Table of Contents
Using peer-to-peer (P2P) file-sharing applications to illegally share copyrighted music and movies is the #1 way students violate federal copyright law. Students, faculty and staff are all obligated to comply with federal law and university policy regarding appropriate use of information technology and avoiding copyright infringement.
The university enforces network policies regarding bandwidth usage and limits. Under some circumstances, the university may activate monitoring tools designed to detect abnormal or potentially infringing traffic in order to determine its appropriateness and, if necessary, initiate disciplinary procedures.
3. Copyright complaints and legal content alternatives
If you copy and distribute copyrighted material without legal permission, you may be found liable for civil or criminal copyright infringement. Civil penalties for Federal Copyright infringement range from $750 per song to $150,000 in damages for each willful act. Criminal penalties can run up to five years in prison and $250,000 in fines. Student Judicial Services administers penalties and sanctions in accordance with Chapter 11 of the Institutional Rules on Student Services and Activities and Rule 50101 of the Board of Regents Rules and Regulations.
The university cannot protect you from a copyright complaint. The university may also be required by law to disclose information about you to a complainant for use in pursuing legal action against you. The process for handling DMCA notices received by the university is outlined in the Digital Millennium Copyright Act (DMCA) policy. The penalties for violation of copyright law can range from university sanctions to civil and criminal prosecution. Refer to Student Legal Services' article on Notice of Illegal Music Downloading and File Sharing from the RIAA or MPAA, and read more about Enforcement Activities by Copyright Holders.
You are not protected from financial penalty just because you received material at no cost or are distributing material with no charge. Your only protection is to not possess or distribute any unlicensed copyrighted material. There are many Web sites that provide legal online music, movies, and other content.
4. Training Resources
- Faculty and staff are required to take IT Security Awareness training every two years.
- Students are required to take IT Security Awareness training when they first start at UT Austin.
- Students who exceed their bandwidth allowance can take an additional Bandwidth Awareness for Students course.
- UT Austin Copyright Crash Course
5. Peer-to-peer software
Peer-to-peer (P2P) applications such as BitTorrent, BearShare, Limewire, Morpheus, iMesh and KaZaA make it easy for you to share files, and there are legitimate uses for this class of software. However, please keep the following guidelines in mind.
Most P2P applications are configured so other users can access your hard drive and share your files all the time. This constant file transfer can degrade your computer's performance and generate heavy traffic loads on the university network. P2P applications can consume your weekly allocation very quickly.
The university's network bandwidth consumption is monitored. If your usage impacts the overall performance of the network, your computer may be blocked.
If you use a P2P application to share content legally, you should know how to control or disable the application.
If you are running a P2P application, you may be inadvertently sharing personal information, such as e-mail messages or credit card information. You need to make sure you know which files and data the application is sharing. You should know how to control or disable your P2P application to ensure that you are not inadvertently sharing personal information.
Viruses are easily spread using P2P applications. Many P2P applications include "malware" in the download, so you may be unintentionally infecting your computer. To protect your computer, keep your anti-virus program up-to-date and only install programs acquired from reputable sources. Please refer to the following site to read more about malware protection offerings on campus: https://www.utexas.edu/its/products/antivirus/
Some P2P applications use your computer as a computational or storage resource for another organization's use. This may not be an acceptable use of state-owned resources such as the university network or university-owned computers. Do not permit any such use of your system without the consent of the university. For assistance, please contact the Information Security Office, firstname.lastname@example.org.
By running a P2P application, you may be consuming excessive network bandwidth and/or violating copyright law, both of which are violations of the university's rules for acceptable use of information technology. You may also be sharing confidential information and/or making your computer insecure.
If you have questions about P2P applications, please call the ITS Help Desk at 512-475-9400 or send e-mail to the ITS Help Desk.
6. Revision History
|06/21/2013||Reviewed and updated links|
|06/20/2013||Converted back to HTML|
|Copyright Violations.pdf||08/02/2011||Created pdf from web page|
|Cam Beasley||Chief Information Security Officer|| |