As part of Indiana University’s mission of education and public service, the information contained on this page is presented to increase awareness surrounding digital copyright issues. While everyone has their own opinions and concerns, it is not possible to determine the outcome of the substantial and prolonged debate relating to peer-to-peer file sharing and digital copyright. You have the right to criticize the existing laws, petition your local, state, and federal government representatives for more consumer-friendly copyright laws, and boycott the content industry, but as of today, you DO NOT have the right to download or share copyrighted material without the copyright owners express permission. If you do so, you may face serious penalties under the law and University policy.
Please note that if you have received a notice from the University Information Security Office directing you to take the online tutorial and quiz, you must visit the copyright tutorial resolution page in order to resolve the incident.
If Indiana University receives a complaint that copyrighted material is being distributed from a computer that our records indicate is registered to your username, you must complete the copyright tutorial and quiz. This tutorial is a mandatory part of the resolution process. While IU does not actively search for instances of copyrighted infringement, we must respond to complaints of illegal activity on the IU network.
This tutorial provides basic educational materials. Specifically, you will understand how you were identified as sharing copyrighted materials, why doing so is illegal, and what you must do in response to these copyright complaints. This tutorial also includes directions for contesting this notice if you believe you were incorrectly identified.
File sharing applications, in and of themselves, are not illegal. They are simply technologies that enable the sharing of computer files. However, as with many technologies, people can use file sharing applications in ways that are legal or illegal.
File sharing applications allow your computer to connect to a peer-to-peer (P2P) network. Once connected, you are able to download and share files with other users on the network. P2P networking has been around for many years, but file sharing applications have made it easy to trade files with people around the world.
The files available on P2P networks (music, movies, software, etc.) are stored on each user's personal computer. When you download a file from this type of network, you connect directly to the computer of another user on that network. When others download a file you are sharing, they connect directly to your computer to obtain it.
Once installed, most P2P file sharing applications will automatically start up when you turn on your computer. If your computer has an internet connection, the application will automatically share out files. This makes it possible to unknowingly distribute copyrighted material by simply having a P2P file sharing application installed on your computer.
When you install file sharing applications, you may get more than you bargained for. Many install smaller applications known as spyware and adware without your knowledge. These applications can monitor your web surfing habits and generate pop-up advertisements.
Other users may gain access to files on your hard drive that you did not intend to share, or send you files infected with a virus. If your computer becomes infected, it could be used to attack other computers on the network.
Because the developers of some file sharing programs don't want you to uninstall their programs, your computer may continue sharing files via file sharing networks after you've tried to uninstall your file sharing software. For that reason, if you have received a copyright violation notice, it is wise to scan your computer for viruses and malware. It may be necessary to completely reinstall the operating system on the computer in order to guarantee that your computer will cease sharing illegal files.
Whenever someone creates something that is original and expressive and fixes that expression in a way that lets you read, see, hear, or perceive it, federal law gives the creator a copyright in that work. For example, if a musician writes or records a song, the law grants the creator a copyright as soon as it is fixed on paper or recorded.
The length of a copyright is generally the creators lifetime plus 70 years. During this time, he or she is the only person authorized to do any of the following with that work:
Make copies of it
Distribute it publicly
Make derivative works or adaptations based on it
Perform/Display it publicly
For sound recordings, perform it publicly through digital audio transmission
Give someone else permission to do any of the above
Downloading a file involves making a copy of it to your computer. Sharing files over a peer-to-peer network involves distributing and performing them publicly, because anyone using the application has access to it.
If you do not have the permission of the copyright holder, and you download and/or distribute their copyrighted material, then you are violating the copyright holder's rights and the law. This is known as copyright infringement.
There is currently no exception in copyright law that allows you to download or distribute whole works without the copyright holder's permission. Copyright law does allow some limited uses of others copyrighted works without the copyright holders permission. This is called Fair Use and will be briefly covered later in this tutorial.
It is important to understand the purpose of the copyright law and why the law grants copyright holders exclusive rights to their works for a period of time. Copyright law is intended to strike a balance. On one hand, it gives creators substantial control over the use of their works, so that they have an economic incentive to keep creating them. This benefits society by encouraging the creation of expressive works, which may contain facts and ideas (elements that are not protected by copyright) that people can use freely to expand knowledge within society.
On the other hand, copyright law limits the term of copyright and grants some rights to use works without the copyright holder's permission. This further promotes the flow of information and creativity in society.
