SlideShare a Scribd company logo
1 of 34
Submitted to: Sir Waqar Malik
Submitted by: Maryam Jamil,37
Zahida Malik,13
Amna Ashfaq,29
Maryam Yaseen,14
 "Regardless of how the infringer sees it... piracy is theft of
intellectual property and is no more justifiable than shoplifting,
stealing cable service or other utilities. Developers invest time and
money to develop a... product and deserve to make a fair profit - so
they can develop new ...products. This is particularly crucial for
small developers... whose survival depends on income from sales to
a limited market“
 "Pirated copyright goods shall mean any goods which
are copies made without the consent of the rightholder
or person duly authorised by the rightholder in the
country of production and which are made directly or
indirectly from an article where the making of that copy
would have constituted an infringement of a copyright
or a related right under the law of the country of
importation"
 The explosion of media piracy was galvanized by the
invention of the MP3 format back in 1993. This
format allowed the copying of CDs to computer
devices, from which pirate CD replicas could then be
produced. The MP3 format wasn't used as widely for
piracy until the Napster website opened in 1999.
This highly publicized site allowed users to trade and
download musical files. Though Napster was
eventually closed after the recording industry
brought a number of lawsuits against it, a variety of
peer-to-peer file services has since sprung up across
the Net, making it easy to download media files
illegally.
 Print
 Music
 Films
 Software
 Internet (online)
 Any unauthorized use of a copyrighted work, such as a
book, school manual, journal article or sheet music,
represents an infringement of copyright or a case of
copyright piracy, unless covered by a copyright exception.
Piracy of printed works affects both paper copies and works
in digital format. In some developing countries, trade in
pirated books often exceeds the legitimate market.
Educational institutions represent a primary target market
for pirates.
Infringing activities include both illegal commercial
photocopying and/or printing and reproduction of books
and other printed material in digital form, as well as
distribution in hard copy or digital format.
 Music piracy includes both traditional unlawful use of
music and unauthorized use of music on on-line
communication networks.
 Bootlegging (unauthorized recording and duplication of a
live or broadcast performance)
 Counterfeiting (unauthorized copying of the material
support, labels, artwork and packaging) are the most
widespread types of traditional music piracy.
 The unauthorized uploading and making available to the
public of music files or downloading such files from an
Internet site is referred to as Internet or on-line piracy. On-
line piracy may also include certain uses of "streaming"
technologies.
As in the case of music, film piracy is either traditional
or done over the Internet. It includes, but is not limited
to, videocassette and optical disc piracy, theatrical
camcorder piracy, theatrical print theft, signal theft and
broadcasting piracy, and on-line piracy.
Software piracy refers to practices that involve the
unauthorized copying of computer software.
 The unauthorized downloading or distribution over
the Internet of unauthorized copies of works such as
movies, music, videogames and software is generally
referred to as Internet or on-line piracy. Illicit
downloads occur through file-sharing networks, illegal
servers, websites and hacked computers. Hard goods
pirates also use the Internet to sell illegally duplicated
DVDs through auctions and websites.
 Low level of public awareness
 High consumer demand for cultural products
 Misconceptions about piracy
 Inefficient intellectual property protection and weak
enforcement of rights
 High cost of cultural goods
 Difficulty of access to legitimate works
 Considerable business profits for pirates
 In the United States, as in many countries around the
world, breaking copyright on media is illegal
 If an individual breaks federal law regarding media
piracy, she is liable to end up in court. Even a first-time
offender can end up paying as much as $250,000 in fines,
or face a maximum five years in jail. Copyright holders,
like the Recording Industry Association of America, also
have the ability to sue individuals, and can potentially be
