Skip to Content

Notice to Students about P2P and File Sharing

In 2008 Congress passed and the President signed the Higher Education Opportunity Act. Several of the Act’s provisions are intended to reduce unauthorized duplication of copyrighted works through peer-to-peer (P2P) file sharing on campus networks. The University is providing you this notice in compliance with that legislation and the Department of Education’s regulations in 34 C.F.R. Part 668 (Subpart D). You are STRONGLY ADVISED to read this notice thoroughly and give it careful consideration. Paper copies of this notice and the information referenced in it are available upon request.

Texas State University provides a high speed network and other information technology resources to help you accomplish your educational goals.  When you activated your Texas State NetID, you agreed to abide by the University’s Appropriate Use Policy.   More specifically, you agreed not to use University resources for unauthorized duplication, use, or distribution of copyrighted materials, including music and video files.  The University considers unauthorized peer-to-peer file sharing of copyrighted music and videos to be an inappropriate use of its network resources.  Moreover, such activity is illegal under the Digital Millennium Copyright Act (DMCA) and exposes you to serious civil and criminal penalties. 

The DMCA is a federal law that criminalizes production and dissemination of technology, devices, and services intended to circumvent copyright protections. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Criminal penalties for first-time offenders can include fines of up to $250,000 and incarceration for up to five years.  In civil court, damages of up to $150,000 are possible for EACH movie or song that has been illegally acquired or shared. 

In December 2008, the Recording Industry Association of America ("RIAA") announced that it was abandoning its longstanding practice of filing law suits against students for infringing copyrights via illegal file sharing.  Despite the new moratorium on law suits, the RIAA’s aggressive enforcement campaign continues on other fronts and the University urges all students to refrain from copyright infringing behavior.  

Texas State University does not routinely monitor the content of network transmissions, except, as necessary, to identify and repel network attacks, viruses, worms, and other malware.  However, many P2P networks are used almost exclusively for illegal file sharing and are also favorite channels for spreading malware due to their popularity and pervasiveness. To mitigate these threats, the University employs various methods to block illegitimate P2P network traffic at the perimeter of its network.  Note, however, that these methods are not 100% effective and all P2P traffic is not blocked at all times. Students should assume that P2P file sharing activity on the campus network is visible to the RIAA and other content owners that monitor the Internet for copyright infringement activity.


Copyright Enforcement Activities

The Recording Industry Association of America (RIAA) and other content owners are aggressively trying to stop unauthorized downloading, copying, and sharing of music and video by college students. They monitor the Internet continually to identify Internet Protocol (IP) addresses involved in these activities, but they require assistance from the Internet Service Provider (ISP) to communicate with an alleged infringer.  They generally seek the ISP’s help in communicating one or more of the following:

Note that these four communications operate independently and do not necessarily progress from one to another. For example, nothing prevents the initial communication from being a subpoena that seeks the identity of a user connected at a specific IP address at a specific day and time.

DMCA Takedown Notices

When a content owner determines that an IP address has been used to violate its copyright, it sends a Takedown Notice to the applicable Internet Service Provider (ISP) describing the IP address, date, time, and material involved in the alleged infringement. The notice requests that the ISP remove or disable access to the listed material under the terms of the DMCA.    

When Texas State receives such a Takedown Notice, it reviews its network activity records to independently validate the legitimacy of the complaint.  If the complaint appears valid, the University suspends the offending computer’s network access until the infringing material is removed.  First offenders regain network access once proof of removal is provided and an acknowledgement is signed.  Repeat offenders are referred to the Dean of Students for additional sanctions, up to and including expulsion from the University. 

The University also notifies the sender of the Notice that a) appropriate removal actions have been taken, or b) the allegation could not be validated through network activity records. The University does not provide any user identifying information to the sender of the Notice unless the Notice is accompanied or followed by a lawfully issued subpoena. Likewise, the University does not forward a copy of the Takedown Notice itself to the alleged infringer.  