Some people may not care about making money from their works and are happy to donate them to the public domain however, most expect to be compensated for using their time, talent, and creative energy. Even if music labels take a sizable amount of the money from sales of a musicians work, the musician will still make less money if sales are lost to illegal file sharing. Moreover, the labels use money from music sales to promote and support new or less popular musicians, labels may be less willing to do so if funds from music sales decrease due to illegal file sharing.
People who infringe copyrights can be sued by the copyright holders for substantial amounts of money. In addition, anyone who willfully infringes a copyright may be prosecuted and face jail time. There are also the costs of having to hire a lawyer and go to court to defend against an infringement claim.
Some people believe that if they just share files with others, and don't charge for the files or otherwise make any money from file sharing, that the law doesn't apply. THIS IS WRONG. Copyright holders can still sue you for money damages. The No Electronic Theft (NET) Act makes it a crime to reproduce, distribute, or share, electronically or otherwise, copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without any commercial purpose.
Copyright law, including the NET Act, applies to situations such as running a file sharing application with outgoing transfers enabled, hosting files on a Web account, transferring files through Internet Relay Chat (IRC), and other methods of making copyrighted material available over networks.
Copyright holders and trade associations representing them, like the Recording Industry Association of America (RIAA), Motion Picture Association of America (MPAA), and Business Software Alliance (BSA), spend a great deal of time and money scanning Internet traffic to identify the transfer of files containing copyrighted material. When they determine the IP address involved in the transfers, they generally send a Digital Millennium Copyright Act (DMCA) take-down notice to the user's Internet service provider.
For purposes of the DMCA, Indiana University is regarded as an Online Service Provider (OSP) for users of the IU information technology infrastructure. At IU, the University Information Security Office (UISO) receives these DMCA notices from copyright holders. The DMCA recognizes that OSPs like IU generally should not be held liable for infringement by their users. This protection is removed if OSPs learn of alleged infringement and do nothing about it.
In order for IU not to be held liable for illegal activity by our network users, we follow the provisions established within the DMCA. When IU receives a notice alleging that the user has infringed a copyright, we must act expeditiously to remove, or disable access to, the infringing material. To comply with this requirement, we notify the user and disable network access to the computer which held the IP address at the time of infringement. We are also required to adopt and implement a policy to terminate network access in appropriate circumstances for users who are repeat infringers. The exact steps and time frame for IU's response to copyright complaints are explained in detail later in the tutorial.
Yes. It is just more difficult and time consuming for them than it used to be but they can, and do, find out.
In the past, The Digital Millennium Copyright Act allowed copyright holders to issue subpoenas to Online Service Providers (OSP) seeking the identity of alleged infringers without a judge's consent. This was contested by Verizon in the case RIAA v. Verizon, and as a result copyright holders must first file a "John Doe" lawsuit against an infringer. The OSP is still required to supply the information expeditiously, and if Indiana University receives a valid subpoena concerning your file sharing activity, we will be compelled to turn over your identity.
Without a valid subpoena, Indiana University will not identify alleged copyright infringers to the copyright holder. Some DMCA takedown notices include a settlement offer. In these cases it is the infringer's option to self-identify. For assistance as to your acceptance or refusal of this settlement offer you should consult your personal attorney or Student Legal Services.
For over a decade the legal debate over P2P networks has increased. Many in the music industry argue that illegally shared music decreases retail sales and that this hurts artists. Other artists disagree and promote the sharing of their works. Some consumers claim that CDs are too expensive and music is not available in desired formats. The motion picture industry and software publishers have also joined the debate, seeking more vigorous enforcement of copyright law. At the same time, consumer rights groups such as the Electronic Frontier Foundation have voiced strong concerns about some of the methods proposed to deal with copyright infringement.
The debate is also occurring in Congress, where legislation related to copyright infringement on the Internet is frequently introduced. Much of the legislation proposed aims at strengthening copyright holders rights and protections. Some people feel that the changes being proposed are too extreme, while others feel they are necessary to stem a tide of copyright infringement.
As discussed previously, copyright law is intended to give creators certain rights to their work so that they can gain recognition and compensation. They have the exclusive right, for the term of the copyright, to reproduce, distribute, make adaptations, and publicly display or perform the work. However, copyright law does allow people to use copyrighted works without the copyright holders permission, in certain cases where the use is limited and serves an important public purpose. For example, the law allows for the fair use of a copyrighted work for such purposes as teaching, scholarship, research, criticism, comment, and news reporting. Whether or not a particular use is fair depends on the consideration of four factors:
The purpose and character of the use, including whether such use is of a commercial nature or is for non-profit educational purposes
The nature of the copyrighted work
The amount and substantiality of the portion used in relation to the copyrighted work as a whole and
The effect of the use upon the potential market for or value of the copyrighted work.
