Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations

Size: px
Start display at page:

Download "Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations"

Transcription

1 Beijing Model United Nations 2015 XXII Forum: Issue: General Assembly Third Committee Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations Student Officer: Jason Fu Position: Deputy Assistant President of General Assembly Third Committee Introduction The issue of combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations has been an issue ever since the debut of the first P2P sharing application. While P2P systems had been used in various application domains, it was popularized by P2P file sharing systems that allowed the sharing of music. As time went on and technology advanced, these P2P file sharing systems had evolved to have the capability to share not only music, but computer files such as documents, movies, applications, games etc. The reason why P2P file sharing systems have been recognized as a threat to the economic stability of post industrial nations has been because many if not all of the files being shared on these P2P sites break laws regarding the protection of intellectual property and illegal distribution of files and data. Such law breaking actions that P2P file sharing systems are what has been blamed and attributed to the decline in revenues of the music industry and other media industries. This is because P2P file sharing systems allow sharing copy righted files to unlimited amounts of people without the developers or artists of the original file receiving a single penny from the transaction. The media industry is suffering from the threat of cyber and P2P file sharing. Various combats against the threat have been attempted in the past, each with various results of success. But none has been able to fully address and eliminate the problem. This issue has once again come into the public attention after the recent hacks Sony has received. Definition of Key Terms P2P P2P refers to peer-to-peer, which is a type of computing or networking. Its use is to partition and distribute work load among peers. Each peer is equal and participates equally in the task. Peers are both suppliers and consumers of the resource; the resources could be processing power, disk storage, or even network bandwidth. The P2P networking allows distribution of resources without a centralized administrative system, unlike the traditional client-server model. Research Report Page 1 of 8

2 XXII Annual Session The Hague International Model United Nations 2015 Seeds Seeds or seeders are those that have completed a full download of the torrent and are now uploading. During a torrent, the amount of seeds is the amount of seeders there are, and the amount of seeds connected to are the amount of those peers that have completed a full download of torrent that are now uploading that are connected to you. Leeches Leeches or leechers are those that have not completely downloaded the torrent, but are downloading it. During a torrent, leechers are those who only download the torrent, but only offer little to no uploads of any resources. Torrent A torrent file is a file that stores metadata for torrent programs to use and download data into the computer. A bittorrent is a P2P protocol that uses the networking without a central server approach to file sharing. When a bittorrent is run on a torrenting client, it tells the client application to establish a connection to the tracker URL to receive a list of peers that are currently transferring pieces of the file. Economic Stability Economic stability is a term describing the stability of the economy. The stability is determined by the economy having a constant output growth and a low and stable inflation. Magnet Links A magnet link is a web link that contains the metadata that Bittorrent clients can use to start downloading the files. The use of magnet links is to reduce the amount of bandwidth needed to operate the site. If a torrent is one megabyte, magnet links can reduce the size to just one kilobyte. DDoS A distributed denial of service (DDoS) attack is essentially making a network or server s resources unavailable for its intended users. This is commonly caused by sending the target machine with external communications so much that the machine cannot respond to legitimate network traffic. Background The issue of combatting the threat of cyber and P2P file sharing to the economic stability of post-industrial nations has been an issue only since the debut of the first music-sharing site, Napster. The history of combatting the threat of cyber and P2P file sharing has been a short one, as the issue had not existed in an impactful size until it Page 2 of 8 Research Report

