Skip to main content

Recent Updates Fordham offices remain staffed and operating remotely. The University has released its plan, Fordham Forward, to resume in-person teaching and learning for the Fall semester. Full Details

Peer-to-Peer Policy

Version 1.0.1

Purpose

The purpose of this policy is to establish the University’s position on prohibiting and blocking the use of peer-to-peer applications on its IT Resources.

Scope

This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • The University prohibits the use of peer-to-peer applications; however, the University understands there may be legitimate academic uses for peer-to-peer applications and will review requests on a per need basis.
  • The University mandates that all IT Resources be used in a manner consistent with the Acceptable Uses of IT Infrastructure and Resources Policy and are compliant with the Higher Education Opportunity Act, and all other applicable laws and regulations.
  • The University is under no obligation to protect a User from a complaint or action arising from any violation, or alleged violation of the law, including infringement of any intellectual property right due to use of peer-to-peer, or any other type of file-sharing, software, or networks.
  • Users should understand material accessible through the internet does not mean that accessing such material is authorized by the third-party rights holders. In some cases, content is only accessible after a User pays for it and may not be authorized for distribution by those who hold rights to that content.
  • The University employs various deterrents such as bandwidth management technology to ensure peer-to-peer programs do not degrade network speeds or any other portion of the IT Resources.
    • Fordham IT uses tools to perform this work and reserves the right to install or change packet shaping and traffic monitoring technologies at any time.
    • Should peer-to-peer programs degrade the performance of the IT Resources, appropriate action will be taken against the User or Users responsible for such degradation or another negative impact.
  • Users should be aware that peer-to-peer applications are not necessarily harmless and using them, in addition to potentially degrading the IT Resources’ performance, may:
    • Violate the copyright, patent, trademark, or other rights;
    • May result in the disclosure confidential information; and
    • May jeopardize the security of the IT Resources.
  • The University implements safeguards against the illegal exchange and distribution of copyrighted materials. Disproportionate bandwidth usage and the unauthorized use or distribution of copyrighted materials constitutes a violation of the Acceptable Uses of IT Infrastructure and Resources Policy.

Definitions

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Peer-to-peer applications are programs that allow computers to share data in the form of music, movies, games, or any computer file or software over a local network and the internet without accessing a centralized distribution server or set of servers.

Related Policies and Procedures

Acceptable Uses of IT Infrastructure and Resources

Implementation Information

Review Frequency: Annual
Responsible Person: Director, IT Risk and Data Integrity
Approved By: CISO
Approval Date: 09/12/2018

Revision History

Version: Date: Description:
1.0 09/12/2018 Final
1.0.1 02/05/2020 Update to the policy statement

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.