SlideShare a Scribd company logo
1 of 33
 What is software piracy?
 What is copyright?
 Installing illegal copies of commercial
software
 Violating end user license agreement
 Downloading of software/cracking of
software
 Use of software for educational use
 Use of software for personal use
 Differences among various types of
licensing.
 Differences among various software
 Downloading of movies for free
 Making illegal copies for sale on the
streets
 Watching free movies or listening to
music online
 Uploading music and movies to websites
to be viewed free
 Use of bit torrents for file sharing
 Playing games online
Research Paper: Software Piracy & Copyright 2
Research Paper: Software Piracy & Copyright
3
“Given the recent amendment of the Cybercrime Act, do
you think the offenders as it relates to software privacy
and plagiarism will decrease in numbers in fear of the
jurisdiction that comes with the act?”
“Since amendment; has there been any applied pressure
towards offenders as an effort to let them know that there
is a law that speaks against their offences?”
Research Paper: Software Piracy & Copyright
4
“On November 15, there was an offender, or to be
precise, there was a criminal who was charged with rape
and violations of the cybercrime act, seeing he is a recent
offender, do you think he should be given the full 10
years that comes with the act as means to make a
statement to any member of the public that breaches
should minimize?”
 This is the unauthorized copy or distribution of
copyrighted software.This can be done by copying,
downloading, sharing, selling, or installing multiple
copies onto personal or work computers.
 Case: Settlement in software Piracy case - The Gleaner,
Sunday March 8, 2010; Barbara Gayle.
Research Paper: Software Piracy & Copyright 5
 A protection given to authors or creators of “original works
of authorship,” including literary, dramatic, musical, artistic
and other intellectual works.This means as the author of the
work, you alone have the right to:
Research Paper: Software Piracy & Copyright 8
Make
Copies
Distribute
Copies
Make
derivative
works
Perform
Publicly
Display
Work
 Case: Copyright
infringement ruling
disappoints marks
- The Observer;
Paul Henry
With the advent of file sharing sites such as Pirate Bay
and Bit Torrent, the ease of downloading commercial
software for free is creating a challenge for companies.
In Jamaica, Douglas DaCosta sued Arthur James for
selling unauthorized copies of his Auto Parts
Management System to companies.
Research Paper: Software Piracy & Copyright 9
Research Paper: Software Piracy & Copyright
10
“…43 percent of the software installed on PCs around
the world were not properly licensed, an uptick from
42 percent in 2011.The commercial value of the
unlicensed installations was $62.7 billion.”
This is a contract between the ‘licensor’ and the
consumer of the right to use software.
It defines the ways under which a product may be used,
in addition to other rights or restrictions included in the
agreement.
The EULA is also a non-negotiable agreement which the
user can either accept in its entirety or not accept by not
using the product or the service at all.
Research Paper: Software Piracy & Copyright 11
Persons who engage in software cracking are called
“crackers”.
They break into computer systems or networks to
maliciously add, remove or steal information.
Software cracking enables crackers to by-pass paying for
or registering software by using different methods.
‘Cracked’ software is considered to be pirated and is
illegal under the laws of multiple countries.
Research Paper: Software Piracy & Copyright 12
Software cracking is covered in the Digital Millennium
Copyright Act (DMCA) of the US - in accordance to the
World Intellectual Property Organization (WIPO) of the
United Nations.
This infringement is covered under the Cybercrime Act
of 2015 in Jamaica.
Research Paper: Software Piracy & Copyright 13
Questions to be asked:
Research Paper: Software Piracy & Copyright 14
How and where does an educational institution acquire its
software from?
Do they violate the end-user policy on the software by installing
it on multiple machines?
If educational institutions do engage in software piracy and
copyright, would they face the same charges as others who
commit such crimes?
There are many different types and uses of software in the
educational sector.
For example the use of the Microsoft Office Package,
Learning Management Systems, virtualization software,
games for educational purposes, software that assists
students with special needs and the list continues.
Research Paper: Software Piracy & Copyright 15
According to Title 17, Section 107, of the U.S. Code, refers
to “teaching, scholarship or research, is not an
infringement of copyright
Limitations on exclusive rights: Fair Use Doctrine, 2015
given that it does not violate the stated factors above.
Research Paper: Software Piracy & Copyright 16
Research Paper: Software Piracy & Copyright 17
Research Paper: Software Piracy & Copyright 18
Site License User License MIT License
Client Access
License
(CAL)
Compulsory
License
Site License
 Used when purchasing software for
single site usages but with multiple
users.
 These users are granted permission
to access copy protected work, but
only at that particular location.
 Also known as software licensing.
User License
 This is another name for End-User
License Agreement (EULA).
 A EULA protects both parties from
liability if the software is used in a
way not intended by the
manufacturer or author.
Research Paper: Software Piracy & Copyright 19
MIT License
 A type of license recognized by the
Open Source Initiative (OSI).
 It permits reuse within proprietary
software on the condition that the
license is distributed with that
software.
 The MIT license is one of well over
fifty licenses that have been
approved by the OSI.
Client Access License
 This is a license that gives a user the