3 Beijing Model United Nations 2015 XXII was popularized by the P2P sharing Internet service, Napster, which debuted only in The founders of Napster ran into legal issues regarding copyright infringement and ceased operations on July of The Recording Industry Association of America (RIAA) sued Napster s file sharing ability of copyrighted material on December 7 th Ironically, it was also RIAA s decision to sue Napster that resulted in raising its popularity as the case resulted in a great deal of publicity. Napster failed to appeal to the Ninth Circuit Court, and an injunction was issued on March 5 th of 2001, ordering Napster to completely prevent the trading of copyrighted material on its network. Lawrence Lessig, an American academic and political activist has claimed the decision of the injunction made little sense. This was because Napster had told the district court that it had developed a technology to block 99.4 percent of identified infringed copyrighted material, yet the district court told council that 99.4 percent was not good enough and that Napster needed to bring the percentage to 100%. Lessig then stated, If 99.4 percent was not good enough, then this is a war on file sharing technologies, not a war on copyright infringement. However, the demise of Napster only led to the rise of other similar P2P file sharing sites such as Gnutella, Freenet, Kazaa, LimeWire, Scour, Grokster, Madster, edonkey2000 etc. Many of these similar P2P file sharing sites also faced similar legal issues and were therefore altered or ceased to operate. Examples A good example of recent attempts to combat P2P file sharing of copyrighted materials would be the police raid of The Pirate Bay (TPB), a Swedish online index of digital content offering magnet links and torrent files, went offline after a Swedish police raid on December 9 th TorrentFreak reported that with The Pirate Bay offline, other torrent websites received a 5 to 10 percent increase in visitor traffic from the displaced users of The Pirate Bay. Even with the raid and subsequent offline of The Pirate Bay, it had little impact to the overall amount of piracy levels. What s interesting about The Pirate Bay is that it received mixed reviews even from the producers or artists of copyright infringed material. Bjron Uvaeus, former member of the Swedish pop music group ABBA has criticized The Pirate Bay, saying the site was a gift to those who wanted to be lazy and mean. He also commented Is it really so damn difficult to pay your way? Conversely, this view is surprising not consistent to those who had their copyrighted material infringed and illegally shared. Paulo Coelho, author of The Alchemist and The Witch of Portobello, which sold more then 100 million books in 2007 has praised The Pirate Bay and called it what made his books so successful. Coelho claims that, Since the dawn of time, human beings have felt the need to share from food to art. Sharing is a part of the human condition. A person who does not share is not only selfish, but bitter and alone. Coelho even started uploading free copies of his own book on to various Bittorrent sites. Coelho knew that publishers of his book would not be supportive of his decision so he had to take matters into his own hand, but eventually even some publishers started to support him. Famous publisher Harper Collins decided to release a new book of Coelho s ever month for free. Coelho urges upcoming authors to do the same (releasing free electronic copies of their own books), as Coelho claims that this move would eventually help the author. However, when asked about the difference between piracy on books and piracy on music and movies, Coelho said it was difficult to compare. This is because reading a book electronically is not really the same as reading real paperback book; this could not be said for pirated music or movies. Research Report Page 3 of 8

4 XXII Annual Session The Hague International Model United Nations 2015 The Music Industry The music industry in the United States enjoyed a growth since 1990, with shipments generating 7.5 billion dollars. This amount peaked at 14.5 billion dollars in 1999, and then it saw a decline after that, to the 8.5 billion dollars in The decline coincided with the debut of Napster in The music industry holds unauthorized file sharing accountable for the 25 percent decline in music sales after 1999 (The year Napster debuted). The music industry also claimed that pirating music would be a threat to the long-term survivability of the industry and would also have a negative impact on the overall economy. The threat of P2P file sharing to the media industry is the free rider problem where free riders don't pay for the media product. The media industry claims that this may eventually lead to an under production of these goods, which would lead to market failure. The controversial idea that these P2P file sharing networks actually increase sales is based on the thought that P2P file sharing networks provides a good place for sampling these goods. The same thought and idea is made when music industries pay radio stations to play their music. Although the issue at hand here is combatting the threat of P2P file sharing to the economic stability of postindustrial nations, the issue may not even exist. This is because there has been evidence supporting that piracy does indeed pose a threat to the stability of the economy, yet there has also been evidence supporting that piracy increases sales of goods. Major Parties Involved P2P File Sharing Platforms Napster was one of the first P2P file sharing services, sharing only music. It debuted in Napster was not the first time P2P file sharing systems had been applied, but it was one of the sites that made P2P as popular as it is today. The case between Recording Industry Association of America (RIAA) and Napster was what made Napster extremely popular, especially among college students. Due to Napster s ability to share copyrighted music, it was sued and subsequently received a court injunction asking it to cease all operations that would allow file sharing copyrighted material on March 5 th of Due to Napster needing to comply with the court injunction, it officially shut off its services and went offline on July of The company later went bankrupt and its logo and name was acquired in an auction. It has now recently be released as a media player after it was acquired by Best Buy working with Rhapsody. Many companies have now followed Napster s P2P file sharing concept. The Pirate Bay (TPB) is an online Internet index of digital content. It is one of the most popular sites for torrenting movies, music, videos, applications, books and many other digital files. The site provides magnet links and torrent files for its visitors to torrent. The founders of the site were prosecuted and charged for violating Swedish copyright laws in The Pirate Bay had switched several top level domains due to the different legal issues it had faced, and had presumably changed from.com to.se to evade United States laws from taking over the site. The site s founders were trialed for administering the site, which facilitated copyright infringement of its users. Page 4 of 8 Research Report

