This document provides an executive summary of the 2010 BSA Global Software Piracy Study. Some key findings include:
1) The commercial value of pirated PC software grew 14% to a record $58.8 billion in 2010, with over half ($31.9 billion) coming from emerging economies.
2) Piracy rates remain highest in emerging economies, with half having rates over 62% and two-thirds pirating at least one software program for every one purchased.
3) There is widespread public support for intellectual property rights but confusion over what constitutes legal software use, particularly in developing markets.
From BitPagos to BiM, Latin American innovators are taking advantage of high mobile penetration, a strong middle class and a unified culture to capture new opportunities in the digital economy.
From BitPagos to BiM, Latin American innovators are taking advantage of high mobile penetration, a strong middle class and a unified culture to capture new opportunities in the digital economy.
This year, the team at Activate has defined the 9 most important insights for tech and media in 2017. Key points:
*Super-serve the super-users and chase the attention unicorns
*Subscriptions will feed the world (or at least internet and media businesses)
*Learn to live with the discovery oligopoly
*The bot battles are about winning the great messaging war
*eSports is the next tech phenomenon
*You already know the new winners in Pay TV
*Video Streaming: The bundle is the future
*Audio: Smart Speakers, Gray Music
*Post-Household America: A new era of users
1) Key Internet Trends
2) Status Update – Tech Stocks / Education / Healthcare
3) Re-Imagining Continues
4) Screen + Video Growth = Still Early Innings
5) China’s Epic Share Gains
6) Public Company Trends
7) One More Thing(s)...
8) Ran Outta Time Thoughts / Appendix
Download Latest Digital trends, year 2014; numbers with analysis. The research by KPCB showcase the growing trend of mobile marketing, digital marketing, number of users across screens. Country wise comparison. Information contains details of Bitcoin, tablets, mobile usage. A descriptive yet precise report!
In 2009, installations of unlicensed software on PCs dropped in 54 out of 111 economies studied, and rose only in 19. It is clear that anti-piracy education and...
The internet ecosystem is a complex and involves multiple activities and players. Study breaks down the internet value chain into five main markets: Content Rights, Online Services, Enabling Technology/Services, Connectivity and User Interface (devices and applications).
Cognizant is the only company to earn a place in the list of Forbes fastest growing technology companies every year since the list’s inception. Its intriguing growth leaves us inquisitive – is there a framework to excel? Has Cognizant found the same? It is known that the book Built to Last by Jim Collins and Jerry Porras influenced Francisco D’Souza (CEO of Cognizant) the most. He is committed to establish a “cult like” culture focused on core values. But, beyond this, does their dual mandate of run better and run different have any role in their monumental growth? Cognizant is not only preaching about helping their clients to transform in order to run better and run different but also walking the talk by practicing the dual mandate within organization from its early days. This paper digs into Cognizant’s history and current trends to understand what they have done to run better and run different.
This year, the team at Activate has defined the 9 most important insights for tech and media in 2017. Key points:
*Super-serve the super-users and chase the attention unicorns
*Subscriptions will feed the world (or at least internet and media businesses)
*Learn to live with the discovery oligopoly
*The bot battles are about winning the great messaging war
*eSports is the next tech phenomenon
*You already know the new winners in Pay TV
*Video Streaming: The bundle is the future
*Audio: Smart Speakers, Gray Music
*Post-Household America: A new era of users
1) Key Internet Trends
2) Status Update – Tech Stocks / Education / Healthcare
3) Re-Imagining Continues
4) Screen + Video Growth = Still Early Innings
5) China’s Epic Share Gains
6) Public Company Trends
7) One More Thing(s)...
8) Ran Outta Time Thoughts / Appendix
Download Latest Digital trends, year 2014; numbers with analysis. The research by KPCB showcase the growing trend of mobile marketing, digital marketing, number of users across screens. Country wise comparison. Information contains details of Bitcoin, tablets, mobile usage. A descriptive yet precise report!
In 2009, installations of unlicensed software on PCs dropped in 54 out of 111 economies studied, and rose only in 19. It is clear that anti-piracy education and...
The internet ecosystem is a complex and involves multiple activities and players. Study breaks down the internet value chain into five main markets: Content Rights, Online Services, Enabling Technology/Services, Connectivity and User Interface (devices and applications).
Cognizant is the only company to earn a place in the list of Forbes fastest growing technology companies every year since the list’s inception. Its intriguing growth leaves us inquisitive – is there a framework to excel? Has Cognizant found the same? It is known that the book Built to Last by Jim Collins and Jerry Porras influenced Francisco D’Souza (CEO of Cognizant) the most. He is committed to establish a “cult like” culture focused on core values. But, beyond this, does their dual mandate of run better and run different have any role in their monumental growth? Cognizant is not only preaching about helping their clients to transform in order to run better and run different but also walking the talk by practicing the dual mandate within organization from its early days. This paper digs into Cognizant’s history and current trends to understand what they have done to run better and run different.
UN Sustainable Development Goals 2016 - 30 : Sourcing funds from the private sector to fund infrastructural development projects in the developing economies.
