SlideShare a Scribd company logo
1 of 18
C.K. PITHAWALLA COLLEGE OF
ENGINEERING & TECHNOLOGY
TOPIC : Copyright infringement of software
Submitted By :
GROUP : 1
NAME ENROLL NO
Hunny Jummani 140090107014
Purvi Mehta 140090107024
Dhwani Parikh 140090107027
Guided By:
Prof.
Sushma
Prajapati
Mr.
Rakesh
Katariya
Mr.
Hemil
Patel
COPYRIGHT INFRINGEMENT
OF SOFTWARE:..
• Copyright infringement of software (also called
software piracy) refers to the illegal copying of
software, music or films or the spread of these
things on the Internet.
• Copying movies is also called bootlegging.
WHAT IS SOFTWARE PIRACY,
EXACTLY?
• It is the unauthorized duplication, distribution or
use of computer software .
• For example, making more copies of software than the
license allows, or installing software licensed for one
computer onto multiple computers or a server.
• Copying software is an act of copyright
infringement, and is subject to civil and criminal
penalties. It's illegal whether you use the copied
software yourself, give it away, or sell it.
• And aiding piracy by providing unauthorized
access to software or to serial numbers used to
register software can also be illegal.
HOW TO DISTINGUISH
COPYRIGHT INFRINGEMENT OF
SOFTWARE?
• Copyright infringement of software often have
those features.
• Can't offer a legal copyright certificate.
• Can't offer after-sales service.
• At low price
• Can't upgrade
REASONS TO SOFTWARE
INFRINGEMENT:
• Very often, the people making the laws have to
make a trade-off between allowing people to copy
and use the content, and the copyright holders
charging for the content.
• At the same time, even not allowed distribution
makes the content more popular.
• Because of these two reasons, infringement of
copyright for proprietary software and content can
be bad also for free software and content.
ACTIVITIES THAT MAY
CONSTITUTE INFRINGEMENT:..
• Creating a copy and/or selling it.
• Creating a copy and giving it to someone else.
• Creating a copy to serve as a backup.
• Renting the original software.
6
ACTS :..
• In India , the copyright of computer software is
protected under the Indian copyright Act of 1957.
• Government Agencies such as Ministry Of Information
Technology And The Ministry Of Human Resource
Development have played an active role in aiding the
Indian Law Enforcement authorities in protecting
software copyright holders.
• Minimum jail term for software copyright infringement
is 7 days and maximum is three years.
• Sections of The IT Act , 2000 can also be applied based
on scenario of piracy.
TYPES:..
• 1. End User Piracy:
• This occurs when a company employee reproduces
copies of software without authorization. End user piracy
can take the following forms:
• Using one licensed copy to install a program on
multiple computers;
• Eg.
• MS OFFICE 16
• 2. Client-Server Overuse:
• This type of piracy occurs when too many employees on
a network are using a central copy of a program at the
same time.
• Possible only in LAN network .
• 3. Internet Piracy:
• This occurs when software is downloaded from
the Internet.
• Eg.
• TORRENT(µ)
• Pirate websites that make software available for free
download or in exchange for uploaded programs.
• 4. Hard-Disk Loading:
• This occurs when a business who sells new
computers loads illegal copies of software onto the
hard disks to make the purchase of the machines
more attractive.
STATS:..
• China is the world's largest producer of pirated
products, including software. The Business
Software Alliance estimates that in 2006 82% of
the PC software used in China was pirated.
• India ranks 43rd in the world at 69% of Software
piracy rate.
10
LAWS:..
• The law says that anyone who purchases a software
copy has the right to load that copy onto a single
computer and to make another copy “for archival
purposes only”.
• It is illegal to use that software on more than one
computer or to make or distribute copies of that
software
• for other purposes unless permission has been
obtained from the copyright owner. Software piracy
is a federal offense and constitutes copyright
infringement, regardless of whether it is used for
sale, free distribution, or personal use.
11
THE EFFECTS OF COPYRIGHT
INFRINGEMENT:..
• Software piracy is illegal due to the potential
economic loss that it inflicts on the copyright
owner.
• Software authors suggest that copyright
infringement negatively affects the economy by
decreasing the profits that allow for further
development and growth within the software
industry.
• The Indonesia is the country most affected, as they
provide about 84% of the world's software.
12
EXAMPLE OF A PIRATED
PRODUCT:..
13
•The picture shows a
pirated copy of windows
vista operating system.
This software is worth
about Rs 10,000 , which is
sold at few hundreds at a
gray market.
ADVANTAGES OF
SOFTWARE
INFRINGEMENT:..• Cost:
• Pirated software costs nothing, or close to
nothing, to obtain.
• Easy to Acquire:
• Pirated software is extremely easy to find,
whether online, or sold openly in foreign
countries, or simply provided by friends. In
fact, in many cases, it easier for someone to
go online and download an illegal copy of a
software program than to drive to a store and
buy it from a retailer.
• Anonymity:
• Pirating software is a crime that can be
committed without leaving one's house, or even
interacting with any person. Thus, it is very
tempting to commit this "victimless" crime.
• Profit:
• Although most software pirates do not profit
directly from pirating software, the temptation
to make money by selling illegal programs is
strong. All one needs to become a software
pirate is a CD burner, which now cost as little .
DISADVANTAGES OF
SOFTWARE
INFRINGEMENT:..
• It is Illegal
• It is Risky
• It is Unproductive
COST:..
THANK YOU!!!