5 Beijing Model United Nations 2015 XXII Post-industrial Nations Different countries have different laws on what is considered copyright infringement; these countries also have different punishments for the crime. Despite having laws and punishments, copyright infringement regarding P2P file sharing is very common, and theoretically the peers in the P2P are responsible for the copyright infringement, yet the average everyday P2P user that has torrented copyrighted material without paying is rarely prosecuted. In the United States, any violation of the terms of a copyright has committed copyright infringement, a crime. The punishment for the crime is that the original artist or producer of the good that was copyright infringed has the right to sue the violator. The monetary value of the crime in a lawsuit is whatever the jury decides as acceptable. In many countries The Pirate Bay is blocked, as it is generally believed that it facilitates copyright infringement, giving it secondary infringement liability. In contrast with the United States, Mexico has almost no laws on file sharing. However, Mexican legislators are considering a punishment of 20,000 dollars and ten years in jail for the violators. The Netherlands take a different approach, by legislating that reproduction of literature, art, or science is not considered a violation on the countries copyright laws, provided, that the reproduced good does not have a commercial motive, and its usage is personal, and it being limited in copies. South Korea gives the violators of copyright infringement in online piracy three strikes. After all three strikes are out, the violator could receive a punishment of a disconnect of Internet usage for six months. These are just some examples of how different countries deal with piracy of copyrighted material. Previous Attempts to Resolve the Issue Because the problem of combatting the threat of cyber and P2P file sharing to the economic stability of post industrial nations had not existed in impactful amounts before the debut of Napster in 1999, there had not been much previous attempts to resolve the issue, and the outcome of those resolutions are yet to be determined. Below are some noteworthy previous attempts to resolve the issue: MediaGuard, a now defunct company, was contracted by media firms to spread fake copies of files on various torrent sites and file sharing sites to disrupt the piracy of copyrighted material. However, MediaGuard faced some legal issues while uploading fake copies of files onto torrent and file sharing sites as it essentially caused a distributed denial of service on Revision3, a multichannel Internet television network. Sony s bad seed attack is similar, but not completely. Sony s recent release of bad seeds. Recently, Sony s servers have been hacked and many of its not released products were spread on to P2P networks available for torrent. Sony has decided to combat this threat by uploading bad seeds onto these P2P networks. These bad seeds would prevent the user from being able to use the media they have torrented as the media they have just torrented would be corrupted. These fake seeds are designed to have the same GoP file signature as the real torrents, this makes it harder for people to detect that it is a fake seed. The results of these fake seeds have not shown results yet as it was only recently embedded. The use of these seeds is only to let the users of torrents waste time on Research Report Page 5 of 8

6 XXII Annual Session The Hague International Model United Nations 2015 torrenting corrupted files, and does not actually punish them. It is said that the opportunity cost torrenting these fake seeds would probably exceed that of if people just went out and actually bought the good. Mentioned earlier was the South Korean way of stopping piracy, it was that each internet user gets three strikes when torrenting. When all three strikes were out, the user faces getting banned from using the Internet for six months. This method was thought of because South Korea use to require a full trial for prosecuting copyright infringers, but usually these copyright infringers are children who s parents are probably unaware of the situation, making full trials unfair. With this three strike law implemented, there is no longer the need of having a full trial for copyright infringers (the ones that torrent). The negatives of this is that any copyright infringing would give you a strike, even if it is harmless, therefore many internet users may get banned from the internet even if what they did may be harmless. Possible Solutions New technologies that can identify copyrighted files on P2P file sharing networks and/or are able to stop the file from being shared among peers. Perhaps a continuation on the technology Napster claims to have developed that is able to stop 99.4 percent of known pirated material. Calls on all member nations to enforce blocking torrent sites, much like what they have done for certain countries, China included. Maybe even something similar to the great firewall of China, except focusing on blocking P2P sites. A more well rounded and specialized version of the three strike system that makes sure no strikes are taken off for those not really infringing any copyright laws. The details and specifics could be discussed later Heavier penalties for those uploading to torrent sites as compared to those that are only downloading. This would be used to discourage uploads. No uploads would be no content, and therefore nothing for people to torrent. Further improve Sony s bad seed attack technologies. So far its said to be recognizable from the real files, but still authentic enough to fool those that are not watching carefully. Perhaps by increasing its authenticity would allow it to be more effective. Bibliography Beijnum, Iljitsch Van. "Dutch Government Study: Net Effect of P2P Use Is Positive." Ars Technica. Conde Nast, 20 Jan Web. 12 Jan < Page 6 of 8 Research Report

