Deconstructing the Kazaa Network

Total Page:16

File Type:pdf, Size:1020Kb

Deconstructing the Kazaa Network Deconstructing the Kazaa Network Nathaniel Leibowitz Matei Ripeanu Adam Wierzbicki Expand Networks Computer Science Department, Polish-Japanese Institute for [email protected] The University of Chicago Information Technology [email protected] [email protected] Abstract the user community and in its tastes, and the potential for caching. We are interested in the rate Internet traffic is experiencing a shift from web of appearance of new content, as well as in the traffic to file swapping traffic. Today a significant part stability properties for the sets of the most popular of Internet traffic is generated by peer-to-peer items. applications, mostly by the popular Kazaa application. ° Thirdly, we study the virtual relationships that form Yet, to date, few studies analyze Kazaa traffic, thus among users based on the data they download. We leaving the bulk of Internet traffic in dark. We present model the network as a data-sharing graph and a large-scale investigation of Kazaa traffic based on uncover its small-world characteristics. We believe logs collected at a large Israeli ISP, which capture that these small-world characteristics can be roughly a quarter of all traffic between Israel and US. exploited to build efficient data location and data delivery mechanisms. 1. Introduction The rest of this paper is structured as follows. In the next section we describe our data collection setup and In a brief period of time the composition of the main trace processing steps. Section 3 surveys Internet traffic shifted dramatically from mainly Web related work on peer-to-peer traffic characterization. traffic to traffic generated by peer-to-peer (P2P) Section 4 comprises the bulk of our analysis structured file-sharing applications like Kazaa, Morpheus or along the three guidelines mentioned above. We iMesh. Both network measurements and anecdotic summarize our findings in Section 5. evidence support this statement. Internet2 administrators report that about 16% of the traffic carried by their network is P2P traffic while a further 2. Data Collection and Processing 54% is unidentified traffic most likely to be generated by applications in the same class [1] (January 2003). Few details are publicly available about the Kazaa Between 15% and 30% of residential subscribers on protocol. Apparently, Kazaa nodes dynamically elect several large ISPs surveyed were using Kazaa or ‘super-nodes’ that form an unstructured overlay Morpheus [2]. Downloads of P2P applications network and use query flooding to locate content. progress at incredible rates: 3.2 million per week for Regular nodes connect to one or more super-nodes to Kazaa and 200,000 per week for Gnutella [3] query the network content and in fact act as querying (February 2003). clients to super-nodes. Once desired content has been Yet, to date, few studies have analyzed Kazaa located Kazaa uses HTTP protocol to transfer it traffic, thus leaving the bulk of Internet traffic in dark. directly between the content provider and the node This paper describes a large-scale investigation of this that issues the download request. In fact, to improve traffic structured along three main guidelines: transfer speed multiple file fragments are downloaded ° Firstly, we try to identify the salient features of in parallel from multiple providers. While traffic Kazaa traffic. We confirm that the traffic is highly flowing on the control channel (queries, network concentrated around a small minority of large, membership information, software version popular items. We find however, that this information, etc.) is encrypted, traffic on the download concentration is even more pronounced than channel (i.e. all HTPP transfers) is not encrypted. We previously reported. This is a strong indication that are using information collected from the download caching can bring significant savings in this channel for an, admittedly non-exhaustive, study of context. Kazaa network. ° Secondly, we study the dynamics of network content to better understand both the underlying trends in 1 2.1. Data Collection Table 1 summarizes the main characteristics of the traffic captured. To collect Kazaa traces we use a setup similar to Table 1: Characteristics of collected Kazaa traces. [4]. We briefly describe the trace collection setup below and refer to [4] for a complete description. A Data collection period 1/15 – 2/15/03 Number of download sessions 7 * 106 caching server is installed at the border between the 6 local user base of a large ISP and the Internet cloud. Number of control sessions 24 * 10 For each TCP connection, regardless if direction (both Bytes transferred 20 TB in and out), a Layer 4 switch inspects the fist few Concurrent sessions (avg.) 1200 packets to detect Kazaa download traffic. If download Concurrent sessions (peak) 3000 traffic is detected then the switch redirects it through Bandwidth used (average) 75 Mbps the caching server. Thus, the caching server is able to Bandwidth used (peak) 145 Mbps intercept all downloads performed by local users, Number of unique files ~300,000 cache, and serve cached data. We note that we focus Number of unique users ≥ 50,000 on downloads performed by local users and completely ignore downloads performed by