SlideShare a Scribd company logo
1 of 33
Презентация
по теме:
Компьютерное пиратство
Презентацию подготовил:
Абдурахманов Эмин Исламович (BM-102)
1
 Компьютерное пиратство — это незаконное
использование, копирование и перепродажа
программного обеспечения без согласия
создателя программного обеспечения.
 Несанкционированное копирование может быть
выполнено для личного или коммерческого
использования.
2
1. Soft Lifting
2. Hard Disk Loading
3. Renting
4. OEM Unbundling
5. Counterfeiting
6. Онлайн-пиратcтво[2]
3
Soft Lifting
 means sharing a program with someone who is not
authorized by the license agreement to use it.
 Also known as soft loading/end-user piracy.
 A common form of soft lifting involves purchasing
a single licensed copy of software and then loading
the software onto several computers
4
Hard Disk Loading
 Often committed by hardware dealers
 This form of piracy involves loading a unauthorized
copy of software onto a computer being sold to the end
user
 To attract customers
5
Renting
 Renting involves someone renting out a copy of
software for temporary use, without the permission
of the copyright holder.
 The practice, similar to that of renting a video from
Blockbuster, violates the license agreement of
software.
6
OEM Unbundling
 Original Equipment Manufacturer Unbundling
 means selling stand-alone software originally
meant to be included with a specific
accompanying product.
 An example of this form of piracy is someone
providing drivers to a specific printer without
authorization.
7
Counterfeiting
 means producing fake copies of software, making it
look authentic.
 This involves providing the box, CDs, and manuals,
all designed to look as much like the original
product as possible.
8
Online Piracy
 The fastest-growing form of piracy is
Internet piracy.
 There are hundreds of thousands of "warez"
sites providing unlimited downloads to any
user.
9
 Expensive
 Availability
 Not convenient to buy for each computer
 Ask to buy new version although having
original one
 The CD/backup damaged
10
1. Lower productivity
2. Malware Infection
3. Subject to raid
11
Lower productivity
 Pirated software often
includes incomplete or
damaged programs
12
Malware Infection
 Pirated software can also include computer viruses
(malware) which can destroy data on a user’s hard
drive.
 Computer viruses can have a devastating impact on
any computer user -- from the home user to a
large business.
13
Subject to raid
 Companies can also be subject to raids by
the SIIA (Software & Information Industry
Association).
14
Distribution Methods
 Pirated material is distributed in two ways.
◦ Unknowing consumers buy pirated items.
◦ Others buy pirated items knowing they are
pirated.
15
Revenue Diverson
 Piracy diverts money away from producers
and distributors of items such as audio
recordings, making those companies who
make an investment in production and
distribution less profitable.
16
Tax Revenues
 Except in the case where pirated items are sold
through retail channels and taxed, tax revenue
is not generated from pirated items.
 For example, when music is downloaded with
no tax charged when it is supposed to be, as
dictated by tax laws, that revenue is lost as
well. Lost tax revenue reduces funds available
by the taxing government to spend.
17
Lessening Piracy
 To lessen the effect of piracy on a
business, businesses can implement
methods to discourage software piracy,
such as changes to how software is
distributed to make it harder to download.
 Another way to lessen piracy is to educate
the public about the impact of piracy on
their lives. [6]
18
 Purchase only legitimate software products.
 When buying software, it is necessary to be sure to get
genuine disks, manuals and license documentation.
 When one purchases illegal or counterfeit copies, his
money goes straight into the pockets of software
pirates .
 Buy from an authorized dealer.
 Check the prices and ask for receipts.
19
PUBLIC DOMAIN SOFTWARE
 These software are not under the copyright act.
They are free programs & can be used w/o
restrictions. It means the user of the software can
copy, distribute & even modify the software.
20
FREEWARE
 It is a copyright software which is given free by its author.
The user of the software redistribute the software but
cannot be modified by the end user. It also covers
1. Donation ware : A donation is required by the author or
to the 3rd party from the user of the software
2. Postcard ware : The user has to send a post card to the
creator of the software.
3. Abandon ware : The abandoned software are in this
category.
4. Ad ware : To promote the s/w as advertisement the
software’s are given free of cost. 21
SHAREWARE SOFTWARE
 Shareware or trialware is the software, which
comes with the permission for the people to
redistribute copies for a limited period. So far a
continues use of the software one have to pay for
the software.
 E.g. Winzip
22
COMMERCIAL SOFTWARE
 These are the software purchased from the
software publishers. It is available in stores & has
some objective to fulfill.
 E.g. Windows software, Ms Office etc.
23
OPEN SOURCE SOFTWARE
 These are created by generous programmers &
related to the public use. The programming code is
available to the users so that they can read it and
make changes according to their use & needs. They
can build the new versions of the software by using
the same code.
 E.g. Linux software.
24
PROPRIETY SOFTWARE
 It describes a technology or product that is owned
exclusively by a single company that carefully
guards the knowledge about the technology and
the product internal working. Some proprietary
product can function when used with other
products owned by some other company.
 E.g. Acrobat reader PDF (Portable document
format).
25
FIRM WARE SOFTWARE
 It is a combination of the software and h/w which
is permanently stored in the memory. It is a
program or data that has been written onto ROM.
26
 In India, the copyright of computer software is
protected under the Indian Copyright Act of 1957.
 The minimum jail term for software copyright
infringement(violation of law) is seven days and the
maximum jail term is three years.
 Fines range from a minimum of 50,000 to a
maximum of 200,000 rupees.
27
BSA
(Business Software Alliance)
 It established in 1988 and
representing a number of
the world's largest software
makers
 Its principal activity is trying
to stop copyright
infringement of software
produced by its members.
28
SIIA
(Software & Information Industry
Association)
 It offers global services in
business development,
government relations,
corporate education, and
intellectual property protection
to companies
 It also advocates a legal and
regulatory environment that
benefits the entire industry.
29
CAAST
(Canadian Alliance Against
Software Theft )
 Its mission statement is to
"reduce software piracy in
Canada through
education, public policy
and enforcement.”
 The CAAST was
established in 1990.
30
FAST
(Federation Against Software
Theft)
 It was set up in 1984 by the
British Computer Society's
Copyright Committee, and was
the first software copyright
organization in the U.K.
 Its first action was to raise the
awareness of software piracy
31
[1]Laurie E. MacDonald, Kenneth T. Fougere, Bryant College, Smithfield,
“Software Piracy: A Study of the Extent Of Coverage in Introductory MIS
Textbooks,” Journal of Information Systems Education, vol. 13, no. 4.
[2]http://cs.stanford.edu/people/eroberts/cs181/projects/software-
piracy/types.html
[3] http://www.ehow.com/list_6810994_software-piracy-laws-india.html
[4] http://whatis.techtarget.com/definition/piracy
[5] http://www.computerhope.com/jargon/s/softpira.htm
[6] http://smallbusiness.chron.com/effect-piracy-business-24541.html
[7]http://in.mathworks.com/company/aboutus/policies_statements/pirac
y.html
[8] www.fast.org.uk
[9] www.bsa.org
[10] www.caast.org
[11] www.siia.net
32
33