7 Beijing Model United Nations 2015 XXII Brinkmann, Martin. "So What Is a Torrent Exactly?" Ghacks.net. GHacks Technology News, 5 Aug Web. 12 Jan <http%3a%2f%2fwww.ghacks.net%2f2012%2f08%2f05%2fso-what-is-a-torrentexactly%2f>. "Efforts to Stop Music Piracy 'pointless'" BBC News. BBC, 22 Nov Web. 12 Jan < Ernesto. "BEST-SELLING AUTHOR TURNS PIRACY INTO PROFIT." Torrent Freak. Torrent Freak, 12 May Web. 12 Jan <https%3a%2f%2ftorrentfreak.com%2fbest-selling-author-turns-piracy-intoprofit %2f>. Feldman, Barbara J. "Economic Impact of P2P File Sharing." Surf Net Kids. Surf Net Kids, 2 June Web. 12 Jan <http%3a%2f%2fwww.surfnetkids.com%2ftech%2f1389%2feconomic-impact-of-p2p-filesharing%2f>. "File Sharing and The Law." Academic Computing And Media Sciences. UC SanDiego, n.d. Web. 12 Jan <http%3a%2f%2facms.ucsd.edu%2ffilesharing%2ffilesharing-law.html>. "File Sharing and The Law." Academic Computing And Media Sciences. UC SanDiego, n.d. Web. 12 Jan <http%3a%2f%2facms.ucsd.edu%2ffilesharing%2ffilesharing-law.html>. Gallagher, Sean. "Sony Fights Spread of Stolen Data by Using bad Seed Attack on Torrents." Ars Technica. Conde Nast, 12 Dec Web. 12 Jan <http%3a%2f%2farstechnica.com%2ftechpolicy%2f2014%2f12%2fsony-fights-spread-of-stolen-data-by-using-bad-seed-attack-on-torrents%2f>. Goel, Sanjay, Paul Miesing, and Uday Chandra. "The Impact of Illegal Peer-to-Peer File Sharing on the Media Industry." California Management Review 52.3 (2010): University At Albany. University At Albany, Web. 12 Jan < Sharing%20on%20the%20Media%20Industry.pdf>. Lindenberger, Michael A. "Internet Pirates Face Walking the Plank in Sweden." Time. Time Inc, 20 Feb Web. 12 Jan Research Report Page 7 of 8

8 XXII Annual Session The Hague International Model United Nations 2015 <http%3a%2f%2fcontent.time.com%2ftime%2fbusiness%2farticle%2f0%2c8599%2c %2c00.html>. Masnick, Mike. "South Korea Implements New Copyright Law; ISPs Ban P2P Ads; File Sharers Get Summary Trials." Techdirt. Floor64, 29 July Web. 12 Jan < Masnick, Mike. "South Korea The Latest To Introduce Three Strikes Plan Techdirt." Techdirt. Floor64, 11 Mar Web. 12 Jan < Meyer, David. "Google: P2P and Legal Music Sharing Both Getting More Popular in UK." ZD Net. CBS Interactive, 3 July Web. 12 Jan <http%3a%2f%2fwww.zdnet.com%2farticle%2fgooglep2p-and-legal-music-sharing-both-getting-more-popular-in-uk%2f%23!>. Minow, Mary. "Solving the P2P Problem An Innovative Marketplace Solution by Rob Kasunic." Stanford Copyright and Fair Use Center Solving the P2P Problem An Innovative Marketplace Solution by Rob Kasunic Comments. Stanford University Libraries, 11 Mar Web. 12 Jan < "P2P & Illegal File Sharing FAQ." P2P & Illegal File Sharing FAQ. The College of New Jersey, n.d. Web. 12 Jan < "P2P Illegal File Sharing Guidelines." Information Technology. The College of New Jersey, n.d. Web. 12 Jan <http%3a%2f%2fit.tcnj.edu%2fprocedures%2fp2p-illegal-file-sharing-guidelines%2f>. "P2P/File Sharing." Life Lock. Life Lock Inc, Feb Web. 12 Jan <http%3a%2f%2fwww.lifelock.com%2feducation%2fcomputers-and-technology%2ffile-sharing%2f>. "Peer-to-Peer File Sharing and Copyright Law." Peer-to-Peer File Sharing and Copyright Law. Trustees of Dartmouth College, n.d. Web. 12 Jan < Page 8 of 8 Research Report

Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment

Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment As requested by the Commerce Select Committee Contents Introduction

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including

More information

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast.

