Practicing Conscientious Downloading
Think before you download. The majority of Internet threats are not clever enough to sneak onto your computer without you opening the door for them. Follow these guidelines to protect your computer and minimize the impact file sharing can have on other network users:
- Never open e-mail attachments from people you don’t know. Never open suspicious and unexpected e-mail attachments, even from people you DO know.
- Do not use file-sharing software. Downloading software you do not own is a copyright violation, and those files often contain malicious software. When downloading software, try to download from reliable and well-known sites. A list of legal alternatives for obtaining music and movies is available at http://www.educause.edu/legalcontent. Be cautious of less reputable sites or ones you haven’t previously used.
- Turn off your computer when you’re not using it. This ensures there is no un-monitored network activity originating from your computer, and is environmentally conscious.
- Download during off-peak hours when student bandwidth is highest. See the Networking page for more information.
- Remember that sharing copyrighted material is against Trinity’s Acceptable Use Policy.
The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material regardless of the format of that material. This includes downloading of copyrighted material such as songs and movies. Copyright law is complicated and its interpretation is sometimes controversial.
In simple terms, it is possession of the file or song when you have not paid for it that makes it a violation of the rights of the copyright holder. With the exception of several specific fair use exceptions, the only time a copy of a file, song, or movie is legal is when you own the CD, DVD, program or file and you use the copy only as a backup.
The Digital Millennium Copyright Act (DMCA)
Copyright holders are regularly scanning the Internet looking for illegal file sharing of copyrighted material. If they detect such activity they can file a complaint using the DMCA. The DMCA specifies procedures that Trinity must follow when notified of a copyright violation by an individual using our network. If the copyright holder contacts Trinity (called an infringement notice) about a violation we will contact the violator and require removal of the offending material from his/her computer. If the material is not removed, the person’s computer will be restricted from accessing the network. The copyright holder also has the option to pursue a civil case against the individual who is infringing on their copyright. If the copyright holder