SOFTWARE PIRACY & WORKPLACE ETHICS

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
Northside I.S.D. Acceptable Use Policy
Chapter 27 Your Credit and the Law pp Learning Objectives 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
IRMA Anti-Piracy Compliance Programme. What is IRMA? International Recording Media Association IRMA developed the Anti-Piracy Compliance Programme in.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
How to guard against dealing in pirated or unlicensed software Tony Chow.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Internet Piracy and its Effects on Business By Eric Kutcher.
Copyright Laws and Software By Shana Jenkins Carol Dickinson Brittany Caldarulo Sarah Hunkeler.
INTERNET and CODE OF CONDUCT
Company LOGO Software Piracy Software Piracy Software Pirate Gets 7 Years in Prison Cannelle Cuvelier.
Quiz Anti Piracy 101.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
General Awareness Training
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Software Piracy and Copyright Considerations Laura Larsson Research Librarian Health Services University of Washington revised October 21, 1998
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
Reboot Your Attitude Internet Copyright and Piracy.
Intellectual Property Rights Software in Poland Tomasz Bochenek Dyrektor Generalny Microsoft Sp.z o.o.
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Software Licensing. Software License  Software Licenses are agreements between the user and the software developer.  The user accepts this agreement.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
Copyright and the Law Your Name Goes Here.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Presented by Dominique’ Harbour COPYRIGHT GUIDELINES FOR VIDEO USE.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Plagiarism, Fair Use and Copyright Laws
Software piracy and software patents
Information Technology Acceptable Use An Overview
Copyright Computer crime and cyber security.
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
A Gift of Fire Third edition Sara Baase
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Five Unethical Uses of Computers
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Copyright, Designs and Patents Act 1988
The Issues with Technology in education
Ethical Use of Computers
Presentation transcript:

SOFTWARE PIRACY & WORKPLACE ETHICS SBA’s participation in this cosponsorship is not an endorsement of the views, opinions, products or services of any cosponsor or other person or entity. All SBA programs, services and cosponsored activities are extended to the public on a nondiscriminatory basis. Reasonable arrangements for persons with disabilities will be made if requested at least two weeks in advance. Contact: Jane Boorman, (202) 205-7411. Cosponsorship Authorization #: 06-0763-89.

What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale NOTES: Most people would never consider stealing something that did not belong to them. But those who copy software without authorization are, in fact, stealing someone else’s property – their intellectual property. In short, software piracy is theft. Like most creative works, such as books, music and films, computer software is protected by U.S. copyright laws. When you purchase software, you do not become the owner of the copyright. Rather, you are purchasing the right to use the software under certain restrictions imposed by the copyright owner, typically the software publisher. The precise rules are described in the documentation accompanying the software – the license. It’s imperative that you understand and adhere to these rules. Most often, they state that you have the right to load the software onto a single computer and make one backup copy. If you copy, distribute or install the software in ways that the license prohibits, whether you are swapping disks with friends and coworkers or participating in widespread duplication, you are violating federal copyright law. Even if you only help someone else make unauthorized copies, you are still liable under the copyright law. To find out what’s authorized, READ THE LICENSE.

Impact of Global Software Piracy 36% piracy rate $29 billion in lost revenue Hundreds of thousands of job losses Billions in lost tax revenues NOTES: This slide illustrates the global impact of software piracy. In the United States, 22 percent of all business software is unlicensed. The Business Software Alliance (BSA) estimates that in 2003 the industry lost nearly $6.5 billion in revenue in the U.S. alone due to software theft. It’s important to remember that software piracy’s damaging economic impact is not only confined to the software industry. In fact, software piracy has an effect on the economic health of the nation as a whole. “2004 Global Software Piracy Study,” conducted by International Data Corporation, July 2004

Types of Software Piracy End-user copying Electronic distribution Physical distribution NOTES: Whether you’re casually making a few copies for friends, loaning disks, distributing and/or downloading pirated software via the Internet, or buying a single software program and then installing it on 100 of your company’s personal computers, you’re infringing someone’s copyright. End-user copying: Multiple installations of software programs without the same number of licenses. Most commonly this is purchasing one software program and then installing it on many computers. Unless your license permits multiple copies, you can’t do this. License misuse – the installation/use outside the terms of the license. Example, OEM or academic software. Upgrade abuse – installation/use of upgrades without owning prior version. Electronic distribution: Software programs made available on news groups, FTP (file transfer protocol) sites, warez/cracks sites, IRC (Internet Relay Chat), Peer-to-Peer (P2P) Physical distribution: Software programs available on online auction sites, spam advertising, traditional advertising and flea markets. What you typically get when you obtain software from these distribution methods: Counterfeit CDs “Bootleg” CDs “Gray Market” product Software that may or may not work, and may contain viruses