More information

Ringling College of Art and Design

Ringling College of Art and Design Ringling College of Art and Design Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of the Ringling College of Art and Design Network Version 5 December 2010 12/16/10;

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe

In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe On June 27, 2005, the Supreme Court in Metro-Goldwyn-Mayer Studios

More information

Equipment Needed. Connecting to the Internet

Equipment Needed. Connecting to the Internet All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. CLEAR SKIES NEVADA, LLC, a Nevada Limited

More information

COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS

COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS 1 of 6 8/16/2007 9:16 AM TOPIC: COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS INTRODUCTION: This past summer saw developments relating to peer-to-peer ( P2P ) music file sharing. Of most significance,

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Ministry of Culture Training In cooperation with IP Key

Ministry of Culture Training In cooperation with IP Key Ministry of Culture Training In cooperation with IP Key Monday 31 August 2015, Zhengzhou, Henan COPYRIGHT ENFORCEMENT TRENDS IN THE EU & INTERNATIONALLY Overview Part 1 Threats to the creative industries

More information

Appendix to the LIM College Peer-to-Peer File Sharing Policy

Appendix to the LIM College Peer-to-Peer File Sharing Policy Appendix to the LIM College Peer-to-Peer File Sharing Policy Version 1 Last Updated: 3/15/10 Department: Information Technology Approved by: Board of Directors LIM College does not allow the reproduction

More information

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Carl D. Crowell, OSB No. 982049 email: carl@crowell-law.com Drew P. Taylor, OSB 135974 email: drew@crowell-law.com CROWELL LAW P.O. Box 923 Salem,

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science,

The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, Delft University of Technology, the Netherlands BitTorrent

More information

The Future of IP. As value shifts from connectivity to content

The Future of IP. As value shifts from connectivity to content The Future of IP As value shifts from connectivity to content Martin J. Steinmann Venture Partner Vesbridge Partners, LLC March 15, 2005 The Stupid Network is a Stupid Idea Stupid Networks lead to stupid

More information

Gutenberg 3.2 Ebook-Piracy Report

Gutenberg 3.2 Ebook-Piracy Report Gutenberg 3.2 Ebook-Piracy Report What does piracy cost the publishers? Ersatzraten (replacement rates) Manuel Bonik Dr. Andreas Schaale Pic. from ref. [1] Berlin, September 2012 Prologue The report Gutenberg

More information

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent

More information

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,

More information

Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. FATHERS & DAUGHTERS NEVADA, LLC, a Nevada Limited

More information

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic

More information

PEW INTERNET PROJECT AND COMSCORE MEDIA METRIX DATA MEMO. RE: The impact of recording industry suits against music file swappers DATE: January 2004

PEW INTERNET PROJECT AND COMSCORE MEDIA METRIX DATA MEMO. RE: The impact of recording industry suits against music file swappers DATE: January 2004 PEW INTERNET PROJECT AND COMSCORE MEDIA METRIX DATA MEMO BY: PIP Director Lee Rainie and Research Specialist Mary Madden (202-296- 0019) comscore Senior Vice President Dan Hess and Analyst Graham Mudd

More information

Internet: Copying & Downloading

Internet: Copying & Downloading INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose

More information

THE HIGH COST OF P2P ON THE ENTERPRISE

THE HIGH COST OF P2P ON THE ENTERPRISE THE HIGH COST OF P2P ON THE ENTERPRISE In their private lives, prudent people adjust their behaviors based on their perception of risk. Depending on where they live, for example, they lock their doors

More information

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and

More information

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service The Role of Internet Service Providers in Stopping Internet Copyright Infringement Jennie Ness Regional IP Attaché U.S. Commercial Service New Means of Distribution Webcasting or Streaming Uploading and

More information

[TITLE IN CAPS, VERDANA, 32]

[TITLE IN CAPS, VERDANA, 32] [TITLE IN CAPS, VERDANA, 32] On-line piracy, and the intermediaries Joris van Manen FORDHAM meeting New York, April 4th, 2013 On-line counterfeit on the rise Increasing numbers of on-line counterfeit and

More information

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1 Winny Case A P2P Software Copyright Case in Japan Impact on the Information Society and Legal Analysis Takato NATSUI Professor at Meiji University Law Faculty, Tokyo Japan Lawyer at Asuka-Kyowa Law Firm,

More information

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

File sharing: consumers, creators, welfare and business models

File sharing: consumers, creators, welfare and business models File sharing: consumers, creators, welfare and business models Joost Poort Conference Future of copyright in the digital era European Parliament, 1 June 2011 Contents How common is file sharing, and what

More information

PEER-TO-PEER FILE SHARING POLICY

PEER-TO-PEER FILE SHARING POLICY 1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,

More information

UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?

UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online? UCO Copyright Compliance As members of the UCO community, all faculty and staff members are expected to comply with federal copyright law. Unauthorized use of copyrighted material is illegal and may result

More information

of the world to another. Majority of files which is shared by users are music files or movie files

of the world to another. Majority of files which is shared by users are music files or movie files 1 INTRODUCTION Music file sharing and exchange of data via internet is not a new concept in world of virtual media and millions of users exchange multimillion bytes of data on a daily basis from one end

More information

A Study on the novel tool to retort P2P security issues

A Study on the novel tool to retort P2P security issues 보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 2 호, 2008년 4월 A Study on the novel tool to retort P2P security issues Martin Drahansky 1) Abstract The term File Sharing is the sharing of computer data

More information

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience. MAXIS FAIR USAGE POLICY 1. Introduction 1.1 This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred

More information

Copyright Compliance and Peer to Peer File Sharing Policy

Copyright Compliance and Peer to Peer File Sharing Policy University of Scranton Copyright Compliance and P2P File Sharing Policy 9/1/2010 Division of Planning & Information Resources Copyright Compliance and Peer to Peer File Sharing Policy Executive Sponsor:

More information

Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods

Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods Tunay I. Tunca and Qiong Wu Graduate School of Business, Stanford University Stanford,

More information

United States Attorney Southern District of New York

United States Attorney Southern District of New York United States Attorney Southern District of New York FOR IMMEDIATE RELEASE JUNE 30, 2010 CONTACT: U.S. ATTORNEY'S OFFICE YUSILL SCRIBNER, JANICE OH PUBLIC INFORMATION OFFICE (212) 637-2600 ICE PAT REILLY

More information

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit

More information

YOUNG PEOPLE, MUSIC & THE INTERNET

YOUNG PEOPLE, MUSIC & THE INTERNET YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading

More information

Colorado Mesa University Policy and Plan to Combat Unauthorized Distribution of Copyrighted Material and Peer-to-Peer File Sharing

Colorado Mesa University Policy and Plan to Combat Unauthorized Distribution of Copyrighted Material and Peer-to-Peer File Sharing Colorado Mesa University Policy and Plan to Combat Unauthorized Distribution of Copyrighted Material and Peer-to-Peer File Sharing I. Introduction and Purpose of Policy and Plan: The Higher Education Opportunity

More information

COMPUTER POLICIES AND SUPPORT

COMPUTER POLICIES AND SUPPORT COMPUTER POLICIES AND SUPPORT EMPLOYEE AGREEMENT ON USE OF EMAIL AND THE INTERNET I have read, understand, and agree to comply with the policies, rules, and conditions governing the use of Lindenwood University

More information

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration

More information

Copyright Compliance and Peer-to-Peer File Sharing Policy

Copyright Compliance and Peer-to-Peer File Sharing Policy University of Scranton Division of Information Resources Copyright Compliance and Peer-to-Peer File Sharing Policy Executive Sponsor: Sr Vice President for Finance and Administration Responsible Office:

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

PEW INTERNET PROJECT AND COMSCORE MEDIA METRIX DATA MEMO

PEW INTERNET PROJECT AND COMSCORE MEDIA METRIX DATA MEMO PEW INTERNET PROJECT AND COMSCORE MEDIA METRIX DATA MEMO BY: PIP Director Lee Rainie and Research Specialist Mary Madden (202-296- 0019) comscore Senior Vice President Dan Hess and Senior Analyst Graham

More information

Section 512 Study on safe harbors Comments by the International Association of Scientific Technical and Medical Publishers (STM)

Section 512 Study on safe harbors Comments by the International Association of Scientific Technical and Medical Publishers (STM) March 31, 2016 United States Copyright Office Section 512 Study Comment Submission Section 512 Study on safe harbors Comments by the International Association of Scientific Technical and Medical Publishers

More information

Issues in Copyright Management & File Sharing

Issues in Copyright Management & File Sharing Issues in Copyright Management & File Sharing Madhavan Manivannan Ethics Seminar 1 Copyright definition Copyright is a legal right created by the law of a country that grants the creator of an original