right to access the services of the
server.
 They are primarily used for Microsoft
server products.
Research Paper: Software Piracy & Copyright 20
 Also referred to as a statutory license.
 According to U.S law, a license to use content under reasonable and
non-discriminatory terms, defined by act of Congress.
 They don’t need to obtain permission from the copyright holders to
play a song, but must pay usage fees to the copyright holders based
on how often a particular song is played.
Research Paper: Software Piracy & Copyright 21
Open
Source
Freeware Commercial
Shareware
Public
Domain
General
Public
License
Research Paper: Software Piracy & Copyright 22
Open Source
 Licensed to guarantee free access to
the programming source code.
 This allows the user to install the
software on a new platform without
an additional purchase.
 Those who are technically inclined
can fix bugs.
Freeware
 Software that is distributed for free.
 Available either as fully functional
trial software or partially completed.
 The author may stipulate that others
not modify the program.
 A freeware is typically distributed
without its source code.
 It may be freely copied but not sold.
Research Paper: Software Piracy & Copyright 23
 Developed by a commercial entity
and is typically licensed for a fee to
a customer in object, binary or
executable code.
 The commercial entity often
provides support, training, updates
and other similar services needed
by customers to efficiently use that
software.
 The source code of the software may
be made available to certain users of
the software through special licensing
or other agreements.
Research Paper: Software Piracy & Copyright 24
 Distributed at low (or sometimes no)
cost, but usually requires payment
and registration for full legal use.
 Copies are distributed on a trial
basis.You are free to test the
software and decide whether it's a
good value.
 It is not free, since authors of these
programs expect payment from
those who intend to use the
programs.
 While shareware may be freely
copied, companies may not charge
fees for copies that significantly
exceed their costs.
 The authors retain their copyright on
the contents, and you may not modify
or distribute modified copies.
Research Paper: Software Piracy & Copyright 25
 This is often used to refer to software programs that are offered to the public
without copyright restrictions.
 They are publicly available and can be freely accessed and redistributed.
 It is similar to open source and freeware software
 However, open source software, while freely distributed, still retains the
original developer's copyright.
 When software is offered as public domain, it is often labelled "PD" or may
include a Public Domain Mark (PDM).
Research Paper: Software Piracy & Copyright 26
 This is a free, copyleft license for software and other kinds of works.
 The licenses for most software and other practical works are designed to take
away your freedom to share and change the works.
 By contrast, the GNU General Public License is intended to guarantee your
freedom to share and change all versions of a program - to make sure it
remains free software for all its users.
Research Paper: Software Piracy & Copyright 27
 The Jamaican Gleaner of July 29, 2015 states that as a
democracy Jamaica has the right to its privileges which also
includes watching free movies or listening to music online.
 That means that when some institution rob us from watching
free movies or listening to music online their technically
abusing our rights as citizens of democracy.
 In my opinion, I agree with this as I should have the right to
watch or listen to what I want, when I want, however I want.
Research Paper: Software Piracy & Copyright 28
 Uploading music and movies to websites to be viewed free
can be looked upon in both a positive and negative light.
 In the positive light, when you upload music and movies to be
viewed free online you allow those who really want to watch
or listen to such things but can’t afford to pay for them.
 In the negative light however, unless you get permission from
the original creator of such movies or music, you are part
taking in copyright infringement which may give rise to both
criminal and civil liabilities.
Research Paper: Software Piracy & Copyright 29
 Anyone who does not know that downloading movies from the
Internet online for free is illegal, knows that it is unethical but just
chooses to ignore these laws as well as the criminal justice that
they will face if they got caught.
 The Recording Industry Association of America (RIAA) clearly
states that, as recently as November 13, 2015, "Uploading is
copying. Downloading is also copying. Unauthorized copying is an
unauthorized use that is governed by the copyright laws.”
 Therefore, unauthorized uploading and unauthorized downloading
are unauthorized uses governed by the copyright laws.
Research Paper: Software Piracy & Copyright 30
Under the Copyright Act of Jamaica strictly points out that
the illegal copying of software for redistribution is against
the law.
Anyone who does this commits an offence.
The US has a law relating to this infringement in Title 17 of
the United States Code (Sections 501 and 506)
Research Paper: Software Piracy & Copyright 31
Online games that entail gambling is deemed illegal by
the cybercrime act.
Within the United States of America cyber casinos are
illegal.
According to Leslie Bryant, head of the Cybercrime Fraud
unit at FBI Headquarters, in the article name Online
Gambling “You can go to Vegas.You can go to Atlantic
City.You can go to a racetrack.You can go to those places
and gamble legally. But don’t do it online…”
Research Paper: Software Piracy & Copyright 32
US Laws that govern online gaming:
 Wire Act
 Illegal Gambling Business Act
 Professional and Amateur Sports Professional Act (PASPA)
 Unlawful Internet Gambling Enforcement Act (UIGEA)
Research Paper: Software Piracy & Copyright 33

