How to Handle Prohibited Downloads on Your WiFi Network

Prohibited downloads by a customer in your business can result in receipt of a copyright infringement notice by organizations such as the Recording Industry Association of America (RIAA) or the Motion Picture Association of America (MPAA). They monitor file sharing on the Internet and notify businesses when a computer on its network has prohibited shared and/or downloaded copyrighted files.

Recommended actions

  1. Incorporate notices in your business warning against prohibited downloads on your network.
  2. Zenreach can assist with setting up filters to block unencrypted torrents. Please contact with the specific websites you’d like to block.
  3. Zenreach can assist with blocking any specific websites that are known to allow for prohibited downloads. Please provide a list to
  4. Limit download speed on your guest network to help discourage this type of behavior by customers. Please contact if you would like assistance with this action.

Note: This action will impact all users on your network and may impair their overall experience.


Why is it difficult to protect against this type of activity?

Our hardware providers have the ability to help mitigate some, but not all, prohibited downloads. This is because it is impossible to block encrypted connections en masse as there is no easy way to identify each specific secure HTTPS website that a file sharing program could use to encrypt their traffic. The way these sites are setup allows them to bypass any specific rules that are configured directly on the hardware.

What happens if I receive a copyright infringement notice?

Please visit the organization’s website from which the notice was sent and see what recommended actions they suggest —each organization is different.

Note: Please remember that while the solutions above may help in reducing the risk of improper behavior on your network, they are not comprehensive or foolproof measures. As the owner and administrator of your network, you are ultimately responsible for the behavior of anyone who uses it, and we encourage you to be vigilant in communicating and enforcing proper usage.

Was this article helpful?
0 out of 0 found this helpful



Article is closed for comments.