awarded as much as $150,000 for every copyrighted file
distributed illegally.
 Authorities responsible for enforcing the copyright law
1. Police- Section 74 (3) of the Copyright Law.
2. Federal Investigation Agency- Second Schedule of FIA Act of 1974.
3. Customs- Sections 58, 65A to 65C of the Copyright Law.
4. Judiciary- Civil/Criminal- Sections 59 to 77 of the Copyright Law.
5. Pakistan electronic Media Regulatory Authority (PEMRA)-
PEMRA Ordinance 2007
 Megaupload, a Hong-Kong based company, was a file
sharing site founded by Kim Dotcom in 2005. Users could
freely upload and download files from the site, but needed
to pay a small sum to upgrade their access to "premium
access" so as to have access to faster download speeds, no
file limitations etc. However, the site was shut down on the
19 January 2012, after being accused of costing copyright
holders of films, music and other content more than $500
million dollars in revenue by enabling millions of free
downloads of these materials. Movie industry was
complaining that the company was making money out of
pirated material
 One of the world's largest file sharing sites.
 User base of at least a 150 million people around the
world
 So widely used that profits earned founder Kim
Dotcom 42 million dollars in 2011
 82,764,913 unique visitors
 1,000,000,000 page views throughout history
 25 petabytes of storage
1. Counterfeiting
2. Internet Piracy
3. End User Piracy
4. Client-Server Overuse
5. Hard-Disk Loading
 This type of piracy is the illegal duplication,
distribution and/or sale of copyrighted material with
the intent of imitating the copyrighted product.
 This occurs when software is downloaded from the
Internet. The same purchasing rules apply to on-line
software purchases as for those bought in compact disc
format.
 This occurs when an individual reproduces copies of
software without authorization.
 This type of piracy occurs when too many users on a
network are using a central copy of a program at the
same time
 This occurs when a business sells new computers with
illegal copies of software loaded onto the hard disks to
make the purchase of the machines more attractive.
 Warning Sign
1. Prices that are too good to be true.
 Auction Sites
1. Unbundled OEM and System Builder software
2. No box and manual on CD
3. No tech support
4. Key/serial number only
5. Disc only
6. CD-R/backup copy
7. Software delivered via e-mail
8. Software described as "cannot be registered"
9. Compilation - more than one program on a single CD
 Spam
1. Be cautious of unsolicited spam that promotes Symantec/Norton branded software
2. File spam complaints with FTC
3. Visit sources of spam for more information on spam
1. Decrease in Sales of Legal Copies
2. Retail Price Effects of Piracy
3. Estimating the Amount of Piracy
4. The Expectation of Piracy
5. Non-profit Losses
6. A Past Piracy Problem
 In June of 1996, the largest ever video piracy operation in the United States was
dismantled in New York. The nationwide counterfeit business sold more than
100,000 pirated videos a week, grossing approximately $500,000. The
investigation, dubbed “Operation Copy Cat”, culminated when search warrants
were executed by the New York City Police Department, assisted by the MPAA,
on 17 locations, including four labs. Authorities arrested 36 people and seized
817 VCRs, 77,641 pirated videos, $40,000 in case, 37,000 blank cassettes, more
than 100,000 sleeves, labels and other sophisticated equipment used in the
duplicating process. The economic impact on MPAA member companies is
estimated to be more than $87 million a year.
 There are two methods proposed by Peter Troost may help in the
war on piracy.
1. build copy protection into an operating system
2. Meterware (superdistribution)
 Even though anti-piracy organizations have made
great strides in their fight, with the enormous growth
of the Internet, current anti-piracy methods will not
completely stop piracy.
 The damage done to the industry and legitimate end
user does not outweigh the few advantages that piracy
does have. The chances of being caught, the fines, and
the jail sentences are constantly increasing.
 Organizations and industry need to come up with
solutions to increase copyright protection, inform the
uneducated, and negate the advantages that computer
piracy has.
Impacts of Media Piracy and Anti-Piracy Efforts