Part I Evaluating Sustainability Business Model Opportunities ·.docxdanhaley45372
Part I: Evaluating Sustainability Business Model Opportunities
· Purpose of Sustainability Business Model Opportunities Analysis
Phoenix Technologies is a designer, manufacturer, and distributor of firmware (BIOS or Basic-Input-Output-System and UEFI or Unified Extended Firmware Interface) primarily through licensing of its critically acclaimed software to OEM (original equipment manufacturers) and ODM (original design manufacturers) such as Microsoft, Intel, AMD, Sony, Toshiba, and Tokyo Electrical. The company also designs, manufactures, and distributes consumer software primarily anti-virus, system protection and backup, and system performance improvement software through its wholly owned subsidiary iolo Technologies LLC. Both Phoenix Technologies and iolo Technologies LLC are subsidiaries of the technology-specific venture capital firm Marlin Equity Partners based out of California who have a large portfolio of technology and computer related companies under their management. The company is facing increased competition in their traditional markets of North America, Europe, Latin America, and Asia (China and Japan). However, to continue their growth trajectory and to benefit from fast developing countries, the company is exploring expanding operations to the African region and has selected Nigeria as an entry point into the continent. Nigeria is the continent’s most populous nation and provides the greatest promise for Phoenix Technologies consumer software division on account of the growing middle class in Nigeria who are heavily invested in computers, smartphones, and other consumer electronics. In the following sections, a STEEP analysis covering the major social, technological, economic and political forces affecting the macro environment; a Five Forces Industry Competitiveness analysis; an Blue Ocean Strategy compatibility analysis; and a 9M competitor analysis will be undertaken to determine the attractiveness of expanding into Nigeria, the potential short term and long run profitability of the market, what strategy to employ when entering the market, and through what distribution channels.
STEEP ANALYSIS
· Social Factors
Nigeria is Africa’s most populous country with over 180 million people and one of the most important markets for foreign direct investment after South Africa. Since Nigeria is Africa’s largest oil and gas producers it has attracted the most foreign direct investment from international investors in recent years. This has meant that the economy has been growing at a rapid pace and the country’s middle class is growing in tandem. While approximately 90 percent of the population have ‘limited discretionary income’ (Fiorini, Hattingh, Maclaren, Russo, & Sun-Basroum, 2013) the middle and upper middle income group is growing fast and presents an attractive marketing segment. Also, there has been mass movement of the population into urban areas from rural areas and the urban population stands at approximately 50% and gr.
This year, the team at Activate has defined the 11 most important insights for tech and media in 2018. Key points:
*$300 Billion in Internet and Media Growth Dollars
*Consumer Attention: There are 31 Hours in a Day, and Growing
*Smart Cameras: The Next Terrifyingly Smart Device That People Will Use Everywhere
*eCommerce: New Categories, New Brands, and $3 Trillion to Grow
*Sports Betting: Massive Growth Ahead for Tech and Media Companies
*Messaging: The Battle Will Continue for the World’s Dominant Digital Behavior
*Video Gaming: Unleashed and Ubiquitous for Billions of Consumers
*Music: More Services, More Venues — While Consumers Become Creators
*Podcasting: The Fastest Growing Media Behavior in an Exploding Ecosystem
*Video: The Old Winners Will be the New Winners
*Consumer Financial Services: The Long Awaited Tech Revolution is Finally Arriving
Media Corporation Product PortfolioThis is a portfolio, devel.docxandreecapon
Media Corporation / Product Portfolio:
This is a portfolio, developed over the course of the semester, of any media corporation or series of media products, whether programs, movies, newspapers, magazines, video-games, receiver devices (e.g. iPod, Blackberry, Notebook), artists (musical groups) that exemplify aspects of corporate practice and the political-economy of mass communication. The completed portfolio could address the following questions, among others:
************************************************************************************************************
Topic: iPad
Instruction:
* There are total of 12 entries, each entry includes an article and 2 pages analysis.
* For each entry, we need to summarize the article in about 100 words, then analysis the article on the remaining session.
* The analysis has to show how this article related of political-economy of mass communication.
* The component examples of your portfolio may focus on the relationship between your chosen products and their wider corporate and
political parentage, and/or on the economics of media operations in the market.
* Your analysis should be driven by your discovery of particular news items or other sources of information about your products and you
should aim to add at least one example or discovery AND your corresponding analysis for each week of the course.
* You are strongly advised not to just enter the first items that you encounter in your searches, but to think carefully about the value of each
entry in terms of its weight and potential for insight into key aspects of the political economy of mass communication.
* please also related it to our class material if it’s possible. We learned about business model, major trends in communication industries, rise of
global media system.
*****PLEASE READ THE POWERPOINT I UPLOADED, it’s based on my textbook (market model, business model and trends*****
* REMEMBER, the article has to deal with the relationship between iPad and political-economy of mass communication Here are some of the questions that you can discuss in the analysis:
1) Which is the principal corporation(s) involved in the production and distribution of these products? How do the products relate to and exemplify the business strategies of the parent corporation(s)?
2) In the case of a corporation: what are the key features of its history; what kind of ownership structure does it have and what other companies does it own? What are its main activities and how important are these to the entity’s overall revenues?
3) How do these corporations and/or their products exemplify strategic alliances and partnerships between different corporations?
4) What evidence is there of market success or failure, on the basis of what criteria, at national and international levels?
5) To what market(s) are these corporations/products directed; how are these markets defined?
6) To what extent do these corporations/products exemplify ...
The IDATE DigiWorld Yearbook has become an essential tool for digital professionals, providing a compact and accessible review of the main events of the past year, the latest data on the markets and market players, and the major trends on the world stage.
MKTG 390
Marketing Strategy
Environmental Scan, SWOT Analysis and Market Potential
I was the principle author of this Apple presentation for Marketing Strategy (MKTG 390). A key point is how Apple has disrupted the industry with its Apple Pay.
The assignment objectives:
Conduct an environmental scan of that industry, develop a market potential forecast 2014 and 2019, and choose a company in that industry and do a SWOT analysis on it. You will need to define and describe the industry precisely (NAISC code) and the geographic scope (U.S., Europe, world), e.g. personal computers in the U.S. Then do an environmental scan (PEST) and develop a market potential forecast for the industry. Then you need to choose a company in the chosen industry and do a SWOT analysis on it, e.g. Dell. You need to present, analyze and document your environmental scan, market potential forecast and SWOT analysis as you would any research paper or report. .
