- DEGREES & PROGRAMS
- AREAS OF INTEREST
- Tuition & Aid
- Why Strayer
The University prohibits students from using its computer systems
and networks to violate copyright law. Copyright owners have the right
to control, within certain limits, how their works are published,
distributed, and sold, and the right to be paid for the use of a work.
Unless a student is the copyright holder or has express permission to
share someone else’s copyrighted works, the distribution of
copyrighted works to the Internet to share via a peer-to-peer network
is almost certainly violating another person’s copyrights.
Peer-to-peer file sharing occurs when individuals store files on
their computers and enable their computers as servers so that others
may download the files. The University strictly forbids peer-to-peer
file sharing applications (e.g., Kazaa, BearShare, Gnutella, LimeWire,
BitTorrent, Morpheus) or any application used to violate copyrights or
any federal or state law. Violations include copying or distributing
copyrighted media such as songs, movies, software, video games, text
and pictures, without authorization from the copyright owner.
The University’s networks and computers may only be used for
educational-related objectives of the University. University networks
and computers may not be used to operate file sharing programs,
including peer-to-peer file sharing applications for the illegal
downloading of copyrighted materials.
Use of file sharing applications can harm student users and the
University.A student who runs a file sharing application may be
inadvertently sharing personal information, such as e-mail messages
and credit card information. In addition, virus writers often target
file sharing applications. Finally, file sharing programs may disrupt
Internet access and performance of programs used for academic work on
All use of University networks and computers, including e-mail
accounts, may be monitored by the University at any time without
notice to identify and mitigate usage in violation of federal
copyright laws. Computers found to be engaging in peer-to-peer
activity on University networks will be automatically blocked from
accessing the network for 30 minutes.
The University has a multi-tiered approach to using technology based
deterrents to combat the unauthorized distribution of copyrighted
material by users of the Strayer network. These deterrents are
periodically reviewed against industry best practices by Strayer’s IT
Department, and enhancements are made as determined appropriate.
The Strayer IT department will continuously monitor the effectiveness of the controls, review other institutions' practices to determine if there are different approaches worth exploring and regularly monitor the technological, social, and legal trends to make additional reasonable and appropriate measures if necessary.
Violation of this policy may result in an immediate suspension or
loss of computer or network privileges at the University and will also
subject a student to disciplinary action, up to and including
suspension and expulsion from the University. If appropriate,
violations may also be reported to local or federal law enforcement
agencies for prosecution.
Unauthorized distribution of copyrighted material, including
unauthorized peer-to-peer file sharing, may subject copyright
infringers to civil and criminal liabilities. Infringers may be
assessed civil damages from actual losses of copyright owners caused
by infringement and any additional profits of the infringer due to the
infringement. In cases of willful infringement, the damage assessed
can be up to $150,000 per infringed work. Costs and attorney’s fees
and injunctive relief may also be awarded to a copyright owner. In
addition, infringers may be subject to criminal penalties, including
imprisonment up to five years, and forfeiture, destruction or other
disposition of infringing copies. Unauthorized distribution of
copyrighted material may implicate otherlaws that protect intellectual
property, such as the federal Lanham Act or state laws regarding
unfair competition and misappropriation.
Legal Alternatives for Downloading or Otherwise Acquiring
There are many legal ways to download copyrighted materials. Unlike illegal file sharing, these services, as permitted by Strayer University policy, can be used to access materials like songs and movies without violating the law. Many online music services allow you to download individual songs or albums for a fee. Both the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA) have web sites that list was to legally download copyrighted materials. Some of the more popular ways to download copyrighted material include:
Movies and Television
Note Regarding Third Party Content:
The resources listed below and elsewhere on this website contain links to third party websites as a convenience in locating information and services for our users. The existence of these links is not to be construed as an endorsement by Strayer University of the content of any of these external sites, nor does Strayer University take any responsibility for the content, the accuracy of the information and/or the quality of products or services provided by or advertised on these third-party websites. Strayer University disclaims, to the fullest extent permissible by applicable law, any and all liability and responsibility for any claims or damage that may arise as a result the use of any websites maintained by third parties and linked to the Strayer University website. Any link to websites not controlled by Strayer University are not subject to Strayer University’s privacy notice, and users are advised to read the privacy policies of any third-party sites accessed through this site. Users should also contact the third party site owner for additional information or support for the products listed on those sites.