outside 3. Related Work users from local file providers (in other words we are only interested in incoming traffic). A number of recent studies cast more light on the Additionally, our content-based technique to nature of P2P traffic in particular on traffic generated detect traffic of interest has significant advantages by FastTrack (KaZaa, KaZaa Lite) and Gnutella over traditional, port based techniques: we find that in (Morpheus, LimeWire, etc) family applications that February 2003 about 38% of all download sessions have started to generate a significant share of Internet were not using the standard Kazaa port (1214). traffic. It is difficult to define Kazaa downloads in the Sen et al. [5] use TCP flow-level data gathered terms originally coined for describing standard file from multiple routers across a large Tier-1 ISP to downloads, the salient difference being that the analyze three P2P applications (Kazaa, Gnutella and download of a single file is usually composed of tens DirectConnect). While this data does not reveal of smaller downloads of different fragments of the file application level details and cannot give insights from different providers. This complicates both the explaining the behavior observed, it is an important terminology and the computations involved in step in characterizing these applications from a analyzing the data. We use the terms and methods network engineering perspective. For example, Sen et introduced in [4] to circumvent these problems: The al. [5] report that although the distribution of term download or session describes a single TCP generated P2P traffic volume is highly skewed at the session between two nodes, over which a portion of a individual host level, the fraction of the traffic file (none, part, or all of the file) is transferred. The contributed by each network prefix remains relatively term download cycle describes the logical transfer of a unchanged over long time intervals. whole file, which may consist of tens of sessions, and At the application level, Gnutella’s open protocol extend over hours or even days. Finally, we use the has made the analysis of this network somewhat following scheme to quantify the number of download simpler. A number of studies [5-9], based mostly on cycles for each file: if an accumulated value of X bytes data collected from the control channel, explore the of file Y have been transferred over the network, then topology of the Gnutella overlay, its mapping on the X we estimate that /FileSize-of-Y download cycles of the file Internet physical infrastructure, the behavior of have passed over the network. Gnutella users, and the main characteristics of Gnutella nodes. 2.2. The Traces Two recent studies [4, 10] use the fact that although Kazaa’s protocol (FastTrack) is proprietary, The caching server has been continuously logging Kazaa uses HTTP to move data files: thus this traffic traffic over the past year. As we do not see qualitative can be logged and cached. Both these studies monitor changes in traffic characteristics during this period we HTTP traffic on costly links: traffic from a large use only a part of these logs for most of our analysis Israeli ISP to US and Europe [4], or from University below. of Washington campus to its ISP [10] (in the following We eliminate from our logs all control channel we refer to these traces as UW traces). connections and use only the inbound download Leibowitz et al. [4] note that Kazaa traffic sessions (i.e. data flowing to local users from both constitutes most of the Internet traffic, show that a tiny other external or other internal users) for our analysis. number of files generates most of the download activity, suggest the feasibility of traffic caching, and 2 empirically demonstrate its benefits. Saroiu et al. [10] reaffirm these findings and compare Kazaa traffic with traffic generated by traditional content distribution systems (i.e. Akamai and Web traffic). We believe the traces analyzed in this study and in [4] complement well the traces analyzed in [10]: our traces reflect a more diverse user population with significant heterogeneity in network connectivity and interests. Additionally we analyze a community where users pay network usage charges upfront, as opposed to a university where users charged for network usage indirectly or not at all. One interesting observation highlights the difference in user population (and respective usage patterns) in these two studies: while the University of Figure 1: CDF for file download cycles. Note that Washington user community acts as net provider of more than 10% of all download sessions attempted Kazaa content (Saroiu et al. report that at UW actually fail.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • The Effects of Digital Music Distribution" (2012)