More Related Content

What's hot

ASY1 Media Studies Audience Response
ASY1 Media Studies Audience ResponseASY1 Media Studies Audience Response
ASY1 Media Studies Audience ResponseKBucket
 
Law of defamation
Law of defamationLaw of defamation
Law of defamationJimi Kayode
 
The Hypodermic Needle Model
The Hypodermic Needle ModelThe Hypodermic Needle Model
The Hypodermic Needle Modelruth_media
 
Cultivation theory
Cultivation theoryCultivation theory
Cultivation theorykaysar.khan
 
Communication Theory Cultivation Analysis
Communication Theory Cultivation AnalysisCommunication Theory Cultivation Analysis
Communication Theory Cultivation AnalysisDada Veloso-Beltran
 
District court visit report
District court visit reportDistrict court visit report
District court visit reportShanky Verma
 
Cross Media Ownership - UK
Cross Media Ownership - UKCross Media Ownership - UK
Cross Media Ownership - UKMike Cummins
 
Defences to defamation
Defences to defamationDefences to defamation
Defences to defamationJimi Kayode
 
Client interviewing techniques
Client interviewing techniquesClient interviewing techniques
Client interviewing techniquesPooja Thomas
 
Sting Operation and what is Investigation
Sting Operation and what is InvestigationSting Operation and what is Investigation
Sting Operation and what is InvestigationNEERAJPANGHAL2
 
Media regulation powerpoint
Media regulation powerpointMedia regulation powerpoint
Media regulation powerpointGeorgia Daly
 
Defamation
DefamationDefamation
Defamationzarinaf
 
Moral Panics Media Effects and Audience
Moral Panics Media Effects and AudienceMoral Panics Media Effects and Audience
Moral Panics Media Effects and AudienceRob Jewitt
 
Seminar - Documentary Evidence
Seminar -  Documentary EvidenceSeminar -  Documentary Evidence
Seminar - Documentary EvidenceKeith Jackson
 
Post Modernism in Media
Post Modernism in MediaPost Modernism in Media
Post Modernism in Mediadannybh
 

What's hot (20)

ASY1 Media Studies Audience Response
ASY1 Media Studies Audience ResponseASY1 Media Studies Audience Response
ASY1 Media Studies Audience Response
 
Law of defamation
Law of defamationLaw of defamation
Law of defamation
 
Defamation
DefamationDefamation
Defamation
 
Cultivation theory
Cultivation theoryCultivation theory
Cultivation theory
 
The Hypodermic Needle Model
The Hypodermic Needle ModelThe Hypodermic Needle Model
The Hypodermic Needle Model
 
Cultivation theory
Cultivation theoryCultivation theory
Cultivation theory
 
Communication Theory Cultivation Analysis
Communication Theory Cultivation AnalysisCommunication Theory Cultivation Analysis
Communication Theory Cultivation Analysis
 
District court visit report
District court visit reportDistrict court visit report
District court visit report
 
Cross Media Ownership - UK
Cross Media Ownership - UKCross Media Ownership - UK
Cross Media Ownership - UK
 
Defences to defamation
Defences to defamationDefences to defamation
Defences to defamation
 
Client interviewing techniques
Client interviewing techniquesClient interviewing techniques
Client interviewing techniques
 
Sting Operation and what is Investigation
Sting Operation and what is InvestigationSting Operation and what is Investigation
Sting Operation and what is Investigation
 
Cultivation Theory
Cultivation Theory Cultivation Theory
Cultivation Theory
 
Media regulation powerpoint
Media regulation powerpointMedia regulation powerpoint
Media regulation powerpoint
 
Defamation
DefamationDefamation
Defamation
 
Moral Panics Media Effects and Audience
Moral Panics Media Effects and AudienceMoral Panics Media Effects and Audience
Moral Panics Media Effects and Audience
 
Seminar - Documentary Evidence
Seminar -  Documentary EvidenceSeminar -  Documentary Evidence
Seminar - Documentary Evidence
 
Defamation ppt
Defamation pptDefamation ppt
Defamation ppt
 
Post Modernism in Media
Post Modernism in MediaPost Modernism in Media
Post Modernism in Media
 
Film piracy
Film piracyFilm piracy
Film piracy
 

Similar to Impacts of Media Piracy and Anti-Piracy Efforts

Similar to Impacts of Media Piracy and Anti-Piracy Efforts (11)

