TYPE 1 Involves a perpetrator physically stealing a media that contain the software or the hardware that contains the media Example : An unscrupulous library patron might steal the Encyclopedia Britannica optical disc.
TYPE 2 Occurs when a programmer is terminated from, or stops working for, a company. The programs are common property but some dishonest programmers intentionally remove or disable the programs they have written from company computers.
TYPE 3 Occurs when software is stolen from software manufacturers. Also called piracy Most common form of software theft Software piracy is the unauthorized and illegal duplication of copyrighted software.
TYPE 4 Involves users illegally obtaining registration numbers or activation codes. Keygen a program, short for key generator, creates software registration numbers and sometimes activation codes. Some create and post keygens so that users can install software without legally purchasing it.
SAFEGUARD AGAINST SOFTWARE THEFT To protect media from being stolen, owners should keep original software boxes in a secure location. All computer users should backup their files regularly. Escort terminated employees immediately to protect their softwares and programs (in big companies)
Software manufacturers issue users license agreement. A license agreement is the right to use a software. The most common type of license is single-user license agreement or known as end-user license agreement (EULA)
In this agreement, users are permitted to:o Install the software on only one computer.o Make one copy of the software as a backup.o Give or sell the software to another individual, but only if the software is removed from the user’s computer first.
Users are not permitted to : Install the software on a network, such as school computer lab Export the software Rent or lease the software
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.