SlideShare a Scribd company logo
1 of 17
SOFTWARE PIRACY
BY:- TIWARI AKHIL
BCA SEM-VI
What is software piracy?
 Software piracy is the unauthorized copying or
distribution of copyrighted software.
 Software piracy can be done by copying, downloading,
sharing, selling or installing multiple copies of
software onto personal or work computers.
 If you make more copies of the software or install the
software more times than the license permits, upload
software code to a website so that others can download
and use it, share software license codes or activation
keys, or in some cases, share your user ID and
password for a web-based software application (‘cloud’
computing), you are pirating software and breaking
the law.
Examples of software piracy include:-
Distributing software or mobile apps from the Internet
in a manner that violates the license terms
Buying a single copy of a software program and
installing it without authorization on multiple devices
Making and/or sharing copies of installation CDs
Sharing the login credentials (without authorization)
used to access a web-based software application
(“Software as a Service”)
Top 10 Most Pirated Software
of 2017
 Microsoft Office
 Adobe Photoshop
 Windows 10
 Adobe Premiere
 Final Cut Pro
 Adobe Illustrator
 Ableton Live
 Windows 7 (Why?)
 Avast
 Sony Vegas
TYPES OF SOFTWARE PIRACY
 1. Soft Lifting
 2. Hard Disk Loading
 3. Renting
 4. OEM Unbundling
 5. Counterfeiting
 6. Online Piracy
 1. Soft Lifting
 Means sharing a program with someone who is
not authorized by the license agreement to use it.
 Also known as soft loading.
 A common form of soft lifting involves
purchasing a single licensed copy of software and
then loading the software onto several computers
2. Hard Disk Loading
 Often committed by hardware dealers
 This form of piracy involves loading an unauthorized
copy of software onto a computer being sold to the end
user.
 To attract customers
 3. Renting
 Renting involves someone renting out a copy of
software for temporary use, without the permission of
the copyright holder.
 The practice, similar to that of renting a video from
Blockbuster, violates the license agreement of
software.
4. OEM Unbundling
Means selling stand-alone software originally meant to
be included with a specific product.
 An example of this form of piracy is someone
providing drivers to a specific printer without
authorization.
5. Counterfeiting
 Means producing fake copies of software, making it
look authentic.
 This involves providing the box, CDs, and manuals, all
designed to look as much like the original product as
possible.
6. Online Piracy
 The fastest-growing form of piracy is Internet piracy.
 There are hundreds of thousands of "warez" sites
providing unlimited downloads to any user.
Effects of Piracy
On the Industry
 Reduces profits for the software developer.
 Reduces development money for future
products.
On the Pirate
 Expense, embarrassment, ethically wrong.
 Fines up to $250,000.
 Jail sentence of up to 5 years.
 payment of legal fees.
Simple steps to avoid piracy
 Buy from an authorized dealer.
 Understand what it is you are buying.
 Check the prices and ask for receipts.
 Be sure you are given a license.
 Retain the original media.
 Call the software publisher.
CONCLUSION
 Software piracy is theft of intellectual property.
 Developers invest time and money to develop a
product and deserve to make a fair profit, so they can
develop new products in future.
 The damage done to the industry and legitimate end
users does not balance the few advantages that piracy
does have.
Software piracy

More Related Content

What's hot (20)

Malicious
MaliciousMalicious
Malicious
 
cyber crime
cyber crimecyber crime
cyber crime
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 

Similar to Software piracy

Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkwokk1d337
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chipbrian9p
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chipbrian9p
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfRijuDasgupta
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensingtravellingpolander
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxpugazhendhiv2
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine softwareJonathan Min
 
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athiraathiravm
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...CSCJournals
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxManojKhan7
 

Similar to Software piracy (20)

Soft piracy
Soft piracySoft piracy
Soft piracy
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine software
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athira
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Software piracy

  • 1. SOFTWARE PIRACY BY:- TIWARI AKHIL BCA SEM-VI
  • 2. What is software piracy?  Software piracy is the unauthorized copying or distribution of copyrighted software.  Software piracy can be done by copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.  If you make more copies of the software or install the software more times than the license permits, upload software code to a website so that others can download and use it, share software license codes or activation keys, or in some cases, share your user ID and password for a web-based software application (‘cloud’ computing), you are pirating software and breaking the law.
  • 3. Examples of software piracy include:- Distributing software or mobile apps from the Internet in a manner that violates the license terms Buying a single copy of a software program and installing it without authorization on multiple devices Making and/or sharing copies of installation CDs Sharing the login credentials (without authorization) used to access a web-based software application (“Software as a Service”)
  • 4.
  • 5. Top 10 Most Pirated Software of 2017  Microsoft Office  Adobe Photoshop  Windows 10  Adobe Premiere  Final Cut Pro  Adobe Illustrator  Ableton Live  Windows 7 (Why?)  Avast  Sony Vegas
  • 6. TYPES OF SOFTWARE PIRACY  1. Soft Lifting  2. Hard Disk Loading  3. Renting  4. OEM Unbundling  5. Counterfeiting  6. Online Piracy
  • 7.  1. Soft Lifting  Means sharing a program with someone who is not authorized by the license agreement to use it.  Also known as soft loading.  A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computers
  • 8. 2. Hard Disk Loading  Often committed by hardware dealers  This form of piracy involves loading an unauthorized copy of software onto a computer being sold to the end user.  To attract customers
  • 9.  3. Renting  Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder.  The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software.
  • 10. 4. OEM Unbundling Means selling stand-alone software originally meant to be included with a specific product.  An example of this form of piracy is someone providing drivers to a specific printer without authorization.
  • 11. 5. Counterfeiting  Means producing fake copies of software, making it look authentic.  This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible.
  • 12.
  • 13. 6. Online Piracy  The fastest-growing form of piracy is Internet piracy.  There are hundreds of thousands of "warez" sites providing unlimited downloads to any user.
  • 14. Effects of Piracy On the Industry  Reduces profits for the software developer.  Reduces development money for future products. On the Pirate  Expense, embarrassment, ethically wrong.  Fines up to $250,000.  Jail sentence of up to 5 years.  payment of legal fees.
  • 15. Simple steps to avoid piracy  Buy from an authorized dealer.  Understand what it is you are buying.  Check the prices and ask for receipts.  Be sure you are given a license.  Retain the original media.  Call the software publisher.
  • 16. CONCLUSION  Software piracy is theft of intellectual property.  Developers invest time and money to develop a product and deserve to make a fair profit, so they can develop new products in future.  The damage done to the industry and legitimate end users does not balance the few advantages that piracy does have.