Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Copyright Report

by Josef Weiss
October 6, 2015

This report presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files that are being shared without the owner's permission. If any of these files actually contain copyrighted material, and if they are freely swapped around, the organization might be held liable for copyright infringement by associations such as the Recording Industry Association of America (RIAA) or the Motion Picture Association of America (MPAA).

Copyright law covers materials, such as books, videos, music, movies, and items downloaded on the internet. Many of these types of works are copyrighted, and this content is commonly distributed over peer-to-peer networks.

The Digital Millennium Copyright Act (DMCA) is a federal copyright law that is meant to stop piracy of digital media. The law makes it illegal to download copyrighted digital media, such as movies, music and software. Not only is hosting copyrighted data unlawful, the digital theft of music, movies and copyrighted content is bandwidth intensive. The Information Technology and Innovation Foundation has determined that 24 percent of bandwidth globally, and 17.5 percent in the United States, is consumed by transfer of copyrighted material.

The RIAA and the MPAA made their intentions clear, through the DMCA, organizations will be liable for the actions of their employees. Universities may also be liable for the actions of their students who access the internet via university computers. Organizations must be aware of what their users are doing, and take measures to identify and act on complaints of copyright infringement.

Whether intentionally or not, uploading or downloading copyrighted materials is an infringement of the copyright owner’s rights of reproduction and distribution. The organization may be liable for damages for each work infringed, including attorney fees. To avoid these risks, an organization should assume any material found is copyright protected, until the material is identified as otherwise.

The report is laid out in two main chapters: Executive Summary, and Vulnerability Details. The report utilizes the following plugins, which include file name and path information, to gather and present detailed results:

  • Plugin 11777 - Microsoft Windows SMB Share Hosting Possibly Copyrighted Material displays a list of media files (such as .mp3, .ogg, .mpg, .avi), which have been found on the remote SMB shares.
  • Plugin 11778 - Web Server Hosting Potential Copyrighted Material. The remote web server is hosting media (.mp3, .wav, .avi, or .asf files) that might be infringing on the owners' copyright.
  • Plugin 11779 FTP Server Copyrighted Material Present - The remote FTP server is hosting .mp3, .wav, .avi, or .asf files, which could be potentially copyright-infringing.
  • Plugin 4709 Copyright Information Within HTML Comments - The remote web server was observed responding to a web request with HTML code that consisted of copyright information within the HTML comments.
  • Plugin 1762 Webserver Javascript File (.js) Copyright Information - The remote web server was observed responding to a web request with JavaScript code which consists of the following copyright information. If this JavaScript is part of an open source or third party project, you will need to ensure that your SDL covers this code as well as all code written 'in house'.

The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the SecurityCenter Feed under the category Discovery & Detection.

The report requirements are:

  • SecurityCenter 5.0.2
  • Nessus 6.4.2
  • PVS 4.2.1

Tenable's SecurityCenter Continuous View (SecurityCenter CV) is the market-defining continuous network monitoring platform. SecurityCenter CV includes active vulnerability detection with Nessus and passive vulnerability detection with Passive Vulnerability Scanner (PVS). Using SecurityCenter CV, an organization will obtain the most comprehensive and integrated view of its network.

The report contains the following Chapters:

  • Executive Summary - The Executive Summary provides an overview in three areas of copyright material identification. A copyright matrix provides indication of copyright material found via SMB, FTP, HTTP, in HTML, or via Javascript file. A Host table identifies hosts where copyright data has been found to reside. A Network table identifies networks on which copyright data is present. Together, these tables provide a summary of where copyrighted data is present, while the following chapters provide detailed information on the data found.
  • Copyright [SMB] - This chapter displays a list of media files (such as .mp3, .ogg, .mpg, .avi) which have been found on the remote SMB shares. Some of these files may contain copyrighted materials, such as commercial movies or music files that are being shared without the owner's permission. If any of these files actually contain copyrighted material, and if they are freely swapped around, the organization might be held liable for copyright infringement by associations such as the RIAA or the MPAA.

  • Copyright [HTTP] - The remote web server is hosting media (mp3, wav, avi, or asf files) that might be infringing on the owners' copyright. If any of these files actually contain copyrighted material, and if they are freely swapped around, the organization might be held liable for copyright infringement under the Digital Millennium Copyright Act (DMCA). To avoid these risks, an organization should assume any material found is copyright protected, until the material is identified as otherwise.
  • Copyright [FTP] - The remote FTP server is hosting .mp3, .wav, .avi, or .asf files which could be potentially copyright-infringing. If any of these files actually contain copyrighted material, and if they are freely swapped around, the organization might be held liable for copyright infringement under the Digital Millennium Copyright Act (DMCA). To avoid these risks, an organization should assume any material found is copyright protected, until the material is identified as otherwise.
  • Copyright in HTML - The remote web server was observed responding to a web request with HTML code that consisted of copyright information within the HTML comments. If any of these files actually contain copyrighted material, and if they are freely swapped around, the organization might be held liable for copyright infringement under the Digital Millennium Copyright Act (DMCA). To avoid these risks, an organization should assume any material found is copyright protected, until the material is identified as otherwise.
  • (.js) Copyright Information - The remote web server was observed responding to a web request with JavaScript code which contains copyright information. If this JavaScript is part of an open source or third party project, the organization will need to ensure that the SDL covers this code as well as all code written 'in house'.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training