-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Higher Education Opportunity Act (HEOA) [x]
- Federal Funding for IT (75)
- Federal Policy and Law (75)
- Policy and Law (75)
- Intellectual Property (41)
- P2P File Sharing (41)
- Copyright (26)
- Information Technology Management and Leadership (23)
- Teaching and Learning (23)
- Copyright Infringement (19)
- Distance Education (19)
- State Authorization (16)
- Student Financial Aid (13)
- Digital Millennium Copyright Act (DMCA) (9)
- Institutional Management (9)
- E-Learning (8)
- Online Piracy (7)
- Cybersecurity (6)
- Higher Education Funding (6)
- Legal Downloading (6)
Starting the week of Dec. 6, 2010, the Motion Picture Association of America (MPAA) sent a letter to all U.S. college and university presidents calling their attention to the anti-infringement provisions of the Higher Education Opportunity Act of 2008 (HEOA). Campus CIOs are copied. The letter echoes (and cites) material distributed by EDUCAUSE detailing the HEOA requirements that went into effect July 1, 2010, noting in particular the HEOA "policy@educause.edu.
For full information about the P2P provisions in the Higher Education Opportunity Act, see the sections below. Here are some specific resources provided by EDUCAUSE:
- A comprehensive list of alternatives to illegal downloading
- A summary of penalties for violating copyright law
- Compliance details from role-model campuses and others
Background and Summary
The Higher Education Opportunity Act (HEOA) was signed into law on August 14, 2008, after protracted discussions and controversy. Proposed regulations for implementing the Act were issued by the Department of Education on August 21, 2009, and final regulations were issued on October 29, 2009. While enforcement of the HEOA provisions won't formally begin until July 1, 2010, as of August, 2008 all colleges and universities are required to make a good-faith effort at compliance.
Several sections of the HEOA deal with unauthorized file sharing on campus networks, imposing three general requirements on all U.S. colleges and universities:
- An annual disclosure to students describing copyright law and campus policies related to violating copyright law.
- A plan to "effectively combat the unauthorized distribution of copyrighted materials" by users of its network, including "the use of one or more technology-based deterrents".
- A plan to "offer alternatives to illegal downloading".
General Information
- December 6, 2010 letter from the Motion Picture Association of America (MPAA)
- June 4, 2010 "Dear Colleague" letter from the U.S. Department of Education
- EDUCAUSE Summary
- EDUCAUSE Live! Webcast with Greg Jackson and Jack Bernard (November 23, 2009)
- Memorandum from the Law Office of Zick Rubin (November 20, 2009)
Annual Disclosure
Each campus must distribute three pieces of information related to copyright policy and law:
i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities;
ii) A summary of the penalties for violation of Federal copyright laws; and
iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system.
In its "Dear Colleague" letter of June 4, 2010, the Department of Education provided the following sample text for (ii):
Summary of Civil and Criminal Penalties for Violation of Federal Copyright Laws
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than $750 and not more than $30,000 per work infringed. For "willful" infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see Title 17, United States Code, Sections 504, 505.
Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.
For more information, please see the Web site of the U.S. Copyright Office at www.copyright.gov, especially their FAQ's at www.copyright.gov/help/faq.
This sample text will also appear in the Federal Student Aid Handbook.
A plan to effectively combat unauthorized distribution using technology-based deterrents
The Department of Education regulations specify that the plan must be implemented and in writing. It must also be " periodically reviewed " using "relevant assessment criteria" as determined by each campus. Campuses have a great deal of latitude in crafting the plan and choosing the assessment criteria: "Each institution retains the authority to determine what its particular plans for compliance...will be."
There are four categories of "technology-based deterrents":
- Bandwidth shaping
- Traffic monitoring to identify the largest bandwidth users
- A vigorous program of accepting and responding to Digital Millennium Copyright Act (DMCA) notices
- A variety of commercial products designed to reduce or block illegal file sharing
These categories are equally valid in meeting the requirement to use one or more technology-based deterrents.
Periodic Review
The plan must include "procedures for periodically reviewing the effectiveness...using relevant assessment criteria." The Department of Education's August 21, 2009 posting included the following narrative:
The final component of the plan, in proposed §668.14(b)(30)(i)(D), would require an institution to periodically review its plan to evaluate whether it is working. One of the most controversial aspects of the proposed regulations was the evaluation of whether a plan was effectively combating the unauthorized distribution of copyrighted material. There was extensive discussion over how a plan should be reviewed to determine its effectiveness, and how much discretion institutions should be given in this area. Ultimately, tentative agreement was reached on a provision requiring an institution to periodically review its plan using relevant assessment criteria, permitting an institution discretion to determine the most appropriate criteria. As the specifics of a plan will be determined by an institution, the Department believes that the institution is in the best position to determine the appropriate criteria to assess its plan. In some cases, appropriate assessment criteria might be process-based, so long as the institution's information system information does not contradict such a determination. Such process-based criteria might look at whether the institution is following best practices, as laid out in guidance worked out between copyright owners and institutions or as developed by similarly situated institutions that have devised effective methods to combat the unauthorized distribution of copyrighted material. In other cases, assessment criteria might be outcome- based. The criteria might look at whether there are reliable indications that a particular institution's plans are effective in combating the unauthorized distribution of copyrighted material. Among such indications may be ''before and after'' comparisons of bandwidth used for peer-to-peer applications, low recidivism rates, and reductions (either in absolute or in relative numbers) in the number of legitimate electronic infringement notices received from rights holders. The institution is expected to use the assessment criteria it determines are relevant to evaluate how effective its plans are in combating the unauthorized distribution of copyrighted materials by users of the institution's networks.
