As a part of its educational mission, Andrews University provides data communications and computing services to University students, faculty, administration, and staff. The following policies and guidelines are established to maximize the educational benefit obtained from the considerable investment of resources necessary to operate and maintain these facilities.

General Guidelines

1. The cost of providing computing and data communications services on the campus is shared by different groups and individuals. In general, the responsibilities are divided as follows:

    1. Information Technology Services (ITS) provides and maintains the data network and building connections, administrative and academic computing servers, email and Web servers, and general computing laboratories. ITS also organizes other services for the campus for which the consumers pay, including sales of computing hardware and software and installation and maintenance of university-owned computers and software.
    2. Administrative and academic departments budget their own resources for purchasing and maintaining their own computing and data communication facilities and are encouraged to obtain the services through ITS.
    3. All students have access to computers and data communication through general and departmental laboratories on campus. For those who bring their own computers to the campus, access to the campus network is made available to students who live in University-owned facilities either through direct or dial-up connections. Help desk assistance and maintenance are not provided for student-owned computers unless they were purchased through ITS.
    4. A limited number of dial-up lines is provided by ITS for the use of off-campus students and University employees. There is no charge for the use of these lines, but availability is not guaranteed. All University policies apply to the use of these lines as well as to computing on campus.

2. Individual access passwords should be carefully guarded, changed frequently, and treated as a signature, i.e. not shared with anyone else including fellow employees or family members.

3. The following activities are prohibited on campus computers and networks and some may constitute criminal activity. Prohibited activities include, but are not limited to:

    1. Unauthorized access to other users’ accounts, system software, university data, or other computer systems.
    2. Unauthorized decryption of coded information such as passwords.
    3. Attempts to “crash” computers or network services.
    4. Storage or transmission of copyrighted materials without permission.
    5. Wilful introduction of viruses or other disruptive/destructive programs.
    6. Attempts to evade or bypass resource quotas.
    7. Forgery or attempted forgery of documents or email.
    8. Excessive use of resources, such as network bandwidth or disk storage.
    9. Unsolicited “broadcasting” of email (spam or electronic junk mail).
    10. Harassment or intimidation of other users, including sexual harassment.
    11. Pornography, especially involving children.

4. Information transmitted over the network or made available to others (e.g. through Web pages or bulletin boards) should be representative of a Christian university. For example, materials – text or graphics – should not contain: swearing or obscene language; defamation of any individual or group; materials promoting hatred of cultural, ethnic, or religious groups; advocacy of lifestyles contrary to University policy; pornography and other sexually-oriented material. Illegal materials such as child pornography should not be accessed by or stored on any computer while connected with the University, whether private or University owned.

5. Andrews University cannot guarantee the confidentiality or privacy of electronic mail messages and other documents stored on University computers and the University makes no promises regarding their security. Decisions as to what information to include in such messages should be made with this in mind. The ease of saving, forwarding, and printing electronic mail massages and documents makes them more like formal letters and memoranda than verbal communications.

As it relates to confidentiality, the following criteria are guidelines Andrews strives to follow:

    1. Andrews University reserves the right to conduct routine maintenance, track problems, and maintain the integrity of its systems. As is the case with all data kept on Andrew’s computer systems, the content of electronic mail may be revealed by such activities.
    2. Andrews does not monitor the contents of e-mail as a routine matter. However such monitoring may be conducted when required to protect the integrity of the systems or to comply with legal obligations.
    3. Andrews University reserves the right to inspect the contents of electronic mail and all disk files in the course of an investigation triggered by indications of impropriety or as necessary to locate substantive information that is not more readily available by some other means.

6. Because there is no insurance coverage for computers that are not locked, all possible measures should be taken to preserve the physical security of personal computers, for example maintaining a physical locking device and locking access doors (where applicable). Portable computers should always be under personal supervision, in a locked space, or secured with a locking device -- especially when traveling.

7. Each user is responsible for the security of data on their personal computer. Where sensitive information is stored on a personal computer, access to internal storage should be limited by a password. Centralized backup may be implemented for some personal computers; for all other machines, the user should carry out regular backups by means of some removable storage medium such as disks or tapes. Storage media containing sensitive information (backup or otherwise) should be kept in a locked space. A personal computer connected to sensitive information (local or through the network) should not be left unattended.

