Drew Community  

Go Back   Drew Community > General Forums > Technology Discussion
uLogin ID  
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Thread Tools Search this Thread Display Modes
Old 08-31-2009, 08:30 PM
Simone Bennett's Avatar
Simone Bennett Simone Bennett is offline
Join Date: Apr 2009
Posts: 14
Question Music Downloads

I'm not sure if this question has been asked already but I'm just curious. Does the Drew Computer Initiative contract prohibit P2P file sharing sites like Limewire or Kazaa? Or is that just frowned upon because of piracy issues?
Reply With Quote
Old 08-31-2009, 10:24 PM
Andy A. Benavides Andy A. Benavides is offline
Ranger Cub
Join Date: Apr 2006
Posts: 59

its prohibited... and they can find out easily
Reply With Quote
Old 08-31-2009, 10:45 PM
Betsy Black's Avatar
Betsy Black Betsy Black is offline
Join Date: Jun 2005
Location: South Orange, NJ
Posts: 99

The Network User Agreement that every member of the Drew community must sign (make of it what you will!):

Use of University computing systems is governed by the following policy stated in Daniel's Dictionary:

Computing resources are provided for the use of faculty, students and staff for academic purposes. The privilege of use by a student is not transferable to another student, to an outside individual, or to an outside organization. Misuse of computer facilities is considered a serious judicial offense at Drew and carries sanctions for anyone found in violation of the university's policy.

As a member of the Drew community, there are rules and policies which you must abide by to keep the network secure and available for all to use, and to maintain an atmosphere where all are welcome. Your use of Drew's networking services connects you to the entire Drew community and to the world via the Internet, and therefore reflects on you and on the institution.

Please take these responsibilities seriously and read this agreement carefully.

  1. The Drew network is to be used primarily for purposes of fulfilling the university's academic mission. It is intended to be used as a tool to enhance your education and is not available for unrestricted use for other purposes. Non-academic use of the Drew network will always be restricted in favor of academic usage when the situation dictates.

  2. The university provides the Drew network exclusively to you as a member of the Drew community. Your network identity and uLogin account uniquely identify you, and are not transferable to other members of the Drew community or to people outside of Drew.

  3. Protect your uLogin password or other credentials at all times. You will be held responsible for all activities which occur with your uLogin account.

  4. The Drew network is a shared resource. Therefore, network use or applications which inhibit or interfere with the use of the network by others are not permitted. At times, network administrators may ask you to restrict your use of the network or not to use the network because of a temporary condition. You must comply with those requests. Applications which use an unusually high proportion of network bandwidth for extended periods of time, including, but not limited to, running servers or network games, are not permitted and may be shut down, with the user contacted as soon as possible.

  5. There are university standards for network software and hardware that can be used on the Drew network. Computers, network cards and software issued by Drew become the standard. Use of hardware or network software other than the university standard without permission may be restricted. Hardware or software that interferes with network operation will be removed or disabled.

  6. Users of the Drew network must comply with federal, state, and local laws and ordinances.

  7. Users of the Drew network must comply with U.S. Copyright Law as it applies to electronic files, including media content, music, movies, video and other information.

  8. Users of the Drew network can expect that their data is confidential and secure. Network administrators will access data on the system, either stored or in transit, only to maintain network operation or security, and will adhere to the SAGE Code of Ethics (http://www.sage.org/ethics/ethics.html) when doing so. Contents of personal files may be accessed by programs designed to do heuristic searches for materials that could interfere with network operation or security. Files may be individually searched for investigative purposes only when ordered by a court of competent jurisdiction or when there is an alleged violation of University regulations and the search is authorized by the Dean of the College, Graduate School, or Theological School, the Dean of Student Life or their designated representatives. Search and notification procedures specified in Appendix 5 of Daniel's Dictionary will be followed.

  9. Drew network services and wiring may not be modified, tampered with or extended. This applies to all network wiring, network jacks and hardware. If you cause damage by modifying or tampering with network wiring, jacks or hardware, you will be held financially responsible for such damage and may be subject to disciplinary procedures.

  10. Malicious use of the network is strictly forbidden by university computer usage policies. This includes but is not limited to: sending harassing or threatening messages; attempting to forge messages, crack passwords, intercept data or circumvent server security; sending bulk unsolicited email, or sending data intended to disrupt services.

  11. Support of the Drew network is provided through university staff, student employees and outside vendors. Drew's goal is to provide 24 hour service to all users. In the event of critical system failures (loss of an entire building, critical server, or large amount of network infrastructure) we strive for a 2 hour response time, with an 8 hour resolution. We will strive to resolve non-critical issues within 2 business days.
Manager, User Services
Computing & Network Services
Library 131
Reply With Quote
Old 09-01-2009, 09:49 AM
Jonathan B. Reams's Avatar
Jonathan B. Reams Jonathan B. Reams is offline
Ranger Cub
Join Date: Jun 2005
Posts: 36

So to summarize, the Drew network agreement does prohibit any file sharing that would breach copyright laws (see numbers 6 and 7). But the bigger issue is that it's against the law. If you're breaking the law, the Drew network user agreement is not the biggest problem you're going to potentially run into. CNS is not in the habit of monitoring the activity of any specific individuals on the network, except as required by law, but I can assure you the RIAA is monitoring kazaa and limewire. So in answer to your question, yes illegal file sharing is prohibited by your network user agreement and yes it is frowned upon because we don't want any students to break the law.
Reply With Quote
Old 09-01-2009, 10:16 AM
Brian R. Gardner's Avatar
Brian R. Gardner Brian R. Gardner is offline
Join Date: Jun 2005
Posts: 13

It's also worth highlighting 2 points:

First, many P2P clients are excellent sources of mal/spyware, viruses, etc. It is your responsibility to keep your computer running properly. The computer isn't "bad" or "junk" if you've loaded it up with spyware and 20 things that run at startup. (And I'm refering to the generic "you" here, not Simone specifically of course.)

Second, Drew's network and internet connection is fundamentally a shared resource. If you're finding that it's not performing as fast as you'd expect, everyone running constant downloads (and such) is partly responsible.

Just some food for thought, if the legal argument doesn't sway you.
Reply With Quote
Old 09-01-2009, 10:36 AM
Simone Bennett's Avatar
Simone Bennett Simone Bennett is offline
Join Date: Apr 2009
Posts: 14

Thanks for the info.
Reply With Quote
Old 09-01-2009, 11:55 AM
Mike Richichi's Avatar
Mike Richichi Mike Richichi is offline
Join Date: Jun 2005
Location: Chatham, NJ
Posts: 220

We do have a bandwidth shaping appliance on our Internet connection, but it works exclusively on monitoring how much traffic is coming from or to each client on our network--and if it's disproportionately large will reduce that client's ability to send and receive data. It knows nothing about protocols or files being sent. It is designed to ensure that interactive users of the Web have enough bandwidth (another undesirable effect of most P2P apps is they will take all the bandwidth they can--and one person could basically monopolize our entire connection without bandwidth shaping.)

There are legitimate uses for P2P technology, and we don't want to be in the buisness of stopping the protocols themselves.

The US government recently passed a law that requires the University to take some more steps to educate users about illegal file sharing, and discuss the legal alternatives. There are draft guidelines being formulated now, and if you're interested you can see a summary of them on the Educause website. We'll be discussing these guidelines and documenting our compliance with them when they are official.
--Mike Richichi
Director of Computing and Network Services
Reply With Quote

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

All times are GMT -4. The time now is 03:46 PM.

Powered by vBulletin® Version 3.5.7
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.

Drew University is not responsible for the content of posts made on this site. All posts and comments reflect the opinion of the author.