SlideShare a Scribd company logo
1 of 34
Download to read offline
Presentation
On
Software Piracy
Made By :
Pallavi Agarwal
1
1. Introduction
2. Types of software piracy
3. Why Software Piracy
4. Effects On Users
5. Effect on a Business
6. How to stop piracy
7. Punishment
8. Organizations For Protecting Piracy
9. References
2
 Software piracy is the illegally using, copying and
reselling of software without the consent of the
software creator.
 The unauthorized copying may be done for
personal use or business use. [1]
3
1. Soft Lifting
2. Hard Disk Loading
3. Renting
4. OEM Unbundling
5. Counterfeiting
6. Online Piracy[2]
4
Soft Lifting
 means sharing a program with someone who is not
authorized by the license agreement to use it.
 Also known as soft loading/end-user piracy.
 A common form of soft lifting involves purchasing
a single licensed copy of software and then loading
the software onto several computers
5
Hard Disk Loading
 Often committed by hardware dealers
 This form of piracy involves loading a unauthorized
copy of software onto a computer being sold to the end
user
 To attract customers
6
Renting
 Renting involves someone renting out a copy of
software for temporary use, without the permission
of the copyright holder.
 The practice, similar to that of renting a video from
Blockbuster, violates the license agreement of
software.
7
OEM Unbundling
 Original Equipment Manufacturer Unbundling
 means selling stand-alone software originally
meant to be included with a specific
accompanying product.
 An example of this form of piracy is someone
providing drivers to a specific printer without
authorization.
8
Counterfeiting
 means producing fake copies of software, making it
look authentic.
 This involves providing the box, CDs, and manuals,
all designed to look as much like the original
product as possible.
9
Online Piracy
 The fastest-growing form of piracy is
Internet piracy.
 There are hundreds of thousands of "warez"
sites providing unlimited downloads to any
user.
10
 Expensive
 Availability
 Not convenient to buy for each computer
 Ask to buy new version although having
original one
 The CD/backup damaged
11
1. Lower productivity
2. Malware Infection
3. Subject to raid
12
Lower productivity
 Pirated software often
includes incomplete or
damaged programs
13
Malware Infection
 Pirated software can also include computer viruses
(malware) which can destroy data on a user’s hard
drive.
 Computer viruses can have a devastating impact on
any computer user -- from the home user to a
large business.
14
Subject to raid
 Companies can also be subject to raids by
the SIIA (Software & Information Industry
Association).
15
Distribution Methods
 Pirated material is distributed in two ways.
◦ Unknowing consumers buy pirated items.
◦ Others buy pirated items knowing they are
pirated.
16
Revenue Diverson
 Piracy diverts money away from producers
and distributors of items such as audio
recordings, making those companies who
make an investment in production and
distribution less profitable.
17
Tax Revenues
 Except in the case where pirated items are sold
through retail channels and taxed, tax revenue
is not generated from pirated items.
 For example, when music is downloaded with
no tax charged when it is supposed to be, as
dictated by tax laws, that revenue is lost as
well. Lost tax revenue reduces funds available
by the taxing government to spend.
18
Lessening Piracy
 To lessen the effect of piracy on a
business, businesses can implement
methods to discourage software piracy,
such as changes to how software is
distributed to make it harder to download.
 Another way to lessen piracy is to educate
the public about the impact of piracy on
their lives. [6]
19
 Purchase only legitimate software products.
 When buying software, it is necessary to be sure to get
genuine disks, manuals and license documentation.
 When one purchases illegal or counterfeit copies, his
money goes straight into the pockets of software
pirates .
 Buy from an authorized dealer.
