Administrative Offices
Dean of Students
Student Handbook
Alphabetical Index
Student Handbook C
Student Handbook A
Student Handbook D & E
Student Handbook B
Student Handbook F & G
Student Handbook HIJ
Student Handbook L-O
Student Handbook P
Student Handbook R & S
Student Handbook T, V, W
Comprehensive Index of Policies and Procedures
Student Handbook: Policies A-D
Student Handbook: Policies S
Student Handbook: Policies E-H
Student Handbook: Policies U
Student Handbook: Policies I-R
Accreditation, Accessibility, Non-Discrimination & Diversity Statements
Right to Know
Phone Directory
Campus Resources and Services
Academic Calendar
Student Handbook Feedback Form
Nominations for Student Awards
Distinguished Student Award Nomination Form
James H. Woodworth Memorial Award Nomination Form
Commencement Information
Commencement Webcast
UMA Student Insurance
Office of the President
UMA Presidential Enrollment Mini-Grants
Making A Contribution
UMA Mission Statement
UMA Presidential Search
UMA Launches Presidential Search 5/20/15
Information Technology
Services for Students
Downloading FAQ
UMA PayPrint
Classroom Schedules
Computer Labs/Classrooms
Information Technology Staff
Information Technology Training Schedule
Phishing Scam Example
Internet/Home Computer Use
Services for Faculty
CourseCast/Panopto Retention Policy
Employee Computer Operating and Security Policy
Peer-To-Peer File Sharing and Copyright Violation Risks
Technology Purchasing Policy
Administrative Services
Emergency Action Plan
Professional Employees Assembly
Past PEA Meritorious Service Award Winners
Classified Employees Assembly
CEA Form Instructions
CEA Guidelines
Building Evacuation Procedures
Facilities Management
Facility Emergencies
Snow Removal
Custodial Services
Life Safety Equipment & Systems Guidance
Personal Protective Equipment Program
Confined Space Program and Procedures
Universal and Hazardous Waste
Control of Hazardous Energy Program
Fall Protection and Ladder Safety Program
Blood Borne Pathogens
Capital Construction Projects
Mailroom & Storage Facility
Jewett Hall Roof Replacement
Robinson Hall Parking Lot RFP
Alumni Center Renovation Project
Welding Safety Program
Hazard Communication and MSDS
Collective Bargaining Reps
E-911 Addresses
Employee Flu FAQs
General Forms
Mail Room
Mail Room Staff
Preparation of Mail
Bulk Mail
Fire Procedures
Medical Emergencies
Motor Vehicle Use Policy
Possession of Weapons, Firearms and/or Ammunition
Safety and Security
Personal Safety Escort Service
Active Shooter Safety Video
Safety Tips
Campus Assessment Response Evaluation
CARE Referral Form
CARE Workflow
CARE Videos
UMA Employee Anti-Harassment Training
Vehicle Parking Policy
Annual Security Report
Crime Statistics for the Augusta Campus
Crime Statistics for the Bangor Campus
Title IX Information
Sexual Assault, Sexual Misconduct and Stalking Related Information
Request for Proposal Response
Saco Center Description
Minimum Requirements - Building Specifications
RFP Space Request
Electrical Safety Plan
Office of the Provost
Academic Policies
UMA NEASC Self-Study
UMA NEASC Self-Study Archive
Outcomes Assessment Initiative
UMA NEASC Committees
UMA Technology Plan
Registrar and Records
Applying for Graduation
Apply to Graduate Form
Grading Policy
Transfer of Credits Policy
Student Confidentiality Under FERPA
UMA's Immunization Policy
Veteran Services
Grades by Text Message
Finance Office
Office of Institutional Research and Planning
IRP Staff
Common Data Set
Institutional Planning
Data Requests
Office of Human Resources
Employment Opportunities
Office of Marketing and Publications
Protocols & Procedures (Web Submission FAQ)
New Tester
A Test Page
UMA Tobacco Use Policy
Official Branding & Logos
Rising Scholars
Rising Scholar Nomination Information
Previous Rising Scholars
New Rising Scholars
Interested in being on TV and Helping UMA?
Alumni TV Spot Form
Commencement Student Speaker Nominations
Commencement Awards
President's Welcome
Our Campuses
Moose Tracks Cafe
Our Bangor Campus
Directions to UMA Bangor
UMA Bangor Admissions
Dental Hygiene Services
UMA Bangor Calendar
UMA Bangor Cornerstone
UMA Bangor Learning Support Services
UMA Bangor Writing Center
UMA Bangor
Our Augusta Campus
Augusta Campus Map
Visiting UMA Campuses
Schedule a Tour
Student Consumer Information
Net Price Calculator
Our Roots
Emergency Alerts
Get to Know UMA - Video Gallery
Friends and Family
Quick Facts
UMA on Social Media
50th Anniversary
50th Anniversary Fund

Have you ever wondered about the risk of downloading music from the Internet? Without permission from the copyright holder it is illegal and the chances of getting caught are high. The Recording Industry Association of America (RIAA) is actively looking for such illegal activities on university campuses and aggressively pursuing violators. Some UMS students and employees have already paid thousands of dollars each to settle lawsuits or threats of lawsuits.

Copyrighted material, including most music, is often downloaded or distributed illegally using peer-to-peer file sharing software or "P2P," which allow computers to share files directly with other computers. There are countless P2P systems, e.g., Limewire, Kazaa, Bearshare, Gnutella, etc., that allow you to download music and video files apparently for free. P2P have many serious problems:

  • Downloaded music and video files are usually copyrighted. After you retrieve a file using P2P, your computer becomes a server, offering the file to other P2P users and making you responsible for illegal distribution. We receive daily complaints of computers illegally distributing copyrighted materials from our networks. Copyright holders are not required to warn you before taking legal action. Copyright violations can also result in criminal prosecution.
  • Once your computer is an illegal P2P server it can:
    • run more slowly
    • slow down the entire University network
    • result in a minimum $750 fine per song you share
  • Downloaded files can infect your computer with viruses, expose confidential information and lead to identity theft.
  • Using P2P can result in University disciplinary action, including termination, for misuse of University property.

How to Protect Yourself

  • If you use your computer to access confidential student and/or employee information you should NEVER INSTALL ANY ADDITIONAL SOFTWARE, from any source, without first checking with technical support staff.
  • The safest course of action is limiting use of your university computer to university business. If you can't live without music while working:
    • Play regular CD's in your computer. Purchasing used CD's online, e.g. through's marketplace or, is a good way to build your CD collection.
    • Paid services may not be legal! Several P2P systems offer a paid service. This does not make their use legal. If you buy songs online, make sure the source is legal and avoid anything that requires you to install software on your computer. The Center for Democracy and Technology maintains a partial list of illegal sites posing as legal music sellers.
    • Avoid legal subscription services, e.g. Napster or Ruckus, that require you to install software that may interfere with business use of your computer.
    • Windows Media Player, included with Microsoft Windows, is reasonably safe to use for playing CD's and legally purchased and downloaded music.
    • There are sources of free and legal music on the Internet. Research carefully before using them. For example, the "Live Music Archive" at provides free access to music with the approval of copyright holders.
  • Be careful before bringing a PERSONAL computer onto a university network. Students and employees have been caught when they bring a personal laptop computer, with P2P software installed, to a university facility and attach to our wireless networks.
  • You are ultimately responsible for whatever you choose to do with your computer beyond University business. Nothing herein relieves you of your responsibility to ensure that your actions are legal and the University makes no guarantee that following the advice herein will protect you from legal action or financial consequences. The safest course of action is to use your university-provided computer for university business only.