10.11.2014 Views

IT Handbook - Directories - University of Cincinnati

IT Handbook - Directories - University of Cincinnati

IT Handbook - Directories - University of Cincinnati

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Who Can Help?<br />

You can get help from one <strong>of</strong> these <strong>of</strong>fices or departments if you become a victim through affiliation with a<br />

social web site.<br />

Counseling Center.................................................... 513-556-0648<br />

Office <strong>of</strong> Student Life............................................... 513-556-5250<br />

Resident Education and Development.............. 513-556-6476<br />

UC 24-Hour Sexual Violence Crisis Line............. 513-218-9531<br />

UC Ombuds Office..................................................... 513-556-5956<br />

UC Police Department............................................. 513-556-1111 or 911 (Emergencies)<br />

UC Women’s Center................................................... 513-556-4401<br />

UCit Information Security........................................ 513-558-4732<br />

<strong>University</strong> Judicial Affairs........................................ 513-556-6814<br />

Peer-To-Peer (P2P) File Sharing<br />

Unauthorized peer-to-peer (P2P) file sharing on college and university campuses is receiving increasing<br />

attention from the entertainment industry, the media, and the United States Congress. Although P2P file<br />

sharing on university networks is not unlawful, such activity could be harmful especially as it can lead to<br />

a violation <strong>of</strong> the federal copyright law. Indeed, many students using popular s<strong>of</strong>tware such as Limewire,<br />

Frostwire, uTorrent, and Gnutella, intentionally or advertently infringe on copyrighted works relating to<br />

music, movies, computer s<strong>of</strong>tware, video games, and photographs. Lawsuit filings indicate copyright<br />

owners are taking the <strong>of</strong>fensive against infringements on their protected works. Students need to know<br />

their rights and responsibilities, and their potential liability for unlawful P2P activities.<br />

The basis for copyright law is found in Article 1 <strong>of</strong> the United States Constitution and codified in Title<br />

17 (the “Copyright Act”) <strong>of</strong> the United States Code. The Copyright Act lists exclusive rights <strong>of</strong> copyright<br />

holders, including reproduction and distribution <strong>of</strong> the copyrighted work, both <strong>of</strong> which are implicated in<br />

P2P file sharing. There are three types <strong>of</strong> infringement: direct, contributory, and vicarious. Under direct<br />

infringement, a person is liable for his or her own infringing conduct; under contributory infringement,<br />

a person may be liable if he or she knows <strong>of</strong> the infringing activity, and induces, causes, or materially<br />

contributes to the infringing conduct <strong>of</strong> another; under vicarious infringement, a person may be liable if he<br />

or she has the right and ability to supervise the infringing activity and also has a direct financial interest in<br />

the activity. Most users <strong>of</strong> P2P networks fall under the direct infringement category. However, even without<br />

directly infringing conduct, students who operate or encourage the use <strong>of</strong> such networks may be open to<br />

contributory or vicarious claims.<br />

Downloading, possessing or distributing copyrighted material without the owners’ permission is also a<br />

violation <strong>of</strong> the <strong>University</strong>’s General Policy on the Use <strong>of</strong> Information Technology (http://www.uc.edu/ucit/).<br />

The <strong>University</strong> <strong>of</strong> <strong>Cincinnati</strong> does not actively monitor illicit or inappropriate activities, nor is it under any<br />

obligation to defend or accept responsibility for its students’ illegal actions in the P2P context.<br />

The <strong>University</strong> <strong>of</strong> <strong>Cincinnati</strong> expects our user community to act in a proper and responsible computing<br />

manner. If illegal or inappropriate activities are brought to our attention, the <strong>University</strong> will take all<br />

reasonable and appropriate actions. Copyright violations will generate a report to the <strong>of</strong>fice <strong>of</strong> Student Life-<br />

<strong>University</strong> Judicial Affairs as part <strong>of</strong> the <strong>University</strong>’s disciplinary action process. This can result in a variety <strong>of</strong><br />

actions including removal <strong>of</strong> computer privileges and probation. Additionally, the copyright holder <strong>of</strong> the<br />

material found on your system may take legal action against violators.<br />

What can you do to be part <strong>of</strong> the solution? Avoid downloading, distributing, or possessing copyrighted<br />

material over the Internet and the UC internal network unless you have received explicit permission from<br />

the owner, their <strong>of</strong>ficial representative, or have paid an access or license fee to obtain the material. If you<br />

are using a peer-to-peer application you should consider removing it from your system prior to connecting<br />

to the <strong>University</strong>’s network. If you do not remove the application, you should ensure your system is set to<br />

prevent the application from acting as a provider <strong>of</strong> unlicensed materials to other users. Failure to restrict<br />

the application, whether you are aware <strong>of</strong> the violation or not, will result in the <strong>University</strong>’s Information<br />

Technology department (UC<strong>IT</strong>) removing your machine from the network until the copyright violation is<br />

rectified.<br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!