P2P Sharing

Use of Peer-to-Peer (P2P) Services

Information Technology Services provides guidelines and restricts the use of P2P applications and protocols, such as Kazaa, BitTorrent, iTunes, etc. Many P2P applications do not use network resources responsibly or can easily be misconfigured to use more than a reasonable amount of bandwidth. Denison has implemented technical controls which allow us to prioritize traffic based on type so that we never examine the content of the traffic, thereby ensuring individual privacy. However, all community members must respect all applicable copyright laws.
All students have received a copy of the Director’s Letter to Students.
Most of the freeware versions of P2P applications contain adware and spyware, which you should remove. Spyware/adware cause pop-up advertisements and can keep you from connecting to the internet. Students that use P2P services will experience higher than normal levels of malicious software activity on their system. Pay services can be better, but still cause similar problems. Information Technology Services recommends that you do not install any P2P file/music sharing applications. However, if you do, you must follow these requirements:
  • Choose your application wisely. Check for spyware or viruses after installing.
  • Read all available documentation and help files provided with your application.
  • Configure the application to use a reasonable amount of resources (i.e. no more than 10 simultaneous downloads, limit bandwidth and limit or disable uploads).
  • Disable all super-node or hub settings.
  • Close the application when you are not using it. Some of these applications create useless connections even when you are not actively using it.
  • Abide by all copyright laws.
 
Penalties for Violation of University P2P File Sharing Policy
 
Denison Information Technology Services (ITS) department receives electronic notices alleging copyright infringement. Notices are received from a variety of sources including but not limited to the Recording Industry Association of America (RIAA), Motion Picture Association of America, Sony BMG, HBO, CBS, NBC and other organizations, affiliates and agencies representing the interests of copyright holders.
ITS takes action with each allegation as follows:
  • ITS staff investigate the allegation using the IP address, IP port, and the date and time conveyed in the notice. Once verified, the information is matched to login and activity records to determine the identity of the user. All relevant information regarding the allegation is recorded in an ITS maintained database.
  • A Warning letter from the Director of ITS is sent to the user by email and printed and deposited in the user’s postal mailbox along with a copy of the original allegation correspondence. The Warning letter contains information about potential consequences and an offer for technical assistance to cease all peer-to-peer file sharing activity.
  • The second Warning notice received by a student must be acknowledged with signature and returned to the ITS Help Desk within 7 days.  If a signed copy of the second notice is not returned to the ITS Help Desk, network service for the student’s personal devices will be suspended.
  • Upon the third Warning notice a student receives, network service for the student’s personal devices will be suspended for a period of 30 days.
 
ITS will not reveal the identity of an alleged copyright infringer to the requesting authority but if, in the future, it is presented a subpoena, ITS may be required to reveal a user’s identity and turn over discovery information regarding the alleged user’s network activity.
 
Efforts to Educate Students on Issues of P2P File Sharing
 
  • Freshman June and August Orientation sessions
  • September Student Affairs Hand of Honor Campaign
  • Fall Security Fair
  • Denison Publications
  • ITS Student Quick Start Guide
  • Denison Student Handbook
  • First‐Year Student Notebooks
  • ITS Website
  • Student Affairs Website
 
Procedures To Review The Effectiveness Of The Plan To Combat PeertoPeer
File Sharing Activities
 
Periodically, Denison ITS will review the P2P database records. An analysis of various data and metrics including types of allegations, originator, student type and status, and quantity of first, second, and third offenses will be conducted. At least once a year, a meeting to examine the data will occur with Directors from Information Technology Services, the Library, the Community Rights and Standards Office, and the Vice President for Student Affairs. Observations will be made and educational efforts or other deterrents will be considered as needed.
 
Banned Applications
In order to provide equitable network services to all our users, the ITS department reserves the right to block abusive or dangerous file sharing protocols. Systems attempting to use a banned application may be blocked from all network access until the offending program is removed.  
 
Penalties for Peer-to-Peer File Sharing
+ Summary of Disciplinary Penalties for Violation of Denison's Peer-to-Peer File Sharing Policy

Denison Information Technology Services (ITS) department directly receives and acknowledges electronic notices alleging copyright infringement.  Notices are received from a variety of sources including but not limited to the Digital Millenium Copyright Act (DMCA), the Recording Industry Association of America (RIAA), Motion Picture Association of America, Sony BMG, HBO, CBS, NBC and other organizations, affiliates and agencies representing the interests of copyright holders. ITS takes action with each allegation as follows:

a.    ITS investigates the allegation using the IP address, IP port, and the date and time conveyed in the notice. Once verified, the information is matched to login and activity records to determine the identity of the user. All relevant information regarding the allegation is recorded in an ITS maintained database.
 
b.    A Warning letter from the Director of ITS is sent to the user by email and printed and deposited in the user’s postal mailbox along with a copy of the original allegation correspondence. The Warning letter contains information about potential consequences and an offer for technical assistance to cease and desist peer-to-peer file sharing activity.
 
c.    ITS assumes that a first Warning notice received by a student will be acted upon by the student, in good faith, to correct further similar behavior.
 
d.    The second Warning notice received by a student must be acknowledged with signature and returned to the ITS Help Desk within 7 days.  If a signed copy of the second notice is not returned to the ITS Help Desk, network service for the student’s personal devices will be suspended.
 
e.    Upon the third Warning notice a student receives, network service for the student’s personal devices will be suspended for a period of 30 days.
 
f.    ITS will not reveal the identity of an alleged copyright infringer to the requesting authority but if, in the future, it is presented a subpoena, ITS may be required to reveal a user’s identity and turn over discovery information regarding the alleged user’s network activity.
+ Summary of Civil and Criminal Penalties for Violation of Federal Copyright Laws

Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.

Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than $750 and not more than $30,000 per work infringed. For "willful" infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see Title 17, United States Code, Sections 504, 505.

Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.

For more information, please see the Web site of the U.S. Copyright Office at www.copyright.gov, especially their FAQ's at www.copyright.gov/help/faq.

This statement was prepared by the U.S. Department of Education, June 2010.

Legal Alternative Resources for Music, Video, and other media
Other Relevant Information:

+ Peer-to-Peer Settings Guide

Information Technology Services provides guidelines and restricts the use of peer to peer applications. Many peer to peer applications do not use network resources responsibly or can easily be misconfigured to use more than a reasonable amount of bandwidth. Denison's Traffic Shaper allows us to prioritize traffic based on type so that we never examine the content of the traffic, thereby ensuring individual privacy. However, all community members must respect all applicable copyright laws.

Most of the freeware versions of peer to peer applications contain adware and spyware, which you should remove. Spyware/adware cause pop-up advertisements and can keep you from connecting to the Internet. Pay services can be better, but still cause similar problems. Information Technology Services recommends not installing any peer to peer file/music sharing applications. However, if you do, you must follow these requirements:

  • Choose your application wisely. Check for spyware or viruses after installing.
  • Read all available documentation and help files provided with your application.
  • Configure the application to use a reasonable amount of resources (i.e. limit simultaneous downloads, limit bandwidth, limit or disable uploads).
  • Disable all supernode or hub settings.
  • Close the application when you are not using it. Some of these applications create useless connections even when you are not actively using it.
  • Abide by all copyright laws.