 Check the prices and ask for receipts.
20
PUBLIC DOMAIN SOFTWARE
 These software are not under the copyright act.
They are free programs & can be used w/o
restrictions. It means the user of the software can
copy, distribute & even modify the software.
21
FREEWARE
 It is a copyright software which is given free by its author.
The user of the software redistribute the software but
cannot be modified by the end user. It also covers
1. Donation ware : A donation is required by the author or
to the 3rd party from the user of the software
2. Postcard ware : The user has to send a post card to the
creator of the software.
3. Abandon ware : The abandoned software are in this
category.
4. Ad ware : To promote the s/w as advertisement the
software’s are given free of cost. 22
SHAREWARE SOFTWARE
 Shareware or trialware is the software, which
comes with the permission for the people to
redistribute copies for a limited period. So far a
continues use of the software one have to pay for
the software.
 E.g. Winzip
23
COMMERCIAL SOFTWARE
 These are the software purchased from the
software publishers. It is available in stores & has
some objective to fulfill.
 E.g. Windows software, Ms Office etc.
24
OPEN SOURCE SOFTWARE
 These are created by generous programmers &
related to the public use. The programming code is
available to the users so that they can read it and
make changes according to their use & needs. They
can build the new versions of the software by using
the same code.
 E.g. Linux software.
25
PROPRIETY SOFTWARE
 It describes a technology or product that is owned
exclusively by a single company that carefully
guards the knowledge about the technology and
the product internal working. Some proprietary
product can function when used with other
products owned by some other company.
 E.g. Acrobat reader PDF (Portable document
format).
26
FIRM WARE SOFTWARE
 It is a combination of the software and h/w which
is permanently stored in the memory. It is a
program or data that has been written onto ROM.
27
 In India, the copyright of computer software is
protected under the Indian Copyright Act of 1957.
 The minimum jail term for software copyright
infringement(violation of law) is seven days and the
maximum jail term is three years.
 Fines range from a minimum of 50,000 to a
maximum of 200,000 rupees.
28
BSA
(Business Software Alliance)
 It established in 1988 and
representing a number of
the world's largest software
makers
 Its principal activity is trying
to stop copyright
infringement of software
produced by its members.
29
SIIA
(Software & Information Industry
Association)
 It offers global services in
business development,
government relations,
corporate education, and
intellectual property protection
to companies
 It also advocates a legal and
regulatory environment that
benefits the entire industry.
30
CAAST
(Canadian Alliance Against
Software Theft )
 Its mission statement is to
"reduce software piracy in
Canada through
education, public policy
and enforcement.”
 The CAAST was
established in 1990.
31
FAST
(Federation Against Software
Theft)
 It was set up in 1984 by the
British Computer Society's
Copyright Committee, and was
the first software copyright
organization in the U.K.
 Its first action was to raise the
awareness of software piracy
32
[1]Laurie E. MacDonald, Kenneth T. Fougere, Bryant College, Smithfield,
“Software Piracy: A Study of the Extent Of Coverage in Introductory MIS
Textbooks,” Journal of Information Systems Education, vol. 13, no. 4.
[2]http://cs.stanford.edu/people/eroberts/cs181/projects/software-
piracy/types.html
[3] http://www.ehow.com/list_6810994_software-piracy-laws-india.html
[4] http://whatis.techtarget.com/definition/piracy
[5] http://www.computerhope.com/jargon/s/softpira.htm
[6] http://smallbusiness.chron.com/effect-piracy-business-24541.html
[7]http://in.mathworks.com/company/aboutus/policies_statements/pirac
y.html
[8] www.fast.org.uk
[9] www.bsa.org
[10] www.caast.org
[11] www.siia.net
33
34