8. University-owned personal computers are to be used for university business. Limited personal use is permitted outside of work hours for communications such as email and Web browsing. Permission of a supervisor should be obtained for other personal uses. In computing laboratories, academic work of students and faculty takes precedence over any personal uses. Use of University computers for personal commercial activities is prohibited. The dial-up lines may also be used for personal communications, but other University policies still apply. The available resources may restrict personal use.

9. “University work” should generally be done on computer or communications equipment provided by the university. Where personally-owned equipment is used for university business, the university assumes no liability for the maintenance or replacement of this equipment unless arrangements are made in advance.

Networking and Data Communications

1. The university provides a data network connection for virtually all computers connected with the University, giving access to other computers and services both within and outside the campus. Every employee and student can request an account on at least one central computer to permit access to email, the World Wide Web, and other local and national/international services.

2. Information Technology Services, in cooperation with various campus committees, sets technical and operational standards for data networking and computing on campus. Anyone connecting a computer to the campus network – student or employee – is required to abide by the standards set by ITS. In addition, help desk assistance is available only for programs on a supported list.

3. Connections to the campus data network must be made and changed only by personnel from Information Technology Services.

4. No private name servers are permitted on the campus network.

5. Approval is required by the Chief Information Officer for any site on a campus-connected computer that offers a service outside the University.

6. Any computer connected to the campus network that is configured to be a server must permit access by University network administrators.

Email and Web

1. Widely accepted etiquette for the Internet and Web should always be observed. For example, email should not be sent to users, lists, or newsgroups where the subject is not appropriate, where the email is not welcome, or the document size or number of destinations is excessive.

2. University employees and students may set up a home page on the World Wide Web containing personal as well as university information. Such pages must follow guidelines established by the Web Committee. The owner of a Web site is responsible for the content of all pages in the site that are on computers connected to the University network and for all the first-level links from these pages.

Software and Intellectual Property

1. All software on university or personal computers on campus or connected to the campus network must be legally licensed by the owners of the software or copyrights. Users are responsible for observing license and copyright restrictions of all software and documentation. Usually this means that commercial software may not be copied to other machines and documentation should not be copied. “Site licenses” will be purchased by the university for some widely used programs. Information Technology Services personnel must install these programs and users should not copy or move them to other machines. Other copyrighted programs may be installed on personal computers by users provided that an appropriate license has been purchased. Many software packages are available at academic discounts through the University Bookstore.

2. Copyright laws should be observed for documents (text and graphics) as well as for computer software. For a summary of the copyright law, see Appendix A.

Copyrighted materials should not be used in Web pages (departmental or personal) or instructional materials, for example, unless the use falls under the educational “fair use” clause as defined by the United States Copyright Act. See Appendix B for a description of the definition of “fair use”.

The following resources on the Web may be helpful to users in deciding whether a particular usage of copyrighted material qualifies as a fair use:


In addition to fair use, copyrighted material may also be used if the material has passed into the public domain. Items in the public domain (for example, items for which copyrights have expired) are no longer subject to copyright and do not require permission from the copyright owner. For more information on public domain works, the following Web site may be helpful:

http://www.unc.edu/~unclng/public d.htm.

The following Web resources may be helpful to users with questions regarding copyrights:


3. ITS sets policies for the installation and maintenance of standard and non-standard software packages on University-owned computers.

4. Employees’ use of games on University-owned personal computers is prohibited during work hours, except for special cases where there is a clear academic or administrative objective.


Software Use and the Law

A Guide for Individuals, Businesses, Educational Institutions, Server Operators and User Groups
United States and Canadian Edition

Everyone Benefits from a Healthy Computer Software Industry

With each passing year, evolving software technology brings us faster, more sophisticated, versatile and easy to use products. Business software allows companies to save time, effort and money. Educational computer programs teach basic skills and sophisticated subjects. Home software now includes a wide array of programs that enhance the user's productivity and creativity. Computer graphics have turned PCs into a veritable artist's palette; new games are increasingly inventive. The industry is thriving and users stand to benefit along with the publishers.

Along the way, however, the problem of software theft has developed, and threatens to impede the development of new software products. Romantically called "piracy," the unauthorized duplication of software is a Federal offense that affects everyone: large and small software publishers and legitimate users. Even the users of unlawful copies suffer from their own illegal actions. They receive no documentation, no customer support and no information about product updates.

When a Few People Steal Software, Everyone Loses

This guide is intended to provide a basic understanding of the issues involved in ethical software use. It will tell you what the laws are, how to follow them and why you should adhere to them.

