."
- Pp. 8-9: "Misuse includes, but is not limited to intentionally and knowingly, doing the following:
"...l. Violating any software license or copyright, including copying or redistributing copyrighted software, without the written authorization of the software owner.
"m. Using electronic mail systems or services to violate the property rights of authors and copyright owners.
"n. Violating the Digital Millennium Copyright Act of 1998.
"...q. Academic dishonesty.
"...s. Using electronic mail systems or services or information technology resources to steal another individual's work, fabricate research data or otherwise misrepresent one's own work.
"t. Downloading or posting illegal, proprietary or damaging material to a University computer.
"u. Transporting illegal, proprietary or damaging material across a University network.
"...w. Violating any state or federal law in connection with the use of any information system or electronic mail system or service."
P. 10: "...Violations of this policy may result in discipline. Any discipline will be administered pursuant to the applicable provisions of the affected employee's collective bargaining agreement or the applicable campus policy."
Information Technology Web site