Peer-to-Peer Internet Guidelines and Information

Periodic slowness of the on-campus student Internet is often the result of excessive torrent traffic, caused by the excessive use of peer-to-peer software. Such traffic and usage is in violation of University Internet usage policy and is strictly prohibited. In order to preserve the integrity and performance of our Internet connection for academic purposes and conventional bandwidth demands, it is necessary for the University to take action restricting such usage and offending users.

You are responsible for all activity that transpires through your devices connected to the Cairn network. Illegal downloads and content sharing may result in serious legal penalties, both civil and criminal. Civil penalties may include penalties from $750 to $30,000 per work that is infringed. Criminal penalties can include fines and imprisonment.

Orgainizations such as RIAA and MPAA monitor P2P traffic and networks capturing the IP adresss of their users and the files being downloaded and uploaded. Once an IP address and other information has been obtained by the copyright owner, the RIAA, MPAA and other copyright owners can file a lawsuit and issue a subpena to the ISP demanding the identity of the user connected to that IP address. Here is a detailed explanation on how they do it from Chronicle.com and Q&A from RIAA.

It is our desire that all Internet users in the University community willingly comply with the community guidelines and the copyright owner rights. Downloading and sharing illegal content is not worth the civil and criminal penalties by the copyright owners. Additionally, computers with P2P software are extremely vulnerable to viruses, malware and other identity theft risks.

Those who fail to comply will have their Internet access suspended until the computer is demonstrated to be in compliance.

More information and resources on P2P software

The following resources are directions on disabling and uninstalling P2P applications courtesy of the University of Southwest.

  Acquisition   LimeWire
  Aimster   (Note: Aimster is now called
  Madster and is now a  subscription service. The current version of the software may differ from what is shown here.)
  LordofSearch
  Ares   Mactella
  Ares Lite   Morpheus
  BearShare   NeoNapster
  BitTorrent 
  (and other BitTorrent clients)
  OneMX
  Blubster   Phex
 Direct Connect   Piolet
 eDonkey2000 and Overnet   Poisoned
 Freewire   Qtella
 Gnotella   Shareaza
 Gnucleus   SoulSeek
 Grokster

  SwapNut

 GTK-Gnutella

  TrustyFiles

 Kazaa Lite and Kazaa Lite K++

  Warez P2P

Kazaa Media Desktop 

  WinMX

 

  XoLoX

Once you have removed any P2P file sharing applications, it is a good idea to download Spybot Search and Destroy and Malwarebytes,  and run a full scan of your computer.

 If you have additional questions or need assistance, please contact the Technology Services helpdesk at ts@cairn.edu or 215.702.4554.