Copyright Infringement: Excerpts from the Cornell University Policy
Patricia A. McClary
Associate University Counsel
June 3, 2002
Copyright infringement constitutes a violation under several university policies. Below are excerpts from the university policies that prohibit copyright infringement:
Responsible Use of Electronic Communications:
C. Violations involving illegal, proprietary, or damaging material
C1. Electronically distributing or posting copyrighted material in violation of license restrictions or other contractual agreements
C3. Downloading or posting illegal, proprietary or damaging material to a university computer
C4. Transporting illegal, proprietary or damaging material across Cornell's networks
Code of Academic Integrity:
B. Examples of Violations
The following actions are examples of activities that violate the Code of Academic Integrity and subject their actors to proceedings under the Code. This is not a definitive list.
1. Knowingly representing the work of others as one's own.
C. Specific Guidelines for Courses
2. Course Assignments.
Representing another's work as one's own is plagiarism and a violation of this Code.
If materials are taken from published sources the student must clearly and completely cite the source of such materials.
D. Principles for Computer Use and Network Systems
The use of computers and network systems in no way exempts students from the normal requirements of ethical behavior in the Cornell University community. Use of a computer and network system that is shared by many users imposes certain additional obligations. In particular, data, software and computer capacity have value and must be treated accordingly.
Standards of behavior include:
2. Respect for the ownership of proprietary software. For example, unauthorized copies of such software for one's own use, even when that software is not protected against copying is inappropriate.
Code of Conduct:
Section II Violations
K. To steal or knowingly possess stolen property,6
6 Misappropriation of data or copyrighted materials, including computer software, may constitute theft.