More information

PIRATES OF THE DIGITAL MILLENNIUM

PIRATES OF THE DIGITAL MILLENNIUM PIRATES OF THE DIGITAL MILLENNIUM By John Gantz and Jack B. Rochester Upper Saddle River, NJ, Financial Times Prentice Hall, 2005, ISBN0-13-246315-2 (Price $25.95) pp. 294. Reviewed by Rachel S. Leeds

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening. Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5 Questions to consider before listening 1. Complete the following mindmap: Piracy 2. How much time do you spend on the

More information

2011 COUNTRY WATCH LIST

2011 COUNTRY WATCH LIST The Congressional International Anti-Piracy Caucus Senator Sheldon Whitehouse, Co-Chair Senator Orrin G. Hatch, Co-Chair Congressman Bob Goodlatte, Co-Chair Congressman Adam B. Schiff, Co-Chair 2011 COUNTRY

More information

By using the Cloud Service, Customer agrees to be bound by this Agreement. If you do not agree to this Agreement, do not use the Cloud Service.

By using the Cloud Service, Customer agrees to be bound by this Agreement. If you do not agree to this Agreement, do not use the Cloud Service. 1/9 CLOUD SERVICE AGREEMENT (hereinafter Agreement ) 1. THIS AGREEMENT This Cloud Service Agreement ("Agreement") is a binding legal document between Deveo and you, which explains your rights and obligations

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013 Executive Summary McAfee Labs Threats Report: Third Quarter Although summer can be a relatively slow season for cybercriminal activity (even the bad guys need a break occasionally), the third quarter of

More information

Websites: Social Networks, Blogs & Usergenerated

Websites: Social Networks, Blogs & Usergenerated INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,

More information

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net. Network Management, Performance Characteristics, and Commercial Terms Policy Consistent with FCC regulations 1, Agri-Valley Broadband, Inc., d/b/a mispot (mispot) provides this information about our broadband

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

USE AND PROTECTION OF INTELLECTUAL PROPERTY GUIDELINES FOR CHAPTERS WITH NEWSLETTERS OR WEBSITES The Compassionate Friends, Inc.

USE AND PROTECTION OF INTELLECTUAL PROPERTY GUIDELINES FOR CHAPTERS WITH NEWSLETTERS OR WEBSITES The Compassionate Friends, Inc. USE AND PROTECTION OF INTELLECTUAL PROPERTY GUIDELINES FOR CHAPTERS WITH NEWSLETTERS OR WEBSITES The Compassionate Friends, Inc. Creating a website or publishing a newsletter can be an effective way to

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Case 2:16-cv-00928-APG-GWF Document 1 Filed 04/24/16 Page 1 of 12

Case 2:16-cv-00928-APG-GWF Document 1 Filed 04/24/16 Page 1 of 12 Case :-cv-00-apg-gwf Document Filed 0// Page of CHARLES C. RAINEY, ESQ. Nevada Bar No. chaz@raineylegal.com RAINEY LEGAL GROUP, PLLC 0 W. Martin Avenue, Second Floor Las Vegas, Nevada +.0..0 (ph +... (fax

More information

Searching for Malware in BitTorrent

Searching for Malware in BitTorrent Searching for Malware in BitTorrent Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

FAQ s on The Center for Copyright Information And Copyright Alert System

FAQ s on The Center for Copyright Information And Copyright Alert System 1. How significant is online content theft? FAQ s on The Center for Copyright Information And Copyright Alert System Content theft is estimated to cost the U.S. economy $58 billion, 373,000 American jobs

More information

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:

More information

P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla University, Thailand Darran Nathan, APBioNet

P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla University, Thailand Darran Nathan, APBioNet Automatic Synchronization and Distribution of Biological Databases and Software over Low-Bandwidth Networks among Developing Countries P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla

More information

Intellectual Property and Designers of Music Information Retrieval Systems. Michael W. Carroll Assistant Professor Villanova University School of Law

Intellectual Property and Designers of Music Information Retrieval Systems. Michael W. Carroll Assistant Professor Villanova University School of Law Intellectual Property and Designers of Music Information Retrieval Systems Michael W. Carroll Assistant Professor Villanova University School of Law Third Party Liability Under Copyright Law Contributory

More information

CDT Comments: FTC December 2004 P2P File-Sharing Workshop. P2P File-Sharing Workshop Comment, P034517

CDT Comments: FTC December 2004 P2P File-Sharing Workshop. P2P File-Sharing Workshop Comment, P034517 CDT Comments: FTC December 2004 P2P File-Sharing Workshop November 15, 2004 Office of the Secretary Room 159-H 600 Pennsylvania Avenue N.W. Washington, D.C. 20580 Re: P2P File-Sharing Workshop Comment,

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

Web Hosting Agreement & Terms

Web Hosting Agreement & Terms Web Hosting Agreement, Terms, Conditions, & Policies 1. General This agreement is between WEBSTAPLE LTD. (hereinafter referred to as Provider), and the on-line individual or entity (hereinafter referred

More information

Note: The following information was gathered based on process current during Spring 2006.

