NC State Home Page

 

MEMORANDUM
March 16, 2000

TO: NC State Students, Faculty and Staff

FROM: Samuel F. Averitt, Vice Provost for Information Technology

SUBJECT: Napster and similar MP3 search engine/download Internet programs

In February, 2000 more than 100 American universities reportedly restricted access to Napster, an Internet program that enables those logged into a Napster server to search for, download, and share thousands of MP3 digital music files. Erroneously, North Carolina State University was listed on the Students Against University Censorship site (http://www.savenapster.com) as one of those universities, and as a result our name appeared in the media as a major campus that had banned Napster. This is not the case, and we have since had our name removed. Nevertheless, the incident has led to requests that we restate our position on censorship of student use of the university network in general and our position on Napster and similar programs in particular.

NC State network policy has long been that we do not censor Internet traffic except as may be appropriate in response to official complaints and in the case of illegal activity. Part of our mission is to foster student engagement and responsible experimentation with the latest technologies. Thanks in part to the high-speed Internet access and our ResNet program, students in on-campus housing have formed an informal but lively learning community which we see as a significant educational opportunity at NC State. We are very reluctant to censor these activities.

Illegal activity is of course forbidden on the NC State network. This is clearly stated in the rules and regulations governing personal use of NC State’s computing systems and network. These regulations are widely distributed and published online. (See North Carolina State University Administrative Regulations, section III, Personal Use: http://www.ncsu.edu/policies/informationtechnology/REG08.00.2.php.) Although the Napster program is not itself illegal, it can be used for the illegal download and distribution of MP3s. Downloading or distributing material without permission of the copyright holder is a violation of federal and state law, even if it is not for profit. The penalties can be significant, including imprisonment and fines. Our refusal to censor access to the Napster site in no way condones violations of copyright or intellectual property laws.

Some universities have restricted access to Napster and similar programs because heavy bandwidth use among users of these applications had a significant impact on their university network. Although Napster is popular at NC State, we enjoy much greater bandwidth to the common Internet via NCREN than the vast majority of colleges and universities who may have only two or three T1 connections to their ISP. Any one of NCREN's OC-3 connections has many times the capacity that most smaller schools have in total. Recently, Napster has represented an average of 8 Mbps of total aggregated outbound network traffic. While this is a lot for a single application, NC State network functioning as a whole has not been affected.

However, if excessive bandwidth use by Napster or similar programs were to degrade the performance of instructional, research, or key business activities on the NC State network, we may choose to put a limit on bandwidth availability to targeted areas of the campus network. This would not be a censorship of access to a particular site, but simply a prudent measure to assure that the university’s computing systems are not overloaded and that resources are equitably shared.

Finally, users of Napster, iMesh, iCast, Macster, Spinfrenzy and similar programs need to be aware of the potential security threat they are exposing themselves to when using these applications. Many do not understand that their computer becomes a server when they use these programs. Some of the newer applications automatically start serving shared files as soon as the computer is connected to a network, and most do not stop the server portion of the application when the user exits the main program. Instead, the server remains active while the computer is on, and users are often unaware that they are sharing files even when away from their computers. With some programs, it is very easy for users to share portions of their hard drives that could easily expose them to intruders who could download password files, various cache files, and other personal information.


Back To Computing Rules & Regulations