SlideShare a Scribd company logo
1 of 34
Submitted to: Sir Waqar Malik
Submitted by: Maryam Jamil,37
Zahida Malik,13
Amna Ashfaq,29
Maryam Yaseen,14
 "Regardless of how the infringer sees it... piracy is theft of
intellectual property and is no more justifiable than shoplifting,
stealing cable service or other utilities. Developers invest time and
money to develop a... product and deserve to make a fair profit - so
they can develop new ...products. This is particularly crucial for
small developers... whose survival depends on income from sales to
a limited market“
 "Pirated copyright goods shall mean any goods which
are copies made without the consent of the rightholder
or person duly authorised by the rightholder in the
country of production and which are made directly or
indirectly from an article where the making of that copy
would have constituted an infringement of a copyright
or a related right under the law of the country of
importation"
 The explosion of media piracy was galvanized by the
invention of the MP3 format back in 1993. This
format allowed the copying of CDs to computer
devices, from which pirate CD replicas could then be
produced. The MP3 format wasn't used as widely for
piracy until the Napster website opened in 1999.
This highly publicized site allowed users to trade and
download musical files. Though Napster was
eventually closed after the recording industry
brought a number of lawsuits against it, a variety of
peer-to-peer file services has since sprung up across
the Net, making it easy to download media files
illegally.
 Print
 Music
 Films
 Software
 Internet (online)
 Any unauthorized use of a copyrighted work, such as a
book, school manual, journal article or sheet music,
represents an infringement of copyright or a case of
copyright piracy, unless covered by a copyright exception.
Piracy of printed works affects both paper copies and works
in digital format. In some developing countries, trade in
pirated books often exceeds the legitimate market.
Educational institutions represent a primary target market
for pirates.
Infringing activities include both illegal commercial
photocopying and/or printing and reproduction of books
and other printed material in digital form, as well as
distribution in hard copy or digital format.
 Music piracy includes both traditional unlawful use of
music and unauthorized use of music on on-line
communication networks.
 Bootlegging (unauthorized recording and duplication of a
live or broadcast performance)
 Counterfeiting (unauthorized copying of the material
support, labels, artwork and packaging) are the most
widespread types of traditional music piracy.
 The unauthorized uploading and making available to the
public of music files or downloading such files from an
Internet site is referred to as Internet or on-line piracy. On-
line piracy may also include certain uses of "streaming"
technologies.
As in the case of music, film piracy is either traditional
or done over the Internet. It includes, but is not limited
to, videocassette and optical disc piracy, theatrical
camcorder piracy, theatrical print theft, signal theft and
broadcasting piracy, and on-line piracy.
Software piracy refers to practices that involve the
unauthorized copying of computer software.
 The unauthorized downloading or distribution over
the Internet of unauthorized copies of works such as
movies, music, videogames and software is generally
referred to as Internet or on-line piracy. Illicit
downloads occur through file-sharing networks, illegal
servers, websites and hacked computers. Hard goods
pirates also use the Internet to sell illegally duplicated
DVDs through auctions and websites.
 Low level of public awareness
 High consumer demand for cultural products
 Misconceptions about piracy
 Inefficient intellectual property protection and weak
enforcement of rights
 High cost of cultural goods
 Difficulty of access to legitimate works
 Considerable business profits for pirates
 In the United States, as in many countries around the
world, breaking copyright on media is illegal
 If an individual breaks federal law regarding media
piracy, she is liable to end up in court. Even a first-time
offender can end up paying as much as $250,000 in fines,
or face a maximum five years in jail. Copyright holders,
like the Recording Industry Association of America, also
have the ability to sue individuals, and can potentially be