More Related Content

Similar to swpiracyslideshare-180302131348.pdf

Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...CSCJournals
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxManojKhan7
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxpugazhendhiv2
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian EducationSourav Biswas
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GISJoanne Cook
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chipbrian9p
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chipbrian9p
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of softwareBurhan Ahmed
 
Public domain software.pptx
Public domain software.pptxPublic domain software.pptx
Public domain software.pptxSethupathy42
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engFitira
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source softwareaamatya
 

Similar to swpiracyslideshare-180302131348.pdf (20)

Software piracy
Software piracySoftware piracy
Software piracy
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
14. application software
14. application software14. application software
14. application software
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Software theft
Software theftSoftware theft
Software theft
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Software piracy Grade 6
Software piracy Grade 6Software piracy Grade 6
Software piracy Grade 6
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
Public domain software.pptx
Public domain software.pptxPublic domain software.pptx
Public domain software.pptx
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 eng
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 

More from RijuDasgupta

26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdfRijuDasgupta
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdfRijuDasgupta
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdfRijuDasgupta
 
L16_17_Shell structures.pdf
L16_17_Shell structures.pdfL16_17_Shell structures.pdf
L16_17_Shell structures.pdfRijuDasgupta
 
5-180501044424.pdf
5-180501044424.pdf5-180501044424.pdf
5-180501044424.pdfRijuDasgupta
 
6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.ppt6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.pptRijuDasgupta
 
rivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdfrivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdfRijuDasgupta
 
Compression_members1.ppt
Compression_members1.pptCompression_members1.ppt
Compression_members1.pptRijuDasgupta
 
ANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.pptANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.pptRijuDasgupta
 
2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptx2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptxRijuDasgupta
 
presentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdfpresentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdfRijuDasgupta
 
presentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptxpresentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptxRijuDasgupta
 
populationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdfpopulationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdfRijuDasgupta
 
AGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptxAGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptxRijuDasgupta
 

More from RijuDasgupta (16)

26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
 
L16_17_Shell structures.pdf
L16_17_Shell structures.pdfL16_17_Shell structures.pdf
L16_17_Shell structures.pdf
 
5-180501044424.pdf
5-180501044424.pdf5-180501044424.pdf
5-180501044424.pdf
 
6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.ppt6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.ppt
 
rivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdfrivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdf
 
Compression_members1.ppt
Compression_members1.pptCompression_members1.ppt
Compression_members1.ppt
 
ANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.pptANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.ppt
 
beamanalysis.ppt
beamanalysis.pptbeamanalysis.ppt
beamanalysis.ppt
 
2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptx2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptx
 
forecast.ppt
forecast.pptforecast.ppt
forecast.ppt
 
presentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdfpresentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdf
 
presentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptxpresentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptx
 
populationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdfpopulationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdf
 
AGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptxAGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptx
 