More Related Content

What's hot

Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxanbersattar
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxanbersattar
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 

What's hot (20)

Software piracy Grade 6
Software piracy Grade 6Software piracy Grade 6
Software piracy Grade 6
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Computer security
Computer securityComputer security
Computer security
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 

Viewers also liked

copyright act with case study
copyright act with case studycopyright act with case study
copyright act with case studyRajveer Choudhary
 
Sample copyright case study
Sample copyright case studySample copyright case study
Sample copyright case studyMark Lushenko
 
Apple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdfApple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdfManojkumar S
 

Viewers also liked (6)

Estimulación temprana
Estimulación temprana Estimulación temprana
Estimulación temprana
 
Microsoft vs Apple
Microsoft vs AppleMicrosoft vs Apple
Microsoft vs Apple
 
Apple vs Microsoft
Apple vs MicrosoftApple vs Microsoft
Apple vs Microsoft
 
copyright act with case study
copyright act with case studycopyright act with case study
copyright act with case study
 
Sample copyright case study
Sample copyright case studySample copyright case study
Sample copyright case study
 
Apple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdfApple vs microsoft lawsuit.pdf
Apple vs microsoft lawsuit.pdf
 

Similar to Copyright infringement risks in software piracy

swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfRijuDasgupta
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkwokk1d337
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensingtravellingpolander
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxpugazhendhiv2
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 

Similar to Copyright infringement risks in software piracy (20)

swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 

Recently uploaded

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 

Copyright infringement risks in software piracy

  • 1. C.K. PITHAWALLA COLLEGE OF ENGINEERING & TECHNOLOGY TOPIC : Copyright infringement of software Submitted By : GROUP : 1 NAME ENROLL NO Hunny Jummani 140090107014 Purvi Mehta 140090107024 Dhwani Parikh 140090107027 Guided By: Prof. Sushma Prajapati Mr. Rakesh Katariya Mr. Hemil Patel
  • 2. COPYRIGHT INFRINGEMENT OF SOFTWARE:.. • Copyright infringement of software (also called software piracy) refers to the illegal copying of software, music or films or the spread of these things on the Internet. • Copying movies is also called bootlegging.
  • 3. WHAT IS SOFTWARE PIRACY, EXACTLY? • It is the unauthorized duplication, distribution or use of computer software . • For example, making more copies of software than the license allows, or installing software licensed for one computer onto multiple computers or a server. • Copying software is an act of copyright infringement, and is subject to civil and criminal penalties. It's illegal whether you use the copied software yourself, give it away, or sell it. • And aiding piracy by providing unauthorized access to software or to serial numbers used to register software can also be illegal.
  • 4. HOW TO DISTINGUISH COPYRIGHT INFRINGEMENT OF SOFTWARE? • Copyright infringement of software often have those features. • Can't offer a legal copyright certificate. • Can't offer after-sales service. • At low price • Can't upgrade
  • 5. REASONS TO SOFTWARE INFRINGEMENT: • Very often, the people making the laws have to make a trade-off between allowing people to copy and use the content, and the copyright holders charging for the content. • At the same time, even not allowed distribution makes the content more popular. • Because of these two reasons, infringement of copyright for proprietary software and content can be bad also for free software and content.
  • 6. ACTIVITIES THAT MAY CONSTITUTE INFRINGEMENT:.. • Creating a copy and/or selling it. • Creating a copy and giving it to someone else. • Creating a copy to serve as a backup. • Renting the original software. 6
  • 7. ACTS :.. • In India , the copyright of computer software is protected under the Indian copyright Act of 1957. • Government Agencies such as Ministry Of Information Technology And The Ministry Of Human Resource Development have played an active role in aiding the Indian Law Enforcement authorities in protecting software copyright holders. • Minimum jail term for software copyright infringement is 7 days and maximum is three years. • Sections of The IT Act , 2000 can also be applied based on scenario of piracy.
  • 8. TYPES:.. • 1. End User Piracy: • This occurs when a company employee reproduces copies of software without authorization. End user piracy can take the following forms: • Using one licensed copy to install a program on multiple computers; • Eg. • MS OFFICE 16 • 2. Client-Server Overuse: • This type of piracy occurs when too many employees on a network are using a central copy of a program at the same time. • Possible only in LAN network .
  • 9. • 3. Internet Piracy: • This occurs when software is downloaded from the Internet. • Eg. • TORRENT(µ) • Pirate websites that make software available for free download or in exchange for uploaded programs. • 4. Hard-Disk Loading: • This occurs when a business who sells new computers loads illegal copies of software onto the hard disks to make the purchase of the machines more attractive.
  • 10. STATS:.. • China is the world's largest producer of pirated products, including software. The Business Software Alliance estimates that in 2006 82% of the PC software used in China was pirated. • India ranks 43rd in the world at 69% of Software piracy rate. 10
  • 11. LAWS:.. • The law says that anyone who purchases a software copy has the right to load that copy onto a single computer and to make another copy “for archival purposes only”. • It is illegal to use that software on more than one computer or to make or distribute copies of that software • for other purposes unless permission has been obtained from the copyright owner. Software piracy is a federal offense and constitutes copyright infringement, regardless of whether it is used for sale, free distribution, or personal use. 11
  • 12. THE EFFECTS OF COPYRIGHT INFRINGEMENT:.. • Software piracy is illegal due to the potential economic loss that it inflicts on the copyright owner. • Software authors suggest that copyright infringement negatively affects the economy by decreasing the profits that allow for further development and growth within the software industry. • The Indonesia is the country most affected, as they provide about 84% of the world's software. 12
  • 13. EXAMPLE OF A PIRATED PRODUCT:.. 13 •The picture shows a pirated copy of windows vista operating system. This software is worth about Rs 10,000 , which is sold at few hundreds at a gray market.
  • 14. ADVANTAGES OF SOFTWARE INFRINGEMENT:..• Cost: • Pirated software costs nothing, or close to nothing, to obtain. • Easy to Acquire: • Pirated software is extremely easy to find, whether online, or sold openly in foreign countries, or simply provided by friends. In fact, in many cases, it easier for someone to go online and download an illegal copy of a software program than to drive to a store and buy it from a retailer.
  • 15. • Anonymity: • Pirating software is a crime that can be committed without leaving one's house, or even interacting with any person. Thus, it is very tempting to commit this "victimless" crime. • Profit: • Although most software pirates do not profit directly from pirating software, the temptation to make money by selling illegal programs is strong. All one needs to become a software pirate is a CD burner, which now cost as little .
  • 16. DISADVANTAGES OF SOFTWARE INFRINGEMENT:.. • It is Illegal • It is Risky • It is Unproductive