This guide is only one component of The Software Publishers Association’s continuing effort to increase public awareness of software piracy. If you have any questions about the legal use of software, please call the SPA at (800) 388 7478 or contact us at: piracy@spa.org. We encourage you to make as many copies of this brochure as required, however, we do ask that the entire brochure be copied so that all readers receive all of this important information.

The Law in the United States

Software is automatically protected by federal copyright law from the moment of its creation. The rights granted to the owner of a copyright are clearly stated in the Copyright Act, Title 17 of the US Code. The Act gives the owner of the copyright "the exclusive rights" to "reproduce the copyrighted work" and "to distribute copies ... of the copyrighted work" (Section 106). It also states that "anyone who violates any of the exclusive rights of the copyright owner ... is an infringer of the copyright" (Section 501), and sets forth several penalties for such conduct. Those who purchase a license for a copy of software do not have the right to make additional copies without the permission of the copyright owner, except (i) copy the software onto a single computer and (ii) make "another copy for archival purposes only," which are specifically provided in the Copyright Act (Section 117). The license accompanying the product may allow additional copies to be made; be sure to review the license carefully.

Software creates unique problems for copyright owners because it is so easy to duplicate, and the copy is usually as good as the original. This fact, however, does not make it legal to violate the rights of the copyright owner. Although software is a new medium of intellectual property, its protection is grounded in the long established copyright rules that govern other more familiar media, such as records, books, and films. The unauthorized duplication of software constitutes copyright infringement regardless of whether it is done for sale, for free distribution, or for the copier's own use. Moreover, copiers are liable for the resulting copyright infringement whether or not they knew their conduct violated federal law. Penalties include liability for damages suffered by the copyright owner plus any profits of the infringer that are attributable to the copying, or statutory damages of up to $100,000 for each work infringed. The unauthorized duplication of software is also a Federal crime if done "willfully and for purposes of commercial advantage or private financial gain (Title 18 Section 2319(b))." Criminal penalties include fines of as much as $250,000 and jail terms of up to 5 years.

The Law in Canada

Software is automatically protected by federal copyright law from the date of creation. The rights granted to the owner of a copyright are clearly stated in the Copyright Act, R.S.C 1985, c. C 42. The Act gives the copyright owner the sole right to produce, reproduce or publish the work or any substantial part thereof in any material form whatever, and to rent out the computer program (Section 3). It also states that "copyright in a work shall be deemed to be infringed by any person who, without the consent of the owner of the copyright, does anything that, by this Act, only the owner of the copyright has the right to do" (Section 27(1)), and that a copyright shall be deemed to be infringed by any person who sells or lets for hire, distributes, exhibits in public or imports for sale or hire into Canada any work that infringes copyright (Section 27(4)). Persons who purchase a copy of software have no right to make additional copies without the permission of the copyright owner, except for the right to make "a single reproduction for backup purposes" and "a single reproduction of the copy by adapting, modifying or converting the computer program or translating it into another computer language if the person proves that (i) the reproduction is essential for the compatibility of the computer program with a particular computer, (ii) the reproduction is solely for the person's own use, and (iii) the reproduction is destroyed forthwith when the person ceases to be the owner of the copy of the computer program (Section 27(2)(l) and (m)).

Software creates unique problems for copyright owners because it is easy to duplicate, and the copy is usually as good as the original. This fact, however, does not make it legal to violate the rights of the copyright owner. The unauthorized duplication of software constitutes copyright infringement regardless of whether it is done for sale, for free distribution, or for the copier's own use. Moreover, copiers are liable for the resulting copyright infringement whether or not they knew their conduct was in breach of the law. Penalties include liability for damages suffered by the copyright owner plus any profits of the infringer that are attributable to the copying (Section 35). In addition, copiers who knowingly infringe copyright may, on conviction on indictment, be fined up to $1,000,000 and imprisoned for a term of up to five years (Section 42).

Use of Software

Anyone who purchases a license for a copy of software has the right to load it onto a single computer and to make another copy "for archival purposes only." In Canada, the purchaser of a licensed piece of software has the right to load it onto a single computer and to make another copy "for backup purposes." It is illegal to load that software onto more than one computer or to make copies of that software for any other purpose unless specific permission has been obtained from the copyright owner or otherwise permitted in the license accompanying the software program. The law applies equally, for example, to a $25 game and a $750 project management program. Each product reflects a substantial investment of time and money by many individuals. Software development involves a team effort that blends the creative talents of writers, programmers and graphic artists. Piracy diminishes the value of a program and further, deprives the developers of fair compensation.

