SlideShare a Scribd company logo
Presentation
On
Software Piracy
Made By :
Pallavi Agarwal
1
1. Introduction
2. Types of software piracy
3. Why Software Piracy
4. Effects On Users
5. Effect on a Business
6. How to stop piracy
7. Punishment
8. Organizations For Protecting Piracy
9. References
2
 Software piracy is the illegally using, copying and
reselling of software without the consent of the
software creator.
 The unauthorized copying may be done for
personal use or business use. [1]
3
1. Soft Lifting
2. Hard Disk Loading
3. Renting
4. OEM Unbundling
5. Counterfeiting
6. Online Piracy[2]
4
Soft Lifting
 means sharing a program with someone who is not
authorized by the license agreement to use it.
 Also known as soft loading/end-user piracy.
 A common form of soft lifting involves purchasing
a single licensed copy of software and then loading
the software onto several computers
5
Hard Disk Loading
 Often committed by hardware dealers
 This form of piracy involves loading a unauthorized
copy of software onto a computer being sold to the end
user
 To attract customers
6
Renting
 Renting involves someone renting out a copy of
software for temporary use, without the permission
of the copyright holder.
 The practice, similar to that of renting a video from
Blockbuster, violates the license agreement of
software.
7
OEM Unbundling
 Original Equipment Manufacturer Unbundling
 means selling stand-alone software originally
meant to be included with a specific
accompanying product.
 An example of this form of piracy is someone
providing drivers to a specific printer without
authorization.
8
Counterfeiting
 means producing fake copies of software, making it
look authentic.
 This involves providing the box, CDs, and manuals,
all designed to look as much like the original
product as possible.
9
Online Piracy
 The fastest-growing form of piracy is
Internet piracy.
 There are hundreds of thousands of "warez"
sites providing unlimited downloads to any
user.
10
 Expensive
 Availability
 Not convenient to buy for each computer
 Ask to buy new version although having
original one
 The CD/backup damaged
11
1. Lower productivity
2. Malware Infection
3. Subject to raid
12
Lower productivity
 Pirated software often
includes incomplete or
damaged programs
13
Malware Infection
 Pirated software can also include computer viruses
(malware) which can destroy data on a user’s hard
drive.
 Computer viruses can have a devastating impact on
any computer user -- from the home user to a
large business.
14
Subject to raid
 Companies can also be subject to raids by
the SIIA (Software & Information Industry
Association).
15
Distribution Methods
 Pirated material is distributed in two ways.
◦ Unknowing consumers buy pirated items.
◦ Others buy pirated items knowing they are
pirated.
16
Revenue Diverson
 Piracy diverts money away from producers
and distributors of items such as audio
recordings, making those companies who
make an investment in production and
distribution less profitable.
17
Tax Revenues
 Except in the case where pirated items are sold
through retail channels and taxed, tax revenue
is not generated from pirated items.
 For example, when music is downloaded with
no tax charged when it is supposed to be, as
dictated by tax laws, that revenue is lost as
well. Lost tax revenue reduces funds available
by the taxing government to spend.
18
Lessening Piracy
 To lessen the effect of piracy on a
business, businesses can implement
methods to discourage software piracy,
such as changes to how software is
distributed to make it harder to download.
 Another way to lessen piracy is to educate
the public about the impact of piracy on
their lives. [6]
19
 Purchase only legitimate software products.
 When buying software, it is necessary to be sure to get
genuine disks, manuals and license documentation.
 When one purchases illegal or counterfeit copies, his
money goes straight into the pockets of software
pirates .
 Buy from an authorized dealer.
 Check the prices and ask for receipts.
20
PUBLIC DOMAIN SOFTWARE
 These software are not under the copyright act.
They are free programs & can be used w/o
restrictions. It means the user of the software can
copy, distribute & even modify the software.
21
FREEWARE
 It is a copyright software which is given free by its author.
The user of the software redistribute the software but
cannot be modified by the end user. It also covers
1. Donation ware : A donation is required by the author or
to the 3rd party from the user of the software
2. Postcard ware : The user has to send a post card to the
creator of the software.
3. Abandon ware : The abandoned software are in this
category.
4. Ad ware : To promote the s/w as advertisement the
software’s are given free of cost. 22
SHAREWARE SOFTWARE
 Shareware or trialware is the software, which
comes with the permission for the people to
redistribute copies for a limited period. So far a
continues use of the software one have to pay for
the software.
 E.g. Winzip
23
COMMERCIAL SOFTWARE
 These are the software purchased from the
software publishers. It is available in stores & has
some objective to fulfill.
 E.g. Windows software, Ms Office etc.
24
OPEN SOURCE SOFTWARE
 These are created by generous programmers &
related to the public use. The programming code is
available to the users so that they can read it and
make changes according to their use & needs. They
can build the new versions of the software by using
the same code.
 E.g. Linux software.
25
PROPRIETY SOFTWARE
 It describes a technology or product that is owned
exclusively by a single company that carefully
guards the knowledge about the technology and
the product internal working. Some proprietary
product can function when used with other
products owned by some other company.
 E.g. Acrobat reader PDF (Portable document
format).
26
FIRM WARE SOFTWARE
 It is a combination of the software and h/w which
is permanently stored in the memory. It is a
program or data that has been written onto ROM.
27
 In India, the copyright of computer software is
protected under the Indian Copyright Act of 1957.
 The minimum jail term for software copyright
infringement(violation of law) is seven days and the
maximum jail term is three years.
 Fines range from a minimum of 50,000 to a
maximum of 200,000 rupees.
28
BSA
(Business Software Alliance)
 It established in 1988 and
representing a number of
the world's largest software
makers
 Its principal activity is trying
to stop copyright
infringement of software
produced by its members.
29
SIIA
(Software & Information Industry
Association)
 It offers global services in
business development,
government relations,
corporate education, and
intellectual property protection
to companies
 It also advocates a legal and
regulatory environment that
benefits the entire industry.
30
CAAST
(Canadian Alliance Against
Software Theft )
 Its mission statement is to
"reduce software piracy in
Canada through
education, public policy
and enforcement.”
 The CAAST was
established in 1990.
31
FAST
(Federation Against Software
Theft)
 It was set up in 1984 by the
British Computer Society's
Copyright Committee, and was
the first software copyright
organization in the U.K.
 Its first action was to raise the
awareness of software piracy
32
[1]Laurie E. MacDonald, Kenneth T. Fougere, Bryant College, Smithfield,
“Software Piracy: A Study of the Extent Of Coverage in Introductory MIS
Textbooks,” Journal of Information Systems Education, vol. 13, no. 4.
[2]http://cs.stanford.edu/people/eroberts/cs181/projects/software-
piracy/types.html
[3] http://www.ehow.com/list_6810994_software-piracy-laws-india.html
[4] http://whatis.techtarget.com/definition/piracy
[5] http://www.computerhope.com/jargon/s/softpira.htm
[6] http://smallbusiness.chron.com/effect-piracy-business-24541.html
[7]http://in.mathworks.com/company/aboutus/policies_statements/pirac
y.html
[8] www.fast.org.uk
[9] www.bsa.org
[10] www.caast.org
[11] www.siia.net
33
34

