Alexander Marlantes December 3 rd 2008

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Software Piracy. The Impact of Software Piracy By: Andy Ajello.
Copyright Dos and Don’ts
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
An Introduction to Internet Piracy Adapted from Internet Piracy Exposed by Guy Hart-Davis.
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
Intellectual Property in the networked world. Overview  Copyright and copyleft  Patents  Licensing  Open Source Software.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Intellectual Property
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
Jiahuan Liu MGQ B7. Definition A copyright provides legal protection to a written or an artistic work Protected work may include images, symbols, novels,
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Keywords: Legislation, Guidelines, Ownership, Copyright, Permissions, Copyright Free LO: You will be able to understand and explain Copyright, Designs.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
1 Intellectual Property “Gift of Fire”. 2 Intellectual Property - Have you ever give a CD to a friend that contained a copy of a computer game or a programs?
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,

Programming and Application Packages
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Copyright & Licensing. 2/18 Presentation Outline Copyright Law Software and copyright Licensing Software Piracy Copyright and the Internet.
Software Piracy and Copyright Considerations Laura Larsson Research Librarian Health Services University of Washington revised October 21, 1998
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Reboot Your Attitude Internet Copyright and Piracy.
Digital Planet: Tomorrow’s Technology and You
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
Application Software Performs a specific job or task. Helps people use their computers to perform their work more effectively. Categorized in two ways.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Copyright and the Law For more information contact:
CSCI EXTRA CREDIT ASSIGNMENT ASHLEY R. BROADNAX TUESDAY 3:30 CLASS MARCH 11, 2008.
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
SOFTWARE PIRACY OF BUSINESS ETHICS PERSPECTIVE
Laws Jamie Dunn.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Definition of Internet Piracy Definition of Internet Piracy Internet Piracy The unlawful reproduction and/or distribution of any copyrighted digital file.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Chapter Two Introduction to Information Technology Prepared by: Eman Amer.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Copyright and the Law Your Name Goes Here.
Commercial software.. Introduction.  Computer software comes in three different flavors: freeware, shareware, and commercial software. Freeware is free.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Earn money by sharing files on P2P networks
Computer Ethics, Viruses, and Copyrights
Internet Acceptable Use Policy
Software piracy and software patents
Copyright Computer crime and cyber security.
Computer Safety and Ethics
PROGRAM STUDI TEKNIK INFORMATIKA FAKULTAS ILMU KOMPUTER
Copyright & Licensing.
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Intellectual Property Rights
Computer Ethics, Viruses, and Copyrights
Part 3.
Copyright, Designs and Patents Act 1988
Client/Server and Peer to Peer
Student Name Student Class
Presentation transcript:

Alexander Marlantes December 3 rd 2008

What is Piracy? Creating a copy and/or selling it. This is the act that some people refer to as "software piracy". This is copyright infringement in most countries and is unlikely to be fair use or fair dealing if the work remains commercially available. In some countries the laws may allow the selling of a version modified for use by blind people, students (for educational product) or similar. Differences in legislation may also make the copyright void in some jurisdictions, but not the others. Creating a copy and giving it to someone else. This constitutes copyright infringement in most jurisdictions. It is not infringing under specific circumstances such as fair use and fair dealing.fair usefair dealing Creating a copy to serve as a backup. This is seen as a fundamental right of the software-buyer in some countries, e.g., Germany, Spain, Brazil and Philippines. It can be infringement, depending on the laws and the case law interpretations of those laws, currently undergoing changes in many countries. In the US, legal action was taken against companies which made backup copies while repairing computers (see MAI Systems Corp. v. Peak Computer, Inc. (1993)) and as a result, US law was changed so that making temporary backup copies of software while repairing computers is not copyright infringement.backupGermanySpainBrazilPhilippinescase law MAI Systems Corp. v. Peak Computer, Inc.was changed Renting the original software. Software licenses often restrict the usual right of a purchaser of a copyrighted work to let others borrow the work. In some jurisdictions the validity of such restrictions are disputed, but some require permission from the copyright holder to allow renting the software. Buying the original software. Licenses say that the buyer does not buy the software but instead pays for the right to use the software. In the US, the first-sale doctrine, Softman v. Adobe [3] and Novell, Inc. v. CPU Distrib., Inc. ruled that software sales are purchases, not licenses, and resale, including unbundling, is lawful regardless of a contractual prohibition. The reasoning in Softman v. Adobe suggests that resale of student licensed versions, provided they are accurately described as such, is also not infringing.first-sale doctrineSoftman v. Adobe [3]Novell, Inc. v. CPU Distrib., Inc. Source:

Types of Piracy Industrial piracy: An individual or group attempts duplication and distribution on a large scale for profit. Corporate piracy: Unprotected contents are shared through net­works such as peer-to-peer, LAN and Internet. Reseller piracy: Involves computer hardware companies selling machines with illegal copies of software preloaded on their hard drive. Home piracy: Ranges from trading disks with friends to running a not-for- profit bulletin board for the purpose of illegal software distribution.

The Birth of Software Piracy Commodore 64 Physical copies of floppies mailed using postal system Facilitated software transmission from the West to the East Rise of internet assisted Bulletin Board Systems Limited by data transmission speeds (<<56k) First attempt to combat software piracy in 1992 by the Software Publisher’s Association “Don’t Copy that Floppy”

Introduction of Windows 95 and the personal PC boom. Modem speeds typically between 28.8 and 33.6 kbits / second. “Warez” Possibly derived from the Middle English term “wares” First “Underground” FTP websites and BBS High virus and malware content Eventually morphed into Morpheus / Azerous / Kazaa Main software copied included pornography, video games, and expensive media software (Photoshop etc.)

As internet speeds increase… Peer to Peer networks become increasingly popular as compared to FTP (File Transfer Protocol) sites due to bandwidth concerns Bittorent and Rapidshare are now the dominant memes Decentralized model helps reduce “blame” and makes it difficult for central authorities to shut down websites All files are now fair game. With a fast enough connection even the latest and greatest high definition movie can be downloaded and ready to run in less than an hour.

Software Often distributed via “cracked” packages or as CD ISO images meant to be read by virtual CD drives as opposed to pirated movies which are often large AVI or DIVX files Video Game industry has much more control on games that require online access Often times games and are software are unable to be updated via the intended means

Very difficult to control content Even fixed media: taken from: 03/07/content_ htm

Economic Impact Source: Business Software Alliance and IDC 2004, First annual BSA and IDC global software piracy study.

Piracy Rates

Thank You Questions?