How Technology Can Help in Fighting Counterfeiting and Piracy David Finn Associate General Counsel World-wide Anti-Piracy and Anti-Counterfeiting Microsoft.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Making Anti- Counterfeiting Laws and Enforcement Work: A Case Study from China David Finn Associate General Counsel World-wide Anti-Piracy and Anti-Counterfeiting.
IPTS workshop on ICTs for learning the host country language by adult migrants in the EU Seville 1-2 October Welcome and Introduction Clara Centeno.
Frank Kern Senior Vice President Global Sales and Distribution Innovating for growth.
RISK ADVISORY SERVICES Green State IT Strictly Private and Confidential 29 September 2014 An initiative towards higher maturity for managing software.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Software Piracy. The Impact of Software Piracy By: Andy Ajello.
Mr. Weiss China and Intellectual Property What do we mean by “intellectual property”??
ACCESS 2003 November 11, 2003 Spencer Gusick VP Intellectual Property Counsel Universal Studios If you build it, they will come… Delivery of Content to.
Copyright 2009 IDC Aid to Recovery: The Economic Impact of IT, Software, and the Microsoft Ecosystem Worldwide Prepared for Microsoft Corporation October.
PIRACY. KEY TAKE AWAYS Poor Maritime Security Policies Poor Capacity Contested Land/Water Disputes BLUF: Changing Geopolitics Threaten Broad Cooperation,
Counterfeit Avoidance Mark Alliance® Forum for CAMA members, industry professionals, government leaders and concerned citizens to address the growing epidemic.
The Business Contribution to Development and Safe Trade UN Economic Commission for Europe Second International Forum on Trade Facilitation, 15 May 2003.
Software Asset Management The New Competitive Advantage.
Copyright © KPMG All rights reserved kpmg KOLA KPMG On Line Auditing : Practical experiences from piloting on line continuous audit tools Kevin Handscombe,
Asia-Pacific Finance and Development Centre 2006 Biennial Forum Shanghai, September 2006 Session V: Regional Cooperation and Innovation Development Presented.
Creativity and Innovation in the Digital Creative Economy.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Microsoft Confidential2 6 Key Message: VS 2010 can help you reuse existing assets, increasing the ROI of those assets by enabling you to bring.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Copyright 2009 IDC Aid to Recovery: The Economic Impact of IT, Software, and the Microsoft Ecosystem in Portugal Prepared for Microsoft Corporation October.
Software Asset Management
Enterprise What does it mean to you?
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
Code Injection and Software Cracking’s Effect on Network Security Group 5 Jason Fritts Utsav Kanani Zener Bayudan ECE 4112 Fall 2007.
Get More from Your Software The Genuine Windows Vista™ Experience.
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
INTERPOL For official use only. Facial Recogniton Project Campbell McGhee.
- Sustaining creative diversity through cultural goods and services - A UNESCO Pilot Project
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl.
Community Colleges & Technology-Based Economic Growth in Rural America Robert Templin Northern Virginia Community College.
Hacker Zombie Computer Reflectors Target.
TAX-AIDE Windows 7 Upgrade Chris Hughes - NTC 1. TAX-AIDE TCS Conference Call Sept Windows 7 Imperative ● Microsoft support for Windows XP ends.
THEPERFECTTUTOR.com Copyright, 1996 © Dale Carnegie & Associates, Inc. theperfectutor.com.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Intellectual Property Rights Software in Poland Tomasz Bochenek Dyrektor Generalny Microsoft Sp.z o.o.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
U.S. Government Coordinated Approach to Intellectual Property Enforcement Third Global Congress on Counterfeiting & Piracy January 30, 2007 Office of the.
GORAN RADMAN Chairman ECEE Microsoft Corporation ICT Market in South East Europe and Investment Opportunities.
Data Governance: Addressing the Big Data Challenge IT.CAN 2015 Information Technology Law Spring Forum May 4, 2015 Adam Kardash Partner, Privacy & Data.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Planning for security Microsoft View
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Software Piracy feat. ‘The Dangerous World of Counterfeit and Pirated Software’ by IDC, March 2013 Al Clinton M. Soriano Edward Joseph Presto.
Security Insights: Spyware. Spyware Challenges Bombard you with ads Change system settings Collect personal information Slow down or crash computers Invade.
Understanding Technology Stakeholders: Their Progress and Challenges John M. Gilligan Software Assurance Forum November 4, 2009.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Jordan Baxley Kyle Neal Kadell James Justin Copeland.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
SABRE VIRTUAL PAYMENTS Karen Frayer Sabre Virtual Payments Manager.
Internet safety By Suman Nazir
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Lesson 6 Technology, Digital Media and Curriculum.
Computer Security By Duncan Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Movie Piracy  Illegal copying of movies for personal or commercial use.  New epidemic that is affecting the film industry financially on a global level.
Piracy and file-sharing: Challenges and perspectives for the Digital Renaissance Raffaele Baldassarre MEP Vice President – Committee for Legal.
Mar-16 © 2007 IDC 11 IT Economic Impact and Microsoft Country Footprint Portugal Prepared for Microsoft Corporation October 2007.
Global Big Data As A Service Market WEBSITE Single User License: US$ 2500 No of Pages: 92 Corporate User License: US$
Learning Outcomes 1. Know software installation processes 2. Be able to prepare for software installation 3. Be able to install and configure software.
Charbel Fakhoury General Manager, Microsoft Eastern Mediterranean The Economic Consequences of Software Piracy Beirut, Lebanon May 5, 2003.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Internet Acceptable Use Policy
How Technology Can Help in Fighting Counterfeiting and Piracy
NETWORK SECURITY.
Prepared By : Binay Tiwari
Introduction to Systems Security
How to build your Integrated
Counterfeiting and Intellectual property theft in Medicines World Bank Symposium March 10, 2005 Washington DC Frederick Razzaghi Director of Technical.
Presentation transcript:

How Technology Can Help in Fighting Counterfeiting and Piracy David Finn Associate General Counsel World-wide Anti-Piracy and Anti-Counterfeiting Microsoft Corporation

59% of counterfeit product key generators and crack tools downloaded from peer-to-peer networks contain malicious or unwanted software Counterfeiting and piracy: A high-tech economic and societal problem Threat to economy, jobs, taxes, innovation, creativity Threat to IT security and systems integrity 25% of websites offering access to pirated software, counterfeit product keys and crack tools attempt to install malicious or unwanted software IDC, The Risks of Obtaining and Using Pirated Software, Oct. 2006

Physical piracy: Faster evidence preparation CD/CD-ROM/DVD production: vast and diverse

Physical piracy: Faster evidence preparation Traditional disc matching: manual and slow Traditional matching of unknown discs must be done by microscope, compared by a trained eye, disc by disc.

Physical piracy: Faster evidence preparation Opportunity to automate comparison with known exemplars: ‘FRED’

Internet piracy: Faster identification, removal, deterrence Internet piracy is a very high-volume business

Internet piracy: Faster identification, removal, deterrence Better use of technological tools Pro-active government enforcement Improved public-private cooperation