SlideShare a Scribd company logo
1 of 16
MULTIMEDIA-DIGITAL PIRACY
Introduction To Digital Piracy
• What is Piracy?
“Unauthorised copying of software,
music or films, so-called digital piracy”

While there are definitions of “pirated copyright
goods”, there is currently no specific legal
definition of digital piracy, which would be more
accurately described as “digital infringement of
copyright”.
What Is Copyright?
• Copyright is a legal concept, enacted by most
governments, giving the creator of an original
work exclusive rights to it, usually for a limited
time, with the intention of enabling the creator of
intellectual wealth (e.g. the photographer of a
photograph or the author of a book) to get
compensated for their work and be able to
financially support themselves. Generally, it is
"the right to copy", but also gives the copyright
holder the right to be credited for the work.
Music Piracy & Video Piracy
• Music Piracy
For music, it is the copying and distributing
of copies of a piece of music for which the
composer, recording artist, or copyright
holding record company did not give consent.
It is a form of copyright infringement(An act
that disregards an agreement or a
right), which is a crime in many countries.
Music Piracy & Video Piracy
• Video Piracy
Whereas for video piracy, a movie is
usually released in several formats and
different versions as the primary sources used
by a group for a particular movie may vary.
Pirated movies are primarily released by these
organized groups, commonly referred to as
scene groups or warez groups. The first
release of a movie is usually of a lower quality
due to a lack of sources, but is eventually
replaced with higher-quality releases as better
sources become available.
Consumer VS Producer
• Producer at a loss
• Producer at benefit
• Consumer at a loss
• Consumer at benefit
Anti-piracy
• Antipiracy in India
EIPR is the first to put India's excellent copyright
and intellectual property rights law to good use,
for the benefit of the manufacturers, artists,
entertainment industry, software developers
scientists intellectuals, creative thinkers, and the
nation of India as a whole.
Who are EIPR ?
EIPR is India's largest investigation agency
specialising in anti-counterfeiting solutions.
Reasons for Supporting Piracy
•
•
•
•
•

We're only hurting big business.
Authors already have a plenty of money.
Digital content is too expensive.
Everyone else is doing it.
We live in a different country so we don't get
movies/books/shows until months later.
Reasons for Going Against Piracy
•
•
•
•

Viruses & Malware
Good Quality Media
Against Law
If You are the producer
Advantages
• Piracy keeps music “alive”
• Drives up the sales of legal music
• Legal online file-sharing services exist at fair
prices and are much safer
Disadvantages
• People are taking the risk of getting caught
and receiving a criminal record when he/she
downloads illegally
• Free file-sharing sites often transmit viruses
• Quality of pirated movies and songs might
not be as accurate and précised as compared
to original copies
APPLICATIONS
• Forensics And Piracy Deterrence
Forensic watermark
• Forensic watermark applications enhance a
content owner's ability to detect and respond
to misuse of its assets. Forensic watermarking
is used not only to gather evidence for
criminal proceedings, but also to enforce
contractual usage agreements between a
content owner and the people or companies
with which it shares its content. It provides
positive, irrefutable evidence of misuse for
leaked content assets.
Deterrence Effects
There will still be a fairly equal amount of
people who are pirates and non pirates
What we can do?

We only can do is to get knowledge about
piracy and defend ourself from piracy
Multimedia digital piracy

More Related Content

What's hot

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Remix of music impact on copyright in india
Remix of music  impact on copyright in indiaRemix of music  impact on copyright in india
Remix of music impact on copyright in indiaAltacit Global
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Michael Roa
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspaceRistya Anditha
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
copyright (under indian cyber law)
copyright (under indian cyber law)copyright (under indian cyber law)
copyright (under indian cyber law)ravindra sharma
 

What's hot (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ransomware
RansomwareRansomware
Ransomware
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Remix of music impact on copyright in india
Remix of music  impact on copyright in indiaRemix of music  impact on copyright in india
Remix of music impact on copyright in india
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
copyright (under indian cyber law)
copyright (under indian cyber law)copyright (under indian cyber law)
copyright (under indian cyber law)
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 

