Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn


Thursday, February 22, 2018

  New Resources
Security Logging Service
Travel Tips for Data Security
Free Security/Privacy Training Resources
Two-step verification
Combating Malware
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Wireless Networking
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
  More in-depth information for
Local support providers
System administrators
  Security initiatives
Critical Component compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
  Related links
Electronic privacy
Worms, trojans, backdoors

Reporting Alleged Copyright Infringement

The University of Pennsylvania does not condone or tolerate the unauthorized copying of licensed computer software or digital media by staff, faculty, or students. The University shall adhere to its contractual responsibilities and shall comply with all copyright laws, and expects all members of the University community to do so as well.

Members of the University community who violate this policy may be subject to discipline through standard University procedures. An individual or University department engaged in the unlawful copying or use of software may also face civil suit, criminal charges, and/or penalties and fines. Subject to the facts and circumstances of each case, such individuals or departments shall be solely responsible for their defense and any resulting liability.

If you have questions about this policy, please contact, or (215) 898-2172

Penn has designated an agent to receive notifications of alleged copyright infringement in the domain. If you believe your copyrighted work is being infringed on a Penn site, please notify our copyright agent:

Joshua Beeman
University Information Security Officer/Copyright Agent
University of Pennsylvania

Phone: +1-215-898-2172
Fax: +1-215-573-2037
US Mail: 3401 Walnut Street Suite 230A, Philadelphia, PA 19104-6228

In notifying us of the alleged copyright infringement, please be sure to include the following information:

  1. A description of the copyrighted work that is the subject of the claimed infringement (if multiple works are being infringed at a single site, a representative list of such works at that site is adequate);
  2. A description of the infringing material and information sufficient to permit us to locate the material;
  3. Contact information for you, including your address, telephone number and/or email address;
  4. A statement by you that you have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, or its agent, or the law;
  5. A statement by you, signed under penalty of perjury, that the information in the notification is accurate and that you have the authority to enforce the copyrights that are claimed to be infringed; and
  6. A physical or electronic signature of the copyright owner or a person authorized to act on its behalf.

Failure to include all of the above-listed information may result in a delay of the processing of your complaint. Penn will comply with requirements of the Digital Millenium Copyright Act. Consistent with the DMCA, and in accordance with Penn's acceptable use policy, the University reserves the right to terminate system access of users who repeatedly infringe on the rights of copyright owners.

For more information about University of Pennsylvania's acceptable use policy, click here.

For more information on U.S Copyright law, click here.

Last updated: Tuesday, January 3, 2017

Information Systems and Computing
University of Pennsylvania
Comments & Questions

Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania