SlideShare a Scribd company logo
1 of 7
Download to read offline
Software as Property
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-25 1 / 7
Outlines
1 Introduction
2 History
3 Is it wrong to copy proprietary software?
Dr. Varun Kumar (IIIT Surat) Lecture-25 2 / 7
Introduction
Software is a set of instructions, data or programs used to operate
computers and execute specific tasks.
⇒ Software has challenged the traditional notion of property and
ownership. There have been two theories:
(A) Consequentialist: It suggests an action is good or bad depending on
its outcome.
(B) Kantian: Everyone has the right to be autonomous.
Dr. Varun Kumar (IIIT Surat) Lecture-25 3 / 7
Continued–
⇒ This idea is derived from Lockes Labour theory.
A person has natural right to what he/she produces.
This can be applied to software as well.
Example:
⇒ Recall the Bingo case.
⇒ PPOS copied BOS and as such they stole Bingos labour.
⇒ Bingo has lost the capacity to sell (and make money from) its creation.
Dr. Varun Kumar (IIIT Surat) Lecture-25 4 / 7
History
⇒ John Locke, who argued that if one mixed one’s labor with something
then one had legitimate claim to it.
There should be some restrictions on the right to appropriation.
⇒ Argument → ”Enough and as good left for others”.
Weakness → It is not obvious why we should gain what we mix our
labor with, rather than simply losing our labor.
Example: If I poured a can of tomato juice, which I owned, into the
sea, clearly I would not thereby own the sea.
⇒ Some people reject this idea because the level of knowledge that was
considered is generic and common.
⇒ The absence of ownership might also cause bad consequences.
⇒ Claim has been made that lack of ownership will lead to lack of
incentive to produce software.
⇒ Software writers are not always in it for the money consider freeware
and shareware.
Dr. Varun Kumar (IIIT Surat) Lecture-25 5 / 7
Is it wrong to copy proprietary software?
⇒ In general the answer is yes.
⇒ Copying might be allowed in the license in certain including fair use
and back-up purposes.
⇒ In some countries, fair use of the copyrighted material is allowed for
the following purposes:
Criticisms or comments
News reporting
Teaching
Scholarship or research
Some governmental purposes such as
⇒ Parliamentary
⇒ Judiciary proceedings and commissions
⇒ Statutory inquiries.
Dr. Varun Kumar (IIIT Surat) Lecture-25 6 / 7
Continued–
⇒ Fair use of proprietary software is not considered wrong or illegal.
⇒ Most countries
⇒ Making a copy to prevent serious harm might also not attract legal
consequence in many jurisdictions.
⇒ The act of copying software in itself is not wrong because there is
nothing intrinsically wrong with the act. → Philosophical argument
⇒ Its the act of using the copied software that is the problem.
⇒ While the person who has been licensed for the software may not
have been harmed
Copying does not deprive the person of the procession.
The authors are deprived of payment for their labor
Dr. Varun Kumar (IIIT Surat) Lecture-25 7 / 7

More Related Content

Similar to Software as a Property

Patent Protection
Patent ProtectionPatent Protection
Patent ProtectionVARUN KUMAR
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in ComputingVARUN KUMAR
 
Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?VARUN KUMAR
 
Computer Ethics: Some Case Study
Computer Ethics: Some Case StudyComputer Ethics: Some Case Study
Computer Ethics: Some Case StudyVARUN KUMAR
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2VARUN KUMAR
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship VARUN KUMAR
 
Introduction to computer ethics
Introduction to computer ethics Introduction to computer ethics
Introduction to computer ethics VARUN KUMAR
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and ControversyVARUN KUMAR
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
Directions Please answer three of the four following essay questi.docx
Directions Please answer three of the four following essay questi.docxDirections Please answer three of the four following essay questi.docx
Directions Please answer three of the four following essay questi.docxlynettearnold46882
 
Copyright faculty-presentation-timings-a
Copyright faculty-presentation-timings-aCopyright faculty-presentation-timings-a
Copyright faculty-presentation-timings-alivermop
 
Introduction to ICT workshop
Introduction to ICT workshopIntroduction to ICT workshop
Introduction to ICT workshopVARUN KUMAR
 
Will Software Legal
Will Software LegalWill Software Legal
Will Software Legallegalcounsel
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi PowerpointJbhirsh
 
Developing applications that stand the test of time
Developing applications that stand the test of timeDeveloping applications that stand the test of time
Developing applications that stand the test of timeJeff Long
 

Similar to Software as a Property (20)

Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
 
Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?
 
Computer Ethics: Some Case Study
Computer Ethics: Some Case StudyComputer Ethics: Some Case Study
Computer Ethics: Some Case Study
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 
Introduction to computer ethics
Introduction to computer ethics Introduction to computer ethics
Introduction to computer ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
Ethics By ZAK
Ethics By ZAKEthics By ZAK
Ethics By ZAK
 
Directions Please answer three of the four following essay questi.docx
Directions Please answer three of the four following essay questi.docxDirections Please answer three of the four following essay questi.docx
Directions Please answer three of the four following essay questi.docx
 
Copyright faculty-presentation-timings-a
Copyright faculty-presentation-timings-aCopyright faculty-presentation-timings-a
Copyright faculty-presentation-timings-a
 
Introduction to ICT workshop
Introduction to ICT workshopIntroduction to ICT workshop
Introduction to ICT workshop
 
Will Software Legal
Will Software LegalWill Software Legal
Will Software Legal
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi Powerpoint
 
Developing applications that stand the test of time
Developing applications that stand the test of timeDeveloping applications that stand the test of time
Developing applications that stand the test of time
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc ModelVARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire ModelVARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignVARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI DesignVARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO SystemVARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital DemocracyVARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionVARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of ActionVARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic AgeVARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal PolynomialVARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical IntegrationVARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's IntegrationVARUN KUMAR
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2VARUN KUMAR
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy ActVARUN KUMAR
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integrationVARUN KUMAR
 
Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issuesVARUN KUMAR
 
Numerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleNumerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleVARUN KUMAR
 
Case Study on Computer Privacy
Case Study on Computer PrivacyCase Study on Computer Privacy
Case Study on Computer PrivacyVARUN KUMAR
 
Code of Practice
Code of PracticeCode of Practice
Code of PracticeVARUN KUMAR
 
Cubic Spline Interpolation
Cubic Spline InterpolationCubic Spline Interpolation
Cubic Spline InterpolationVARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integration
 
Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issues
 
Numerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleNumerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal Rule
 
Case Study on Computer Privacy
Case Study on Computer PrivacyCase Study on Computer Privacy
Case Study on Computer Privacy
 
Code of Practice
Code of PracticeCode of Practice
Code of Practice
 
Cubic Spline Interpolation
Cubic Spline InterpolationCubic Spline Interpolation
Cubic Spline Interpolation
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Software as a Property

  • 1. Software as Property Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-25 1 / 7
  • 2. Outlines 1 Introduction 2 History 3 Is it wrong to copy proprietary software? Dr. Varun Kumar (IIIT Surat) Lecture-25 2 / 7
  • 3. Introduction Software is a set of instructions, data or programs used to operate computers and execute specific tasks. ⇒ Software has challenged the traditional notion of property and ownership. There have been two theories: (A) Consequentialist: It suggests an action is good or bad depending on its outcome. (B) Kantian: Everyone has the right to be autonomous. Dr. Varun Kumar (IIIT Surat) Lecture-25 3 / 7
  • 4. Continued– ⇒ This idea is derived from Lockes Labour theory. A person has natural right to what he/she produces. This can be applied to software as well. Example: ⇒ Recall the Bingo case. ⇒ PPOS copied BOS and as such they stole Bingos labour. ⇒ Bingo has lost the capacity to sell (and make money from) its creation. Dr. Varun Kumar (IIIT Surat) Lecture-25 4 / 7
  • 5. History ⇒ John Locke, who argued that if one mixed one’s labor with something then one had legitimate claim to it. There should be some restrictions on the right to appropriation. ⇒ Argument → ”Enough and as good left for others”. Weakness → It is not obvious why we should gain what we mix our labor with, rather than simply losing our labor. Example: If I poured a can of tomato juice, which I owned, into the sea, clearly I would not thereby own the sea. ⇒ Some people reject this idea because the level of knowledge that was considered is generic and common. ⇒ The absence of ownership might also cause bad consequences. ⇒ Claim has been made that lack of ownership will lead to lack of incentive to produce software. ⇒ Software writers are not always in it for the money consider freeware and shareware. Dr. Varun Kumar (IIIT Surat) Lecture-25 5 / 7
  • 6. Is it wrong to copy proprietary software? ⇒ In general the answer is yes. ⇒ Copying might be allowed in the license in certain including fair use and back-up purposes. ⇒ In some countries, fair use of the copyrighted material is allowed for the following purposes: Criticisms or comments News reporting Teaching Scholarship or research Some governmental purposes such as ⇒ Parliamentary ⇒ Judiciary proceedings and commissions ⇒ Statutory inquiries. Dr. Varun Kumar (IIIT Surat) Lecture-25 6 / 7
  • 7. Continued– ⇒ Fair use of proprietary software is not considered wrong or illegal. ⇒ Most countries ⇒ Making a copy to prevent serious harm might also not attract legal consequence in many jurisdictions. ⇒ The act of copying software in itself is not wrong because there is nothing intrinsically wrong with the act. → Philosophical argument ⇒ Its the act of using the copied software that is the problem. ⇒ While the person who has been licensed for the software may not have been harmed Copying does not deprive the person of the procession. The authors are deprived of payment for their labor Dr. Varun Kumar (IIIT Surat) Lecture-25 7 / 7