More Related Content

What's hot

Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 
Digital Rights Management PPT
Digital Rights Management PPTDigital Rights Management PPT
Digital Rights Management PPT
Suresh Khutale
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
Byerdavi
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
SaimaRafiq
 

What's hot (20)

Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
Digital Rights Management PPT
Digital Rights Management PPTDigital Rights Management PPT
Digital Rights Management PPT
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Everything You Need to Know About Gmail Rendering
Everything You Need to Know About Gmail RenderingEverything You Need to Know About Gmail Rendering
Everything You Need to Know About Gmail Rendering
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Artificial Intelligence and Intellectual Property
Artificial Intelligence and Intellectual PropertyArtificial Intelligence and Intellectual Property
Artificial Intelligence and Intellectual Property
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 

Viewers also liked

Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
Adjem
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
aleeya91
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 

Viewers also liked (17)

Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
 
Intelligent agents
Intelligent agentsIntelligent agents
Intelligent agents
 
Copyright Infringement and Plagiarism
Copyright Infringement and PlagiarismCopyright Infringement and Plagiarism
Copyright Infringement and Plagiarism
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Direito Autoral
Direito AutoralDireito Autoral
Direito Autoral
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Plagiarism=Copyright Infringement
Plagiarism=Copyright InfringementPlagiarism=Copyright Infringement
Plagiarism=Copyright Infringement
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
A presentation on Copyright & Copyright Infringement
A presentation on Copyright & Copyright InfringementA presentation on Copyright & Copyright Infringement
A presentation on Copyright & Copyright Infringement
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
17 Ways to Design a Presentation People Want to View
17 Ways to Design a Presentation People Want to View17 Ways to Design a Presentation People Want to View
17 Ways to Design a Presentation People Want to View
 

Similar to Software piracy and copyright infringement

Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future Ahead
Sanjanaa Chindalia
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
RijuDasgupta
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
wokk1d337
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
dixieyeager
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
dixieyeager
 
Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docx
alanfhall8953
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
Heather Bauer
 
Limewire
LimewireLimewire
Limewire
wmorris
 
SIGGRAPH 2008 - Copyright and Open Licensing
SIGGRAPH 2008 - Copyright and Open LicensingSIGGRAPH 2008 - Copyright and Open Licensing
SIGGRAPH 2008 - Copyright and Open Licensing
guest5a993b
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
Rowan Wilson
 

Similar to Software piracy and copyright infringement (20)

Software copyright
Software copyrightSoftware copyright
Software copyright
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future Ahead
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docx
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Limewire
LimewireLimewire
Limewire
 
SIGGRAPH 2008 - Copyright and Open Licensing
SIGGRAPH 2008 - Copyright and Open LicensingSIGGRAPH 2008 - Copyright and Open Licensing
SIGGRAPH 2008 - Copyright and Open Licensing
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensing
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 