Software piracy inhibits innovation. The software industry is filled with new developers trying to break into a crowded market. They can survive only if their products are purchased. Each theft makes staying in business more difficult.

Rental of Software

It has always been illegal to rent unauthorized copies of software. However, concern over the fact that the rental of authorized or "original" software frequently resulted in the creation of pirated software led Congress to enact the Software Rental Amendments Act of 1990 (Public Law 101 650), which prohibits the rental, leasing, or lending of original copies of any software without the express permission of the copyright owner.

The same situation prevails in Canada. In 1993, Parliament amended the Copyright Act to include the rental of software as a distinct right which cannot be exercised without the express authorization of the copyright owner. These provisions came into force on January 1, 1994.

Use of Software by Schools

Public or private educational institutions are not exempt from the copyright laws. To the contrary, because of their unique position of influence, schools must remain committed to upholding the copyright laws. Just as it would be wrong to buy one textbook and photocopy it for use by other students, it is wrong for a school to duplicate software (or to allow its faculty or students to do so) without authority from the publisher.

Some people claim that software publishers should allow schools to copy programs because it is the only way some school systems can afford to provide enough software for their students. However, the acquisition of software is no different than any other product or service required by a school. Schools purchase books, audio visual equipment and classroom furniture, and they pay a fair price for them. Newer and better software can be developed only if the software development team receives a fair price for its efforts.

Many software firms offer special sales arrangements to schools. These include discounts for additional copies of programs, reduced priced lab packs (a quantity of programs sold together) and site license agreements (an arrangement that allows a school to make a specified number of copies for one location at a fixed price). Schools should make every effort to uphold the law, because it is by their example that students will learn to have respect for intellectual property.

User Groups

The personal computer industry owes much of its success to the proliferation of user groups. These groups provide a valuable service as forums for sharing computing experience and expertise. User groups should, however, ensure that their meetings are not used to promote illegal duplication or distribution of software.

The unauthorized duplication or distribution of software by user groups or at user group meetings places many people in a vulnerable position. The individuals who duplicate or distribute software, as well as the user group itself and the owner of the meeting place, may be held responsible as copyright violators.

A close relationship between user groups and the software publishing community is mutually beneficial. User groups should encourage ethical software use among their members. Likewise, software publishers should respond to users' needs for proper support and updates.

Business Users

In the workplace, "softlifting" is characterized by two common incidents: extra copies of software are made for employees to take home, and extra copies are made for the office. Both situations mean a greater number of computers can run more copies of the software than were originally purchased.

Unless a special arrangement has been made between the business user and the publisher, the user must follow a simple rule: one software package per computer. This means that a copy of software should be purchased for every computer on which it will be used. For example, if the business has 10 computers on which employees use spreadsheet software, it must purchase 10 copies of such software. If there are 25 secretaries using word processing software on their computers, each secretary must have a licensed copy.

Another option that has proven successful is for firms to enter into special site license or concurrent use agreements with publishers. These agreements compensate the publishers for the "lost sales" they might have made on a package by package basis. With a site license, the company agrees to pay a certain amount for a specific number of copies they will make and not exceed on site. A concurrent license permits a specified number of users to access the software simultaneously, but prohibits users from exceeding the number of licenses acquired by the company and as metered by the program. These types of licenses will therefore, often save the organization money. At the same time, they eliminate the possibility that copyright violations will occur. By buying the correct number of programs or the right type of license, a company removes the incentive for employees to make unauthorized copies. Adhering to these rules will pay off in the long run, because a firm that illegally duplicates software exposes itself to tremendous liability.

Many software applications are sold in "Local Area Network" (LAN) versions. If your company has a LAN, be sure to follow the publisher's guidelines for the use of software on the LAN. It is a violation of the copyright laws and most license agreements to allow a single copy version of software on a LAN to be simultaneously accessed by more than one user.

Finally, it has been found that when companies enact a policy statement stating their intention to ensure employee compliance with copyright regulations, the risk of software piracy is reduced. A sample corporate policy statement is included on the back panel of this brochure.

Bulletin Board Operators

The exponential growth of bulletin boards, the internet, and other on line providers has created a new concern for copyright holders. Being able to download copyrighted software for the cost of the telephone call has become a significant problem for the software industry.

