{"id":1435,"date":"2018-12-05T14:50:50","date_gmt":"2018-12-05T20:50:50","guid":{"rendered":"https:\/\/www.missouriwestern.edu\/techservices\/?page_id=1435"},"modified":"2019-03-29T13:21:13","modified_gmt":"2019-03-29T18:21:13","slug":"file-sharing","status":"publish","type":"page","link":"https:\/\/www.missouriwestern.edu\/techservices\/file-sharing\/","title":{"rendered":"File Sharing"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:30px;padding-bottom:0px;padding-left:30px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-first\" style=\"width:65.3333%; margin-right: 4%;margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\" style=\"transform:translate3d(0,0,0);\"><p>MWSU computing facilities are provided in order to promote and support academic pursuits. Academic computer facilities are therefore to be used only for instruction and research activities. Listed here are certain responsibilities and the ethical behavior expected of you as a computer user. The guidelines presented here reflect U.S. Copyright Law, the Law of the State of Missouri, and additional specific rules relative to the MWSU campus. It is the intent of Missouri Western State University to adhere to the provisions of copyright laws relative to software and to comply with licensing agreements and\/or policy statements contained in the software packages used on campus. If you need further clarification regarding these guidelines, please contact Information Technology Services.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:20px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"border-color:#e0dede;border-top-width:0px;border-bottom-width:0px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-title-center fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-bottom:31px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><h2 class=\"title-heading-center\" style=\"margin:0;\">Top Three Ways to Ensure Compliance with the Law<\/h2><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-tabs fusion-tabs-1 classic horizontal-tabs icon-position-left\"><style type=\"text\/css\">.fusion-tabs.fusion-tabs-1 .nav-tabs li a.tab-link{border-top-color:#ffc700;background-color:#ffc700;}.fusion-tabs.fusion-tabs-1 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link:hover,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link:hover,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav,.fusion-tabs.fusion-tabs-1 .nav-tabs,.fusion-tabs.fusion-tabs-1 .tab-content .tab-pane{border-color:#777777;}<\/style><div class=\"nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-963b80642d026a0e73f\" aria-selected=\"true\" id=\"fusion-tab-1.\" href=\"#tab-963b80642d026a0e73f\"><h4 class=\"fusion-tab-heading\">1.<\/h4><\/a><\/li><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-260aa5e513d2f3289c5\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-2.\" href=\"#tab-260aa5e513d2f3289c5\"><h4 class=\"fusion-tab-heading\">2.<\/h4><\/a><\/li><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b1c7b9ba30d7677b9fe\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-3.\" href=\"#tab-b1c7b9ba30d7677b9fe\"><h4 class=\"fusion-tab-heading\">3.<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\"><li class=\"active\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-963b80642d026a0e73f\" aria-selected=\"true\" id=\"mobile-fusion-tab-1.\" href=\"#tab-963b80642d026a0e73f\"><h4 class=\"fusion-tab-heading\">1.<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-1.\" id=\"tab-963b80642d026a0e73f\">\n<p><b>Do not install P2P file-sharing software on your computer<\/b><\/p>\n<ul>\n<li>By default, P2P applications will search for and share content on your computer with others. P2P applications usually run as soon as you turn on your computer and continue to run in the background. Even if you disable uploading, copyrighted content in a \u201cshared\u201d folder can be seen by others using the same P2P network and many P2P programs may reset preferences to resume uploading.<\/li>\n<li>The Recording Industry Association of America (RIAA) and other content owners use the same P2P software that file sharers do! Their aim is to catch file sharers sharing their protected content with others. If you\u2019re running a P2P program, chances are that the RIAA is running the same software. In fact, the person downloading a song from you may be working for the RIAA and may be compiling evidence against you. It has happened to thousands of P2P users, and it can happen to you.<\/li>\n<\/ul>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\"><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-260aa5e513d2f3289c5\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-2.\" href=\"#tab-260aa5e513d2f3289c5\"><h4 class=\"fusion-tab-heading\">2.<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-2.\" id=\"tab-260aa5e513d2f3289c5\">\n<p><b>Do not use a University network for file sharing<\/b><\/p>\n<ul>\n<li>Content owners specifically target illegal file sharing on university networks. The RIAA has employed aggressive legal strategies, such as forwarding the University legal documents for alleged infringers and filing infringement lawsuits.<\/li>\n<\/ul>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\"><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b1c7b9ba30d7677b9fe\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-3.\" href=\"#tab-b1c7b9ba30d7677b9fe\"><h4 class=\"fusion-tab-heading\">3.<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-3.\" id=\"tab-b1c7b9ba30d7677b9fe\">\n<p><b>Always be sure to secure your wireless router in your residence hall or home<\/b><\/p>\n<ul>\n<li>If you\u2019ve registered your wireless router using your NetID, any activity that occurs on the router can be tracked back to you. This means that if your roommate is sharing copyrighted works using the wireless connection that you set up in your residence hall, you can be held personally responsible, and be sued by the RIAA.<\/li>\n<li>If you use VPN connections from home, your home network becomes visible as part of the MWSU network.