Thursday, January 23, 2020
Piracy Essay -- Technology Software Computers Essays
Piracy Piracy is the unauthorized copying, counterfeiting or distribution of software. Piracy is essentially stealing someone else's intellectual property. The five most common types of software piracy are end user piracy, client-server overuse, Internet piracy, hard disk loading, and software counterfeiting. End User Piracy occurs when an employee of a company reproduces software without the proper authorization. End User Piracy can be done in several different ways: . Using one licensed copy to install a program on multiple computers . Copying disks for installation and distribution . Taking advantage of upgrade offers without having a legal copy of the version to be upgraded . Acquiring academic or other restricted or non-retail software without a license for commercial use . Swapping disks in or outside the workplace [6] Client-Server overuse occurs when too many employees on a network are using a central copy of a program at the same time. When using a program in this way, it must be stated in the license. By having more employees using the software than stated in the license, is defined as overuse. Internet Piracy occurs when software is downloaded from the Internet. Although the product was acquired through the Internet, the same rules apply as if it were bought in a store. Internet Piracy can be done in several different ways: . Pirate websites that make software available for free download or in exchange for uploaded programs . Internet auction sites that offer counterfeit, out-of-channel, infringing copyright software . Peer-to-Peer networks that enable unauthorized transfer of copyrighted programs. [6] Hard-Disk Loading occurs when a business w... ...chelle, "China on Pirates: Blow 'Em Down," Wired Online Magazine, October 17, 2001. <http://www.wired.com/news/politics/0,1283,47617,00.html> [6] Business Software Alliance, "Types of Piracy, " Business Software Alliance, 2004. <http://www.bsa.org/usa/antipiracy/Types-of-Piracy.cfm> [7] Copyright Law of the United States of America, US Copyright Office. <http://www.copyright.gov/title17/92chap1.html#102> [8] Travel Pictures. <http://www.cs.unm.edu/~dlchao/travel/> [9] Business Software Alliance, "Sixth Annual BSA Global Software Piracy Study," Business Software Alliance, June 2000. <http://global.bsa.org/resources/2001-05- 21.55.pdf> [10] The Complete Reference to the Web Sites of China Law, <http://www.chinasite.com/Law.html> [11] Markkula Center for Applied Ethics,<http://www.scu.edu/ethics/>
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.