Recently uploaded

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 

Software piracy and copyright infringement

  • 1.
  • 2.  What is software piracy?  What is copyright?  Installing illegal copies of commercial software  Violating end user license agreement  Downloading of software/cracking of software  Use of software for educational use  Use of software for personal use  Differences among various types of licensing.  Differences among various software  Downloading of movies for free  Making illegal copies for sale on the streets  Watching free movies or listening to music online  Uploading music and movies to websites to be viewed free  Use of bit torrents for file sharing  Playing games online Research Paper: Software Piracy & Copyright 2
  • 3. Research Paper: Software Piracy & Copyright 3 “Given the recent amendment of the Cybercrime Act, do you think the offenders as it relates to software privacy and plagiarism will decrease in numbers in fear of the jurisdiction that comes with the act?” “Since amendment; has there been any applied pressure towards offenders as an effort to let them know that there is a law that speaks against their offences?”
  • 4. Research Paper: Software Piracy & Copyright 4 “On November 15, there was an offender, or to be precise, there was a criminal who was charged with rape and violations of the cybercrime act, seeing he is a recent offender, do you think he should be given the full 10 years that comes with the act as means to make a statement to any member of the public that breaches should minimize?”
  • 5.  This is the unauthorized copy or distribution of copyrighted software.This can be done by copying, downloading, sharing, selling, or installing multiple copies onto personal or work computers.  Case: Settlement in software Piracy case - The Gleaner, Sunday March 8, 2010; Barbara Gayle. Research Paper: Software Piracy & Copyright 5
  • 6.
  • 7.
  • 8.  A protection given to authors or creators of “original works of authorship,” including literary, dramatic, musical, artistic and other intellectual works.This means as the author of the work, you alone have the right to: Research Paper: Software Piracy & Copyright 8 Make Copies Distribute Copies Make derivative works Perform Publicly Display Work  Case: Copyright infringement ruling disappoints marks - The Observer; Paul Henry
  • 9. With the advent of file sharing sites such as Pirate Bay and Bit Torrent, the ease of downloading commercial software for free is creating a challenge for companies. In Jamaica, Douglas DaCosta sued Arthur James for selling unauthorized copies of his Auto Parts Management System to companies. Research Paper: Software Piracy & Copyright 9
  • 10. Research Paper: Software Piracy & Copyright 10 “…43 percent of the software installed on PCs around the world were not properly licensed, an uptick from 42 percent in 2011.The commercial value of the unlicensed installations was $62.7 billion.”
  • 11. This is a contract between the ‘licensor’ and the consumer of the right to use software. It defines the ways under which a product may be used, in addition to other rights or restrictions included in the agreement. The EULA is also a non-negotiable agreement which the user can either accept in its entirety or not accept by not using the product or the service at all. Research Paper: Software Piracy & Copyright 11
  • 12. Persons who engage in software cracking are called “crackers”. They break into computer systems or networks to maliciously add, remove or steal information. Software cracking enables crackers to by-pass paying for or registering software by using different methods. ‘Cracked’ software is considered to be pirated and is illegal under the laws of multiple countries. Research Paper: Software Piracy & Copyright 12
  • 13. Software cracking is covered in the Digital Millennium Copyright Act (DMCA) of the US - in accordance to the World Intellectual Property Organization (WIPO) of the United Nations. This infringement is covered under the Cybercrime Act of 2015 in Jamaica. Research Paper: Software Piracy & Copyright 13
  • 14. Questions to be asked: Research Paper: Software Piracy & Copyright 14 How and where does an educational institution acquire its software from? Do they violate the end-user policy on the software by installing it on multiple machines? If educational institutions do engage in software piracy and copyright, would they face the same charges as others who commit such crimes?
  • 15. There are many different types and uses of software in the educational sector. For example the use of the Microsoft Office Package, Learning Management Systems, virtualization software, games for educational purposes, software that assists students with special needs and the list continues. Research Paper: Software Piracy & Copyright 15
  • 16. According to Title 17, Section 107, of the U.S. Code, refers to “teaching, scholarship or research, is not an infringement of copyright Limitations on exclusive rights: Fair Use Doctrine, 2015 given that it does not violate the stated factors above. Research Paper: Software Piracy & Copyright 16
  • 17. Research Paper: Software Piracy & Copyright 17
  • 18. Research Paper: Software Piracy & Copyright 18 Site License User License MIT License Client Access License (CAL) Compulsory License
  • 19. Site License  Used when purchasing software for single site usages but with multiple users.  These users are granted permission to access copy protected work, but only at that particular location.  Also known as software licensing. User License  This is another name for End-User License Agreement (EULA).  A EULA protects both parties from liability if the software is used in a way not intended by the manufacturer or author. Research Paper: Software Piracy & Copyright 19