More Related Content

Similar to пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk

Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensingtravellingpolander
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian EducationSourav Biswas
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...CSCJournals
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxpugazhendhiv2
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engFitira
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chipbrian9p
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chipbrian9p
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GISJoanne Cook
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of softwareBurhan Ahmed
 

Similar to пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk (20)

Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
 
14. application software
14. application software14. application software
14. application software
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 eng
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
Software piracy Grade 6
Software piracy Grade 6Software piracy Grade 6
Software piracy Grade 6
 

Recently uploaded

Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceanilsa9823
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
 
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...robinsonayot
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girlsshivangimorya083
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfExperience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfSoham Mondal
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)Soham Mondal
 

Recently uploaded (20)

Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
 
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
 
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfExperience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)
 

пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk

  • 1. Презентация по теме: Компьютерное пиратство Презентацию подготовил: Абдурахманов Эмин Исламович (BM-102) 1
  • 2.  Компьютерное пиратство — это незаконное использование, копирование и перепродажа программного обеспечения без согласия создателя программного обеспечения.  Несанкционированное копирование может быть выполнено для личного или коммерческого использования. 2
  • 3. 1. Soft Lifting 2. Hard Disk Loading 3. Renting 4. OEM Unbundling 5. Counterfeiting 6. Онлайн-пиратcтво[2] 3
  • 4. Soft Lifting  means sharing a program with someone who is not authorized by the license agreement to use it.  Also known as soft loading/end-user piracy.  A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computers 4
  • 5. Hard Disk Loading  Often committed by hardware dealers  This form of piracy involves loading a unauthorized copy of software onto a computer being sold to the end user  To attract customers 5
  • 6. Renting  Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder.  The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software. 6
  • 7. OEM Unbundling  Original Equipment Manufacturer Unbundling  means selling stand-alone software originally meant to be included with a specific accompanying product.  An example of this form of piracy is someone providing drivers to a specific printer without authorization. 7
  • 8. Counterfeiting  means producing fake copies of software, making it look authentic.  This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible. 8
  • 9. Online Piracy  The fastest-growing form of piracy is Internet piracy.  There are hundreds of thousands of "warez" sites providing unlimited downloads to any user. 9
  • 10.  Expensive  Availability  Not convenient to buy for each computer  Ask to buy new version although having original one  The CD/backup damaged 10
  • 11. 1. Lower productivity 2. Malware Infection 3. Subject to raid 11
  • 12. Lower productivity  Pirated software often includes incomplete or damaged programs 12
  • 13. Malware Infection  Pirated software can also include computer viruses (malware) which can destroy data on a user’s hard drive.  Computer viruses can have a devastating impact on any computer user -- from the home user to a large business. 13
  • 14. Subject to raid  Companies can also be subject to raids by the SIIA (Software & Information Industry Association). 14
  • 15. Distribution Methods  Pirated material is distributed in two ways. ◦ Unknowing consumers buy pirated items. ◦ Others buy pirated items knowing they are pirated. 15
  • 16. Revenue Diverson  Piracy diverts money away from producers and distributors of items such as audio recordings, making those companies who make an investment in production and distribution less profitable. 16
  • 17. Tax Revenues  Except in the case where pirated items are sold through retail channels and taxed, tax revenue is not generated from pirated items.  For example, when music is downloaded with no tax charged when it is supposed to be, as dictated by tax laws, that revenue is lost as well. Lost tax revenue reduces funds available by the taxing government to spend. 17
  • 18. Lessening Piracy  To lessen the effect of piracy on a business, businesses can implement methods to discourage software piracy, such as changes to how software is distributed to make it harder to download.  Another way to lessen piracy is to educate the public about the impact of piracy on their lives. [6] 18
  • 19.  Purchase only legitimate software products.  When buying software, it is necessary to be sure to get genuine disks, manuals and license documentation.  When one purchases illegal or counterfeit copies, his money goes straight into the pockets of software pirates .  Buy from an authorized dealer.  Check the prices and ask for receipts. 19
  • 20. PUBLIC DOMAIN SOFTWARE  These software are not under the copyright act. They are free programs & can be used w/o restrictions. It means the user of the software can copy, distribute & even modify the software. 20
  • 21. FREEWARE  It is a copyright software which is given free by its author. The user of the software redistribute the software but cannot be modified by the end user. It also covers 1. Donation ware : A donation is required by the author or to the 3rd party from the user of the software 2. Postcard ware : The user has to send a post card to the creator of the software. 3. Abandon ware : The abandoned software are in this category. 4. Ad ware : To promote the s/w as advertisement the software’s are given free of cost. 21
  • 22. SHAREWARE SOFTWARE  Shareware or trialware is the software, which comes with the permission for the people to redistribute copies for a limited period. So far a continues use of the software one have to pay for the software.  E.g. Winzip 22
  • 23. COMMERCIAL SOFTWARE  These are the software purchased from the software publishers. It is available in stores & has some objective to fulfill.  E.g. Windows software, Ms Office etc. 23
  • 24. OPEN SOURCE SOFTWARE  These are created by generous programmers & related to the public use. The programming code is available to the users so that they can read it and make changes according to their use & needs. They can build the new versions of the software by using the same code.  E.g. Linux software. 24
  • 25. PROPRIETY SOFTWARE  It describes a technology or product that is owned exclusively by a single company that carefully guards the knowledge about the technology and the product internal working. Some proprietary product can function when used with other products owned by some other company.  E.g. Acrobat reader PDF (Portable document format). 25
  • 26. FIRM WARE SOFTWARE  It is a combination of the software and h/w which is permanently stored in the memory. It is a program or data that has been written onto ROM. 26
  • 27.  In India, the copyright of computer software is protected under the Indian Copyright Act of 1957.  The minimum jail term for software copyright infringement(violation of law) is seven days and the maximum jail term is three years.  Fines range from a minimum of 50,000 to a maximum of 200,000 rupees. 27
  • 28. BSA (Business Software Alliance)  It established in 1988 and representing a number of the world's largest software makers  Its principal activity is trying to stop copyright infringement of software produced by its members. 28
  • 29. SIIA (Software & Information Industry Association)  It offers global services in business development, government relations, corporate education, and intellectual property protection to companies  It also advocates a legal and regulatory environment that benefits the entire industry. 29
  • 30. CAAST (Canadian Alliance Against Software Theft )  Its mission statement is to "reduce software piracy in Canada through education, public policy and enforcement.”  The CAAST was established in 1990. 30
  • 31. FAST (Federation Against Software Theft)  It was set up in 1984 by the British Computer Society's Copyright Committee, and was the first software copyright organization in the U.K.  Its first action was to raise the awareness of software piracy 31
  • 32. [1]Laurie E. MacDonald, Kenneth T. Fougere, Bryant College, Smithfield, “Software Piracy: A Study of the Extent Of Coverage in Introductory MIS Textbooks,” Journal of Information Systems Education, vol. 13, no. 4. [2]http://cs.stanford.edu/people/eroberts/cs181/projects/software- piracy/types.html [3] http://www.ehow.com/list_6810994_software-piracy-laws-india.html [4] http://whatis.techtarget.com/definition/piracy [5] http://www.computerhope.com/jargon/s/softpira.htm [6] http://smallbusiness.chron.com/effect-piracy-business-24541.html [7]http://in.mathworks.com/company/aboutus/policies_statements/pirac y.html [8] www.fast.org.uk [9] www.bsa.org [10] www.caast.org [11] www.siia.net 32
  • 33. 33