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Spring 4-5-2012 The ffecE ts of Digital Music Distribution Rama A. Dechsakda [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp The er search paper was a study of how digital music distribution has affected the music industry by researching different views and aspects. I believe this topic was vital to research because it give us insight on were the music industry is headed in the future. Two main research questions proposed were; “How is digital music distribution affecting the music industry?” and “In what way does the piracy industry affect the digital music industry?” The methodology used for this research was performing case studies, researching prospective and retrospective data, and analyzing sales figures and graphs. Case studies were performed on one independent artist and two major artists whom changed the digital music industry in different ways. Another pair of case studies were performed on an independent label and a major label on how changes of the digital music industry effected their business model and how piracy effected those new business models as well. I analyzed sales figures and graphs of digital music sales and physical sales to show the differences in the formats. I researched prospective data on how consumers adjusted to the digital music advancements and how piracy industry has affected them. Last I concluded all the data found during this research to show that digital music distribution is growing and could possibly be the dominant format for obtaining music, and the battle with piracy will be an ongoing process that will be hard to end anytime soon.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Piratez Are Just Disgruntled Consumers Reach Global Theaters That They Overlap the Domestic USA Blu-Ray Release
    Moviegoers - or perhaps more accurately, lovers of cinema - are frustrated. Their frustrations begin with the discrepancies in film release strategies and timing. For example, audiences that saw Quentin Tarantino’s1 2 Django Unchained in the United States enjoyed its opening on Christmas day 2012; however, in Europe and other markets, viewers could not pay to see the movie until after the 17th of January 2013. Three weeks may not seem like a lot, but some movies can take months to reach an international audience. Some take so long to Piratez Are Just Disgruntled Consumers reach global theaters that they overlap the domestic USA Blu-Ray release. This delay can seem like an eternity for ultiscreen is at the top of the entertainment a desperate fan. This frustrated enthusiasm, combined industry’s agenda for delivering digital video. This with a lack of timely availability, leads to the feeling of M is discussed in the context of four main screens: being treated as a second class citizen - and may lead TVs, PCs, tablets and mobile phones. The premise being the over-anxious fan to engage in piracy. that multiscreen enables portability, usability and flexibility for consumers. But, there is a fifth screen which There has been some evolution in this practice, with is often overlooked – the cornerstone of the certain films being released simultaneously to a domestic and global audience. For example, Avatar3 was released entertainment industry - cinema. This digital video th th ecosystem is not complete without including cinema, and in theaters on the 10 and 17 of December in most it certainly should be part of the multiscreen discussion.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • [Hal-00744922, V1] Improving Content Availability in the I2P Anonymous
    Improving Content Availability in the I2P Anonymous File-Sharing Environment Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Universit´ede Lorraine Email: fjuanpablo.timpanaro, [email protected] Email: [email protected] Abstract. Anonymous communication has gained more and more inter- est from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anony- mous file-sharing among users. However, one major problem with anony- mous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTor- rent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable. 1 Introduction Peer-to-peer file-sharing has always been one of the major sources of the Internet hal-00744922, version 1 - 24 Oct 2012 traffic, since its early beginnings in 2000. It has been moving from semi-central approaches (eDonkey2000, for example), to semi-decentralized approaches (Kazaa, for instance) to fully decentralized file-sharing architectures (like the KAD net- work).
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Services for Microsoft Onedrive for Business
    Service Overview SERVICES FOR MICROSOFT ONEDRIVE FOR BUSINESS Simplify where workers go for content sharing and collaboration Business Challenge ESSENTIALS Dynamic teams are constantly collaborating, which means easily Dell Technologies Consulting Services can sharing personal and team documents is a must for todays’ help you gain the most from your OneDrive innovative workers. All too often organizations have multiple content for Business investment with: repositories without a single standard for the entire workforce which • Repeatable, mature methodologies can cause frustration and impact worker productivity. designed for delivery efficiency and Simplifying where your workers go to collaborate and share content quality accelerate content migrations can boost innovation, increase productivity and more importantly • Determining and delivering the optimal worker satisfaction. For organizations who have adopted Office 365, OneDrive client deployment model as OneDrive for Business is the logical choice. But how do you part of your Windows 10 and Office 365 efficiently migrate, retire and consolidate personal and team files ProPlus initiatives from overlapping content repositories to control costs? • Security and management tuning at the It’s easy with Dell Technologies Consulting Services. We are a Gold worker, device and application level Certified Microsoft Partner with experience migrating organizations of all sizes and verticals to Office 365. • Migration and consolidation of content from a wide variety of sources • The right mix of