Students, faculty and staff at colleges and universities sometimes believe that any use they make of a copyrighted work falls under fair-use, and doesnt require the permission of the copyright holder, because they are associated with an educational institution. As you can see from the four factors above, that is not the case. In particular, if your use is not for educational purposes, and/or you have downloaded or shared the whole work (i.e. the whole movie, or whole song), and/or your doing so affects sales of that work or the market for licensing fees to use that work, it is highly unlikely that your use would be considered fair use. Put simply, downloading songs, movies, games, and software for your personal entertainment without explicit permission from the copyright owner is not fair use and is against the law.
If you wish to use copyrighted works for educational purposes, please visit the US Copyright Office for further information on whether and how your proposed use might be fair use under the copyright law, and on other circumstances in which you can lawfully use copyrighted material without permission from the copyright holder.
Pleading that you didn't know about the copyright law will not protect you from a lawsuit. Moreover, with all of the news about file sharing and copyright issues on the news, and all of the copyright education that schools like IU are providing, it is increasingly difficult for network users to say that they had no idea that copyright law applied to file sharing. It is your responsibility to be aware of and comply with the law. IU strongly encourages users to educate themselves about the current state of copyright law as it applies to file sharing over the Internet, and to keep up to date on changes to copyright legislation. IU provides network users with information on these issues.
Indiana University does not actively search for instances of copyrighted infringement. However, we do respond to complaints about inappropriate use of the IU network. Copyright owners actively search for copyright infringements of their works and send DMCA take-down notices to Indiana University.
Indiana University, as a public educational institution, allows a short time for individuals to educate themselves in copyright law and to either take down the materials themselves or produce whatever documented permission they have to share the files.
Indiana University's procedure in response to copyright notices, and user consequences of these actions, can be found here.
Although your personal computer may be blocked from accessing the network because of a copyright infringement, your IU computing accounts are not disabled. You are still able to access IU technology using other resources such as the Student Technology Centers (STC) and Residential Technology Centers (RTC). While this may be an inconvenience, connecting your personal computer to the IU network is a privilege, not a right. Of course, your use of STC or RTC computers must also comply with copyright law.
When you accept computing accounts at Indiana University, you agree to use the University's computing resources responsibly. A major part of responsible use is maintaining the security and confidentiality of your computer accounts and the information you store on them.
This agreement includes the following points:
Your computer accounts, passphrases, and other types of authorization are assigned to you alone. You should never share them with others.
Select an account passphrase according to UITS guidelines and change it every two years.
Protect your accounts. Log out when you're finished using them.
If you allow others to access your accounts, you can be held responsible for their actions on the network. For example, if you allow a friend to use your computer and they download or distribute copyrighted material illegally, you can be held responsible because your computer is identified in the notice that is sent to us from the copyright holder.
You are also responsible for following all applicable IU policies. For policy statements indicating what the general privileges and responsibilities are within the university computing environment, see the Acceptable Use Agreement.
Note: University units such as Colleges and Departments may have in place more specific policies related to the use of information technology.
To be sure that file sharing activity is ceased, it is best to completely reinstall the operating system on your computer. If you disregard this recommendation, then you must ensure that your file sharing application is not sharing files unless you have explicit permission from the copyright holders to share all of the files accessible to this application.
You can be held responsible for the file sharing activity of your computer, even if you are unaware of it.
For your own protection, you should assume that you do not have permission to download or distribute a file unless you have proof to the contrary. Before you download a file, research to determine if it is legal for you to do so. For example, check the Web sites of the copyright holder to see if they allow distribution of their materials in this manner.
When you purchase music, movies, games, etc., read the license carefully to learn if you have permission to convert the material to other formats for your own use, and whether or not you can share the material with others.
Keep up to date on the debate over intellectual property rights legislation, and ensure that your voice is heard by your local legislators if you have an opinion on current laws and proposed changes.
Fair use only applies to specific situations. Fair use depends on balancing the four factors: the purpose, nature, amount and market effect of the use. Downloading or distributing songs, movies, software, and games for personal entertainment is NOT fair use.
NOTE: It’s important to realize that contesting a notice should not be taken lightly. If we find during the course of our investigation that you misrepresented yourself when contesting, then the incident will be immediately referred to the appropriate disciplinary office.