Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Copyright and File Sharing
DMCA ACT and Copyright

Photo: Penn's Kelly Writers House Marathon

Copyright and File Sharing


Peer-to-Peer File-Sharing

Peer-to-Peer (P2P) file sharing is the use of a P2P software for swapping and sharing digital media such as music, films, TV shows, and computer games with others across the internet. P2P file-sharing software is an easy, convenient, and inexpensive way to acquire digital media. However, the process of downloading files and making it available for others to upload from your computer can result in an illegal distribution of copyrighted material, which is a violation of Penn Copyright and Acceptable Use policies, and of the Digital Millennium Copyright Act (DMCA).

Copyright Policy

The University's Unauthorized Copying of Copyrighted Media policy states, “The University of Pennsylvania does not condone or tolerate the unauthorized copying of licensed computer software or digital media by staff, faculty or student. The University shall adhere to its contractual responsibilities and shall comply with the United States copyright law and expects all members of the University community to do so as well. Members of the University community who violate this policy may be subject to discipline through standard University procedures. An individual or University department engaged in unauthorized copying or use of copyrighted materials may also face a civil suit, criminal charges, and/or penalties and fines. Subject to the facts and circumstances of each case, such individuals or departments shall be solely responsible for their defense and resulting liability."   

The Digital Millennium Copyright Act (DMCA)
  • The Digital Millennium Copyright Act (DMCA)
  • Report Copyright Violation
  • Legal Alternatives to P2P
  • P2P File-Sharing Risks

The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 to protect the rights of the original work of authorship from reproduction or tampering. DMCA criminalizes the use or development of software that allows users to access copyright protected material.

The Higher Education Opportunity Act of 2008 (Public Law 110-315) Section 488 (P), requires post-secondary education institutions to set “policies and sanctions related to copyright infringement including an annual disclosure that explicitly informs students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities, provide students with a summary of penalties for violation of Federal copyright laws including disciplinary actions that are taken against students who engage in unauthorized distribution of copyrighted materials using the institution’s information technology system."

Report Alleged Copyright Violation

Members of the University community who violate the University Copyright Policy may be subject to disciplinary actions through standard University procedures. Penn has designated the University Information Security Officer as an agent to receive notifications of alleged copyright infringement in the upenn.edu domain. If you believe your copyrighted work is being infringed on a Penn site, please notify the University copyright agent.

In notifying the University of an alleged copyright violation, be sure to include the following information:

  1. A description of the copyrighted work that is the subject of the claimed infringement (if multiple works are being infringed at a single site, a representative list of such works at the site is adequate).
  2. A description of the infringing material and information sufficient to permit the University to locate the material.
  3. Your contact information including address, telephone number and/or email address.
  4. A statement by you indicating you have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, or its agent, or the law.
  5. A statement by you, signed under penalty of perjury, that the information in the notification is accurate and that you have the authority to enforce the copyrights that are claimed to be infringed, and
  6. A physical or electronic signature of the copyright owner or a person authorized to act on its behalf.

Failure to include all the above-listed information may result in a delay in the processing of your complaint. Penn will comply with the requirements of the Digital Millennium Copyright Act. Consistent with the DMCA, and in accordance with Penn's acceptable use policy, the University reserves the right to terminate system access of users who repeatedly infringe on the rights of copyright owners. Questions about the University copyright policy should be directed to security@isc.upenn.edu, or (215) 898-2172.

The University Copyright Agent

NICK FALCONE
University Information Security Officer/Copyright Agent
University of Pennsylvania
Email: dmca@isc.upenn.edu
Phone: +1-215-898-2172
Fax: +1-215-573-2037
US Mail: 3401 Walnut Street, Suite 213A, Philadelphia, PA 19104-6228

Legal Alternative to P2P File Sharing

The use of peer-to-peer (P2P) file-sharing software is an easy and inexpensive way to swap and share digital media such as music, films, TV shows, computer games, and applications. However, allowing other P2P users access to your digital media for download or upload is a violation of the Digital Millennium Copyright Act (DMCA) and Penn Copyright and Acceptable Use policies.

There are, though, legal alternative sources for obtaining digital media at a minimal cost, and in some cases at no cost at all. EDUCAUSE, a nonprofit organization working to advance higher education through the use of information technology, provides a comprehensive list of alternative services to the use of P2P file-sharing for free digital media. You can access this list at www.educause.edu/legalcontent/

In addition, a number of streaming services provide a wide variety of music genres from thousands of Internet radio stations. A few of the more widely known streaming services are:

Music/Internet Radio

  • SHOUTcast at www.shoutcast.com
  • Pandora Internet Radio at www.pandora.com
  • Live365 at www.live365.com

Video

RedBox Instant at www.redbox.com

Other

If you're aware of other legal digital media downloading or streaming services that might be of interest to the Penn Community, contact us at dmca@isc.upenn.edu and we will review it for possible inclusion.

Fire-Sharing Security and Privacy Risks

If you are considering P2P File-Sharing software, you need to understand the security and privacy risks associated with it. There are risks associated with using P2P that include:

  • Installation of malicious code (malware). When you are downloading files from P2P applications, it's difficult to verify the source. These applications are often used by malicious individuals to transmit malicious codes incorporated or attached to files. Unknowingly, you could install a virus, spyware or a trojan on your computer when downloading a file or media from P2P application. 
  • Compromise of privacy. Sharing files using P2P applications may provide unauthorized individuals access to personal information and sensitive data (similar to your financial and medical records) stored on the P2P application or on your computer.  
  • Prosecution. If you download pirated software or copyright material, even unknowingly, you may be subject to legal actions and heavy fines. 

Minimize the Risk

The best method to eliminate the risk is to avoid using P2P applications. However, if you are planning to use one, make sure to:

  • Install and run anti-virus software. Anti-virus software detects malware on your computer, software, and files. As malicious individuals work diligently to release new and sophisticated malicious codes, it is important to keep your anti-virus up to date with the latest definitions by regularly installing new updates. 
  • Know the P2P Filesharing software you are installing. When you load a P2P file-sharing application onto your computer, changes you made to the application's default setting may grant the application's users access to your personal folders on sub-folders. To protect your privacy, read carefully about the P2P file-sharing application and its features before loading it onto your computer, and only enable features you need to use.
  •  Install and enable personal computer firewall. A firewall can block some malicious traffic from reaching your computer. By installing and enabling a personal computer firewall you are adding a second layer of security in protecting your computer and data. 
  • Exit the program. The best method to close a program is by clicking exit. In some cases clicking "X" on the application doesn't close the application allowing it to run on your computer consuming your Internet bandwidth while granting access to your folders. You may also need to adjust the file-sharing program's controls to prevent it from opening automatically. 
  • Back up sensitive data. Back up all files and software you need access to in the event your computer crashes or when you lose access to these files in a clear readable format. Store the backup disk in a secure and safe location, e.g. locked filecabinet. 

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • InfoSec Training & Awareness
  • Digital Millennium Copyright Act
  • Policy on Acceptable Use of Electronic Resources
  • Policy on Unauthorized Copying of Copyrighted Media
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff