SlideShare a Scribd company logo
Software Piracy
Software piracy is the illegally using, copying and reselling of
software without the consent of the software creator
The unauthorized copying may be done for personal use or
business use.
Types
• 1. Soft Lifting
• 2. Hard Disk Loading
• 3. Renting
• 4. OEM Unbundling
• 5. Counterfeiting
• 6. Online Piracy
Soft Lifting
• means sharing a program with someone who is not authorized by the license
agreement to use it.
• A common form of soft lifting involves purchasing a single licensed copy
of software and then loading the software onto several computer
Hard Disk Loading
• Often committed by hardware dealers
• This form of piracy involves loading a unauthorized copy of software onto a
computer being sold to the end user
• To attract customers
Renting
• Renting involves someone renting out a copy of software for temporary use,
without the permission of the copyright holder.
• The practice, similar to that of renting a video from Blockbuster, violates the
license agreement of software.
OEM Unbundling
( Original Equipment Manufacturer Unbundling)
• means selling stand-alone software originally meant to be included with a
specific accompanying product.
• An example of this form of piracy is someone providing drivers to a specific
printer without authorization.
Counterfeiting
• means producing fake copies of software, making it look authentic.
• This involves providing the box, CDs, and manuals, all designed to look as
much like the original product as possible.
Online Piracy
• The fastest-growing form of piracy is Internet piracy.
• There are hundreds of thousands of "warez" sites providing unlimited
downloads to any user.
EFFECTS ON USERS
• 1. Lower productivity(that pirated software often includes incomplete or
damaged programs)
• 2. Malware Infection(Computer viruses can have a devastating impact on any
computer use)
• 3. Subject to raid
• 4. Unusual sufferings
RESPONCIBLITIES AS A USER
• to purchase only legitimate software products.
• When buying software, it is necessary to be sure to get genuine disks, manuals and
license documentation.
• When one purchases illegal or counterfeit copies, his money goes straight into the
pockets of software pirates .
• Buy from an authorized dealer
• Check the prices and ask for itemized quotations and receipts
• Call the software publisher
LAWS & PENALTIES
• Additional installation, distribution, or reproduction of the software in ways
that the license prohibits is a violation of federal copyright law.
• Any person(s) practicing or participating in any of these illegal acts can be
held liable.
• The laws varies over different regions.
• Generally punishment as fine up to a huge amount.
Syed Muhammad Shah
Gilgit Baltistan
https://www.slideshare.net/ashrafmath/s
oftware-piracy-15644828

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
Byerdavi
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
Texas Medical Liability Trust
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Pankaj Kumawat
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
Apostolos Syropoulos
 
Malware ppt
Malware pptMalware ppt
Malware ppt
Faiz Khan
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
PRANJAL SAIKIA
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similar to Piracy and Types

SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
pugazhendhiv2
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
Hunny Jummani
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Soft piracy
Soft piracySoft piracy
Soft piracy
Vibhor Raut
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine software
Jonathan Min
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
Rheigh Henley Calderon
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
Vi Tính Hoàng Nam
 
Installing and uninstalling computer software
Installing and uninstalling computer softwareInstalling and uninstalling computer software
Installing and uninstalling computer software
Vidya Kalaivani Rajkumar
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
RijuDasgupta
 
Introduction To Computing.pptx
Introduction To Computing.pptxIntroduction To Computing.pptx
Introduction To Computing.pptx
MARIVICJOYCLAMUCHA1
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
 
spyware
spyware spyware
spyware
maaza mohammed
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Software
SoftwareSoftware
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
wokk1d337
 
Foss for Health Care
Foss for Health CareFoss for Health Care
Foss for Health Care
Dr. Lasantha Ranwala
 
Software license
Software licenseSoftware license
Software license
sstothoff
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
Plus91 Technologies Pvt. Ltd.
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
travellingpolander
 

Similar to Piracy and Types (20)

SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine software
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Installing and uninstalling computer software
Installing and uninstalling computer softwareInstalling and uninstalling computer software
Installing and uninstalling computer software
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Introduction To Computing.pptx
Introduction To Computing.pptxIntroduction To Computing.pptx
Introduction To Computing.pptx
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
spyware
spyware spyware
spyware
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Software
SoftwareSoftware
Software
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Foss for Health Care
Foss for Health CareFoss for Health Care
Foss for Health Care
 
Software license
Software licenseSoftware license
Software license
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 

Recently uploaded

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 

Recently uploaded (20)

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 

Piracy and Types

  • 1.
  • 2. Software Piracy Software piracy is the illegally using, copying and reselling of software without the consent of the software creator The unauthorized copying may be done for personal use or business use.
  • 3. Types • 1. Soft Lifting • 2. Hard Disk Loading • 3. Renting • 4. OEM Unbundling • 5. Counterfeiting • 6. Online Piracy
  • 4. Soft Lifting • means sharing a program with someone who is not authorized by the license agreement to use it. • A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computer
  • 5. Hard Disk Loading • Often committed by hardware dealers • This form of piracy involves loading a unauthorized copy of software onto a computer being sold to the end user • To attract customers
  • 6. Renting • Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder. • The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software.
  • 7. OEM Unbundling ( Original Equipment Manufacturer Unbundling) • means selling stand-alone software originally meant to be included with a specific accompanying product. • An example of this form of piracy is someone providing drivers to a specific printer without authorization.
  • 8. Counterfeiting • means producing fake copies of software, making it look authentic. • This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible.
  • 9. Online Piracy • The fastest-growing form of piracy is Internet piracy. • There are hundreds of thousands of "warez" sites providing unlimited downloads to any user.
  • 10. EFFECTS ON USERS • 1. Lower productivity(that pirated software often includes incomplete or damaged programs) • 2. Malware Infection(Computer viruses can have a devastating impact on any computer use) • 3. Subject to raid • 4. Unusual sufferings
  • 11. RESPONCIBLITIES AS A USER • to purchase only legitimate software products. • When buying software, it is necessary to be sure to get genuine disks, manuals and license documentation. • When one purchases illegal or counterfeit copies, his money goes straight into the pockets of software pirates . • Buy from an authorized dealer • Check the prices and ask for itemized quotations and receipts • Call the software publisher
  • 12. LAWS & PENALTIES • Additional installation, distribution, or reproduction of the software in ways that the license prohibits is a violation of federal copyright law. • Any person(s) practicing or participating in any of these illegal acts can be held liable. • The laws varies over different regions. • Generally punishment as fine up to a huge amount.
  • 13. Syed Muhammad Shah Gilgit Baltistan https://www.slideshare.net/ashrafmath/s oftware-piracy-15644828