{"id":3965,"date":"2023-02-06T13:41:16","date_gmt":"2023-02-06T18:41:16","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/help-support\/security\/information-technology-policies-procedures\/copyright-information\/"},"modified":"2026-01-14T10:56:01","modified_gmt":"2026-01-14T15:56:01","slug":"copyright-information","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/","title":{"rendered":"Digital Millennium Copyright Act (DMCA)"},"content":{"rendered":"<h3 data-start=\"0\" data-end=\"17\"><strong data-start=\"0\" data-end=\"17\">What is DMCA?<\/strong><\/h3>\n<p>The <a href=\"https:\/\/www.copyright.gov\/dmca\/\">Digital Millennium Copyright Act (DMCA) <\/a>of 1998 seeks to balance the interests of online service providers and copyright holders. The DMCA limits an online service provider\u2019s liability for copyright infringement by users when specific legal conditions are met. Key conditions include:<\/p>\n<ul>\n<li data-start=\"603\" data-end=\"1077\">Designation and public posting of a DMCA agent to receive notices of claimed infringement.<\/li>\n<li data-start=\"603\" data-end=\"1077\">Prompt action to remove or disable access to allegedly infringing material upon receipt of a valid notice.<\/li>\n<li data-start=\"603\" data-end=\"1077\">Adoption and reasonable implementation of a policy to terminate repeat infringers in appropriate circumstances, and communication of that policy to users.<\/li>\n<li data-start=\"603\" data-end=\"1077\">Accommodation of, and non-interference with, standard technical measures used by copyright owners to protect their works.<\/li>\n<\/ul>\n<h3 data-start=\"0\" data-end=\"17\"><strong data-start=\"0\" data-end=\"17\">DMCA designated agent<\/strong><\/h3>\n<p data-start=\"494\" data-end=\"628\">Trinity College\u2019s designated agent to receive notifications of claimed copyright infringement under the DMCA is:<\/p>\n<p data-start=\"630\" data-end=\"731\"><strong>Agent name<\/strong>: John Inghilterra, Chief Information Security Officer<br \/>\n<strong>Mailing<\/strong> <strong>address<\/strong>: 300 Summit Street, Hartford,\u00a0 CT\u00a0 06106<br \/>\n<strong>Phone<\/strong>: 860-297-2100<br \/>\n<strong>Email<\/strong>: DMCAgent@trincoll.edu<\/p>\n<h3 data-start=\"1267\" data-end=\"1473\">How to submit a DMCA takedown notice<\/h3>\n<p data-start=\"918\" data-end=\"1086\">Send a written notification to the DMCA designated agent listed above. Your notice must include substantially all of the following:<\/p>\n<ol>\n<li data-start=\"1091\" data-end=\"1129\">Your physical or electronic signature.<\/li>\n<li data-start=\"1133\" data-end=\"1272\">Identification of the copyrighted work claimed to have been infringed (or a representative list if multiple works at a single online site).<\/li>\n<li data-start=\"1276\" data-end=\"1481\">Identification of the material claimed to be infringing, and information reasonably sufficient to let Trinity locate it (for example: specific URL(s), page title, screenshot, username, date\/time observed).<\/li>\n<li data-start=\"1485\" data-end=\"1562\">Your contact information (address, telephone number, and email if available).<\/li>\n<li data-start=\"1566\" data-end=\"1684\">A statement that you have a good-faith belief the use is not authorized by the copyright owner, its agent, or the law.<\/li>\n<li data-start=\"1688\" data-end=\"1882\">A statement that the information in the notice is accurate and, under penalty of perjury, that you are authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.<\/li>\n<\/ol>\n<h3><strong>Trinity&#8217;s Response to Copyright Infringement Complaints:<\/strong><\/h3>\n<p>Trinity responds promptly to valid notifications of claimed copyright infringement received under the DMCA. For more information, refer to Trinity\u2019s Acceptable Use Policy, which applies to all students, faculty, and staff using Trinity systems and networks. Trinity enforces its Acceptable Use Policy, including its repeat-infringer policy, and may suspend or terminate network access for repeat infringers when warranted.<\/p>\n<ul>\n<li>Legal Alternatives to Unauthorized Downloading: <a href=\"http:\/\/www.educause.edu\/legalcontent\">Legal Sources of Online Content<\/a><\/li>\n<\/ul>\n<h3><strong>Compliance with Copyright Laws and Consequences of Violations<\/strong><\/h3>\n<p>Under U.S. copyright law and the DMCA, Trinity College must respond to valid notifications of claimed copyright infringement involving Trinity systems or services. All members of the Trinity College community must comply with software use laws and legal agreements. Failure to do so may result in financial penalties, criminal charges, and other legal consequences. Additionally, violations may lead to disciplinary action under College policies.<\/p>\n<h3><strong>Learn More About Copyright Laws and Enforcement:<\/strong><\/h3>\n<ul>\n<li>The Software &amp; Information Industry Association <a href=\"https:\/\/www.siia.net\/file-piracy-complaint\/\">\u201cAnti-Piracy\u201d<\/a> page<\/li>\n<li>The Recording Industry Association of America&#8217;s <a href=\"https:\/\/www.riaa.com\/resources-learning\/about-piracy\/\">\u201cAnti-Piracy\u201d<\/a> page<\/li>\n<\/ul>\n<p>Adhering to copyright laws helps protect both creators&#8217; rights and the integrity of the Trinity College community.<\/p>\n<h3 id=\"penalties\">Penalties<\/h3>\n<p>Copyright infringement can result in civil liability, including statutory damages of $750 to $30,000 per work infringed, and up to $150,000 per work for willful infringement. Criminal penalties may apply in certain cases under federal law.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is DMCA? The Digital Millennium Copyright Act (DMCA) of 1998 seeks to balance the interests of online service providers and copyright holders. The DMCA limits an online service provider\u2019s liability for copyright infringement by users when specific legal conditions are met. Key conditions include: Designation and public posting of a DMCA agent to receive [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":5229,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-3965","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Millennium Copyright Act (DMCA) - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Millennium Copyright Act (DMCA)\" \/>\n<meta property=\"og:description\" content=\"What is DMCA? The Digital Millennium Copyright Act (DMCA) of 1998 seeks to balance the interests of online service providers and copyright holders. The DMCA limits an online service provider\u2019s liability for copyright infringement by users when specific legal conditions are met. Key conditions include: Designation and public posting of a DMCA agent to receive [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-14T15:56:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/\",\"name\":\"Digital Millennium Copyright Act (DMCA) - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2023-02-06T18:41:16+00:00\",\"dateModified\":\"2026-01-14T15:56:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance Risk and Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Regulatory Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Digital Millennium Copyright Act (DMCA)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital Millennium Copyright Act (DMCA) - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/","og_locale":"en_US","og_type":"article","og_title":"Digital Millennium Copyright Act (DMCA)","og_description":"What is DMCA? The Digital Millennium Copyright Act (DMCA) of 1998 seeks to balance the interests of online service providers and copyright holders. The DMCA limits an online service provider\u2019s liability for copyright infringement by users when specific legal conditions are met. Key conditions include: Designation and public posting of a DMCA agent to receive [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2026-01-14T15:56:01+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/","name":"Digital Millennium Copyright Act (DMCA) - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2023-02-06T18:41:16+00:00","dateModified":"2026-01-14T15:56:01+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/copyright-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Governance Risk and Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/"},{"@type":"ListItem","position":5,"name":"Regulatory Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/services\/"},{"@type":"ListItem","position":6,"name":"Digital Millennium Copyright Act (DMCA)"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/3965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=3965"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/3965\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/5229"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=3965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}