Peer-to-Peer File Sharing
Network Policy Issues
Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. File-sharing can give you access to a wealth of information, but it also has a number of risks. You could download copyright-protected material, pornography, or viruses without meaning to. Or you could mistakenly allow other people to copy files you don't mean to share.
Programs and services like BitTorrent, uTorrent, BearShare, and Limewire - are not as harmless as they might seem. There can be serious legal implications of violating copyright laws by sharing certain materials via these programs. There is also an increase in the negative impact that these file sharing programs can have on network capacity. There are additional security risks as many downloads are laden with malware and viruses.
It is tempting to conclude that the issues raised primarily involve our students. However, a number of our staff and faculty may be using the new file sharing technologies to explore what is available on the constantly developing Internet. So all members within the University community need to be aware of these issues.
Negative Effects on Network Performance
Peer-to-peer file sharing applications and services such as BitTorrent, uTorrent, BearShare, and Limewire can generate so much network traffic that they adversely affect network performance for users who share the same local network. Use of these applications is perceived as being most widespread among students - many of whom subscribe to ResNet, Loyola University Chicago's Residence Hall Network Services, and some are using their desktop computers in the computing centers and the labs, and university offices.
All persons who are authorized to access and use University computing, networking, telephony and information resources are required to use these resources in a manner that advance the education, research, health care and public service missions of the University. Any access and use of these resources and services that interfere with these goals are not permitted.
Information Services is continuously monitoring the network traffic situation as it relates to the use of these file sharing applications. Users on the University network whose usage hinders network performance and interferes with others trying to use the network for University work will be contacted. Action to maintain network integrity and performance will be taken where necessary.
This is not only a matter of network etiquette. Interfering with the ability of others to use network services violates Loyola University Chicago policy and may be grounds for suspension of access to University computing and networking resources and can result in other appropriate sanctions.
File Sharing Applications and Copyright Issues
Providing or obtaining copyrighted material, e.g., music, movies, videos, text, and etc., without permission from the rightful owner violates the United States Copyright Act and several university policies. While it is true that a number of artists have allowed their creative works to be freely copied, those artists remain very much the exception. It is best for you to assume that all works are copyright-protected except those that explicitly state otherwise. As an individual, you should also be aware that you face liability for damages of up to $30,000 per infringement under the U.S. Copyright Act.
Additionally, students, faculty and staff who may be in violation of copyright law place not only themselves at risk - they may be incurring liability for Loyola University Chicago as an institution, e.g., using the University network resources to obtain the material and/or to store the material on University servers.
If an artist, author, publisher, or law enforcement agency notifies the University that you are violating copyright laws then the relevant offices within the University will investigate the complaint. If appropriate, action will be taken against you in accordance with University policy. In some cases, violations of University policy could result in suspending your network access privileges and/or criminal prosecution under state and federal statutes.
Computers Acting as Servers
Peer-to-peer file sharing applications typically allow you to set up your computer so that other people can access files you choose to make available to them. While this might seem like a nice service to offer, there are some serious drawbacks.
Having your computer act as a server can burden the University networks if your server is popular and does excessive, high-volume transfers of files. For example, MP3 files are usually very large files, between 2 and 10 MB in size. Some applications let you choose NOT to be a server, but others, such as Gnutella, don't. If you simply install the software and don't take the time to read any documentation, you may not even realize your computer is a server. Make sure you understand what the software does.
Note: machines acting as servers for materials which infringe copyright can and will have their network connections turned off in response to complaints.
Another serious problem with setting up your computer as a server is that you could be opening a security hole for hackers, allowing them access to your entire computer. Peer-to-peer file sharing applications differ in how much security they provide. Be cautious.
If you have installed a peer-to-peer file sharing application on your computer that connects to the University network and you have considered the issues presented in this advisory and now would like to remove the application, you can usually achieve this in a Microsoft Windows environment by accessing Add/Remove Programs from the Windows Control Panel.
If you still need assistance to remove the application you can contact the University ITS Help Desk at 8-4ITS (or call 773 508-4487), or send an e-mail message to email@example.com
Loyola Online Resources
Other Online Resources
- United States Copyright Office
Library of Congress
- Crash Course in Copyright University of Texas System
- The Copyright Education Program
American Library Association
- Fair Use of Copyrighted Works
Consortium for Educational Technology for University Systems
- copyright website
History and Updates
- October 28, 2009: Initial Policy
- June 23, 2015: Annual Review for PCI Compliance, removed outdated P2P programs, added Campus Downloading link.
- June 20, 2016: Annual Review for PCI Compliance, corrected links and ITS helpdesk phone number
- April 19, 2017: Annual Review for PCI Compliance
- Author: UISO
- Version: 1.3