Bulletin board operators can be held liable, both civilly and criminally, for infringing the copyrights of software publishers. Unauthorized copies of software on a bulletin board may bring rise to a copyright infringement lawsuit, including seizure of the equipment. SPA, in addition to federal authorities such as the FBI have investigated numerous reports of piracy on bulletin board systems.

Sysops, or bulletin board operators, must take diligent steps to actively monitor the activities of the bulletin board. This will also help in preventing viruses from affecting the system. If copyrighted software is found to exist on the board, it must be promptly removed from the system and consideration should be given to oust the person uploading the copyrighted software to the bulletin board.

SPA Materials

The SPA has a variety of materials about the legal use of software. The Self Audit Kit describes procedures appropriate for ensuring that an organization is "software legal." The Kit includes SPAudit (for DOS) KeyAudit (for Macintosh), a software management tool, which is available for download free of charge. In addition, the SPA has a 12 minute videotape on the subject of software piracy entitled "It's Just Not Worth The Risk." The video is a useful tool for instructing business users about the legal use of software products and is available for $15. A second video entitled, "Don't Copy that Floppy" is a "rap" video designed to teach school age people the benefits of using legal software. This video is also available for $15. We also publish additional brochures and various posters on the subject of software piracy. Please call or write the SPA if you are interested in obtaining any of these materials.

Reporting Copyright Violations

The SPA has established a special toll free number for reports of copyright violations: 1 800 388 7478. Cases of piracy may also reported via email at piracy@spa.org or via our Online Piracy Intake Report. The SPA has filed hundreds of actions against individuals and companies engaged in the unauthorized duplication of PC software and will continue to do so when it becomes aware of situations that warrant such action.


Most people do not purposely break the law. They would never consider stealing a package of software from the shelf of a retail store. But those who copy software without authorization are also stealing intellectual property and they should understand the consequences of their actions.

If you are an individual user, don't break the law. Everyone pays for your crime. If you are part of an organization, see to it that your organization complies with the law, and that it issues an appropriate policy statement that is signed and respected by all involved.

© 1997, Software Publishers Association. All Rights Reserved. Used by permission.


The Copyright Act and Fair Use

The Copyright Act (17 U.S.C. § 106) gives the owner of a copyrighted work the exclusive right to reproduce the work, to prepare derivative works, to distribute copies of the work, and to perform or display the work publicly. In most cases, no one can make copies of a copyrighted work without the copyright owner's permission, and anyone who does so is an infringer of the copyright and may be held liable to the full extent of the law.

The Copyright Act sets forth four factors that courts are to consider in determining whether copying of someone else's work is permitted by the doctrine of fair use:
1.the purpose and character of the copying, including whether the use is of a commercial nature or is for non profit educational purposes i.e., copying for nonprofit educational uses may be more likely to qualify as fair use;
2.the nature of the work being copied i.e., copying from works that are primarily factual in nature (science book) is tolerated more than copying from more creative works;
3.the amount and substantiality of the portion that is copied in relation to the copyrighted work as a whole i.e., the more that is copied, or the more significant the portion that is copied (regardless of the quantity) the less likely that fair use will apply; and

4.the effect of the copying upon the potential market for or value of the copyrighted work i.e., has an adverse impact on the market for the original work. (Copying an entire supplemental science software program, rather than buying it, would not be fair use, but piracy.)

Determining whether fair use exists depends on particular circumstances. To assist educators in evaluating whether their intended copying of copyrighted works will violate the law, the legislative history of the Copyright Act includes a set of Guidelines, "Agreement on Guidelines for Classroom Copying in Not For Profit Educational Institutions", that help define what constitutes "fair use" for classroom copying. However, these Guidelines only cover the reproduction of books, periodicals and musical compositions, not software.
It is difficult to know when something is "fair use." The best strategy is to contact the publisher to find out if a license is available for your specific needs. The rule of thumb is to assume that "fair use" does not apply.

The Copyright Act provides other exemptions that may apply to specific educational activities. The US Copyright Office publishes an excellent summary of Section 107 of the Guidelines. The publication entitled Circular 21 Reproduction of Copyrighted Works by Educators and Librarians can be requested by calling the Forms Hotline at (202) 707 9100.

© 1997, Software Publishers Association. All Rights Reserved. Used by permission.

M. Kootsey, May 27, 1998