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"width:30.6666%;margin-top:0px;margin-bottom:20px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\">#accordion-1435-1 .fusion-panel:hover, #accordion-1435-1 .fusion-panel.hover{ background-color: #ffffff } #accordion-1435-1 .fusion-panel { border-color:#cccccc; border-width:1px; background-color:#f9f9f9; }.fusion-accordian  #accordion-1435-1 .panel-title a .fa-fusion-box{ color: #ffffff;}.fusion-accordian  #accordion-1435-1 .panel-title a .fa-fusion-box:before{ font-size: 13px; width: 13px;}.fusion-accordian  #accordion-1435-1 .panel-title a{font-size:18px;}.fusion-accordian  #accordion-1435-1 .fa-fusion-box { background-color: #333333;border-color: #333333;}.fusion-accordian  #accordion-1435-1 .panel-title a:hover, #accordion-1435-1 .fusion-toggle-boxed-mode:hover .panel-title a { color: #3a3a3a;}.fusion-accordian  #accordion-1435-1 .panel-title .active .fa-fusion-box,.fusion-accordian  #accordion-1435-1 .panel-title a:hover .fa-fusion-box { background-color: #3a3a3a!important;border-color: #3a3a3a!important;}<\/style><div class=\"accordian fusion-accordian\"><div class=\"panel-group\" id=\"accordion-1435-1\" role=\"tablist\"><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"aa31081ce571a838b\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#aa31081ce571a838b\" href=\"#aa31081ce571a838b\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is a takedown or Digital Millennium Copyright Act (DMCA) Notice?<\/span><\/a><\/h4><\/div><div id=\"aa31081ce571a838b\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b><\/b>Takedown or DMCA Notices are the most common type of copyright infringement notices that the University receives. Content owners such as the Recording Industry Association of America (RIAA) and Motion Picture Association of America (MPAA) send these notices to the ISP provider (MWSU) from which the file was made available.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"bcb226afb9ba9ee5f\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#bcb226afb9ba9ee5f\" href=\"#bcb226afb9ba9ee5f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">How does the University handle takedown DMCA (RIAA and MPAA) notices against students?<\/span><\/a><\/h4><\/div><div id=\"bcb226afb9ba9ee5f\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b><\/b>When Missouri Western State University, as an ISP provider, receives a takedown DMCA notice regarding a particular user, the notice provides the user\u2019s external IP address, infringement details, the date and time of the infringement. The user\u2019s external IP is then traced to the internal IP, the MAC address, and finally to the user\u2019s ID.<\/p>\n<p>The user is then notified by email that their personal computer was used to reproduce and\/or distribute unauthorized copies of one or more copyrighted recordings. The Director of IT Services and the System Administrator are also notified of the infringement.<\/p>\n<p>The email states that this is a violation of federal copyright laws and the MWSU Computing Guidelines.<\/p>\n<p>The email includes instructions for obtaining assistance in properly removing any illegal file(s) and the elimination of the file sharing capability within the file sharing application (e.g. Limewire, Gnutella, Frostwire, Napster, BitTorrent, etc.) used to distribute the file(s) from your computer.<\/p>\n<p>The user is required to provide written confirmation of compliance, by emailing the ITS System Administrator by the date indicated in the original email.<\/p>\n<p>A second violation results in the offender\u2019s access to the campus network being deactivated. The offender must contact the ITS department and arrange to meet with an ITS staff member to discuss the reason for a second violation and to educate the offender regarding their illegal activities. The violation may be forwarded to the Computer Usage Hearing Panel. A third violation results in the offender\u2019s access being deactivated and a hearing is scheduled with the Computer Usage Hearing Panel to determine disciplinary measures. The violation may be forwarded to the Dean of Students.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"4008558ce78f3b26f\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#4008558ce78f3b26f\" href=\"#4008558ce78f3b26f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What happens if I don\u2019t acknowledge the notice or comply with the University\u2019s requests?<\/span><\/a><\/h4><\/div><div id=\"4008558ce78f3b26f\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b><\/b>If the user does not comply by the date indicated in the original email (usually five business days), the user\u2019s access to the MWSU computer resources and MWSU network is terminated.<\/p>\n<p>Should the user violate any MWSU Computing Guideline or the MWSU Acceptable Use Policy during the remainder of the current semester, the user\u2019s access to the MWSU computer resources and MWSU network is suspended.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"2b0d464c6f6a11dbe\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#2b0d464c6f6a11dbe\" href=\"#2b0d464c6f6a11dbe\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">If I comply with all of the University\u2019s requests, am I protected from further action against me?<\/span><\/a><\/h4><\/div><div id=\"2b0d464c6f6a11dbe\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b><\/b>As a matter of University policy, you must comply with the procedures. It is important to understand that even if you comply fully with the University\u2019s takedown procedure, you are not shielded from potential liability from third parties like the RIAA, who retain the right to sue you for the underlying infringing activity.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"238f6d4dc6f0f226b\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#238f6d4dc6f0f226b\" href=\"#238f6d4dc6f0f226b\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is a Preservation Notice?