Owens FAQ
Search:     Advanced search

Peer to Peer File Sharing

Article ID: 922
Last updated: 08 Nov, 2017
Revision: 14
Views: 575

Peer-to-Peer (P2P) File Sharing Requirements and Copyrighted Material

Peer-to-Peer

Peer to peer (P2P) file sharing is technology that allows users to directly connect their computers across a network or the Internet for the purpose of sharing files. There are many different software programs that connect to these P2P networks, some of which include Bit-Torrent, Limewire, BearShare, KaZaA, and Morpheus. Once connected users can search for files or allow others to search their computer for files and share in both directions. 

While P2P programs themselves are not illegal there are many potentially negative and illegal side effects that can come from utilizing such software. Some of those outcomes could include unwanted viruses, worms, Trojans, and spy-ware being installed on your system or the sharing of illegal copyrighted material that could result in civil and criminal penalties. 

Information technology Services currently employs bandwidth-shaping technology to prioritize network traffic and limiting the amount of bandwidth available to P2P applications and on certain networks ITS will block known P2P traffic. The installation of P2P applications on College supported devices is also unsupported. If you need to submit a bid for exception due to legitimate academic need please contact the ITS Help Desk or the Office of Information Security and the request will be reviewed. 


Copyright Infrigenment

The use of P2P software becomes illegal when downloading copyrighted music, movies, books, software or games that you do not own or if you allow sharing to others. When you use, transmit, or possess copyrighted material without the express permission of the copyright holders it is deemed copyright infringement which is a serious offense that can subject offenders to significant civil and criminal penalties. 

While Information Technology Services does not actively monitor or police the network and computing behavior, if notified of a DMCA violation steps will be taken to block the activity and the offender will be notified. These notifications frequently come from content owners that include:

The use of Owens' network services as an ISP qualifies the College for safe harbor exemption which means the individual is liable for monetary damages if they are found to be committing infringement. While attempting to protect the individual's identity by not releasing the name of the offender, if subpoenaed, we will turn over the name of the infringing user at that time.


Legal Alternatives

The use of digital resources obtained legally is encouraged. In an effort to help users identify legitimate access to copyrighted material the following is a list of examples of services. It is the responsibility of the user to identify the legitimacy of a service.

Music

Video

Additionally, the nonprofit association for advancing higher education through the use of technology, Educause, maintains a list of resources for legal downloading at: Legal Sources of Online Content


Resources for additional information:

Prev   Next
Higher Education Opportunity Act (HEOA)     IT Status Page