awarded as much as $150,000 for every copyrighted file
distributed illegally.
 Authorities responsible for enforcing the copyright law
1. Police- Section 74 (3) of the Copyright Law.
2. Federal Investigation Agency- Second Schedule of FIA Act of 1974.
3. Customs- Sections 58, 65A to 65C of the Copyright Law.
4. Judiciary- Civil/Criminal- Sections 59 to 77 of the Copyright Law.
5. Pakistan electronic Media Regulatory Authority (PEMRA)-
PEMRA Ordinance 2007
 Megaupload, a Hong-Kong based company, was a file
sharing site founded by Kim Dotcom in 2005. Users could
freely upload and download files from the site, but needed
to pay a small sum to upgrade their access to "premium
access" so as to have access to faster download speeds, no
file limitations etc. However, the site was shut down on the
19 January 2012, after being accused of costing copyright
holders of films, music and other content more than $500
million dollars in revenue by enabling millions of free
downloads of these materials. Movie industry was
complaining that the company was making money out of
pirated material
 One of the world's largest file sharing sites.
 User base of at least a 150 million people around the
world
 So widely used that profits earned founder Kim
Dotcom 42 million dollars in 2011
 82,764,913 unique visitors
 1,000,000,000 page views throughout history
 25 petabytes of storage
1. Counterfeiting
2. Internet Piracy
3. End User Piracy
4. Client-Server Overuse
5. Hard-Disk Loading
 This type of piracy is the illegal duplication,
distribution and/or sale of copyrighted material with
the intent of imitating the copyrighted product.
 This occurs when software is downloaded from the
Internet. The same purchasing rules apply to on-line
software purchases as for those bought in compact disc
format.
 This occurs when an individual reproduces copies of
software without authorization.
 This type of piracy occurs when too many users on a
network are using a central copy of a program at the
same time
 This occurs when a business sells new computers with
illegal copies of software loaded onto the hard disks to
make the purchase of the machines more attractive.
 Warning Sign
1. Prices that are too good to be true.
 Auction Sites
1. Unbundled OEM and System Builder software
2. No box and manual on CD
3. No tech support
4. Key/serial number only
5. Disc only
6. CD-R/backup copy
7. Software delivered via e-mail
8. Software described as "cannot be registered"
9. Compilation - more than one program on a single CD
 Spam
1. Be cautious of unsolicited spam that promotes Symantec/Norton branded software
2. File spam complaints with FTC
3. Visit sources of spam for more information on spam
1. Decrease in Sales of Legal Copies
2. Retail Price Effects of Piracy
3. Estimating the Amount of Piracy
4. The Expectation of Piracy
5. Non-profit Losses
6. A Past Piracy Problem
 In June of 1996, the largest ever video piracy operation in the United States was
dismantled in New York. The nationwide counterfeit business sold more than
100,000 pirated videos a week, grossing approximately $500,000. The
investigation, dubbed “Operation Copy Cat”, culminated when search warrants
were executed by the New York City Police Department, assisted by the MPAA,
on 17 locations, including four labs. Authorities arrested 36 people and seized
817 VCRs, 77,641 pirated videos, $40,000 in case, 37,000 blank cassettes, more
than 100,000 sleeves, labels and other sophisticated equipment used in the
duplicating process. The economic impact on MPAA member companies is
estimated to be more than $87 million a year.
 There are two methods proposed by Peter Troost may help in the
war on piracy.
1. build copy protection into an operating system
2. Meterware (superdistribution)
 Even though anti-piracy organizations have made
great strides in their fight, with the enormous growth
of the Internet, current anti-piracy methods will not
completely stop piracy.
 The damage done to the industry and legitimate end
user does not outweigh the few advantages that piracy
does have. The chances of being caught, the fines, and
the jail sentences are constantly increasing.
 Organizations and industry need to come up with
solutions to increase copyright protection, inform the
uneducated, and negate the advantages that computer
piracy has.
Impacts of Media Piracy and Anti-Piracy Efforts

