Just like protecting yourself and personal belongings, keeping your digital "life" safe and secure should be one of your utmost concerns. You should keep your usernames and passwords a secret (do not share them under any circumstances). SU Technology staff will never ask for your online credentials, nor will any other Schreiner University employee. Consider any request for usernames and/or passwords (via e-mail or by phone) an attempt to exploit your personal account.
- Best Practices
- Protecting Your Information
- Wireless Networks
- Who to Contact for Help or Issues
- Keep an updated anti-virus and anti-malware program on your computer
- Back up important documents (in several places)
- Keep your computer up to date
- Watch for scams or phishing attempts
- Be wary of downloading files from unknown websites
Notice to the Schreiner University Students about P2P and File Sharing
In 2008 the Higher Education Opportunity Act was signed into law. Several of the Act’s provisions are intended to reduce unauthorized duplication of copyrighted works through peer-to-peer (P2P) file sharing on campus networks. In compliance with that legislation and the Department of Education’s regulations in 34 C.F.R. Part 668 (Subpart D) you are hereby notified of this Act and are STRONGLY ADVISED to read this notice thoroughly. Paper copies of this notice and the information referenced in it are available upon request and are included in all new student and parent information packets.
Schreiner University provides a high speed network and other information technology resources to help you accomplish your educational and instructional goals. When you access our network or when you sign on using your Schreiner ID/user name and password, you agree to comply with the University’s Responsible Computing Policy and with the Student Code of Conduct. Both policies include a section on copyright compliance and are included in the Student Handbook (pages 24 & 37) and are posted on University’s website. (http://www.schreiner.edu/handbook/) These policies prohibit the use of University resources for unauthorized duplication, use, or distribution of copyrighted materials, including music and video files. The University considers unauthorized peer-to-peer file sharing of copyrighted content (such as but not limited to music, videos, text-based documents) to be an inappropriate use of its network resources. Moreover, such activity is illegal under the Digital Millennium Copyright Act (DMCA) and exposes you to serious civil and criminal penalties.
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than $750 and not more than $30,000 per work infringed. For "willful" infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see Title 17, United States Code, Sections 504, 505.
The DMCA is a federal law that criminalizes production and dissemination of technology, devices, and services intended to circumvent copyright protections. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Criminal penalties for first-time offenders can include fines of up to $250,000 and incarceration for up to five years. In civil court, damages of up to $150,000 are possible for EACH movie or song that has been illegally acquired or shared. For more information, please see the Web site of the U.S. Copyright Office at http://www.copyright.gov. The FAQ's are particularly informative: www.copyright.gov/help/faq.
In December 2008, the Recording Industry Association of America (RIAA) announced that it was abandoning its longstanding practice of filing law suits against students for infringing copyrights via illegal file sharing. The RIAA had reportedly filed over 17,500 lawsuits through early 2008 (see http://www.p2plawsuits.com). Despite the new moratorium on law suits, the RIAA’s aggressive enforcement campaign continues on other fronts and the University urges all students to refrain from copyright infringing behavior.
Schreiner University does not routinely monitor the content of network transmissions except as necessary to identify and repel network attacks, viruses, worms, and other malware. However, many P2P networks are used almost exclusively for illegal file sharing and are also favorite channels for spreading malware due to their popularity and pervasiveness. To mitigate these threats, the University employs various methods to block illegitimate P2P network traffic at the perimeter of its network. For example, The University employs traffic/packet shaping which allows the campus to ensure smooth flow of content to and from the Internet with the ability to prioritize traffic based on need or policy. Traffic-shaping technology also allows for dynamic partitioning. Dynamic partitioning gives the network administrator the ability to determine large bandwidth users and abusers. Note, however, that these methods are not 100% effective; all P2P traffic is not blocked at all times. Students should assume that P2P file sharing activity on the campus network is visible to the RIAA and other content owners that monitor the Internet for copyright infringement activity.
Copyright Enforcement Activities
The Recording Industry Association of America (RIAA) and other content owners are aggressively trying to stop unauthorized downloading, copying, and sharing of music and video by college students. They monitor the Internet continually to identify Internet Protocol (IP) addresses involved in these activities, but they require assistance from the Internet Service Provider (ISP) to communicate with an alleged infringer. They generally seek the ISP’s help in communicating DMCA takedown notices, preservation requests, pre-litigation settlement letters, and subpoenas (in connection with law suits). These four communications operate independently and do not necessarily progress from one to another. For example, nothing prevents the initial communication from being a subpoena that seeks the identity of a user connected at a specific IP address at a specific day and time.
DMCA Takedown Notices
When a content owner determines that an IP address has been used to violate its copyright, it sends a Takedown Notice to the applicable Internet Service Provider (ISP) describing the IP address, date, time, and material involved in the alleged infringement. The notice requests that the ISP remove or disable access to the listed material under the terms of the DMCA.
When Schreiner University receives such a Takedown Notice, it reviews its network activity records to independently validate the legitimacy of the complaint. If the complaint appears valid, the University suspends the offending computer’s network access until the infringing material is removed. First offenders regain network access once proof of removal is provided and an acknowledgement is signed. Repeat offenders are referred to the Dean of Students for additional sanctions, up to and including expulsion from the University.
The University also notifies the sender of the Notice that a) appropriate removal actions have been taken, or b) the allegation could not be validated through network activity records. The University does not provide any user identifying information to the sender of the Notice unless the Notice is accompanied or followed by a lawfully issued subpoena. Likewise, the University does not forward a copy of the Takedown Notice itself to the alleged infringer.