    [Show full text]
  • The Robustness of Content-Based Search in Hierarchical Peer to Peer Networks
    The Robustness of Content-Based Search in Hierarchical Peer to Peer Networks ∗ M. Elena Renda Jamie Callan I.S.T.I. – C.N.R. Language Technologies Institute and School of Computer Science Scuola Superiore Sant’Anna Carnegie Mellon University I-56100 Pisa, Italy Pittsburgh, PA 15213, US [email protected] [email protected] ABSTRACT Keywords Hierarchical peer to peer networks with multiple directory services Peer to Peer, Hierarchical, Search, Retrieval, Content-based, Ro- are an important architecture for large-scale file sharing due to their bustness effectiveness and efficiency. Recent research argues that they are also an effective method of providing large-scale content-based federated search of text-based digital libraries. In both cases the 1. INTRODUCTION directory services are critical resources that are subject to attack Peer to peer (P2P) networks have emerged in recent years as a or failure, but the latter architecture may be particularly vulnera- popular method of sharing information, primarily popular music, ble because content is less likely to be replicated throughout the movies, and software, among large numbers of networked com- network. puters. Computers (‘nodes’) in P2P networks can be information This paper studies the robustness, effectiveness and efficiency providers and information consumers, and may provide network of content-based federated search in hierarchical peer to peer net- services such as message routing and regional directory services. works when directory services fail unexpectedly. Several recovery A single node may play several roles at once, for example, posting methods are studied using simulations with varying failure rates. queries, sharing files, and relaying messages.
    [Show full text]
  • FASTTRACK Through FUJITSU-DEV
    FASTTRACK through FUJITSU-DEV Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA FASTTRACK through FUJITSU-DEV FASTTRACK FASTTRACK Name/CLI Keyword fasttrack Full Name FastTrack Description FastTrack is a file sharing client software that is based on peer-to-peer connection. FastTrack is used by multiple file sharing applications such as Kazaa, Grokster, iMesh, and Morpheus. Initialization: Initial the connection with FastTrack server over HTTP. Search: Searching for files in FastTrack server. Download: Download request from FastTracker server. Reference http://developer.berlios.de/projects/gift-fasttrack/ Global ID L7:57 ID 57 Known Mappings UDP Port - TCP Port - IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 2 FASTTRACK through FUJITSU-DEV FASTTRACK-STATIC FASTTRACK-STATIC Name/CLI Keyword fasttrack-static Full Name fasttrack-static Description FastTrack Traffic - KaZaA Morpheus Grokster... Reference - Global ID L7:1322 ID 1322 Known Mappings UDP Port 1214 TCP Port 1214 IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 3 FASTTRACK through FUJITSU-DEV FATSERV FATSERV Name/CLI Keyword fatserv Full Name Fatmen Server Description Fatmen Server Reference - Global ID L4:305 ID 305 Known
    [Show full text]
  • Internet Peer-To-Peer File Sharing Policy Effective Date 8T20t2010
    Title: Internet Peer-to-Peer File Sharing Policy Policy Number 2010-002 TopicalArea: Security Document Type Program Policy Pages: 3 Effective Date 8t20t2010 POC for Changes Director, Office of Computing and Information Services (OCIS) Synopsis Establishes a Dalton State College-wide policy regarding copyright infringement. Overview The popularity of Internet peer-to-peer file sharing is often the source of network resource allocation problems and copyright infringement. Purpose This policy will define Internet peer-to-peer file sharing and state the policy of Dalton State College (DSC) on this issue. Scope The scope of this policy includes all DSC computing resources. Policy Internet peer-to-peer file sharing applications are frequently used to distribute copyrighted materials such as music, motion pictures, and computer software. Such exchanges are illegal and are not permifted on Dalton State Gollege computers or network. See the standards outlined in the Appropriate Use Policy. DSG Procedures and Sanctions Failure to comply with the appropriate use of these resources threatens the atmosphere for the sharing of information, the free exchange of ideas, and the secure environment for creating and maintaining information property, and subjects one to discipline. Any user of any DSC system found using lT resources for unethical and/or inappropriate practices has violated this policy and is subject to disciplinary proceedings including suspension of DSC privileges, expulsion from school, termination of employment and/or legal action as may be appropriate. Although all users of DSC's lT resources have an expectation of privacy, their right to privacy may be superseded by DSC's requirement to protect the integrity of its lT resources, the rights of all users and the property of DSC and the State.
    [Show full text]