SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Software Piracy
Software piracy is the illegally using, copying and reselling of
software without the consent of the software creator
The unauthorized copying may be done for personal use or
business use.
Types
• 1. Soft Lifting
• 2. Hard Disk Loading
• 3. Renting
• 4. OEM Unbundling
• 5. Counterfeiting
• 6. Online Piracy
Soft Lifting
• means sharing a program with someone who is not authorized by the license
agreement to use it.
• A common form of soft lifting involves purchasing a single licensed copy
of software and then loading the software onto several computer
Hard Disk Loading
• Often committed by hardware dealers
• This form of piracy involves loading a unauthorized copy of software onto a
computer being sold to the end user
• To attract customers
Renting
• Renting involves someone renting out a copy of software for temporary use,
without the permission of the copyright holder.
• The practice, similar to that of renting a video from Blockbuster, violates the
license agreement of software.
OEM Unbundling
( Original Equipment Manufacturer Unbundling)
• means selling stand-alone software originally meant to be included with a
specific accompanying product.
• An example of this form of piracy is someone providing drivers to a specific
printer without authorization.
Counterfeiting
• means producing fake copies of software, making it look authentic.
• This involves providing the box, CDs, and manuals, all designed to look as
much like the original product as possible.
Online Piracy
• The fastest-growing form of piracy is Internet piracy.
• There are hundreds of thousands of "warez" sites providing unlimited
downloads to any user.
EFFECTS ON USERS
• 1. Lower productivity(that pirated software often includes incomplete or
damaged programs)
• 2. Malware Infection(Computer viruses can have a devastating impact on any
computer use)
• 3. Subject to raid
• 4. Unusual sufferings
RESPONCIBLITIES AS A USER
• to purchase only legitimate software products.
• When buying software, it is necessary to be sure to get genuine disks, manuals and
license documentation.
• When one purchases illegal or counterfeit copies, his money goes straight into the
pockets of software pirates .
• Buy from an authorized dealer
• Check the prices and ask for itemized quotations and receipts
• Call the software publisher
LAWS & PENALTIES
• Additional installation, distribution, or reproduction of the software in ways
that the license prohibits is a violation of federal copyright law.
• Any person(s) practicing or participating in any of these illegal acts can be
held liable.
• The laws varies over different regions.
• Generally punishment as fine up to a huge amount.
Syed Muhammad Shah
Gilgit Baltistan
https://www.slideshare.net/ashrafmath/s
oftware-piracy-15644828

Contenu connexe

Tendances (20)

Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Spyware
SpywareSpyware
Spyware
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Digital law
Digital lawDigital law
Digital law
 
34088.Chapter-2.pptx
34088.Chapter-2.pptx34088.Chapter-2.pptx
34088.Chapter-2.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
Software theft
Software theftSoftware theft
Software theft
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Internet security
Internet securityInternet security
Internet security
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 

Similaire à Piracy and Types

SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine softwareJonathan Min
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Installing and uninstalling computer software
Installing and uninstalling computer softwareInstalling and uninstalling computer software
Installing and uninstalling computer softwareVidya Kalaivani Rajkumar
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfRijuDasgupta
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkwokk1d337
 
Software license
Software licenseSoftware license
Software licensesstothoff
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar Mohsin Ali
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 

Similaire à Piracy and Types (20)

SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Understand the importance of getting only genuine software
Understand the importance of getting only genuine softwareUnderstand the importance of getting only genuine software
Understand the importance of getting only genuine software
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Installing and uninstalling computer software
Installing and uninstalling computer softwareInstalling and uninstalling computer software
Installing and uninstalling computer software
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Introduction To Computing.pptx
Introduction To Computing.pptxIntroduction To Computing.pptx
Introduction To Computing.pptx
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
spyware
spyware spyware
spyware
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Software
SoftwareSoftware
Software
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Foss for Health Care
Foss for Health CareFoss for Health Care
Foss for Health Care
 
Software license
Software licenseSoftware license
Software license
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 

Dernier

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Piracy and Types

  • 1.
  • 2. Software Piracy Software piracy is the illegally using, copying and reselling of software without the consent of the software creator The unauthorized copying may be done for personal use or business use.
  • 3. Types • 1. Soft Lifting • 2. Hard Disk Loading • 3. Renting • 4. OEM Unbundling • 5. Counterfeiting • 6. Online Piracy
  • 4. Soft Lifting • means sharing a program with someone who is not authorized by the license agreement to use it. • A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computer
  • 5. Hard Disk Loading • Often committed by hardware dealers • This form of piracy involves loading a unauthorized copy of software onto a computer being sold to the end user • To attract customers
  • 6. Renting • Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder. • The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software.
  • 7. OEM Unbundling ( Original Equipment Manufacturer Unbundling) • means selling stand-alone software originally meant to be included with a specific accompanying product. • An example of this form of piracy is someone providing drivers to a specific printer without authorization.
  • 8. Counterfeiting • means producing fake copies of software, making it look authentic. • This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible.
  • 9. Online Piracy • The fastest-growing form of piracy is Internet piracy. • There are hundreds of thousands of "warez" sites providing unlimited downloads to any user.
  • 10. EFFECTS ON USERS • 1. Lower productivity(that pirated software often includes incomplete or damaged programs) • 2. Malware Infection(Computer viruses can have a devastating impact on any computer use) • 3. Subject to raid • 4. Unusual sufferings
  • 11. RESPONCIBLITIES AS A USER • to purchase only legitimate software products. • When buying software, it is necessary to be sure to get genuine disks, manuals and license documentation. • When one purchases illegal or counterfeit copies, his money goes straight into the pockets of software pirates . • Buy from an authorized dealer • Check the prices and ask for itemized quotations and receipts • Call the software publisher
  • 12. LAWS & PENALTIES • Additional installation, distribution, or reproduction of the software in ways that the license prohibits is a violation of federal copyright law. • Any person(s) practicing or participating in any of these illegal acts can be held liable. • The laws varies over different regions. • Generally punishment as fine up to a huge amount.
  • 13. Syed Muhammad Shah Gilgit Baltistan https://www.slideshare.net/ashrafmath/s oftware-piracy-15644828