More Related Content

What's hot

Media and Human RIghts Education
Media and Human RIghts EducationMedia and Human RIghts Education
Media and Human RIghts EducationRaymund Sanchez
 
pressure on newsmedia
pressure on newsmediapressure on newsmedia
pressure on newsmediaTahseenamjad
 
Defamation (Libel & Slander)
Defamation (Libel & Slander)Defamation (Libel & Slander)
Defamation (Libel & Slander)Miriam Smith
 
Barc and Tam Media Audience measurement
Barc and Tam Media Audience measurementBarc and Tam Media Audience measurement
Barc and Tam Media Audience measurementHasnain Bhindarwala
 
Verghese committee ppt - B.G. Verghese 1977
Verghese committee ppt - B.G. Verghese 1977Verghese committee ppt - B.G. Verghese 1977
Verghese committee ppt - B.G. Verghese 1977Rahul John
 
Cultivation theory
Cultivation theoryCultivation theory
Cultivation theorykaysar.khan
 
ownership patterns in media
 ownership patterns in media ownership patterns in media
ownership patterns in mediaSwati Saini
 
Networked Journalism
Networked JournalismNetworked Journalism
Networked JournalismSeth Lewis
 
public corporation.pptx
public corporation.pptxpublic corporation.pptx
public corporation.pptxMukulDev34
 
The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995Leo Lukose
 
ASY1 Media Studies C1SA Introduction to Advertising and Marketing - Definiti...
ASY1 Media Studies C1SA Introduction to Advertising and Marketing  - Definiti...ASY1 Media Studies C1SA Introduction to Advertising and Marketing  - Definiti...
ASY1 Media Studies C1SA Introduction to Advertising and Marketing - Definiti...KBucket
 
Mainstream media vs. alternative media
Mainstream media vs. alternative mediaMainstream media vs. alternative media
Mainstream media vs. alternative medianewsindiatimes
 
Growth and role of electronic media in India
Growth and role of electronic media in IndiaGrowth and role of electronic media in India
Growth and role of electronic media in IndiaANUJ SHUKLA
 

What's hot (20)

Media and Human RIghts Education
Media and Human RIghts EducationMedia and Human RIghts Education
Media and Human RIghts Education
 
Media law in India
Media law in IndiaMedia law in India
Media law in India
 
Prasar bharti
Prasar bhartiPrasar bharti
Prasar bharti
 
pressure on newsmedia
pressure on newsmediapressure on newsmedia
pressure on newsmedia
 
Defamation (Libel & Slander)
Defamation (Libel & Slander)Defamation (Libel & Slander)
Defamation (Libel & Slander)
 
Barc and Tam Media Audience measurement
Barc and Tam Media Audience measurementBarc and Tam Media Audience measurement
Barc and Tam Media Audience measurement
 
Verghese committee ppt - B.G. Verghese 1977
Verghese committee ppt - B.G. Verghese 1977Verghese committee ppt - B.G. Verghese 1977
Verghese committee ppt - B.G. Verghese 1977
 
Audience theory
Audience theoryAudience theory
Audience theory
 
Cultivation theory
Cultivation theoryCultivation theory
Cultivation theory
 
ownership patterns in media
 ownership patterns in media ownership patterns in media
ownership patterns in media
 
Radio Ad
Radio AdRadio Ad
Radio Ad
 
Theories
TheoriesTheories
Theories
 
Networked Journalism
Networked JournalismNetworked Journalism
Networked Journalism
 
public corporation.pptx
public corporation.pptxpublic corporation.pptx
public corporation.pptx
 
The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995
 
ASY1 Media Studies C1SA Introduction to Advertising and Marketing - Definiti...
ASY1 Media Studies C1SA Introduction to Advertising and Marketing  - Definiti...ASY1 Media Studies C1SA Introduction to Advertising and Marketing  - Definiti...
ASY1 Media Studies C1SA Introduction to Advertising and Marketing - Definiti...
 