52% dintre angajati considera ca lucreaza mai bine singuri decat in echipa, a...Constantin Cocioaba
O comunicare de astăzi din partea Bestjobs arată că lucrul de acasă / remote a devenit, cumva, normalitate pentru multe dintre companii. Angajații au fost și ei nevoiți să adopte un nou stil de lucru, scăzând interacțiunile cu colegii și rezolvând sarcini pe cont propriu.
București, 25 martie 2019 – Cisco aniversează 20 de ani de prezență în România, bazele companiei fiind puse în 1999, la un an de la lansarea programului Cisco Networking Academy pe piața locală. Evoluția companiei în România în această perioadă este strâns legată de evoluția NetAcad, dar și de cea a internetului, Cisco fiind o companie care a contribuit decisiv la dezvoltarea internetului așa cum îl știm astăzi.
Potrivit Mediatrust, parte a Institute of Media Monitoring (IMM) din Polonia, primele poziții în topul celor mai vizibile branduri în publicitate sunt ocupate de Orange, Vodafone și Telekom.
Peste o treime dintre gospodăriile din România dețin o tabletăConstantin Cocioaba
În 36% dintre gospodăriile din România există cel puţin o tabletă, media fiind de 1,1 tablete/gospodărie, arată un studiu realizat de Autoritatea Națională pentru Administrare și Reglementare în Comunicații (ANCOM). De asemenea, în 73% dintre gospodării există cel puţin un smartphone (media fiind de 1,5 per gospodărie), iar 55% deţin laptopuri.
Planurile de consum ale romanilor releva intentia de a investi în tehnologieConstantin Cocioaba
Planurile de consum ale romanilor releva intentia de a investi în tehnologie.
Consumatorii din România sunt primii din Europa la timpul petrecut folosind telefoane
mobile, cu o medie de 1 oră și 49 de minute pe zi
Românii folosesc dispozitive electronice în medie 10 ore si 20 de minute pe zi, în
comparație cu media pe Europa de 8 ore
40% dintre români plănuiesc să achiziționeze un telefon mobil în următoarele 3 luni, de
două ori mai mult decât media europeană de unul din cinci utilizatori (21%)
CCS Insight Analyst - consumatorii continuă să investească în gadget-uri și tehnologie în
întreaga lor gospodărie, astfel că realitatea Internet of Things se apropie vertiginos.
Inceputul de an a fost foarte bun pentru majoritatea sectoarelor. Cinci dintre ele au inregistrat rate de crestere de doua cifre: electrocasnice mari (+ 21%), electrocasnice mici (+19%), telecom (+17%), electronice (+15%) si piata de imprimante, multifunctionale si consumabile (+11). Singurul sector intr-o usoara scadere a fost cel foto (aproape -5%).
Gemius a realizat raportul gemiusAdMonitor care prezinta o gama larga de indicatori pentru campaniile online din Europa Centrala si de Est, printre care profilul socio-demografic al utilizatorilor care genereaza afisari si click-uri, rata de click din fiecare tara monitorizata, etc
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
2010 bsa piracy_study-standard
1. E I G H T H A N N U A L B S A G L O B A L S O F T WA R E
2 010 PIRACY STUDY
M AY 2 0 1 1
2. TABLE OF CONTENTS
EXECUTIVE SUMMARY .................................................................................................... 1
GLOBAL PIRACY TRENDS IN 2010 ................................................................................... 3
The Surging PC Market in Emerging Economies ............................................................. 3
A Shifting Market Landscape ...................................................................................... 4
Anti-Piracy “Equity” and the Need for Sustained Efforts .................................................... 6
GLOBAL OPINION: DECIDEDLY PRO-IPR, YET CONFUSED ABOUT WHAT IS LEGAL ................... 7
METHODOLOGY ............................................................................................................ 12
BSA BLUEPRINT FOR REDUCING SOFTWARE PIRACY ....................................................... 15
CHARTS AND TABLES
Commercial Value of Pirated PC Software........................................................................... 1
Global PC Shipments ....................................................................................................... 2
Global PC Software Sales ................................................................................................. 2
Highest and Lowest Piracy Rates ...................................................................................... 3
PC Software Piracy Rates by Region .................................................................................. 4
Economies with Highest Commercial Value of Pirated PC Software ......................................... 5
Commercial Value of Unlicensed PC Software by Region ....................................................... 5
Confusion Over Software Acquisition Channels ..................................................................... 7
PC Software Piracy Rates and Commercial Value of Unlicensed Software ................................ 8
Support for Intellectual Property Rights & Innovation .......................................................... 10
3. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
EXECUTIVE SUMMARY
In the global market for personal computers, 2010 was a watershed year. For the first time,
PC shipments to emerging economies outpaced those to mature markets, 174 million to 173
million. On that score, at least, 2010 might fairly be considered the year in which the world’s
emerging economies stopped merely emerging: They have fully arrived.
But this turning point also underscores how technologies that could benefit the rest of society.
emerging economies have become the driving This is true even in markets with high piracy
force behind PC software piracy. rates — especially there, in fact. Moreover, there
is widespread recognition that licensed software
• The commercial value of software piracy grew is better than pirated software, because it is
14 percent globally last year to a record total of understood to be more secure and more reliable.
$58.8 billion, according to the 2010 BSA Global The problem is that people often do not realize
Software Piracy Study. the software they are using is illegal. Again, this is
• Just six years ago, the commercial value of the especially true in developing markets.
PC software that was being pirated in emerging
economies accounted for less than a third of
the world total. Last year, it accounted for more
than half — $31.9 billion.
