SlideShare a Scribd company logo
1 of 9
Copy rights & Intellectual property
Intellectual Property  The term Intellectual Property reflects the  idea that its subject matter is the product  of the mind or the intellect.  E.g. computer  program  WIPO  Encouraging creativity and innovation
Intellectual property  Many Countries are producers  and exporters of copyright  materials like software,  cinematograph films and  music.  Measures are taken to  protect the authors and  strengthen enforcement  of copyright.
What is Software Piracy?  Software Piracy or counterfeiting is defined as  the illegal copying of software combined with  unauthorised duplication of genuine trademarks  and documents  Software Copying  Generally, licenses for one or a few copies of a  computer package / programme may be  purchased for a business or in a workplace. As,  requirements increase, illegal copies are made  from one of the licensed programmes and  installed in other computers.  In addition, office software is often illegally copied  into the home computer of an employee or vice-versa.
Network Piracy  Software piracy often occurs on computer  networks when a software program is  accessed by more users than what a  license permits. Many network user  organisations fail to realise this as a  violation of copyright law  E.g., ERP software is sold usually on per-  user license basis  If more users are using the same package  then user organization should pay license  fees to the software vendor.
Internet Piracy  With the advent of internet and the  increasing use of internet, the software  piracy has grown dramatically in recent  years. Through Internet, programs are  uploaded to bulletin board systems or  commercial on-line services which, in turn,  can be downloaded or sent via electronic  mail to individuals who may  not hold a  license to use these software.
Computer hardware resellers  The sellers of computer software particularly the  unauthorised retailers are also involved in selling  pirated softwares. They simply copy the original  (licensed) softwares into floppy discs or  in CD  ROMs and sell them to the end users or install  them in users' hardware.  Computer dealers more particularly, the  unauthorised hardware suppliers who assemble  components and sell computers to the users with  software already installed.  Unfortunately, in most of the cases these  computers are loaded with  unlicensed  softwares . In such cases, unless a license and  software manuals are provided with the sale, it is  likely that programs have been  illegally copied.
IT Industry  The computer software perhaps is the fastest  growing industry in India. The sector is growing  at an annual compound growth rate of over 50  per cent during the recent years  Do not mix up the software service with the  software package export  Perhaps, software companies are happy in  exporting mainly the services since they do not have  to worry much about the copyright piracy as has  been taking place in the packaged software
Shareware / Free software  Open source  The licenses for most software are  designed to take away your freedom to  share and change it.  By contrast, the GNU General Public  Licenses are intended to guarantee your  freedom to share and change free  software--to make sure the software is  free for all its users.

More Related Content

What's hot

4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notesguest78023a
 
Chapter 4 Programs and Apps
Chapter 4 Programs and AppsChapter 4 Programs and Apps
Chapter 4 Programs and Appsxtin101
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentationDeepak John
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Chapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile DevicesChapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile Devicesxtin101
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computerRodz Tech
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanHaseeb Shalmani
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is usedgracepm28
 

What's hot (20)

4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notes
 
Chapter 4 Programs and Apps
Chapter 4 Programs and AppsChapter 4 Programs and Apps
Chapter 4 Programs and Apps
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Chapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile DevicesChapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile Devices
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
System failure
System  failureSystem  failure
System failure
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 

Viewers also liked

Apple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdfApple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdfManojkumar S
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Getting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaGetting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaAngelo Corsaro
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Performance Evaluation PowerPoint PPT Content Modern Sample
Performance Evaluation PowerPoint PPT Content Modern SamplePerformance Evaluation PowerPoint PPT Content Modern Sample
Performance Evaluation PowerPoint PPT Content Modern SampleAndrew Schwartz
 
PERFORMANCE EVALUATION POWERPOINT
PERFORMANCE EVALUATION POWERPOINTPERFORMANCE EVALUATION POWERPOINT
PERFORMANCE EVALUATION POWERPOINTAndrew Schwartz
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final pptreemalmarri
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Trademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwaniTrademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwaniPooja Gurwani
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (15)

Apple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdfApple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdf
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Web servers
Web serversWeb servers
Web servers
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Web servers
Web serversWeb servers
Web servers
 
Getting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaGetting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and Scala
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Web Servers (ppt)
Web Servers (ppt)Web Servers (ppt)
Web Servers (ppt)
 
Sales Promotion
Sales Promotion Sales Promotion
Sales Promotion
 
Performance Evaluation PowerPoint PPT Content Modern Sample
Performance Evaluation PowerPoint PPT Content Modern SamplePerformance Evaluation PowerPoint PPT Content Modern Sample
Performance Evaluation PowerPoint PPT Content Modern Sample
 