Piracy Essay
Piracy EssayPiracy Essay
Piracy Essay
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
2010 US Congress on pirate states
2010 US Congress on pirate states2010 US Congress on pirate states
2010 US Congress on pirate states
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Piracy
PiracyPiracy
Piracy
 
Berkley Law Writing Competition
Berkley Law Writing CompetitionBerkley Law Writing Competition
Berkley Law Writing Competition
 
Intellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & StrategiesIntellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & Strategies
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Impacts of Media Piracy and Anti-Piracy Efforts

  • 1. Submitted to: Sir Waqar Malik Submitted by: Maryam Jamil,37 Zahida Malik,13 Amna Ashfaq,29 Maryam Yaseen,14
  • 2.  "Regardless of how the infringer sees it... piracy is theft of intellectual property and is no more justifiable than shoplifting, stealing cable service or other utilities. Developers invest time and money to develop a... product and deserve to make a fair profit - so they can develop new ...products. This is particularly crucial for small developers... whose survival depends on income from sales to a limited market“
  • 3.  "Pirated copyright goods shall mean any goods which are copies made without the consent of the rightholder or person duly authorised by the rightholder in the country of production and which are made directly or indirectly from an article where the making of that copy would have constituted an infringement of a copyright or a related right under the law of the country of importation"
  • 4.
  • 5.  The explosion of media piracy was galvanized by the invention of the MP3 format back in 1993. This format allowed the copying of CDs to computer devices, from which pirate CD replicas could then be produced. The MP3 format wasn't used as widely for piracy until the Napster website opened in 1999. This highly publicized site allowed users to trade and download musical files. Though Napster was eventually closed after the recording industry brought a number of lawsuits against it, a variety of peer-to-peer file services has since sprung up across the Net, making it easy to download media files illegally.
  • 6.  Print  Music  Films  Software  Internet (online)
  • 7.  Any unauthorized use of a copyrighted work, such as a book, school manual, journal article or sheet music, represents an infringement of copyright or a case of copyright piracy, unless covered by a copyright exception. Piracy of printed works affects both paper copies and works in digital format. In some developing countries, trade in pirated books often exceeds the legitimate market. Educational institutions represent a primary target market for pirates. Infringing activities include both illegal commercial photocopying and/or printing and reproduction of books and other printed material in digital form, as well as distribution in hard copy or digital format.
  • 8.  Music piracy includes both traditional unlawful use of music and unauthorized use of music on on-line communication networks.  Bootlegging (unauthorized recording and duplication of a live or broadcast performance)  Counterfeiting (unauthorized copying of the material support, labels, artwork and packaging) are the most widespread types of traditional music piracy.  The unauthorized uploading and making available to the public of music files or downloading such files from an Internet site is referred to as Internet or on-line piracy. On- line piracy may also include certain uses of "streaming" technologies.
  • 9.
  • 10. As in the case of music, film piracy is either traditional or done over the Internet. It includes, but is not limited to, videocassette and optical disc piracy, theatrical camcorder piracy, theatrical print theft, signal theft and broadcasting piracy, and on-line piracy.
  • 11.
  • 12.
  • 13. Software piracy refers to practices that involve the unauthorized copying of computer software.
  • 14.  The unauthorized downloading or distribution over the Internet of unauthorized copies of works such as movies, music, videogames and software is generally referred to as Internet or on-line piracy. Illicit downloads occur through file-sharing networks, illegal servers, websites and hacked computers. Hard goods pirates also use the Internet to sell illegally duplicated DVDs through auctions and websites.
  • 15.
  • 16.  Low level of public awareness  High consumer demand for cultural products  Misconceptions about piracy  Inefficient intellectual property protection and weak enforcement of rights  High cost of cultural goods  Difficulty of access to legitimate works  Considerable business profits for pirates
  • 17.