This year’s study of PC software piracy is the
eighth to be conducted by the Business Software
Alliance in partnership with IDC, the IT industry’s
leading market research and forecasting firm.
The 2010 study covers 116 countries and regions Commercial Value of Pirated PC Software
using a robust methodology that incorporates 182
discrete data inputs for each. But this year’s study
also adds a new dimension: Deeper and richer 60
surveys of PC users in 32 countries, conducted 50
$Billions (2010 Dollars)
by Ipsos Public Affairs, one of the world’s leading
public-opinion research firms. 40
A striking finding is that world opinion comes 30
down firmly in favor of intellectual property (IP) 20
rights. Seven PC users in 10 support paying
innovators for their creations to promote more 10
technology advances, while just three in 10
0
say no company or individual should control 2003 2004 2005 2006 2007 2008 2009 2010
Developed Markets Emerging Markets
Developed markets include: AU, CA, JP, NZ, SG, SK, TW, US and Western
Europe. Emerging markets include all others studied.
1
4. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
Among the other key findings of the 2010 BSA Global Software Piracy Study:
• At $58.8 billion, the commercial value of PC • Half of the 116 geographies studied in 2010 had
software piracy has nearly doubled in real terms piracy rates of 62 percent or higher, and two-
since 2003. thirds saw at least one software program pirated
for every one that was installed legally.
• While the number of PCs shipped to emerging
economies accounted for 50 percent of the • The piracy rate dropped in 51 of the 116
world total in 2010, the value of paid software geographies studied in 2010 and went up in
licenses in emerging economies accounted for only 15. But, crucially, regional average rates
less than 20 percent of the world total. rose by 1 point in both Asia-Pacific and Latin
America — two economic hotbeds of the
• The most common way people in developing developing world.
economies engage in piracy is to buy a single
copy of software and install it on multiple • The global piracy rate for PC software dropped
computers — including in offices. Fifty-one by a single percentage point in 2010 to 42
percent of PC users surveyed in emerging percent — 3.6 points higher than the previous
markets (including the same percentage of five-year average.
business decision-makers) mistakenly believe
this is legal to do.
Global PC Shipments in 2010 Global PC Software Sales in 2010
Emerging
Markets
19%
Mature Markets Emerging Markets
49.9% 50.1%
Mature Markets
81%
2
5. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
GLOBAL PIRACY TRENDS IN 2010
Sales of personal computers surged 14 percent globally in 2010, compared with just 4
percent in the previous year, as the computer industry rebounded from the recent recession.
On the strength of that robust growth, businesses and consumers bought nearly $95 billion
worth of PC software — but illegally installed another $59 billion worth. This means that for
every dollar spent on legitimate software in 2010, an additional 63 cents worth of unlicensed
software also made its way into the market.
An analogy can be drawn between global
software piracy and the problem many
Highest and Lowest Piracy Rates in 2010
governments face in confronting structural budget
deficits and burdensome public debts: A year HIGHEST PIRACY LOWEST PIRACY
of marginal improvements or mixed results will
Georgia 93% United States 20%
not rectify long-term imbalances. Indeed, at the
Zimbabwe 91% Japan 20%
current pace, it would take until 2049 for the
Bangladesh 90% Luxembourg 20%
average piracy rate among today’s emerging
Moldova 90% New Zealand 22%
economies (69 percent) to fall in line with that of
Yemen 90% Australia 24%
today’s developed economies (26 percent).
Armenia 89% Austria 24%
Venezuela 88% Sweden 25%
THE SURGING PC MARKET IN Belarus 88% Belgium 25%
EMERGING ECONOMIES Libya 88% Finland 25%
How significant an impact do emerging economies Azerbaijan 88% Switzerland 26%
have on global software piracy? Consider that Indonesia 87% Denmark 26%
the average piracy rate in emerging economies is Ukraine 86% Germany 27%
two and a half times higher than it is in developed Sri Lanka 86% United Kingdom 27%
economies — while PC shipments to emerging Iraq 85% Canada 28%
markets are growing three times faster, 21 percent Pakistan 84% Netherlands 28%
to 7 percent. Vietnam 83% Norway 29%
Algeria 83% Israel 31%
Of the 1.4 billion PCs now installed worldwide, Paraguay 83% Singapore 34%
nearly half sit in emerging markets with high piracy Nigeria 82% South Africa 35%
rates. Because these high-piracy markets account Cameroon 82% Ireland 35%
for a rapidly increasing share of the world’s PC Zambia 82% Czech Republic 36%
users, they are driving up the global piracy rate Guatemala 80% UAE 36%
even as they marginally improve their own rates. El Salvador 80% Taiwan 37%
This will continue for years to come, until more is Bolivia 80% France 39%
done to bring their rates down closer to the global Kenya 79% South Korea 40%
average. Botswana 79% Portugal 40%
Ivory Coast 79% Reunion 40%
The most common way people in developing
Nicaragua 79% Hungary 41%
economies engage in software piracy is to buy a
Montenegro 79% Slovakia 42%
single, legal copy of a program and then install it
China 78% Puerto Rico 42%
on multiple computers — including in enterprises,
3
6. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
PC Software Piracy Rates by Region
CENTRAL &
EASTERN EUROPE
LATIN AMERICA
ASIA-PACIFIC
MIDDLE EAST &
AFRICA
WORLDWIDE
EUROPEAN UNION
WESTERN EUROPE
2010
NORTH AMERICA
2009
where software has the greatest value. In fact, A SHIFTING MARKET LANDSCAPE
this year’s surveys found that 51 percent of
Countering the piracy-inflating effect of growth
business decision-makers in developing markets
in emerging markets in 2010 were forces that
erroneously believe this is legal to do. This has
aligned to pull piracy rates down by a net margin
broad implications beyond just the software
of 1 percent. For example:
industry, because software is a tool of production
in every sector of the economy. Companies that • Laptops tend to have more legitimate software
do not pay for the programs they use to run their bundled with them at the point of sale than do
operations have an unfair cost advantage over desktops, and they account for an increasing
companies that do, which skews competition. share of the PC market. Laptops represented 46
percent of PCs in use around the world in 2010,
Consumers, meanwhile, have been buying an
up sharply from 35 percent in 2008.