More Related Content

Similar to swpiracyslideshare-180302131348.pdf

Software piracy
Software piracySoftware piracy
Software piracy
Akhil Tiwari
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
CSCJournals
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
ManojKhan7
 
14. application software
14. application software14. application software
14. application software
Zambales National High School
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
pugazhendhiv2
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
Sourav Biswas
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
Antara Rastogi
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
Alexander Decker
 
Software theft
Software theftSoftware theft
Software theft
chrispaul8676
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
Joanne Cook
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
brian9p
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
brian9p
 
Software piracy Grade 6
Software piracy Grade 6Software piracy Grade 6
Software piracy Grade 6
ninoallandanganancarpio
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
Nandhini Sathiyanarayanan
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
Vincent lefebvre
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
Burhan Ahmed
 
Public domain software.pptx
Public domain software.pptxPublic domain software.pptx
Public domain software.pptx
Sethupathy42
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 eng
Fitira
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
aamatya
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
aamatya
 

Similar to swpiracyslideshare-180302131348.pdf (20)

Software piracy
Software piracySoftware piracy
Software piracy
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
14. application software
14. application software14. application software
14. application software
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Software theft
Software theftSoftware theft
Software theft
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Software piracy Grade 6
Software piracy Grade 6Software piracy Grade 6
Software piracy Grade 6
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
Public domain software.pptx
Public domain software.pptxPublic domain software.pptx
Public domain software.pptx
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 eng
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 
Ethical consideration in open source software
Ethical consideration in open source softwareEthical consideration in open source software
Ethical consideration in open source software
 

More from RijuDasgupta

26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
RijuDasgupta
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
RijuDasgupta
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
RijuDasgupta
 
L16_17_Shell structures.pdf
L16_17_Shell structures.pdfL16_17_Shell structures.pdf
L16_17_Shell structures.pdf
RijuDasgupta
 
5-180501044424.pdf
5-180501044424.pdf5-180501044424.pdf
5-180501044424.pdf
RijuDasgupta
 
6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.ppt6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.ppt
RijuDasgupta
 
rivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdfrivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdf
RijuDasgupta
 
Compression_members1.ppt
Compression_members1.pptCompression_members1.ppt
Compression_members1.ppt
RijuDasgupta
 
ANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.pptANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.ppt
RijuDasgupta
 
beamanalysis.ppt
beamanalysis.pptbeamanalysis.ppt
beamanalysis.ppt
RijuDasgupta
 
2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptx2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptx
RijuDasgupta
 
forecast.ppt
forecast.pptforecast.ppt
forecast.ppt
RijuDasgupta
 
presentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdfpresentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdf
RijuDasgupta
 
presentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptxpresentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptx
RijuDasgupta
 
populationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdfpopulationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdf
RijuDasgupta
 
AGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptxAGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptx
RijuDasgupta
 

More from RijuDasgupta (16)

26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
26901321007_SAPTADEEP DASGUPTA_CIVIL ENGINEERING (2).pdf
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)701C.pdf
 
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
26901321007_SAPTADEEP DASGUPTA_CE(PE)702A.pdf
 
L16_17_Shell structures.pdf
L16_17_Shell structures.pdfL16_17_Shell structures.pdf
L16_17_Shell structures.pdf
 
5-180501044424.pdf
5-180501044424.pdf5-180501044424.pdf
5-180501044424.pdf
 
6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.ppt6_2022_11_09!10_18_35_PM.ppt
6_2022_11_09!10_18_35_PM.ppt
 
rivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdfrivetedjoints-130404054301-phpapp02 (1).pdf
rivetedjoints-130404054301-phpapp02 (1).pdf
 
Compression_members1.ppt
Compression_members1.pptCompression_members1.ppt
Compression_members1.ppt
 
ANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.pptANALYSIS_OF_RATES.ppt
ANALYSIS_OF_RATES.ppt
 
beamanalysis.ppt
beamanalysis.pptbeamanalysis.ppt
beamanalysis.ppt
 
2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptx2415536_Unit-ISIGHTDISTNCE.pptx
2415536_Unit-ISIGHTDISTNCE.pptx
 
forecast.ppt
forecast.pptforecast.ppt
forecast.ppt
 
presentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdfpresentation47-190318045824 (1).pdf
presentation47-190318045824 (1).pdf
 
presentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptxpresentation_propertiesofcement_1513407631_244125.pptx
presentation_propertiesofcement_1513407631_244125.pptx
 
populationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdfpopulationforecasting-200810153117 (1).pdf
populationforecasting-200810153117 (1).pdf
 
AGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptxAGGREGATES_AND_OTHERS.pptx
AGGREGATES_AND_OTHERS.pptx
 

Recently uploaded

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
Abdullah Al Noman
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
mahaffeycheryld
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 

Recently uploaded (20)