Editor's Notes

  1. It is the copying and reuse of software by large corporations. It is copying software and distributing it on the Web.
  2. It is not for commercial purpose
  3. It is for commercial purpose
  4. warez Commercial software that has been pirated and made available to the public via a BBS or the Internet.
  5. Lessening Piracy To lessen the effect of piracy on a business, businesses can implement methods to discourage software piracy, such as changes to how software is distributed to make it harder to download. Another way to lessen piracy is to educate the public about the impact of piracy on their lives. For example, piracy causes items to be more expensive because a company does not realize the income it is entitled to and has to charge higher prices for its products to make up for lost revenue.[6]
  6. Constraints of Open Source Software Quality Not user friendly Rapid change Documentation Lack of focus on UI
  7. Copyright protection for software with an individual author lasts for the duration of the author's life and continues 60 years after the author's death. Government agencies such as the Ministry of Information Technology and the Ministry of Human Resource Development have played an active role in aiding the Indian law enforcement authorities in protecting software copyright holders.
  8. MathWorks is a member of the Business Software Alliance (BSA), a global organization formed to advance free and open world transfer for legitimate software by advocating strong intellectual property protection. The BSA represents leading software and e-commerce developers in 65 countries. For more information about the BSA or to report software piracy, visit the BSA Web site at www.bsa.org.
  9. The Software & Information Industry Association (SIIA) is a trade organization for the software and digital content industry. SIIA offers global services in business development, government relations, corporate education, and intellectual property protection to companies. It also advocates a legal and regulatory environment that benefits the entire industry. For more information about SIIA or to report software piracy, visit the SIIA Web site at www.siia.net.
  10. The Canadian Alliance Against Software Theft (CAAST) is an industry alliance of software manufacturers that share the common goal of reducing software piracy. CAAST provides educational information to corporations, consumers, academic institutions, and resellers about software theft and its implications. CAAST works with BSA. For more information about CAAST or to report software piracy, vast the CAAST Web site at www.caast.org or call the hotline (from Canada only) at 800-263-9700.
  11. The Federation Against Software Theft was set up in 1984 by the British Computer Society's Copyright Committee, and was the first software copyright organization in the U.K. Its first action was to raise the awareness of software piracy and to lobby the U.K. Parliament for changes in the Copyright Act of 1956 to reflect the needs of software authors and publishers. This campaign was successful, and FAST has since been able to influence other legislation that impacts the proper safeguarding of software. The work of FAST in this area has directly influenced the way software copyright law and investigations are carried out in many other countries. To learn more, visit www.fastiis.org.