  • 18.  In the United States, as in many countries around the world, breaking copyright on media is illegal  If an individual breaks federal law regarding media piracy, she is liable to end up in court. Even a first-time offender can end up paying as much as $250,000 in fines, or face a maximum five years in jail. Copyright holders, like the Recording Industry Association of America, also have the ability to sue individuals, and can potentially be awarded as much as $150,000 for every copyrighted file distributed illegally.
  • 19.  Authorities responsible for enforcing the copyright law 1. Police- Section 74 (3) of the Copyright Law. 2. Federal Investigation Agency- Second Schedule of FIA Act of 1974. 3. Customs- Sections 58, 65A to 65C of the Copyright Law. 4. Judiciary- Civil/Criminal- Sections 59 to 77 of the Copyright Law. 5. Pakistan electronic Media Regulatory Authority (PEMRA)- PEMRA Ordinance 2007
  • 20.  Megaupload, a Hong-Kong based company, was a file sharing site founded by Kim Dotcom in 2005. Users could freely upload and download files from the site, but needed to pay a small sum to upgrade their access to "premium access" so as to have access to faster download speeds, no file limitations etc. However, the site was shut down on the 19 January 2012, after being accused of costing copyright holders of films, music and other content more than $500 million dollars in revenue by enabling millions of free downloads of these materials. Movie industry was complaining that the company was making money out of pirated material
  • 21.  One of the world's largest file sharing sites.  User base of at least a 150 million people around the world  So widely used that profits earned founder Kim Dotcom 42 million dollars in 2011  82,764,913 unique visitors  1,000,000,000 page views throughout history  25 petabytes of storage
  • 22.
  • 23.
  • 24. 1. Counterfeiting 2. Internet Piracy 3. End User Piracy 4. Client-Server Overuse 5. Hard-Disk Loading
  • 25.  This type of piracy is the illegal duplication, distribution and/or sale of copyrighted material with the intent of imitating the copyrighted product.
  • 26.  This occurs when software is downloaded from the Internet. The same purchasing rules apply to on-line software purchases as for those bought in compact disc format.
  • 27.  This occurs when an individual reproduces copies of software without authorization.
  • 28.  This type of piracy occurs when too many users on a network are using a central copy of a program at the same time
  • 29.  This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive.
  • 30.  Warning Sign 1. Prices that are too good to be true.  Auction Sites 1. Unbundled OEM and System Builder software 2. No box and manual on CD 3. No tech support 4. Key/serial number only 5. Disc only 6. CD-R/backup copy 7. Software delivered via e-mail 8. Software described as "cannot be registered" 9. Compilation - more than one program on a single CD  Spam 1. Be cautious of unsolicited spam that promotes Symantec/Norton branded software 2. File spam complaints with FTC 3. Visit sources of spam for more information on spam
  • 31. 1. Decrease in Sales of Legal Copies 2. Retail Price Effects of Piracy 3. Estimating the Amount of Piracy 4. The Expectation of Piracy 5. Non-profit Losses 6. A Past Piracy Problem  In June of 1996, the largest ever video piracy operation in the United States was dismantled in New York. The nationwide counterfeit business sold more than 100,000 pirated videos a week, grossing approximately $500,000. The investigation, dubbed “Operation Copy Cat”, culminated when search warrants were executed by the New York City Police Department, assisted by the MPAA, on 17 locations, including four labs. Authorities arrested 36 people and seized 817 VCRs, 77,641 pirated videos, $40,000 in case, 37,000 blank cassettes, more than 100,000 sleeves, labels and other sophisticated equipment used in the duplicating process. The economic impact on MPAA member companies is estimated to be more than $87 million a year.
  • 32.  There are two methods proposed by Peter Troost may help in the war on piracy. 1. build copy protection into an operating system 2. Meterware (superdistribution)
  • 33.  Even though anti-piracy organizations have made great strides in their fight, with the enormous growth of the Internet, current anti-piracy methods will not completely stop piracy.  The damage done to the industry and legitimate end user does not outweigh the few advantages that piracy does have. The chances of being caught, the fines, and the jail sentences are constantly increasing.  Organizations and industry need to come up with solutions to increase copyright protection, inform the uneducated, and negate the advantages that computer piracy has.