Mainstream media vs. alternative media
Mainstream media vs. alternative mediaMainstream media vs. alternative media
Mainstream media vs. alternative media
 
Interpretation of Penal Statutes
Interpretation of Penal StatutesInterpretation of Penal Statutes
Interpretation of Penal Statutes
 
Air
AirAir
Air
 
Growth and role of electronic media in India
Growth and role of electronic media in IndiaGrowth and role of electronic media in India
Growth and role of electronic media in India
 

Similar to Impacts of Media Piracy and Anti-Piracy Efforts

Similar to Impacts of Media Piracy and Anti-Piracy Efforts (12)

Piracy Essay
Piracy EssayPiracy Essay
Piracy Essay
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
2010 US Congress on pirate states
2010 US Congress on pirate states2010 US Congress on pirate states
2010 US Congress on pirate states
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Piracy
PiracyPiracy
Piracy
 
Berkley Law Writing Competition
Berkley Law Writing CompetitionBerkley Law Writing Competition
Berkley Law Writing Competition
 
Intellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & StrategiesIntellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & Strategies
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Impacts of Media Piracy and Anti-Piracy Efforts

  • 1. Submitted to: Sir Waqar Malik Submitted by: Maryam Jamil,37 Zahida Malik,13 Amna Ashfaq,29 Maryam Yaseen,14
  • 2.  "Regardless of how the infringer sees it... piracy is theft of intellectual property and is no more justifiable than shoplifting, stealing cable service or other utilities. Developers invest time and money to develop a... product and deserve to make a fair profit - so they can develop new ...products. This is particularly crucial for small developers... whose survival depends on income from sales to a limited market“
  • 3.  "Pirated copyright goods shall mean any goods which are copies made without the consent of the rightholder or person duly authorised by the rightholder in the country of production and which are made directly or indirectly from an article where the making of that copy would have constituted an infringement of a copyright or a related right under the law of the country of importation"
  • 4.
  • 5.  The explosion of media piracy was galvanized by the invention of the MP3 format back in 1993. This format allowed the copying of CDs to computer devices, from which pirate CD replicas could then be produced. The MP3 format wasn't used as widely for piracy until the Napster website opened in 1999. This highly publicized site allowed users to trade and download musical files. Though Napster was eventually closed after the recording industry brought a number of lawsuits against it, a variety of peer-to-peer file services has since sprung up across the Net, making it easy to download media files illegally.
  • 6.  Print  Music  Films  Software  Internet (online)
  • 7.  Any unauthorized use of a copyrighted work, such as a book, school manual, journal article or sheet music, represents an infringement of copyright or a case of copyright piracy, unless covered by a copyright exception. Piracy of printed works affects both paper copies and works in digital format. In some developing countries, trade in pirated books often exceeds the legitimate market. Educational institutions represent a primary target market for pirates. Infringing activities include both illegal commercial photocopying and/or printing and reproduction of books and other printed material in digital form, as well as distribution in hard copy or digital format.
  • 8.  Music piracy includes both traditional unlawful use of music and unauthorized use of music on on-line communication networks.  Bootlegging (unauthorized recording and duplication of a live or broadcast performance)  Counterfeiting (unauthorized copying of the material support, labels, artwork and packaging) are the most widespread types of traditional music piracy.  The unauthorized uploading and making available to the public of music files or downloading such files from an Internet site is referred to as Internet or on-line piracy. On- line piracy may also include certain uses of "streaming" technologies.
  • 9.
  • 10. As in the case of music, film piracy is either traditional or done over the Internet. It includes, but is not limited to, videocassette and optical disc piracy, theatrical camcorder piracy, theatrical print theft, signal theft and broadcasting piracy, and on-line piracy.
  • 11.
  • 12.
  • 13. Software piracy refers to practices that involve the unauthorized copying of computer software.
  • 14.  The unauthorized downloading or distribution over the Internet of unauthorized copies of works such as movies, music, videogames and software is generally referred to as Internet or on-line piracy. Illicit downloads occur through file-sharing networks, illegal servers, websites and hacked computers. Hard goods pirates also use the Internet to sell illegally duplicated DVDs through auctions and websites.
  • 15.