<\/span><\/a><\/h4><\/div><div id=\"238f6d4dc6f0f226b\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b><\/b>The RIAA sometimes sends preservation notices to MWSU requesting that MWSU preserve contact information of the persons associated with IP addresses alleged to have infringed their copyrighted works. MWSU will generally comply with such notices; however, MWSU will not release the contact information based on the preservation letter alone. Preservation notices are sometimes followed by early settlement letters.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"22584020f240ca861\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#22584020f240ca861\" href=\"#22584020f240ca861\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is an Early Settlement Letter?<\/span><\/a><\/h4><\/div><div id=\"22584020f240ca861\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b><\/b>The RIAA sends campus ISPs, such as MWSU, \u201cEarly Settlement Letters\u201d to be forwarded to the persons associated with IP addresses alleged to have infringed their copyrighted works. The early settlement letter advises the user that he or she may soon be subject to a lawsuit in connection with the allegedly infringing activity, provides a sample of the recordings that the user allegedly infringed, and suggests that user consider settling the claim to avoid the RIAA filing their claims in court (the \u201cEarly Settlement Letter\u201d includes a link to a settlement website where a credit card payment can be made ).<\/p>\n<p>Since December 2008, the RIAA has stated publicly that it has suspended its early settlement process, but there is no guarantee that it will not sue students again.<\/p>\n<p>If at some point, Early Settlement Letters are reintroduced and you receive one, you may wish to seek the advice of an attorney. The University\u2019s Office of the General Counsel does not represent students, so you would need to seek independent legal representation.<\/p>\n<p>Past letter recipients who did not want to settle with the RIAA were frequently sued. As part of this process, the RIAA would issue a subpoena to MWSU requesting the disclosure of your name and identifying information.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"b1c0575b8e7cd8079\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#b1c0575b8e7cd8079\" href=\"#b1c0575b8e7cd8079\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">How does MWSU respond to subpoenas from the RIAA?<\/span><\/a><\/h4><\/div><div id=\"b1c0575b8e7cd8079\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>If served with a valid subpoena from the RIAA, the University will comply with the subpoena, providing the requested information.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"a894c7883fae27158\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#a894c7883fae27158\" href=\"#a894c7883fae27158\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">I didn\u2019t personally upload any copyrighted materials. Am I still responsible?<\/span><\/a><\/h4><\/div><div id=\"a894c7883fae27158\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>You are responsible for any violation that occurs using your registered network addresses. This includes any downloading that occurs on a wireless router that you have registered on the University network or activity using a VPN connection to the MWSU network.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"f26f3b56170f11fe0\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#f26f3b56170f11fe0\" href=\"#f26f3b56170f11fe0\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">I bought those songs legally using iTunes (or similar software). Why am I receiving a complaint?<\/span><\/a><\/h4><\/div><div id=\"f26f3b56170f11fe0\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Even if you have legally purchased a copyrighted work, it is still a violation of copyright law to distribute it to others without the content owner\u2019s permission. If you are making the works available for downloading (whether knowingly or not), you may receive an infringement notice or be subject to other legal action based on the copyright holder claims that you are allowing other people to download their material.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default fusion-toggle-no-divider fusion-toggle-boxed-mode\" role=\"tabpanel\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-selected=\"false\" aria-controls=\"9e2df65190366abf2\" role=\"tab\" data-toggle=\"collapse\" data-parent=\"#accordion-1435-1\" data-target=\"#9e2df65190366abf2\" href=\"#9e2df65190366abf2\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">How can I be sure that I am not sharing copyrighted works on my computer with others?<\/span><\/a><\/h4><\/div><div id=\"9e2df65190366abf2\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b><\/b>By default, P2P file-sharing applications enable uploading of files from your computer to others. To stop uploading, you either have to remove the P2P application from your computer, locate and change the options that control uploading in the application, or disconnect the computer from the network. Even after you have disabled uploading on a P2P application, a software update or other resetting mechanism may reset your preferences to resume uploading. You can reduce this risk by monitoring your use of the software, learning about the underlying technology, and familiarizing yourself with the laws that govern your use of these applications. If you want to be certain that you are not distributing copyright files over the Internet and campus network contact ITS Help Desk for assistance in removing the P2P software application.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"border-color:#e0dede;border-top-width:0px;border-bottom-width:0px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/pages\/1435"}],"collection":[{"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/comments?post=1435"}],"version-history":[{"count":10,"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/pages\/1435\/revisions"}],"predecessor-version":[{"id":1496,"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/pages\/1435\/revisions\/1496"}],"wp:attachment":[{"href":"https:\/\/www.missouriwestern.edu\/techservices\/wp-json\/wp\/v2\/media?parent=1435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}