increasing share of the world’s PCs in recent
years. Just three years ago, they accounted for • So-called “white-box” suppliers — companies
43 percent of the world’s installed base of PCs. that assemble PCs from parts and often load
In 2010, that rose to 52 percent. This growth is them with unlicensed software — hold a
significant because consumers tend to install more declining share of the PC market. At one time
software per computer than do enterprises. they were everywhere in emerging markets,
accounting for nearly a third of all PC shipments
to those regions as recently as 2008, but that
slipped to about one-fifth in 2010.
4 0 10 20 30 40 50 60 70 80
7. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
Economies with Highest Commercial Value of Pirated PC Software in 2010
COUNTRY COMMERCIAL VALUE $M COUNTRY COMMERCIAL VALUE $M
United States $9,515 South Korea $722
China $7,779 Argentina $681
Russia $2,842 Venezuela $662
India $2,739 Australia $658
Brazil $2,619 Malaysia $606
France $2,579 Netherlands $591
Germany $2,096 Ukraine $571
Italy $1,879 Poland $553
United Kingdom $1,846 Turkey $516
Japan $1,624 South Africa $513
Indonesia $1,322 Switzerland $424
Mexico $1,199 Saudi Arabia $414
Spain $1,105 Vietnam $412
Canada $1,066 Sweden $411
Thailand $777 Chile $349
Commercial Value of Unlicensed PC Software by Region ($M)
ASIA-PACIFIC
EUROPEAN UNION
WESTERN EUROPE
NORTH AMERICA
LATIN AMERICA
CENTRAL &
EASTERN EUROPE
MIDDLE EAST & 2010
AFRICA 2009
5
8. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
• Software made available without an upfront States and Japan began buying again. This late-
fee, such as shareware, along with open- stage growth in the enterprise segment resulted
source applications that often rely on service in the installation of more legitimate software
agreements to generate revenues, accounted in 2010, countering the piracy-inflating factors
for between 20 percent and 30 percent of all seen elsewhere.
software deployed in 2010. This was up from
between 12 percent and 22 percent in 2009. • On top of these market influences was the
Contributing to the growth of free software was equity accumulated from years of anti-piracy
a spate of deals between software vendors and activities in markets around the world. These
PC manufacturers that made freely available have included legalization efforts by software
some common commercial applications, such as makers, licensing agreements with computer
security software. manufacturers, industry partnerships with
governments and law-enforcement authorities,
• Whereas the PC market in emerging economies education campaigns, and software asset
started to rebound from the global recession management (SAM) programs.
in 2009, it wasn’t until 2010 that enterprises in
mature, low-piracy countries such as the United
ANTI-PIRACY “EQUITY” AND THE NEED FOR SUSTAINED EFFORTS
Reductions in software piracy produce widespread • Agreements with computer manufacturers to preload
economic benefits. For example, the BSA-IDC Piracy software onto hardware systems before they ship.
Impact Study found in 2010 that reducing the global As the number of non-branded “white-box” vendors
piracy rate for PC software by 10 percentage points continues to fall, more of these agreements will take
— 2.5 points per year for four years — would create place.
$142 billion in new economic activity globally by • Employing technical advances such as digital rights
2013 while adding nearly 500,000 new high-tech jobs management that encourage customer self-audits,
and generating $32 billion in new tax revenues for and offering exclusive, value-added services that are
governments. On average, more than 80 percent of not available to users of unlicensed software.
these benefits would accrue to local economies.
• Promulgating software asset management (SAM)
Clearly, concerted action to ensure strong protection practices, as BSA does with its SAM Advantage
for intellectual property and to reduce software program, to deliver savings to users even as they
piracy should be a priority. Indeed, the fact that many spend money to legalize previously unlicensed
countries succeeded in lowering their piracy rates in software.
2010 shows the value of sustained anti-piracy efforts
that build equity over time. These efforts take many • Encouraging governments to conduct public-
forms, including: education campaigns and undertake enforcement
activities that promote respect for IP laws and deter
• Legalization efforts by vendors that provide piracy.
governments with software at a low cost in bulk to
replace unlicensed software. Vendors continued these If efforts such as these are sustained, they can continue
programs in 2010, turning users of illegal software to build equity over time.
into customers, and allowing governments to set a
good example for their citizens.
6
9. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
GLOBAL OPINION: DECIDEDLY
PRO-IPR, YET CONFUSED ABOUT
WHAT IS LEGAL
Around the world, overwhelming majorities of PC users, in developed and emerging markets
alike, express a healthy appreciation for the role intellectual property rights play in driving
technological innovation and economic progress. Moreover, they exhibit strong preferences
for legal software over pirated software. But, especially in developing markets, PC users are
not fully aware of which means of acquiring software are likely to be illegal.