Example Takedown Notice (redacted to protect identity)

Preservation Requests

Preservation Requests are used to notify the ISP that a subpoena may be served on it seeking identifying information about a network user who has allegedly infringed a content owner’s copyrighted material. Like the Takedown Notice, the Preservation Request identifies an alleged infringer's IP address at the time of the alleged infringement. The Preservation Request asks the ISP to preserve the identifying information for the user connected via that IP address at that time.

Texas State’s practice is to first determine if the information provided in the Request may be sufficient to implicate a specific user. If not, the University notifies the requesting party of its inability to comply. If a specific user is implicated, the University preserves the information as requested and forwards the Request to that user via email. The cover email explains the nature of the Request, encourages the user to preserve evidence relating to the claims in the Request, and informs them that they may wish to obtain legal advice before taking any other action. Once again, Texas State will not release a user’s identifying information in response to a Preservation Request unless and until the Request is accompanied or followed by a lawfully issued subpoena.

Example Preservation Request (redacted to protect identity)

Pre-Litigation Settlement Letters

Prior to abandoning the “sue the customer” strategy, the RIAA’s outside legal counsel sent what were known as "Pre-Litigation Settlement Letters" to many universities and other ISP’s.  The Settlement Letter was generally sent to the ISP with a request that it be forwarded to the user of a particular IP address. The Letter alleged that the user of that particular IP address had violated copyright laws and presented an opportunity to settle the claim as early as possible at a "significantly reduced amount" compared to the judgment that a court might impose at the end of a lawsuit.  The Letter also informed the user to preserve evidence relating to the claims and instructed the user to retain, and not delete, any peer-to-peer programs.

Should the RIAA or another copyright owner resurrect lawsuits and settlement letters, Texas State’s practice is, and has always been, to forward a Settlement Letter along with an explanation to the alleged infringer if the University’s network activity logs can establish the identity of the person at the specified IP address with a reasonable degree of certainty. Because network log data can be unavailable or inconclusive, the University cannot guarantee that all Settlement Letters will be forwarded to alleged infringers. Individuals should not expect to receive such a letter prior to being sued for copyright infringement.   Based on the wording in recent Settlement Letters, recipients must settle within twenty (20) days of the date of the Settlement Letter or face a lawsuit.  Recipients are encouraged to seek legal counsel before taking any action.

Example Pre-Litigation Settlement Letter (redacted to protect identity)

Lawsuits and Subpoenas

In cases where no settlement is reached, the RIAA and member companies had been filing lawsuits in Federal District Courts. The suits alleged that unnamed students have infringed copyrights by downloading certain information and, for some, distributing the information to others over the Internet.  After filing these "John Doe" lawsuits (so named because they name IP addresses rather than people) identifying IP addresses, the companies served subpoenas on universities seeking the identity of the users associated with those IP addresses.

If and when Texas State receives such a subpoena, Texas State first ensures that the subpoena is valid and lawful. If so, and if the information sought in the subpoenas exists, the University is legally required to provide the desired information. While complying with the subpoena, the University notifies the individuals being identified in the subpoena response. The University has heard but cannot confirm that companies first used the subpoenaed information to try to settle the matter with the identified individuals, and if a settlement was not reached, the companies would amend the lawsuits to name the individual students and proceed in court.

Obtaining Legal Advice

Information provided in this notice does NOT constitute legal advice. It is intended for information and educational purposes only. Every situation is unique and you are encouraged to consult an attorney if you need specific legal advice. Links to legal web sites, such as those provided below, do not constitute an endorsement of any legal services. Neither the downloading of materials nor any communication with respect to this Notice constitutes the formation of an attorney-client relationship. In reading and acting upon this Notice, you acknowledge that nothing in the Notice is intended to or constitutes the practice of law or the giving of legal advice.

Finding an attorney to explain your rights and options:
Attorney for Students LBJ Student Center, Room 5-8.1   245-2370
Subpoena Defense Alliance
State Bar of Texas Lawyer Referral Information Service

Additional Resources

For further information about copyright and file sharing laws and policies, as well as legal options for downloading music and video, visit:

For more specifics about copyright infringement notices and the possible responses you should consider, see:
Other questions about this message should be directed to:
Information Technology Assistance Center: and 245-ITAC (4822)
Information Technology Security: and 245-HACK (4225)