Ohio Administrative Code
Title 3339 - Miami University
Chapter 3339-19 - Information Technology
Section 3339-19-04 - Unauthorized peer-to-peer file sharing

Universal Citation: OH Admin Code 3339-19-04

Current through all regulations passed and filed through March 18, 2024

(A) Background and purpose of policy

Peer-to-peer (p2p) file sharing applications allow users to download and share electronic files of all types and to use any computer as a server for file sharing requests. Currently, some of the more common files shared in this fashion are audio files (e.g., mp3, wav, midi), video files (e.g., quicktime, jpeg, mpeg, avi), and picture files (e.g., gif, jpeg). When computers are set up in a peer-to-peer model, the computers become connected as peers, and files on each system are subject to access by the other systems. When a university computer is set up for peer-to-peer operations with an outside computer, the university computer is sharing its files, and in some cases its entire hard drive. In most cases, the same computer has also agreed to accept files from an outside computer. Conversely, the outside system could copy individual files from the university computer's shared drive, to the outside server, resulting in the potential for inadvertent disclosure of sensitive information.

Because there are legitimate academic, research, and personal uses of p2p file sharing applications, Miami university does not ban them from its network. However, Miami recognizes that p2p activity is commonly used for copying music and video files for personal enjoyment which may violate copyright law and that content which does not infringe copyright is typically available through other methods, such as websites and ftp sites. Accordingly, Miami actively blocks all p2p traffic from crossing its network perimeter. If a user has a legitimate need to use p2p software, authorization will need to be obtained from Miami university's information security officer. Before requesting authorization to participate in any p2p file sharing activity, users of university computing and electronic communication resources should consider the following:

(1) Network bandwidth. Most p2p applications are configured so other users can access your hard drive and share your files all the time. This constant file transfer can degrade your computer's performance and generate heavy traffic loads on the university network. The university's network bandwidth consumption is monitored. If your usage impacts the overall performance of the network, your computer may be blocked. If you use a p2p application to share content legally, you should know how to control or disable the application.

(2) Privacy. If you are running a p2p application, you may be inadvertently sharing personal information, such as e-mail messages or credit card information. You need to make sure you know which files and data the application is sharing. You should know how to control or disable your p2p application to ensure that you are not inadvertently sharing personal information.

(3) Security. Viruses are easily spread using p2p applications. Many p2p applications include "malware" in the download, so you may be unintentionally infecting your computer. To protect your computer, keep your anti-virus program up-to-date and only install programs acquired from reputable sources.

(4) Resource use. Some p2p applications use your computer as a computational or storage resource for another organization's use. This may not be an acceptable use of state-owned resources such as the university network or university-owned computers. Do not permit any such use of your system without the consent of Miami university's information security officer.

(B) Prohibition

The use of a p2p application which (1) constitutes a violation of any federal, state or local law, (2) a violation of university policies (including the responsible use policy and the code of student conduct), or (3) interferes with Miami university's network integrity or security is prohibited.

(C) Enforcement

As an internet service provider, Miami university follows appropriate enforcement procedures required by the digital millennium copyright act.

Upon discovery of an apparent violation of this policy by a student, the information security officer will notify the dean of students. The dean of students shall notify the user and require that the user immediately cease the prohibited activity and delete files that this policy. In addition to stopping potential legal violations, the dean of students goal is to educate the student about appropriate p2p use and personal and social responsibility as a p2p user within the learning community. In the event that a user fails to comply with the dean of students' directive or if the same user violates this policy one or more additional times in the same academic year, then the dean of students may initiate appropriate disciplinary action against the student.

Upon discovery of an apparent violation of this policy by an employee, then the information security officer will notify user to immediately cease the prohibited activity and delete files that violate this policy. In the event that a user fails to comply with the information security officer's notice or violates this policy one or more additional times, the information security officer will refer the matter to the department of human resources or academic personnel services for appropriate action.

In addition, if a user violates the copyright laws through unauthorized p2p activities, the user may be found liable for civil or criminal copyright infringement. Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than seven hundred fifty dollars and not more than thirty thousand dollars per work infringed. For "willful" infringement, a court may award up to one hundred fifty thousand dollars per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see section 504 and 505 of title 17 of the United States Code. Willful copyright infringement can also result in criminal.

(D) Review

The dean of students and the information security officer shall periodically (1) review the effectiveness of this policy; and (2) review the legal alternatives for downloading or otherwise acquiring copyrighted material and make the results of the review available to its students through a website or other means.

Replaces: 3339-21-04

Disclaimer: These regulations may not be the most recent version. Ohio may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.