Ipsos surveyed a globally representative sample create jobs rather than make the products they
of PC users in 32 countries, asking about the need too expensive.
software they installed in 2010, where they
acquired it, what they value about it, and how The most common way people in developing
they view the IP rights and protections covering economies engage in piracy is to buy a single
technologies such as software. copy of software and install it on multiple
computers — including in offices. Most PC
Globally, 81 percent of PC users say they value users believe this practice is legal at home (57
legal software over pirated software because it is percent in developing economies and 63 percent
more reliable and offers better protection against in mature economies), and about half believe
computer viruses and hackers. Yet a surprising it is legal at work (51 percent in developing
number of respondents — in developing markets, economies, 47 percent overall).
in particular — are unaware that common ways of
acquiring pirated software are often illegal. For
example, nearly half of PC users in developing Confusion Over Software Acquisition Channels
economies (46 percent) believe software In surveys of approximately 15,000 PC users in 32
downloaded through peer-to-peer networks is countries, Ipsos asked people whether they thought
common ways of acquiring software are legal or not.
“probably legal.” In mature economies, that figure
drops to 21 percent. Likewise, nearly half of PC
users in developing markets (45 percent) assume it 60
is legal to install software lent to them by a friend
50
or co-worker, compared with 29 percent in mature
% Answering “Is Legal”
markets. 40
The survey found overwhelming support for 30
IP and innovation, both in principle and in
20
practice. For example, 71 percent of respondents
agree that innovators should be paid for their 10
creations, because it provides incentives for
0
more technology advances. Respondents also Install One Copy Lent by Friend Peer-to-Peer
on Multiple Office or Co-Worker Networks
see clear economic benefits from IP rights and Computers
protections. For example, a 59 percent majority
Emerging Markets Mature Markets
of respondents globally (including 62 percent in
developing markets) say they believe IP rights
and protections benefit their local economies.
Emerging markets include: AR, BR, CN, CL, CO, CZ, IN, ID, KR, MY, MX, NG,
Similarly, a 61 percent majority of respondents PL, RU, SA, ZA, TH, TR, UA, VN.
globally (including 64 percent in developing Mature markets include: AU, CA, FR, DE, IT, JP, NL, ES, SE, CH, GB, US.
markets) say they believe IP rights and protections
7
12. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
POLL RESULTS
SUPPORT FOR INTELLECTUAL PROPERTY RIGHTS & INNOVATION
question: “The laws that give someone who invents a new product or technology the
right to decide how it is sold are called intellectual property rights. Which comes closer
to your view...”
STATEMENT A STATEMENT A
“Intellectual property rights benefit people like “Intellectual property rights allow companies
me by creating jobs and improving the economy.” to generate profits which in turn benefit local
economies.”
STATEMENT B
STATEMENT B
“Intellectual property rights hurt people like me
by making products I need too expensive.” “Intellectual property rights concentrate wealth in
the hands of multinational companies that do not
deliver significant local economic benefits.”
IP Benefits
IP Creates Jobs Local Economies
61% 59%
IP Helps
IP Makes Things Multinational
Too Expensive Firms
37% 40%
Don’t Know Don’t Know
2% 1%
10
13. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
question: “Overall, please indicate which of the following two
statements you agree with more...”
STATEMENT A
“It is important for people who invent new products or technologies to be
paid for them, because it creates an incentive for people to produce more
innovations. That is good for society because it drives technological progress
and economic growth.”
STATEMENT B
“No company or individual should be allowed to control a product or
technology that could benefit the rest of society. Laws like that limit the free
flow of ideas, stifle innovation, and give too much power to too few people.”
Benefits Should
Flow to Society
29%
Inventors Should
Be Paid
71%
11
14. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
METHODOLOGY
The BSA Global Software Piracy Study quantifies the volume and value of unlicensed software
installed in the previous year — in this case, 2010. To compile the report, BSA works closely
with two of the world’s leading independent research firms — IDC and Ipsos Public Affairs —
to measure, understand, and evaluate global software piracy. Every year, BSA and its partners
look for new ways to collect reliable data and further improve the report.
GLOBAL SURVEY OF SOFTWARE CALCULATING SOFTWARE PIRACY
USERS RATES
This year, BSA retained the highly regarded Since 2003, BSA has worked with IDC, the leading
research firm Ipsos Public Affairs to survey more provider of market statistics and forecasts to the
than 15,000 business and consumer PC users. The IT industry, to determine PC software piracy rates
surveys were conducted, online or in-person, in and the commercial value of pirated software.
32 markets that make up a globally representative The process involves collecting 182 discrete
sample of geographies, levels of IT sophistication, data inputs and evaluating PC and software
and geographic and cultural diversity. trends in each of 116 markets. A detailed video
presentation of the IDC methodology can be
The surveys are used, in part, to determine the found at www.bsa.org/globalstudy.
“software load” for each country — that is, a
picture of the number of software programs The basic method for coming up with the piracy
installed per PC, including commercial, open- rate and commercial value of unlicensed software
source and mixed-source programs. Respondents in a country is as follows:
are asked how many software packages, and
of what type, were installed on their PC in the 1. Determine how much PC software was
previous year; what percentage were new or deployed during the year.
upgrades; whether they came with the computers 2. Determine how much was paid for or otherwise
or not; and whether they were installed on a new legally acquired during the year.
computer or one acquired prior to 2010.
3. Subtract one from the other to get the amount
In addition, BSA expanded the surveys this year of unlicensed software.
to provide more insight into key social attitudes
and behaviors related to intellectual property Once the amount of unlicensed software is known,
and the use of licensed versus unlicensed the PC software piracy rate is computed as a
software. This insight provides new and fresh percentage of total software installed.
perspective on the dynamics underlying software
piracy around the world.
Unlicensed Software Units
Piracy Rate =
Total Software Units Installed
12
15. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
To calculate the total number of software units To convert the software market value to number
installed — the denominator — IDC determines of units, IDC determines an average price per
how many computers there are in a country and software unit for all of the PC software in the
how many of those received software during the country. This is done by developing a country-
year. IDC tracks this information quarterly in 105 specific matrix of software prices — such as retail,
countries, either in products called “PC Trackers” volume-license, OEM, free, and open-source —
or as part of custom assignments. The remaining across a matrix of products, including security,
few countries are researched annually for this study. office automation, operating systems, and more.