  • 16.  Low level of public awareness  High consumer demand for cultural products  Misconceptions about piracy  Inefficient intellectual property protection and weak enforcement of rights  High cost of cultural goods  Difficulty of access to legitimate works  Considerable business profits for pirates
  • 17.
  • 18.  In the United States, as in many countries around the world, breaking copyright on media is illegal  If an individual breaks federal law regarding media piracy, she is liable to end up in court. Even a first-time offender can end up paying as much as $250,000 in fines, or face a maximum five years in jail. Copyright holders, like the Recording Industry Association of America, also have the ability to sue individuals, and can potentially be awarded as much as $150,000 for every copyrighted file distributed illegally.
  • 19.  Authorities responsible for enforcing the copyright law 1. Police- Section 74 (3) of the Copyright Law. 2. Federal Investigation Agency- Second Schedule of FIA Act of 1974. 3. Customs- Sections 58, 65A to 65C of the Copyright Law. 4. Judiciary- Civil/Criminal- Sections 59 to 77 of the Copyright Law. 5. Pakistan electronic Media Regulatory Authority (PEMRA)- PEMRA Ordinance 2007
  • 20.  Megaupload, a Hong-Kong based company, was a file sharing site founded by Kim Dotcom in 2005. Users could freely upload and download files from the site, but needed to pay a small sum to upgrade their access to "premium access" so as to have access to faster download speeds, no file limitations etc. However, the site was shut down on the 19 January 2012, after being accused of costing copyright holders of films, music and other content more than $500 million dollars in revenue by enabling millions of free downloads of these materials. Movie industry was complaining that the company was making money out of pirated material
  • 21.  One of the world's largest file sharing sites.  User base of at least a 150 million people around the world  So widely used that profits earned founder Kim Dotcom 42 million dollars in 2011  82,764,913 unique visitors  1,000,000,000 page views throughout history  25 petabytes of storage
  • 22.
  • 23.
  • 24. 1. Counterfeiting 2. Internet Piracy 3. End User Piracy 4. Client-Server Overuse 5. Hard-Disk Loading
  • 25.  This type of piracy is the illegal duplication, distribution and/or sale of copyrighted material with the intent of imitating the copyrighted product.
  • 26.  This occurs when software is downloaded from the Internet. The same purchasing rules apply to on-line software purchases as for those bought in compact disc format.
  • 27.  This occurs when an individual reproduces copies of software without authorization.
  • 28.  This type of piracy occurs when too many users on a network are using a central copy of a program at the same time
  • 29.  This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive.
  • 30.  Warning Sign 1. Prices that are too good to be true.  Auction Sites 1. Unbundled OEM and System Builder software 2. No box and manual on CD 3. No tech support 4. Key/serial number only 5. Disc only 6. CD-R/backup copy 7. Software delivered via e-mail 8. Software described as "cannot be registered" 9. Compilation - more than one program on a single CD  Spam 1. Be cautious of unsolicited spam that promotes Symantec/Norton branded software 2. File spam complaints with FTC 3. Visit sources of spam for more information on spam
  • 31. 1. Decrease in Sales of Legal Copies 2. Retail Price Effects of Piracy 3. Estimating the Amount of Piracy 4. The Expectation of Piracy 5. Non-profit Losses 6. A Past Piracy Problem  In June of 1996, the largest ever video piracy operation in the United States was dismantled in New York. The nationwide counterfeit business sold more than 100,000 pirated videos a week, grossing approximately $500,000. The investigation, dubbed “Operation Copy Cat”, culminated when search warrants were executed by the New York City Police Department, assisted by the MPAA, on 17 locations, including four labs. Authorities arrested 36 people and seized 817 VCRs, 77,641 pirated videos, $40,000 in case, 37,000 blank cassettes, more than 100,000 sleeves, labels and other sophisticated equipment used in the duplicating process. The economic impact on MPAA member companies is estimated to be more than $87 million a year.
  • 32.  There are two methods proposed by Peter Troost may help in the war on piracy. 1. build copy protection into an operating system 2. Meterware (superdistribution)
  • 33.  Even though anti-piracy organizations have made great strides in their fight, with the enormous growth of the Internet, current anti-piracy methods will not completely stop piracy.  The damage done to the industry and legitimate end user does not outweigh the few advantages that piracy does have. The chances of being caught, the fines, and the jail sentences are constantly increasing.  Organizations and industry need to come up with solutions to increase copyright protection, inform the uneducated, and negate the advantages that computer piracy has.