{"id":17533,"date":"2009-12-07T16:27:28","date_gmt":"2009-12-07T20:27:28","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=17533"},"modified":"2014-05-15T14:35:47","modified_gmt":"2014-05-15T18:35:47","slug":"repeat","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/cyber-security\/dmca\/copyright\/repeat\/","title":{"rendered":"Repeat Offenders"},"content":{"rendered":"<p>It is the University\u2019s policy, as set forth in the <a href=\"\/tech\/about\/policies\/info-security\/\">University\u2019s Information Security Policy and Guidelines<\/a>, to terminate, in appropriate circumstances, subscribers, account holders and other Users of the University\u2019s system or network who are repeat copyright infringers.<\/p>\n<p>It is the University\u2019s policy also to accommodate and not interfere with technical measures used by copyright owners to identify or protect copyrighted works where such measures have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary and multi-industry standards process, are available to any person on reasonable and non-discriminatory terms and do not impose substantial costs on the University or substantial burdens on its systems or networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is the University\u2019s policy, as set forth in the University\u2019s Information Security Policy and Guidelines, to terminate, in appropriate circumstances, subscribers, account holders and other Users of the University\u2019s system or network who are repeat copyright infringers. It is the University\u2019s policy also to accommodate and not interfere with technical measures used by copyright&#8230;<\/p>\n","protected":false},"author":2620,"featured_media":0,"parent":6563,"menu_order":11,"comment_status":"closed","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/17533"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/2620"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=17533"}],"version-history":[{"count":5,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/17533\/revisions"}],"predecessor-version":[{"id":79072,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/17533\/revisions\/79072"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/6563"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=17533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}