IDC’s pricing information comes from its pricing
Once IDC has determined how many computers trackers and from local analysts’ research. The
there are, and using the software load data weightings — OEM versus retail, consumer versus
collected in the survey, it can determine the total business — are taken from IDC surveys.
software units installed — licensed and unlicensed
— in each country. IDC multiplies the two matrices to get a final,
blended-average software unit price.
# PCs Getting Software To arrive at the total number of legitimate
x software units, IDC applies this formula:
Software Units per PC
=
Software Market Value
Total Software Units Installed
Average Software Unit Price
To estimate the software load in countries not =
surveyed, IDC uses a series of correlations Legitimate Software Units
between the known software loads from survey
countries and their scores on an emerging
market measure published by the International Subtracting the number of legitimate software
Telecommunications Union, called the ICT units from the total software units reveals the
Development Index. IDC also considers other number of unlicensed software units installed
correlations such as gross domestic product per during the year.
capita, PC penetration and various measures of
institutional strength. From these, IDC estimates
the software load for non-surveyed countries. Total Software Units Installed
–
To get the number of unlicensed software units Legitimate Software Units
— the numerator of the piracy equation — IDC =
comes up with a value measure of the software Unlicensed Software Units
market. IDC routinely publishes software market
data from about 80 countries and studies roughly
20 more on a custom basis. For the few remaining This process provides the underlying data for the
countries, IDC conducts annual research for the basic piracy rate equation.
purposes of this study. This research provides the
value of the legally acquired software market.
13
16. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
CALCULATING THE COMMERCIAL in a way that puts it into the public domain for
VALUE OF PIRATED SOFTWARE common use. It is typically free but can also be
used in commercial products.
The commercial value of pirated software is
the value of unlicensed software installed in a The study excludes software that runs on servers
given year, as if it had been sold in the market. It or mainframes and routine device drivers, as well
provides another measure of the scale of software as free downloadable utilities, such as screen
piracy and allows for important year-over-year savers, that would not displace paid-for software
comparisons of changes in the software piracy or normally be recognized by a user as a software
landscape. program.
It is calculated using the same blend of prices by It includes software as a service if it is paid for,
which we determine the average software unit but excludes free, Web-based services that might
price, including: retail, volume license, OEM, free, supplant the need for a paid-for package to
open-source, etc. The average software unit price be installed on a PC. Software sold as part of a
is lower than retail prices one would find in stores. legalization program — such as a bulk sale to a
government to distribute to schools — is included
Having calculated the total units of software
in the study.
installed, as well as the number of legitimate and
unlicensed software units installed and the average
price per software unit, IDC is able to calculate the THE IMPACT OF EXCHANGE RATES
commercial value of unlicensed software: From 2003 through 2008, dollar figures in the
value tables were in current dollars from the year
before. For example, the 2006 value of unlicensed
software was stated in 2005 dollars; the value
# Unlicensed Software Units
of 2007 unlicensed software was stated in 2006
x
dollars, and so on. In 2009 BSA and IDC decided
Average Software Unit Price
to publish value figures in the current dollars of
= the year being studied. 2009 values are in 2009
Commercial Value dollars, 2010 values in 2010 dollars.
This is important when evaluating changes in
WHAT SOFTWARE IS INCLUDED the values over time. Some of the changes will
The BSA Global Software Piracy Study calculates be based on real market dynamics, some on
piracy of all software that runs on personal exchange rate fluctuations from year to year.
computers — including desktops, laptops, and
For instance, this year’s global commercial value
ultra-portables, including netbooks.
of pirated software is 14 percent higher than last
It includes operating systems, systems software year’s published value. But convert last year’s
such as databases and security packages, values to 2010 dollars, and the difference is
business applications, and consumer applications 13 percent. This doesn’t seem like much, but
such as games, personal finance, and reference for individual countries the difference between
software. The study also takes into account the nominal growth and constant-dollar growth can
availability of legitimate, free software and open- be significant.
source software, which is software that is licensed
14
17. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
BSA BLUEPRINT FOR REDUCING
SOFTWARE PIRACY
PUBLIC EDUCATION to all computing platforms. Governments
must fulfill their obligations under the World
Reducing software piracy can require a
Trade Organization’s Trade-Related Aspects of
fundamental shift in public attitudes toward
Intellectual Property Rights (TRIPS) agreement
software and IP. Public education is critical,
by adopting and implementing laws that meet
therefore, to increase awareness of the importance
international norms for IP rights protection. IP
of managing software assets and respecting
laws should also provide for clear protection
creative works through compliance with software
against misappropriation and infringement of new
licensing. Experience has shown that public-private
software innovations, such as cloud computing
awareness campaigns about piracy and the value of
technologies.
IP can be extremely effective. In addition, support
for industry-led initiatives to promote the business
practice of managing and optimizing software DEDICATED RESOURCES
purchases, utilization and maintenance — a process Too often, software thieves are not treated as
known as software asset management (SAM) — can seriously as other criminals and the punishment
reduce piracy while helping organizations derive is too insignificant to be an effective deterrent.
greater value from software assets. For example, Countries can elevate their enforcement of
BSA offers a framework called SAM Advantage intellectual property by:
(www.bsa.org/samadvantage).