Preservation Requests are used to notify the ISP that a subpoena may be served on it seeking identifying information about a network user who has allegedly infringed a content owner’s copyrighted material. Like the Takedown Notice, the Preservation Request identifies an alleged infringer's IP address at the time of the alleged infringement. The Preservation Request asks the ISP to preserve the identifying information for the user connected via that IP address at that time.
Schreiner University first determines if the information provided in the Request may be sufficient to implicate a specific user. If not, the University notifies the requesting party of its inability to comply. If a specific user is implicated, the University preserves the information as requested and forwards the Request to that user via email. The cover email explains the nature of the Request, encourages the user to preserve evidence relating to the claims in the Request, and informs them that they may wish to obtain legal advice before taking any other action. Once again, Schreiner University will not release a user’s identifying information in response to a Preservation Request unless and until the Request is accompanied or followed by a lawfully issued subpoena.
Pre-Litigation Settlement Letters
Prior to abandoning the “sue the customer” strategy, the RIAA’s outside legal counsel sent what were known as "Pre-Litigation Settlement Letters" to many universities and other ISP’s. The Settlement Letter was generally sent to the ISP with a request that it be forwarded to the user of a particular IP address. The Letter alleged that the user of that particular IP address had violated copyright laws and presented an opportunity to settle the claim as early as possible at a "significantly reduced amount" compared to the judgment that a court might impose at the end of a lawsuit. The Letter also informed the user to preserve evidence relating to the claims and instructed the user to retain, and not delete, any peer-to-peer programs.
Should the RIAA or another copyright owner resurrect lawsuits and settlement letters, Schreiner University’s practice is, and has always been, to forward a Settlement Letter along with an explanation to the alleged infringer if the University’s network activity logs can establish the identity of the person at the specified IP address with a reasonable degree of certainty. Because network log data can be unavailable or inconclusive, the University cannot guarantee that all Settlement Letters will be forwarded to alleged infringers. Individuals should not expect to receive such a letter prior to being sued for copyright infringement. Based on the wording in recent Settlement Letters, recipients must settle within twenty (20) days of the date of the Settlement Letter or face a lawsuit. Recipients are encouraged to seek legal counsel before taking any action.
Lawsuits and Subpoenas
In cases where no settlement is reached, the RIAA and member companies had been filing lawsuits in Federal District Courts. The suits alleged that unnamed students have infringed copyrights by downloading certain information and, for some, distributing the information to others over the Internet. After filing these "John Doe" lawsuits identifying only IP addresses, the companies served subpoenas on universities seeking the identity of the users associated with those IP addresses.
If and when Schreiner University receives such a subpoena, the University first ensures that the subpoena is valid and lawful. If so, and if the information sought in the subpoenas exists, the University is legally required to provide the desired information. While complying with the subpoena, the University notifies the individuals being identified in the subpoena response. The University has heard but cannot confirm that companies first used the subpoenaed information to try to settle the matter with the identified individuals, and if a settlement was not reached, the companies would amend the lawsuits to name the individual students and proceed in court.
Obtaining Legal Advice
Information provided in this notice does NOT constitute legal advice. It is intended for information and educational purposes only. Every situation is unique and you are encouraged to consult an attorney if you need specific legal advice. Links to legal web sites, such as those provided below, do not constitute an endorsement of any legal services. Neither the downloading of materials nor any communication with respect to this Notice constitutes the formation of an attorney-client relationship. In reading and acting upon this Notice, you acknowledge that nothing in the Notice is intended to or constitutes the practice of law or the giving of legal advice.
Finding an attorney to explain your rights and options
Subpoena Defense Alliance
State Bar of Texas Lawyer Referral Information Service
For further information about copyright and file sharing laws and policies, as well as legal options for downloading music and video, visit: Logan Library’s Copyright Resources.
Other questions about this message should be directed to
Candice Scott, Library and Information Services, 830-792-7318 (firstname.lastname@example.org)
Information Technology Help Desk, 830-792-7344 (email@example.com)
Portions of this document are based on policy and procedure statements by Texas State University and are used with permission.
Phishing is an attempt to route the receiver of an email message to web document (webpage) where you will be instructed to enter your username and password, or in some cases your personal information. Internet scammers are very talented in reproducing popular webpages to look like the real thing (this can include bank websites, email websites, and social media websites). It is in your best interest to be vigilant and inspect the webpage and URL closely before entering any sensitive information. Generally you are not sent email from an individual or company you don't already have an existing relationship with and be instructed to enter sensitive information.
One of the worst things that can happen to a college student is to lose important courework or data before a project or assignment is due. At Schreiner University you will be issued a network drive to store documents, but you are encouraged to keep a local copy or copies of the information on your computer as well as backing up your data on a seperate drive (flash drive, USB drive, or external hard drive). These days there are many free cloud drives and back-up programs that enable you to store a multitude of file types and documents that can be accessed via the internet from various devices. Ensure that you agree to the terms of cloud storage applications before placing your documents there. The best way to safeguard your work is on multiple physical drives that you own and control.
Spam is unwanted or unsolicited material that travels via email (commonly spam includes advertising or marketing in some fashion or another). Schreiner University has measures in place to reduce and block much of the spam that is aimed at our users and network. However, it us your responsibility to evaluate messages and files that are sent you. The best indicator that you have been sent spam is to examine closely the contact name and email address of the sender (or in many cases the URL that you are directed to). If you suspect the message is spam do not open the email, simply delete the message. If the same message is sent to you repeatedly, block the sender or contact the Help Desk.
Computer viruses implant instructions in other programs or storage devices, and can attack, scramble, or erase computer data. The danger of computer viruses lies in their ability to replicate themselves and spread from system to system. Few computing systems are immune to infection.
Please see the Network page about our wireless network.
Please visit our Help page for who to contact for technical or computer problems.