SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.

Slides:



Advertisements
Similar presentations
Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to prevent infringement within [business name] September.
Advertisements

Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
© Prentice Hall CHAPTER 15 Managing the IS Function.
BUSINESS B2 Ethics.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security and Personnel
How to guard against dealing in pirated or unlicensed software Tony Chow.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Software Asset Management (SAM) The ITS / CLO Partnership in SAM Implementation By Fleming Woo Chief Computing Officer Information Technology Services.
Software Asset Management The New Competitive Advantage.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Business Plug-In B7 Ethics.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Software Asset Management
Sony Pictures Technologies – FY13 Three Year Plan 1 Core FunctionsKey Facts & Achievements Digital Policy Group New Media & Technology (page 1 of 2) 
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
Objective 5.02 Understand ethics and ethical decision-making.
Software Piracy and Copyright Considerations Laura Larsson Research Librarian Health Services University of Washington revised October 21, 1998
Computer Ethics for Computer Users
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Unethical use of Computers and Networks
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich Copyright.
The Legalities of Technicalities By Kellie Birdwell.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Software Piracy feat. ‘The Dangerous World of Counterfeit and Pirated Software’ by IDC, March 2013 Al Clinton M. Soriano Edward Joseph Presto.
Software Licensing. Software License  Software Licenses are agreements between the user and the software developer.  The user accepts this agreement.
IT in Business Issues in Information Technology Lecture – 13.
Ethics.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
SOFTWARE PIRACY OF BUSINESS ETHICS PERSPECTIVE
New A.M. Best Cyber Questionnaire
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Legal and Ethical Issues in Computer Security Csilla Farkas
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Educational Software Issues. Copyrights This protection is available to both published and unpublished works.
Implementation of legislation (Chapter 47) By Haley Court.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Chapter 3 Applications Software: Getting the Work Done.
Software piracy and software patents
Information Technology Acceptable Use An Overview
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Legal and ethical issues
MGMT 452 Corporate Social Responsibility
CHAPTER FOUR OVERVIEW SECTION ETHICS
A Gift of Fire Third edition Sara Baase
SOFTWARE PIRACY & WORKPLACE ETHICS
Investigating the correct and legal way to use software
Software: Piracy.
Information Security based on International Standard ISO 27001
Five Unethical Uses of Computers
Information Technology Topic: The internet
Ethical Use of Computers
CHAPTER FOUR OVERVIEW SECTION ETHICS
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Presentation transcript:

SOFTWARE PIRACY & WORKPLACE ETHICS

What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale

Impact of Global Software Piracy 36% piracy rate $29 billion in lost revenue Hundreds of thousands of job losses Billions in lost tax revenues “2004 Global Software Piracy Study,” conducted by International Data Corporation, July 2004

Types of Software Piracy End-user copying Electronic distribution Physical distribution

Technical, Legal and Ethical Consequences of Pirated Software Use No upgrades No assurance of quality or reliability No technical support, manuals or documentation Exposure of your network to security breaches Consumption of bandwidth Sends message: It’s okay to steal Serious legal exposure -- $150,000 per program copied

Avoiding the Risk: Proactive Software Asset Management Policy Education Purchasing Control Budget Self-audits

Our Office Policy States our company’s intolerance of software piracy Identifies individuals in charge of software installations Identifies procedures for acquiring needed software Specifies rules on Internet usage and prohibits software downloading/uploading Makes consequences for violations clear

Employee Education We provide information on software piracy and the problems associated with it We ensure regular distribution of office management policy We provide an opportunity for questions

Software Purchasing Controls We centralize purchases in one department We require purchase requests to be in writing, with appropriate approval We confirm requested software is on approved list We specify reputable dealers We ensure complete documentation We prohibit purchases on individual expense accounts

Budget Anticipate software needs in coming year Budget appropriately for needed growth

Self Audit Process Start with assessment of needs Audit software installed on computers Collect licensing and purchase documents Delete unneeded software Purchase licenses for needed but unlicensed software REPEAT REGULARLY

Business Software Alliance (BSA) Educates computer users on respect for intellectual property and copyright compliance Advocates strong intellectual property protection, cyber security, e-commerce and trade opportunities Enforces the rights of copyright holders

BSA Information and Tools BSA “Guide to Software Management” Free software audit tools Fact sheets Asset management resources Free, toll-free hotline, NO PIRACY