  • 20. MIT License  A type of license recognized by the Open Source Initiative (OSI).  It permits reuse within proprietary software on the condition that the license is distributed with that software.  The MIT license is one of well over fifty licenses that have been approved by the OSI. Client Access License  This is a license that gives a user the right to access the services of the server.  They are primarily used for Microsoft server products. Research Paper: Software Piracy & Copyright 20
  • 21.  Also referred to as a statutory license.  According to U.S law, a license to use content under reasonable and non-discriminatory terms, defined by act of Congress.  They don’t need to obtain permission from the copyright holders to play a song, but must pay usage fees to the copyright holders based on how often a particular song is played. Research Paper: Software Piracy & Copyright 21
  • 23. Open Source  Licensed to guarantee free access to the programming source code.  This allows the user to install the software on a new platform without an additional purchase.  Those who are technically inclined can fix bugs. Freeware  Software that is distributed for free.  Available either as fully functional trial software or partially completed.  The author may stipulate that others not modify the program.  A freeware is typically distributed without its source code.  It may be freely copied but not sold. Research Paper: Software Piracy & Copyright 23
  • 24.  Developed by a commercial entity and is typically licensed for a fee to a customer in object, binary or executable code.  The commercial entity often provides support, training, updates and other similar services needed by customers to efficiently use that software.  The source code of the software may be made available to certain users of the software through special licensing or other agreements. Research Paper: Software Piracy & Copyright 24
  • 25.  Distributed at low (or sometimes no) cost, but usually requires payment and registration for full legal use.  Copies are distributed on a trial basis.You are free to test the software and decide whether it's a good value.  It is not free, since authors of these programs expect payment from those who intend to use the programs.  While shareware may be freely copied, companies may not charge fees for copies that significantly exceed their costs.  The authors retain their copyright on the contents, and you may not modify or distribute modified copies. Research Paper: Software Piracy & Copyright 25
  • 26.  This is often used to refer to software programs that are offered to the public without copyright restrictions.  They are publicly available and can be freely accessed and redistributed.  It is similar to open source and freeware software  However, open source software, while freely distributed, still retains the original developer's copyright.  When software is offered as public domain, it is often labelled "PD" or may include a Public Domain Mark (PDM). Research Paper: Software Piracy & Copyright 26
  • 27.  This is a free, copyleft license for software and other kinds of works.  The licenses for most software and other practical works are designed to take away your freedom to share and change the works.  By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program - to make sure it remains free software for all its users. Research Paper: Software Piracy & Copyright 27
  • 28.  The Jamaican Gleaner of July 29, 2015 states that as a democracy Jamaica has the right to its privileges which also includes watching free movies or listening to music online.  That means that when some institution rob us from watching free movies or listening to music online their technically abusing our rights as citizens of democracy.  In my opinion, I agree with this as I should have the right to watch or listen to what I want, when I want, however I want. Research Paper: Software Piracy & Copyright 28
  • 29.  Uploading music and movies to websites to be viewed free can be looked upon in both a positive and negative light.  In the positive light, when you upload music and movies to be viewed free online you allow those who really want to watch or listen to such things but can’t afford to pay for them.  In the negative light however, unless you get permission from the original creator of such movies or music, you are part taking in copyright infringement which may give rise to both criminal and civil liabilities. Research Paper: Software Piracy & Copyright 29
  • 30.  Anyone who does not know that downloading movies from the Internet online for free is illegal, knows that it is unethical but just chooses to ignore these laws as well as the criminal justice that they will face if they got caught.  The Recording Industry Association of America (RIAA) clearly states that, as recently as November 13, 2015, "Uploading is copying. Downloading is also copying. Unauthorized copying is an unauthorized use that is governed by the copyright laws.”  Therefore, unauthorized uploading and unauthorized downloading are unauthorized uses governed by the copyright laws. Research Paper: Software Piracy & Copyright 30
  • 31. Under the Copyright Act of Jamaica strictly points out that the illegal copying of software for redistribution is against the law. Anyone who does this commits an offence. The US has a law relating to this infringement in Title 17 of the United States Code (Sections 501 and 506) Research Paper: Software Piracy & Copyright 31
  • 32. Online games that entail gambling is deemed illegal by the cybercrime act. Within the United States of America cyber casinos are illegal. According to Leslie Bryant, head of the Cybercrime Fraud unit at FBI Headquarters, in the article name Online Gambling “You can go to Vegas.You can go to Atlantic City.You can go to a racetrack.You can go to those places and gamble legally. But don’t do it online…” Research Paper: Software Piracy & Copyright 32
  • 33. US Laws that govern online gaming:  Wire Act  Illegal Gambling Business Act  Professional and Amateur Sports Professional Act (PASPA)  Unlawful Internet Gambling Enforcement Act (UIGEA) Research Paper: Software Piracy & Copyright 33