Note: The following information was gathered based on process current during Spring 2006. Illinois State University Digital Citizen Project Processing DMCA complaints at Illinois State David Greenfield Note: The following information was gathered based on process current during Spring 2006.

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft

REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft U.S. Department of Justice March 2013 REPORTING INTELLECTUAL PROPERTY

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

File Sharing, Network Architecture, and Copyright Enforcement: An Overview

File Sharing, Network Architecture, and Copyright Enforcement: An Overview File Sharing, Network Architecture, and Copyright Enforcement: An Overview Tilman Klumpp University of Alberta May 2013 Abstract This paper provides an overview of internet file sharing networks and explores

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

BPI response to the Draft Ofcom Annual Plan 2013-14

BPI response to the Draft Ofcom Annual Plan 2013-14 BPI response to the Draft Ofcom Annual Plan 2013-14 Introduction 1. BPI welcomes the opportunity to comment on the planned work of Ofcom in the year 2013-14. BPI will contain its comments to those aspects

More information

amounts to a loss of $12.5 billion to the U.S. economy, 70,000 jobs, and $2 billion wages

amounts to a loss of $12.5 billion to the U.S. economy, 70,000 jobs, and $2 billion wages Pirates Sail the High Fidelities: How File Sharing Affects the Music Industry The Institute for Policy Innovation 2007 report found that the annual cost of music piracy amounts to a loss of $12.5 billion

More information

INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET

INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

DETECTION OF PEER TO PEER APPLICATIONS

DETECTION OF PEER TO PEER APPLICATIONS DETECTION OF PEER TO PEER APPLICATIONS AN OPSWAT WHITE PAPER Author: Priti Dadlani Contributors: Benny Czarny, Steven Ginn, Toshit Antani April 2008 OPSWAT, INC. www.opswat.com CONTENTS Introduction...

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

SPOTIFY. An Analysis of Spotify s Market Strategies

SPOTIFY. An Analysis of Spotify s Market Strategies SPOTIFY An Analysis of Spotify s Market Strategies Spotify AN ANALYSIS OF SPOTIFY S STRATEGY Spotify is a Swedish online music streaming service that was launched in 2008. Since, its launch Spotify has

More information

Comparison of Enterprise Digital Rights Management systems

Comparison of Enterprise Digital Rights Management systems Comparison of Enterprise Digital Rights Management systems M.H. van Beek Master Thesis Computer Science MT Advice report Aia Software Thesis number 565 June 22, 2007 Radboud University Nijmegen Computer

More information

MUSIC, VIDEO AND SOFTWARE PIRACY POLICY

MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian

More information

Appropriate Use Policy for Information Technology

Appropriate Use Policy for Information Technology Appropriate Use Policy for Information Technology Amarillo College Faculty, Staff, Students, Friends and Guests Amarillo College reserves the right to amend or otherwise revise this document as may be

More information

A Week in the Life of the Most Popular BitTorrent Swarms

A Week in the Life of the Most Popular BitTorrent Swarms A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University

More information

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET. ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.

More information

The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University

The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University Immaculata University ( IU ) takes a strong stand against unlawful distribution of copyrighted music,

More information

Impact of Peer Incentives on the Dissemination of Polluted Content

Impact of Peer Incentives on the Dissemination of Polluted Content Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto fabricio@dcc.ufmg.br Virgilio Almeida virgilio@dcc.ufmg.br Cristiano Costa krusty@dcc.ufmg.br Jussara Almeida jussara@dcc.ufmg.br

More information

Riverside School Board

Riverside School Board Policy Name: Use of Technology Policy Number: B328-20100216 Date Submitted to Executive: 2009-12-01 Date Received at Council: 2009-12-15 Consultation Period: December 16, 2009 to February 2, 2010 Date

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: Compliance with the1976 United States Copyright Law Computer Software ROUTING All Employees All Locations NUMBER: BUL 716.2 ISSUER: Margaret A. Klee, Chief Information Officer Information Technology

More information