Southern Appalachian Digital Collections

Western Carolina University (21) View all

Western Carolinian Volume 68 Number 01

items 13 of 24 items
  • hl_westerncarolinian_2003-09-02_vol68_no01_13.jpg
Item
?

Item’s are ‘child’ level descriptions to ‘parent’ objects, (e.g. one page of a whole book).

  • STUDENT LIFE PEER TO PEER SWAPPING CAN GET YOUR WEB CONNECTION UNPLUGGED ANOTHER "READ THIS ARTICLE BEFORE YOU DOWNLOAD ANOTHER MUSIC FILE" OVERVIEW: DMCA Your Port Access Blocked By Eric Newsom - WCnewsmagazine The advent of MP3s and peer-to-peer file sharing programs reached the masses in 1999 with the creation of Shawn Fanning's popular Napster program and has shown few signs of stopping since. But roadblocks are being thrown in the way of free peer-to-peer sharing by the Recording Industry Association of America and the Motion Picture Association of America, who feel that distribution of copyrighted materials violates the rights and wages of artists. While the war between these organizations and file sharers may get most of its attention on the national front, battles are being fought here on campus. "We uphold the Digital Millennium Copyright Act here at Western, which prohibits the sharing of copyrighted materials without the consent of the copyright holder," said University Judicial Coordinator Jackie McHargue. Western's policy on copyrighted materials can be found within the Use Of Computers and Data Communications Policy, which prohibits the distribution of non-licensed programs as well as images, audio and video files that are under copyright. But ResNet administrators want students to know that it is not them who watchdog the system. They only act if they receive notice from the MPAA or the RIAA. "If we're notified, we're required by the Digital Millennium Act to act on good faith and make sure that their materials aren't being shared," said Jason Lavigne, ResNet coordinator. "We don't check for anything without getting a letter first, and we sometimes get a bad name." Lavigne says that the organizations search the Internet and network systems to find those who share their copyrighted materials. They can then trace the IP addresses that are unique to students and send a letter to the university naming the movie or song title and artist of the file that the student is sharing. By August 1 of this year, ResNet had already received 29 letters, and that number increases by about five a week. Most of the letters have come from the MPAA, according to Lavigne. The school only had 36 for the entirety of last school year. Western has a faster network than many Internet providers with an OC3 155 Megabit connection. The temptation for students to download with high-speed transfer rates is one reason copyright holders target colleges. "These people who are looking, they're not dumb," Lavigne said. "They know that college students have the faster connections so they go looking for things they would download — Austin Powers 3, Star Wars Episode Il, the Simpsons stuff like that." When letters are received, ResNet turns the matter over to Student Judicial Affairs. According to McHargue, the department tries to be lenient with first-time offenders. "We understand that computers are a vital part of students' happiness and that it's important to them to have port access," McHargue said. "We just want to help them realize their part in being responsible citizens so they'll be aware of what they're doing." Sometimes the student can even be found innocent of the violation, if a virus or other students are involved. Student Judicial Affairs takes each case on a one-by-one basis and investigates the causes behind it. But sometimes violations call for a student's port access to be blocked. "We can do all of that from our office," Lavigne said. McHargue feels it is important for students to understand the consequences of downloading and distributing copyrighted material because it is the artists and filmmakers that they are fans of who lose profits. "We'd like to think everyone downloads the MP3 and then runs right out to buy the album, but we have to accept the fact that it's just not the case, she said. DIGITAL MILLENNIUM COPYRIGHT ACT In response to the popularity of information-sharing ovei the Internet and various interests' concerns that rights were being violated, President Bill Clinton signed the Digital Millennium Copyright Act into effect in 1998. The document was one of the first to address how copyrights stand in the growing digital environment, establishing the responsibilities of service providers in dealing with those who break these copyrights. The DMCA also defined what violations of copyright policy are considered crimes. Amongst the crimes listed were circumventing anti- piracy measures built into commercial software and manufacturing and selling or distributing code-cracking devices used to illegally copy software. However, the act did exclude such programs when an offender is using them in order to conduct encryption research, assess product interoperability or test computer security systems. The act provides exemptions from anti-circumvention provisions for nonprofit libraries, archives, and educational institutions under certain circumstances. Service providers, including colleges and universities, are limited from copyright infringement liability for files that are housed by clients on their servers. They are, however, expected in good faith to remove material from user's web sites that is believed to be copyrighted. Distance learning also found its way into the act with a section calling for a future study to define what copyrighted materials would be allowed to be distributed for the purposes of education and the security regarding the distribution of those materials. The act finishes by stating, "[n]othing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use.... " SIDEBAR: From the Use Of Computers and Data Communications Policy available on-line at: www.wcu.edu/chancellor/index/Universi Polic / olic 2.html D. COPYRIGHT ISSUES The University owns licenses to a number of proprietary programs. Users who redistribute software from the computing systems break agreements with its software suppliers, as well as applicable federal copyright, patent and trade secret laws. Copyright protection also applies to many resources found on the Internet, including but not limited to, images, audio and video files, and electronic versions of print materials. Therefore, the redistribution of any software or other copyrighted materials from computing systems is strictly prohibited except in the case of software that is clearly marked as being in the public domain. Violations include, but are not limited to: Copying, transmitting, or disclosing data, software or documentation without proper authorization, or attempting to do so.
Object
?

Object’s are ‘parent’ level descriptions to ‘children’ items, (e.g. a book with pages).