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 

swpiracyslideshare-180302131348.pdf

  • 2. 1. Introduction 2. Types of software piracy 3. Why Software Piracy 4. Effects On Users 5. Effect on a Business 6. How to stop piracy 7. Punishment 8. Organizations For Protecting Piracy 9. References 2
  • 3.  Software piracy is the illegally using, copying and reselling of software without the consent of the software creator.  The unauthorized copying may be done for personal use or business use. [1] 3
  • 4. 1. Soft Lifting 2. Hard Disk Loading 3. Renting 4. OEM Unbundling 5. Counterfeiting 6. Online Piracy[2] 4
  • 5. Soft Lifting  means sharing a program with someone who is not authorized by the license agreement to use it.  Also known as soft loading/end-user piracy.  A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computers 5
  • 6. Hard Disk Loading  Often committed by hardware dealers  This form of piracy involves loading a unauthorized copy of software onto a computer being sold to the end user  To attract customers 6
  • 7. Renting  Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder.  The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software. 7
  • 8. OEM Unbundling  Original Equipment Manufacturer Unbundling  means selling stand-alone software originally meant to be included with a specific accompanying product.  An example of this form of piracy is someone providing drivers to a specific printer without authorization. 8
  • 9. Counterfeiting  means producing fake copies of software, making it look authentic.  This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible. 9
  • 10. Online Piracy  The fastest-growing form of piracy is Internet piracy.  There are hundreds of thousands of "warez" sites providing unlimited downloads to any user. 10
  • 11.  Expensive  Availability  Not convenient to buy for each computer  Ask to buy new version although having original one  The CD/backup damaged 11
  • 12. 1. Lower productivity 2. Malware Infection 3. Subject to raid 12
  • 13. Lower productivity  Pirated software often includes incomplete or damaged programs 13
  • 14. Malware Infection  Pirated software can also include computer viruses (malware) which can destroy data on a user’s hard drive.  Computer viruses can have a devastating impact on any computer user -- from the home user to a large business. 14
  • 15. Subject to raid  Companies can also be subject to raids by the SIIA (Software & Information Industry Association). 15
  • 16. Distribution Methods  Pirated material is distributed in two ways. ◦ Unknowing consumers buy pirated items. ◦ Others buy pirated items knowing they are pirated. 16
  • 17. Revenue Diverson  Piracy diverts money away from producers and distributors of items such as audio recordings, making those companies who make an investment in production and distribution less profitable. 17
  • 18. Tax Revenues  Except in the case where pirated items are sold through retail channels and taxed, tax revenue is not generated from pirated items.  For example, when music is downloaded with no tax charged when it is supposed to be, as dictated by tax laws, that revenue is lost as well. Lost tax revenue reduces funds available by the taxing government to spend. 18
  • 19. Lessening Piracy  To lessen the effect of piracy on a business, businesses can implement methods to discourage software piracy, such as changes to how software is distributed to make it harder to download.  Another way to lessen piracy is to educate the public about the impact of piracy on their lives. [6] 19
  • 20.  Purchase only legitimate software products.  When buying software, it is necessary to be sure to get genuine disks, manuals and license documentation.  When one purchases illegal or counterfeit copies, his money goes straight into the pockets of software pirates .  Buy from an authorized dealer.  Check the prices and ask for receipts. 20
  • 21. PUBLIC DOMAIN SOFTWARE  These software are not under the copyright act. They are free programs & can be used w/o restrictions. It means the user of the software can copy, distribute & even modify the software. 21
  • 22. FREEWARE  It is a copyright software which is given free by its author. The user of the software redistribute the software but cannot be modified by the end user. It also covers 1. Donation ware : A donation is required by the author or to the 3rd party from the user of the software 2. Postcard ware : The user has to send a post card to the creator of the software. 3. Abandon ware : The abandoned software are in this category. 4. Ad ware : To promote the s/w as advertisement the software’s are given free of cost. 22
  • 23. SHAREWARE SOFTWARE  Shareware or trialware is the software, which comes with the permission for the people to redistribute copies for a limited period. So far a continues use of the software one have to pay for the software.  E.g. Winzip 23
  • 24. COMMERCIAL SOFTWARE  These are the software purchased from the software publishers. It is available in stores & has some objective to fulfill.  E.g. Windows software, Ms Office etc. 24
  • 25. OPEN SOURCE SOFTWARE  These are created by generous programmers & related to the public use. The programming code is available to the users so that they can read it and make changes according to their use & needs. They can build the new versions of the software by using the same code.  E.g. Linux software. 25
  • 26. PROPRIETY SOFTWARE  It describes a technology or product that is owned exclusively by a single company that carefully guards the knowledge about the technology and the product internal working. Some proprietary product can function when used with other products owned by some other company.  E.g. Acrobat reader PDF (Portable document format). 26
  • 27. FIRM WARE SOFTWARE  It is a combination of the software and h/w which is permanently stored in the memory. It is a program or data that has been written onto ROM. 27
  • 28.  In India, the copyright of computer software is protected under the Indian Copyright Act of 1957.  The minimum jail term for software copyright infringement(violation of law) is seven days and the maximum jail term is three years.  Fines range from a minimum of 50,000 to a maximum of 200,000 rupees. 28
  • 29. BSA (Business Software Alliance)  It established in 1988 and representing a number of the world's largest software makers  Its principal activity is trying to stop copyright infringement of software produced by its members. 29
  • 30. SIIA (Software & Information Industry Association)  It offers global services in business development, government relations, corporate education, and intellectual property protection to companies  It also advocates a legal and regulatory environment that benefits the entire industry. 30
  • 31. CAAST (Canadian Alliance Against Software Theft )  Its mission statement is to "reduce software piracy in Canada through education, public policy and enforcement.”  The CAAST was established in 1990. 31
  • 32. FAST (Federation Against Software Theft)  It was set up in 1984 by the British Computer Society's Copyright Committee, and was the first software copyright organization in the U.K.  Its first action was to raise the awareness of software piracy 32
  • 33. [1]Laurie E. MacDonald, Kenneth T. Fougere, Bryant College, Smithfield, “Software Piracy: A Study of the Extent Of Coverage in Introductory MIS Textbooks,” Journal of Information Systems Education, vol. 13, no. 4. [2]http://cs.stanford.edu/people/eroberts/cs181/projects/software- piracy/types.html [3] http://www.ehow.com/list_6810994_software-piracy-laws-india.html [4] http://whatis.techtarget.com/definition/piracy [5] http://www.computerhope.com/jargon/s/softpira.htm [6] http://smallbusiness.chron.com/effect-piracy-business-24541.html [7]http://in.mathworks.com/company/aboutus/policies_statements/pirac y.html [8] www.fast.org.uk [9] www.bsa.org [10] www.caast.org [11] www.siia.net 33
  • 34. 34