Recently uploaded

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

swpiracyslideshare-180302131348.pdf

  • 2. 1. Introduction 2. Types of software piracy 3. Why Software Piracy 4. Effects On Users 5. Effect on a Business 6. How to stop piracy 7. Punishment 8. Organizations For Protecting Piracy 9. References 2
  • 3.  Software piracy is the illegally using, copying and reselling of software without the consent of the software creator.  The unauthorized copying may be done for personal use or business use. [1] 3
  • 4. 1. Soft Lifting 2. Hard Disk Loading 3. Renting 4. OEM Unbundling 5. Counterfeiting 6. Online Piracy[2] 4
  • 5. Soft Lifting  means sharing a program with someone who is not authorized by the license agreement to use it.  Also known as soft loading/end-user piracy.  A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computers 5
  • 6. Hard Disk Loading  Often committed by hardware dealers  This form of piracy involves loading a unauthorized copy of software onto a computer being sold to the end user  To attract customers 6
  • 7. Renting  Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder.  The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software. 7
  • 8. OEM Unbundling  Original Equipment Manufacturer Unbundling  means selling stand-alone software originally meant to be included with a specific accompanying product.  An example of this form of piracy is someone providing drivers to a specific printer without authorization. 8
  • 9. Counterfeiting  means producing fake copies of software, making it look authentic.  This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible. 9
  • 10. Online Piracy  The fastest-growing form of piracy is Internet piracy.  There are hundreds of thousands of "warez" sites providing unlimited downloads to any user. 10
  • 11.  Expensive  Availability  Not convenient to buy for each computer  Ask to buy new version although having original one  The CD/backup damaged 11
  • 12. 1. Lower productivity 2. Malware Infection 3. Subject to raid 12
  • 13. Lower productivity  Pirated software often includes incomplete or damaged programs 13
  • 14. Malware Infection  Pirated software can also include computer viruses (malware) which can destroy data on a user’s hard drive.  Computer viruses can have a devastating impact on any computer user -- from the home user to a large business. 14
  • 15. Subject to raid  Companies can also be subject to raids by the SIIA (Software & Information Industry Association). 15
  • 16. Distribution Methods  Pirated material is distributed in two ways. ◦ Unknowing consumers buy pirated items. ◦ Others buy pirated items knowing they are pirated. 16
  • 17. Revenue Diverson  Piracy diverts money away from producers and distributors of items such as audio recordings, making those companies who make an investment in production and distribution less profitable. 17
  • 18. Tax Revenues  Except in the case where pirated items are sold through retail channels and taxed, tax revenue is not generated from pirated items.  For example, when music is downloaded with no tax charged when it is supposed to be, as dictated by tax laws, that revenue is lost as well. Lost tax revenue reduces funds available by the taxing government to spend. 18
  • 19. Lessening Piracy  To lessen the effect of piracy on a business, businesses can implement methods to discourage software piracy, such as changes to how software is distributed to make it harder to download.  Another way to lessen piracy is to educate the public about the impact of piracy on their lives. [6] 19
  • 20.  Purchase only legitimate software products.  When buying software, it is necessary to be sure to get genuine disks, manuals and license documentation.  When one purchases illegal or counterfeit copies, his money goes straight into the pockets of software pirates .  Buy from an authorized dealer.  Check the prices and ask for receipts. 20
  • 21. PUBLIC DOMAIN SOFTWARE  These software are not under the copyright act. They are free programs & can be used w/o restrictions. It means the user of the software can copy, distribute & even modify the software. 21
  • 22. FREEWARE  It is a copyright software which is given free by its author. The user of the software redistribute the software but cannot be modified by the end user. It also covers 1. Donation ware : A donation is required by the author or to the 3rd party from the user of the software 2. Postcard ware : The user has to send a post card to the creator of the software. 3. Abandon ware : The abandoned software are in this category. 4. Ad ware : To promote the s/w as advertisement the software’s are given free of cost. 22
  • 23. SHAREWARE SOFTWARE  Shareware or trialware is the software, which comes with the permission for the people to redistribute copies for a limited period. So far a continues use of the software one have to pay for the software.  E.g. Winzip 23
  • 24. COMMERCIAL SOFTWARE  These are the software purchased from the software publishers. It is available in stores & has some objective to fulfill.  E.g. Windows software, Ms Office etc. 24
  • 25. OPEN SOURCE SOFTWARE  These are created by generous programmers & related to the public use. The programming code is available to the users so that they can read it and make changes according to their use & needs. They can build the new versions of the software by using the same code.  E.g. Linux software. 25
  • 26. PROPRIETY SOFTWARE  It describes a technology or product that is owned exclusively by a single company that carefully guards the knowledge about the technology and the product internal working. Some proprietary product can function when used with other products owned by some other company.  E.g. Acrobat reader PDF (Portable document format). 26
  • 27. FIRM WARE SOFTWARE  It is a combination of the software and h/w which is permanently stored in the memory. It is a program or data that has been written onto ROM. 27
  • 28.  In India, the copyright of computer software is protected under the Indian Copyright Act of 1957.  The minimum jail term for software copyright infringement(violation of law) is seven days and the maximum jail term is three years.  Fines range from a minimum of 50,000 to a maximum of 200,000 rupees. 28
  • 29. BSA (Business Software Alliance)  It established in 1988 and representing a number of the world's largest software makers  Its principal activity is trying to stop copyright infringement of software produced by its members. 29
  • 30. SIIA (Software & Information Industry Association)  It offers global services in business development, government relations, corporate education, and intellectual property protection to companies  It also advocates a legal and regulatory environment that benefits the entire industry. 30
  • 31. CAAST (Canadian Alliance Against Software Theft )  Its mission statement is to "reduce software piracy in Canada through education, public policy and enforcement.”  The CAAST was established in 1990. 31
  • 32. FAST (Federation Against Software Theft)  It was set up in 1984 by the British Computer Society's Copyright Committee, and was the first software copyright organization in the U.K.  Its first action was to raise the awareness of software piracy 32
  • 33. [1]Laurie E. MacDonald, Kenneth T. Fougere, Bryant College, Smithfield, “Software Piracy: A Study of the Extent Of Coverage in Introductory MIS Textbooks,” Journal of Information Systems Education, vol. 13, no. 4. [2]http://cs.stanford.edu/people/eroberts/cs181/projects/software- piracy/types.html [3] http://www.ehow.com/list_6810994_software-piracy-laws-india.html [4] http://whatis.techtarget.com/definition/piracy [5] http://www.computerhope.com/jargon/s/softpira.htm [6] http://smallbusiness.chron.com/effect-piracy-business-24541.html [7]http://in.mathworks.com/company/aboutus/policies_statements/pirac y.html [8] www.fast.org.uk [9] www.bsa.org [10] www.caast.org [11] www.siia.net 33
  • 34. 34