PERFORMANCE EVALUATION POWERPOINT
PERFORMANCE EVALUATION POWERPOINTPERFORMANCE EVALUATION POWERPOINT
PERFORMANCE EVALUATION POWERPOINT
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Trademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwaniTrademark ppt by-pooja gurwani
Trademark ppt by-pooja gurwani
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Chapter 7 Copy Rights And Intellectual Property

пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkwokk1d337
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfRijuDasgupta
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer softwareElike Ikechukwu
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxpugazhendhiv2
 
Itc lec 14 software and its types
Itc lec 14 software and its typesItc lec 14 software and its types
Itc lec 14 software and its typesAnzaDar3
 
WEBQUEST ALSOANKA
WEBQUEST ALSOANKAWEBQUEST ALSOANKA
WEBQUEST ALSOANKAALSOANKA
 
Web quest ALSOANKA GROUP
Web quest ALSOANKA GROUPWeb quest ALSOANKA GROUP
Web quest ALSOANKA GROUPALSOANKA
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GISJoanne Cook
 

Similar to Chapter 7 Copy Rights And Intellectual Property (20)

Software piracy
Software piracySoftware piracy
Software piracy
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
ITC_lec_14.ppt
ITC_lec_14.pptITC_lec_14.ppt
ITC_lec_14.ppt
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
Itc lec 14 software and its types
Itc lec 14 software and its typesItc lec 14 software and its types
Itc lec 14 software and its types
 
WEBQUEST ALSOANKA
WEBQUEST ALSOANKAWEBQUEST ALSOANKA
WEBQUEST ALSOANKA
 
Web quest ALSOANKA GROUP
Web quest ALSOANKA GROUPWeb quest ALSOANKA GROUP
Web quest ALSOANKA GROUP
 
Software piracy Grade 6
Software piracy Grade 6Software piracy Grade 6
Software piracy Grade 6
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 

More from management 2

Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Studymanagement 2
 
Chapter 9 Mis Library System
Chapter 9 Mis Library SystemChapter 9 Mis Library System
Chapter 9 Mis Library Systemmanagement 2
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support Systemmanagement 2
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erpmanagement 2
 
Chapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life CycleChapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life Cyclemanagement 2
 
Chapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai DabbawalasChapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai Dabbawalasmanagement 2
 
Chapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information SystemsChapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information Systemsmanagement 2
 
Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)management 2
 
Chapter 1 Basics Of Information Transmission
Chapter 1 Basics Of Information TransmissionChapter 1 Basics Of Information Transmission
Chapter 1 Basics Of Information Transmissionmanagement 2
 
Chapter 12 Toshiba Case Study
Chapter 12 Toshiba Case StudyChapter 12 Toshiba Case Study
Chapter 12 Toshiba Case Studymanagement 2
 
Chapter 18 Foundations Of Control
Chapter 18   Foundations Of ControlChapter 18   Foundations Of Control
Chapter 18 Foundations Of Controlmanagement 2
 
Chapter 16 Motivating Employees
Chapter 16   Motivating EmployeesChapter 16   Motivating Employees
Chapter 16 Motivating Employeesmanagement 2
 
Chapter 12 Human Resource Management
Chapter 12   Human Resource ManagementChapter 12   Human Resource Management
Chapter 12 Human Resource Managementmanagement 2
 
Chapter 8 Strategic Management
Chapter 8   Strategic ManagementChapter 8   Strategic Management
Chapter 8 Strategic Managementmanagement 2
 
Chapter 7 Foundations Of Planning
Chapter 7   Foundations Of PlanningChapter 7   Foundations Of Planning
Chapter 7 Foundations Of Planningmanagement 2
 
Chapter 6 Decision Making The Essence Of The Manager S Job
Chapter 6   Decision Making The Essence Of The Manager S JobChapter 6   Decision Making The Essence Of The Manager S Job
Chapter 6 Decision Making The Essence Of The Manager S Jobmanagement 2
 
Chapter 3 Organizational Culture And Environment The Constraints
Chapter 3   Organizational Culture And Environment The ConstraintsChapter 3   Organizational Culture And Environment The Constraints
Chapter 3 Organizational Culture And Environment The Constraintsmanagement 2
 
Chapter 2 The Evolution Of Management Theory Written In Different Manner
Chapter 2   The Evolution Of Management Theory  Written In Different MannerChapter 2   The Evolution Of Management Theory  Written In Different Manner
Chapter 2 The Evolution Of Management Theory Written In Different Mannermanagement 2
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theorymanagement 2
 

More from management 2 (20)

Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Study
 
Chapter 10 Sap
Chapter 10 SapChapter 10 Sap
Chapter 10 Sap
 
Chapter 9 Mis Library System
Chapter 9 Mis Library SystemChapter 9 Mis Library System
Chapter 9 Mis Library System
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support System
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Chapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life CycleChapter 5 Mis Software Development Life Cycle
Chapter 5 Mis Software Development Life Cycle
 
Chapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai DabbawalasChapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai Dabbawalas
 
Chapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information SystemsChapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information Systems
 
Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)Chapter 2 Management Information System (Basics)
Chapter 2 Management Information System (Basics)
 
Chapter 1 Basics Of Information Transmission
Chapter 1 Basics Of Information TransmissionChapter 1 Basics Of Information Transmission
Chapter 1 Basics Of Information Transmission
 
Chapter 12 Toshiba Case Study
Chapter 12 Toshiba Case StudyChapter 12 Toshiba Case Study
Chapter 12 Toshiba Case Study
 
Chapter 18 Foundations Of Control
Chapter 18   Foundations Of ControlChapter 18   Foundations Of Control
Chapter 18 Foundations Of Control
 
Chapter 16 Motivating Employees
Chapter 16   Motivating EmployeesChapter 16   Motivating Employees
Chapter 16 Motivating Employees
 
Chapter 12 Human Resource Management
Chapter 12   Human Resource ManagementChapter 12   Human Resource Management
Chapter 12 Human Resource Management
 
Chapter 8 Strategic Management
Chapter 8   Strategic ManagementChapter 8   Strategic Management
Chapter 8 Strategic Management
 
Chapter 7 Foundations Of Planning
Chapter 7   Foundations Of PlanningChapter 7   Foundations Of Planning
Chapter 7 Foundations Of Planning
 
Chapter 6 Decision Making The Essence Of The Manager S Job
Chapter 6   Decision Making The Essence Of The Manager S JobChapter 6   Decision Making The Essence Of The Manager S Job
Chapter 6 Decision Making The Essence Of The Manager S Job
 
Chapter 3 Organizational Culture And Environment The Constraints
Chapter 3   Organizational Culture And Environment The ConstraintsChapter 3   Organizational Culture And Environment The Constraints
Chapter 3 Organizational Culture And Environment The Constraints
 
Chapter 2 The Evolution Of Management Theory Written In Different Manner
Chapter 2   The Evolution Of Management Theory  Written In Different MannerChapter 2   The Evolution Of Management Theory  Written In Different Manner
Chapter 2 The Evolution Of Management Theory Written In Different Manner
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theory
 

Chapter 7 Copy Rights And Intellectual Property

  • 1. Copy rights & Intellectual property
  • 2. Intellectual Property The term Intellectual Property reflects the idea that its subject matter is the product of the mind or the intellect. E.g. computer program WIPO Encouraging creativity and innovation
  • 3. Intellectual property Many Countries are producers and exporters of copyright materials like software, cinematograph films and music. Measures are taken to protect the authors and strengthen enforcement of copyright.
  • 4. What is Software Piracy? Software Piracy or counterfeiting is defined as the illegal copying of software combined with unauthorised duplication of genuine trademarks and documents Software Copying Generally, licenses for one or a few copies of a computer package / programme may be purchased for a business or in a workplace. As, requirements increase, illegal copies are made from one of the licensed programmes and installed in other computers. In addition, office software is often illegally copied into the home computer of an employee or vice-versa.
  • 5. Network Piracy Software piracy often occurs on computer networks when a software program is accessed by more users than what a license permits. Many network user organisations fail to realise this as a violation of copyright law E.g., ERP software is sold usually on per- user license basis If more users are using the same package then user organization should pay license fees to the software vendor.
  • 6. Internet Piracy With the advent of internet and the increasing use of internet, the software piracy has grown dramatically in recent years. Through Internet, programs are uploaded to bulletin board systems or commercial on-line services which, in turn, can be downloaded or sent via electronic mail to individuals who may not hold a license to use these software.
  • 7. Computer hardware resellers The sellers of computer software particularly the unauthorised retailers are also involved in selling pirated softwares. They simply copy the original (licensed) softwares into floppy discs or in CD ROMs and sell them to the end users or install them in users' hardware. Computer dealers more particularly, the unauthorised hardware suppliers who assemble components and sell computers to the users with software already installed. Unfortunately, in most of the cases these computers are loaded with unlicensed softwares . In such cases, unless a license and software manuals are provided with the sale, it is likely that programs have been illegally copied.
  • 8. IT Industry The computer software perhaps is the fastest growing industry in India. The sector is growing at an annual compound growth rate of over 50 per cent during the recent years Do not mix up the software service with the software package export Perhaps, software companies are happy in exporting mainly the services since they do not have to worry much about the copyright piracy as has been taking place in the packaged software
  • 9. Shareware / Free software Open source The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.