Legal Alternatives
EDUCAUSE maintains a list of all known legitimate download services, which the community is welcome to link to.
Final HEOA Regulations Issued October 29, 2009
§ 668.14 Program participation agreement.
(b) By entering into a program participation agreement, an institution agrees that—
(30) The institution—
(i) Has developed and implemented written plans to effectively combat the unauthorized distribution of copyrighted material by users of the institution’s network, without unduly interfering with educational and research use of the network, that include—
(A) The use of one or more technology-based deterrents;
(B) Mechanisms for educating and informing its community about appropriate versus inappropriate use of copyrighted material, including that described in §668.43(a)(10);
(C) Procedures for handling unauthorized distribution of copyrighted material, including disciplinary procedures; and
(D) Procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials by users of the institution’s network using relevant assessment criteria. No particular technology measures are favored or required for inclusion in an institution’s plans, and each institution retains the authority to determine what its particular plans for compliance with paragraph (b)(30) of this section will be, including those that prohibit content monitoring; and
(ii) Will, in consultation with the chief technology officer or other designated officer of the institution—
(A) Periodically review the legal alternatives for downloading or otherwise acquiring copyrighted material;
(B) Make available the results of the review in paragraph (b)(30)(ii)(A) of this section to its students through a Web site or other means; and
(C) To the extent practicable, offer legal alternatives for downloading or otherwise acquiring copyrighted material, as determined by the institution
§ 668.43 Institutional information.
(a) Institutional information that the institution must make readily available upon request to enrolled and prospective students under this subpart includes, but is not limited to—
(10) Institutional policies and sanctions related to copyright infringement, including—
(i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities;
(ii) A summary of the penalties for violation of Federal copyright laws; and
(iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system
Updated May 2012
Library Items on this Topic
EDUCAUSE Library Items for Higher Education Opportunity Act (HEOA)
-
Higher Education Opportunity Act (HEOA)
-
Higher Education Opportunity Act (HEOA) True Starting the…
-
Fed. Regs. on Student Identity Verification, State Authorization of Distance Ed. Back on the Radar
-
April 16, 2013
As reported in today's Inside Higher Ed , the U.S. Department of Education (ED) has announced its intent to modify the rule-making effort it originally proposed last year …
-
The E-Learning Policy Environment (Updated 02/14/13)
-
February 12, 2013
I presented a session entitled "The E-Learning Policy Environment" this January at the EDUCAUSE Mid-Atlantic Regional Conference (MARC) and just last week at the EDUCAUSE Learning…
-
What Might the For-Profit Sector's Problems Mean for All of Higher Ed?
-
August 3, 2012
Earlier this week, the chair of the Senate Health, Education, Labor, and Pensions (HELP) Committee, Senator Tom Harkin, held a press conference to announce the release of the committee’s report…
-
EDUCAUSE Comments: Financial Aid Fraud and Identity Verification
-
June 4, 2012
EDUCAUSE submitted comments last week in response to a U.S. Department of Education (ED) notice about ED’s intent to hold a negotiated rule-making process later this year on financial …
-
Report of the Advisory Commission on Accessible Instructional Materials in Postsecondary Education for Students with Disabilities
-
December 6, 2011
The Advisory Commission on Accessible Instructional Materials in Postsecondary Education for Students with Disabilities (the Commission) was authorized under the Higher Education Opportunity Act…
-
2010 Distance Education Survey
-
May 19, 2011
The Instructional Technology Council's 2010 Distance Education Survey found a nine percent increase in eLearning enrollment from fall 2009 to fall 2010. …
-
Alphabet Soup: A P2P, DMCA, and HEOA FAQ
-
May 18, 2011
Colleges and universities, like all Internet service providers, may benefit from the safe harbor provided by the Digital Millennium Copyright Act (DMCA) , provided that they take certain steps…
-
State Approval Regulations for Distance Education: A ‘Starter’ List
-
January 27, 2011
On October 29, 2010, the U.S. Department of Education (USDOE) released several new regulations, including the expectation that: "Under the Higher Education Act, for an institution in…
-
Washington Update: Hot Topics in Federal Law and Regulation
-
March 30, 2011
|
A session at the NERCOMP Annual Conference 2011
Congress and the federal regulatory agencies continue to focus their attention on technology issues. From open source to social media, from copyright infringement to cybersecurity, new laws and new…

















