SlideShare a Scribd company logo
SOFTWARE PIRACY
BY:- TIWARI AKHIL
BCA SEM-VI
What is software piracy?
 Software piracy is the unauthorized copying or
distribution of copyrighted software.
 Software piracy can be done by copying, downloading,
sharing, selling or installing multiple copies of
software onto personal or work computers.
 If you make more copies of the software or install the
software more times than the license permits, upload
software code to a website so that others can download
and use it, share software license codes or activation
keys, or in some cases, share your user ID and
password for a web-based software application (‘cloud’
computing), you are pirating software and breaking
the law.
Examples of software piracy include:-
Distributing software or mobile apps from the Internet
in a manner that violates the license terms
Buying a single copy of a software program and
installing it without authorization on multiple devices
Making and/or sharing copies of installation CDs
Sharing the login credentials (without authorization)
used to access a web-based software application
(“Software as a Service”)
Top 10 Most Pirated Software
of 2017
 Microsoft Office
 Adobe Photoshop
 Windows 10
 Adobe Premiere
 Final Cut Pro
 Adobe Illustrator
 Ableton Live
 Windows 7 (Why?)
 Avast
 Sony Vegas
TYPES OF SOFTWARE PIRACY
 1. Soft Lifting
 2. Hard Disk Loading
 3. Renting
 4. OEM Unbundling
 5. Counterfeiting
 6. Online Piracy
 1. Soft Lifting
 Means sharing a program with someone who is
not authorized by the license agreement to use it.
 Also known as soft loading.
 A common form of soft lifting involves
purchasing a single licensed copy of software and
then loading the software onto several computers
2. Hard Disk Loading
 Often committed by hardware dealers
 This form of piracy involves loading an unauthorized
copy of software onto a computer being sold to the end
user.
 To attract customers
 3. Renting
 Renting involves someone renting out a copy of
software for temporary use, without the permission of
the copyright holder.
 The practice, similar to that of renting a video from
Blockbuster, violates the license agreement of
software.
4. OEM Unbundling
Means selling stand-alone software originally meant to
be included with a specific product.
 An example of this form of piracy is someone
providing drivers to a specific printer without
authorization.
5. Counterfeiting
 Means producing fake copies of software, making it
look authentic.
 This involves providing the box, CDs, and manuals, all
designed to look as much like the original product as
possible.
6. Online Piracy
 The fastest-growing form of piracy is Internet piracy.
 There are hundreds of thousands of "warez" sites
providing unlimited downloads to any user.
Effects of Piracy
On the Industry
 Reduces profits for the software developer.
 Reduces development money for future
products.
On the Pirate
 Expense, embarrassment, ethically wrong.
 Fines up to $250,000.
 Jail sentence of up to 5 years.
 payment of legal fees.
Simple steps to avoid piracy
 Buy from an authorized dealer.
 Understand what it is you are buying.
 Check the prices and ask for receipts.
 Be sure you are given a license.
 Retain the original media.
 Call the software publisher.
CONCLUSION
 Software piracy is theft of intellectual property.
 Developers invest time and money to develop a
product and deserve to make a fair profit, so they can
develop new products in future.
 The damage done to the industry and legitimate end
users does not balance the few advantages that piracy
does have.
Software piracy

More Related Content

What's hot

Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
kiran yadav
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
Naren Naren
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
System security
System securitySystem security
System security
invertis university
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 

What's hot (20)

Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Piracy
PiracyPiracy
Piracy
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
System security
System securitySystem security
System security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 

Similar to Software piracy

Soft piracy
Soft piracySoft piracy
Soft piracy
Vibhor Raut
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
Hunny Jummani
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
wokk1d337
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
brian9p
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
brian9p
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
RijuDasgupta
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
travellingpolander
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
pugazhendhiv2
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
Vi Tính Hoàng Nam
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine softwareJonathan Min
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athira
athiravm
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
CSCJournals
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
ManojKhan7
 

Similar to Software piracy (20)

Soft piracy
Soft piracySoft piracy
Soft piracy
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine software
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athira
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 

Software piracy

  • 1. SOFTWARE PIRACY BY:- TIWARI AKHIL BCA SEM-VI
  • 2. What is software piracy?  Software piracy is the unauthorized copying or distribution of copyrighted software.  Software piracy can be done by copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.  If you make more copies of the software or install the software more times than the license permits, upload software code to a website so that others can download and use it, share software license codes or activation keys, or in some cases, share your user ID and password for a web-based software application (‘cloud’ computing), you are pirating software and breaking the law.
  • 3. Examples of software piracy include:- Distributing software or mobile apps from the Internet in a manner that violates the license terms Buying a single copy of a software program and installing it without authorization on multiple devices Making and/or sharing copies of installation CDs Sharing the login credentials (without authorization) used to access a web-based software application (“Software as a Service”)
  • 4.
  • 5. Top 10 Most Pirated Software of 2017  Microsoft Office  Adobe Photoshop  Windows 10  Adobe Premiere  Final Cut Pro  Adobe Illustrator  Ableton Live  Windows 7 (Why?)  Avast  Sony Vegas
  • 6. TYPES OF SOFTWARE PIRACY  1. Soft Lifting  2. Hard Disk Loading  3. Renting  4. OEM Unbundling  5. Counterfeiting  6. Online Piracy
  • 7.  1. Soft Lifting  Means sharing a program with someone who is not authorized by the license agreement to use it.  Also known as soft loading.  A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computers
  • 8. 2. Hard Disk Loading  Often committed by hardware dealers  This form of piracy involves loading an unauthorized copy of software onto a computer being sold to the end user.  To attract customers
  • 9.  3. Renting  Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder.  The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software.
  • 10. 4. OEM Unbundling Means selling stand-alone software originally meant to be included with a specific product.  An example of this form of piracy is someone providing drivers to a specific printer without authorization.
  • 11. 5. Counterfeiting  Means producing fake copies of software, making it look authentic.  This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible.
  • 12.
  • 13. 6. Online Piracy  The fastest-growing form of piracy is Internet piracy.  There are hundreds of thousands of "warez" sites providing unlimited downloads to any user.
  • 14. Effects of Piracy On the Industry  Reduces profits for the software developer.  Reduces development money for future products. On the Pirate  Expense, embarrassment, ethically wrong.  Fines up to $250,000.  Jail sentence of up to 5 years.  payment of legal fees.
  • 15. Simple steps to avoid piracy  Buy from an authorized dealer.  Understand what it is you are buying.  Check the prices and ask for receipts.  Be sure you are given a license.  Retain the original media.  Call the software publisher.
  • 16. CONCLUSION  Software piracy is theft of intellectual property.  Developers invest time and money to develop a product and deserve to make a fair profit, so they can develop new products in future.  The damage done to the industry and legitimate end users does not balance the few advantages that piracy does have.