Viewers also liked

Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingArka Ray
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracyMunish Sudan
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentationDCobbVt
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)k.surya kumar
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .SD Paul
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in indiaMahender Mahi
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 

Viewers also liked (12)

Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and Cheating
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracy
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentation
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Space mouse[1]
Space mouse[1]Space mouse[1]
Space mouse[1]
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Safety of women
Safety of womenSafety of women
Safety of women
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Latest rbi ppt
Latest rbi pptLatest rbi ppt
Latest rbi ppt
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in india
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 

Similar to Multimedia digital piracy

Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfParshant Kumar
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and CommerceAdelphi Consulting
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Kristin Thomson
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGian Fiero
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationeam704
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distributionKristin Thomson
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidLeslie Lee
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpointrockinmole
 

Similar to Multimedia digital piracy (20)

Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdf
 
Music piracy
Music piracyMusic piracy
Music piracy
 
Copyrightbonneversion
CopyrightbonneversionCopyrightbonneversion
Copyrightbonneversion
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and Commerce
 
What is Copyright?
What is Copyright?What is Copyright?
What is Copyright?
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Copyright 2012
Copyright 2012Copyright 2012
Copyright 2012
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual Property
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentation
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distribution
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
Copyright.pptx
Copyright.pptxCopyright.pptx
Copyright.pptx
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still Valid
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Multimedia digital piracy

  • 2. Introduction To Digital Piracy • What is Piracy? “Unauthorised copying of software, music or films, so-called digital piracy” While there are definitions of “pirated copyright goods”, there is currently no specific legal definition of digital piracy, which would be more accurately described as “digital infringement of copyright”.
  • 3. What Is Copyright? • Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time, with the intention of enabling the creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to get compensated for their work and be able to financially support themselves. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work.
  • 4. Music Piracy & Video Piracy • Music Piracy For music, it is the copying and distributing of copies of a piece of music for which the composer, recording artist, or copyright holding record company did not give consent. It is a form of copyright infringement(An act that disregards an agreement or a right), which is a crime in many countries.
  • 5. Music Piracy & Video Piracy • Video Piracy Whereas for video piracy, a movie is usually released in several formats and different versions as the primary sources used by a group for a particular movie may vary. Pirated movies are primarily released by these organized groups, commonly referred to as scene groups or warez groups. The first release of a movie is usually of a lower quality due to a lack of sources, but is eventually replaced with higher-quality releases as better sources become available.
  • 6. Consumer VS Producer • Producer at a loss • Producer at benefit • Consumer at a loss • Consumer at benefit
  • 7. Anti-piracy • Antipiracy in India EIPR is the first to put India's excellent copyright and intellectual property rights law to good use, for the benefit of the manufacturers, artists, entertainment industry, software developers scientists intellectuals, creative thinkers, and the nation of India as a whole. Who are EIPR ? EIPR is India's largest investigation agency specialising in anti-counterfeiting solutions.
  • 8. Reasons for Supporting Piracy • • • • • We're only hurting big business. Authors already have a plenty of money. Digital content is too expensive. Everyone else is doing it. We live in a different country so we don't get movies/books/shows until months later.
  • 9. Reasons for Going Against Piracy • • • • Viruses & Malware Good Quality Media Against Law If You are the producer
  • 10. Advantages • Piracy keeps music “alive” • Drives up the sales of legal music • Legal online file-sharing services exist at fair prices and are much safer
  • 11. Disadvantages • People are taking the risk of getting caught and receiving a criminal record when he/she downloads illegally • Free file-sharing sites often transmit viruses • Quality of pirated movies and songs might not be as accurate and précised as compared to original copies
  • 12. APPLICATIONS • Forensics And Piracy Deterrence
  • 13. Forensic watermark • Forensic watermark applications enhance a content owner's ability to detect and respond to misuse of its assets. Forensic watermarking is used not only to gather evidence for criminal proceedings, but also to enforce contractual usage agreements between a content owner and the people or companies with which it shares its content. It provides positive, irrefutable evidence of misuse for leaked content assets.
  • 15. There will still be a fairly equal amount of people who are pirates and non pirates What we can do? We only can do is to get knowledge about piracy and defend ourself from piracy