Technical, Legal and Ethical Consequences of Pirated Software Use No upgrades No assurance of quality or reliability No technical support, manuals or documentation Exposure of your network to security breaches Consumption of bandwidth Sends message: It’s okay to steal Serious legal exposure -- $150,000 per program copied NOTES: Many businesses, both large and small, face serious technical and ethical risks because of software piracy. This slide illustrates some of those risks. Technical: When a single employee installs unlicensed software onto an office computer, perhaps by downloading it from the Internet or by bringing in a disk from home, he or she is posing a significant threat to the organization. If that unlicensed software contains a computer virus or an exploitable security flaw, that employee has immediately jeopardized the integrity of the organization’s entire network. The repercussions can be enormous, potentially costing the organization thousands of dollars in damages and/or exposing sensitive information. Apart from greater exposure to viruses, using copied or counterfeit software also means: Ineligibility for software upgrades offered to properly licensed users Inadequate or no documentation and no warranties Lack of technical product support available to properly licensed users Legal/Ethical: If you or your company were caught copying software, you might be held liable under both civil and criminal law. Under the law, a company can be held liable for its employees’ actions. If an employee is installing unauthorized software copies on company computers or acquiring illegal software through the Internet, the company can be sued for copyright infringement. This is true even if the company’s management was unaware of the employee’s actions. If the copyright owner brings a civil action against you, the owner can seek to stop you from using its software immediately and can also request money damages. This can be as much as $150,000 for each program copied and in some instances it could be more. In addition, the government can criminally prosecute you for copyright infringement. If convicted, you can be fined up to $250,000, or sentenced to jail for up to five years, or both.

Avoiding the Risk: Proactive Software Asset Management Policy Education Purchasing Control Budget Self-audits NOTES: Organizations must be proactive in avoiding the risks associated with software piracy. The steps that must be taken include: Establishing software management policies that protect computers from unlicensed software and put purchasing and budget controls in place. Educating employees through discussions like this. Conducting routine audits of all office software to guard against piracy.

Our Office Policy States our company’s intolerance of software piracy Identifies individuals in charge of software installations Identifies procedures for acquiring needed software Specifies rules on Internet usage and prohibits software downloading/uploading Makes consequences for violations clear NOTES: This slide describes the objectives of our office software policy.

Employee Education We provide information on software piracy and the problems associated with it We ensure regular distribution of office management policy We provide an opportunity for questions NOTES: Employee education sessions are intended to make everyone feel more comfortable about knowing how to use the office computers and software more responsibly.

Software Purchasing Controls We centralize purchases in one department We require purchase requests to be in writing, with appropriate approval We confirm requested software is on approved list We specify reputable dealers We ensure complete documentation We prohibit purchases on individual expense accounts NOTES: Purchasing controls are useful in ensuring good software asset management.

Budget Anticipate software needs in coming year Budget appropriately for needed growth NOTES: Budgeting controls are also useful in promoting good software asset management.

Self Audit Process Start with assessment of needs Audit software installed on computers Collect licensing and purchase documents Delete unneeded software Purchase licenses for needed but unlicensed software REPEAT REGULARLY NOTES: Software audits should be scheduled regularly. During an audit, the office information technology manager compares the number of software installations to the number of licenses and obtains any licenses needed for compliance.

Business Software Alliance (BSA) Educates computer users on respect for intellectual property and copyright compliance Advocates strong intellectual property protection, cyber security, e-commerce and trade opportunities Enforces the rights of copyright holders NOTES: BSA (www.bsa.org), a nonprofit organization based in Washington, DC, is the foremost organization dedicated to promoting a safe and legal digital world. BSA is the voice of the world's commercial software industry before governments and in the international marketplace. Its members represent the fastest growing industry in the world. BSA educates consumers on software management and copyright protection, cyber security, trade, e-commerce and other Internet-related issues. BSA members include Adobe, Apple, Autodesk, Avid, Bentley Systems, Borland, CNC Software/Mastercam, Internet Security Systems, Macromedia, McAfee, Microsoft, PTC, SolidWorks, Sybase, Symantec, UGS and VERITAS Software. BSA is primarily focuses on educating businesses about their ethical responsibility to maintain an effective software asset management program. They also offer programs to educate consumers and kids about responsible computer and software use.

Information and Tools www.SmartAboutSoftware.org BSA “Guide to Software Management” Free software audit tools Fact sheets Asset management resources Free, toll-free hotline, 1 888 NO PIRACY NOTES: BSA offers a number of free resources to help businesses and consumers understand what they can do to prevent software piracy.