• Creating specialized IP enforcement units at the
national and local level and providing dedicated
WIPO COPYRIGHT TREATY resources to investigate and prosecute IP theft;
In 1996, in direct response to the growing • Increasing cross-border cooperation among
threat of Internet piracy, members of the World police and other enforcement agencies to
Intellectual Property Organization (WIPO) improve coordination for law enforcement in
concluded new copyright treaties to enable multiple countries; and
better enforcement against digital and online • Supporting the training of law enforcement and
piracy. Since then, nearly 90 countries have judiciary officials (including establishment of
joined the WIPO treaties. Close to 2 billion specialized IP courts where appropriate) and
people around the world now have Internet providing better technical assistance to ensure
access — increasing the power and potential of that the people on the front lines of piracy
software, but also opening new doors for pirates enforcement are equipped with the tools they
to distribute their wares. To ensure protection of need to deal with the changing nature of IP theft.
copyrighted works in the digital age, countries
need to update copyright laws to implement their LEAD BY EXAMPLE
WIPO obligations. These measures ensure that
Governments are the largest users of software
protected works are not made available online
in the world. They can set an example for the
without the author’s permission and that copy
private sector to follow by implementing SAM
protection tools are not hacked or circumvented.
policies, requiring the use of legal software by
all government agencies, and promoting the use
ENFORCEMENT MECHANISMS of legal software by state-owned enterprises,
Strong copyright laws are essential — but contractors, and suppliers.
meaningless without effective enforcement
that crosses international borders and extends
15
18. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
ABOUT BSA
The Business Software Alliance (BSA) is the leading advocate for the global software industry
before governments and in the international marketplace. It is an association of nearly 100
world-class companies that invest billions of dollars annually to create software solutions that
spark the economy and improve modern life.
BSA serves as the world’s premier anti-piracy • Curbing Software Theft: BSA conducts vigorous
organization and as a respected leader in enforcement programs in approximately 50
shaping public policies that promote technology countries, helping its members guard against
innovation and drive economic growth. software theft by taking legal action against
commercial, end-user license infringement,
Through government relations, intellectual counterfeiting operations and Internet piracy.
property enforcement and educational activities
in approximately 90 markets around the world, • Leading Industry Research: BSA publishes the
BSA protects intellectual property and fosters most authoritative global studies on piracy and
innovation; works to open markets and ensure fair its economic impact, illuminating the scope of
competition; and builds trust and confidence in the problem and helping shape national and
information technology for consumers, businesses international policy responses.
and governments alike.
• Educating the Public: BSA educates consumers
about harms associated with software piracy
PROTECTING INTELLECTUAL and offers a groundbreaking training program
PROPERTY & FOSTERING INNOVATION to help organizations more effectively manage
Intellectual property rights (IPR) — copyrights, their software assets.
patents and trademarks — provide the legal
framework for creative enterprise, the bedrock OPENING MARKETS & ENSURING FAIR
of growing economies. They are also essential to COMPETITION
commercial software development, which is the
world’s largest copyright industry. Open markets are essential to economic growth
and prosperity. BSA expands market opportunities
By working with policymakers, leading for the software industry by working with
enforcement actions and conducting public- governments to break down trade barriers and
education initiatives around the world, BSA eliminate discriminatory procurement preferences
ensures that respect for IPR pervades the global that stifle innovation by skewing competition.
economy and society.
• Breaking Down Barriers to Growth: BSA
• Championing Intellectual Property Rights: BSA provides policymakers with information, expert
works with governments around the world to analysis and industry insights to promote an
ensure intellectual property protections keep open-markets agenda. These efforts include a
pace with new innovations in technology, such special focus on the so-called ‘BRIC’ economies
as cloud computing. of Brazil, Russia, India and China, which are the
world’s fastest-growing technology markets but
also home to rampant piracy.
16
19. EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY
• Promoting Technology Neutrality: BSA • Protecting Consumers: As new technologies
encourages fair competition among emerge, such as cloud computing, BSA and
technologies by promoting internationally its members develop appropriate privacy and
recognized standards and unbiased IT- security standards and share their insights with
procurement policies for governments. policymakers and regulators.
• Supporting New Innovations: BSA works • Mapping Policy Solutions: BSA has developed
with policymakers around the world to create a global cybersecurity framework to guide
conditions for new technologies, such as governments in crafting policies that effectively
cloud computing, to flourish. In addition to deter and punish cyber crime, mitigate threats,
collaborating on technology standards, this inform and protect consumers, and respond to
work involves elevating intellectual property cyber incidents.
protections, harmonizing international legal
principles and addressing other challenges that
are beyond the capability or jurisdiction of any
one company or government.
BUILDING TRUST & CONFIDENCE IN
TECHNOLOGY
Security and privacy undergird trust and
confidence in information technology for
consumers, businesses and governments. BSA
promotes responsible data stewardship and
facilitates acceptance and adoption of each new
wave of innovation that transforms the technology
marketplace and creates value for society.
• Driving Public-Private Collaboration: Drawing
on the expertise of its members and productive
working relationships with public officials, BSA
serves as a knowledge center and catalyst to
encourage cooperation and forge consensus
among industry and governments.
17
20. BuSinESS SOftWARE AlliAncE GlOBAl OfficES WWW.BSA.ORG
BSA WORldWidE HEAdquARtERS BSA ASiA-pAcific BSA EuROpE, MiddlE EASt & AfRicA
1150 18th Street, NW 300 Beach Road 2 Queen Anne’s Gate Buildings
Suite 700 #25-08 The Concourse Dartmouth Street
Washington, DC 20036 Singapore 199555 London, SW1H 9BP
T: +1.202.872.5500 T: +65.6292.2072 United Kingdom
F: +1.202.872.5501 F: +65.6292.6369 T: +44.207.340.6080
F: +44.207.340.6090
Bangkok, Thailand Beijing, China Brussels, Belgium Hanoi, Vietnam Jakarta, Indonesia Kuala Lumpur, Malaysia
München, Germany New Delhi, India São Paulo, Brazil Taipei, Taiwan Tokyo, Japan