P2P and the UVU Network
- UVU is legally obligated to respond to copyright, piracy and Digital Millennium Copyright
Act violation notices to make a good faith effort to remove all violations from the UVU network
- Illegal P2P downloading of copyrighted materials is a violation of State and Federal
Laws and you may be prosecuted. UVU has an obligation to cooperate with law enforcement
agencies on such violations.
- P2P clients are inherently not secure and give hackers access to the computer on which
they are installed.
- UEN policy prohibits illegal activities and excess use of bandwidth on the UEN network
of which UVU is a part. (UEN is the Utah Educational Network)
- UVU policy (Appropriate Use of Computing Facilities A-10.1) includes the following:
- From I. Rights and Responsibilities: Use of the UVU computer system must be legal,
ethical, and consistent with the College's mission.
- From I.a.5.: Individual users must Obey federal, state, and local laws which govern
computer and telecommunication use.
- From I.a.4: Individual users must Accept that instructional, administrative, and
research uses of system resources take priority over all other uses.
- From I.a.8: Individual users must Protect the privacy of self and others.
- From I.B: System Administrators must:
- Perform periodic security checks to ensure that computing resources by the College
are as secure as the College can make them.
- Enforce violations of this policy in cooperation with appropriate authorities.
- Disclose E-mail messages, files, backups, and any other pertinent records to authorized
law enforcement officials or other authorized third parties.
- From II.B: Users must not Share passwords and/or accounts.
- From II.D.Users must not Use destructive or invasive software.
- From II.E. Users must not Violate licensing agreements, patent, copyright and/or
trademark laws or UVU Purchasing regulations as governed by UVU Policy B-1.3.
- From II.G. Users must not Consume inordinate amounts of system resources.
- From II.L. Users must not Use the College computing facilities for disruptive or
- From V.A. All computing resources owned and managed by UVU are as secure as the College
can make them.
- Penalties are spelled out in III.A – E included are loss of access & privileges,
accounts disabled, and possible prosecution by law enforcement personnel.
UVU violation form and procedure