Paper Details  
 
   

Has Bibliography
8 Pages
2082 Words

 
   
   
    Filter Topics  
 
     
   
 

Software Piracy

nternet. This type of piracy is usually at no charge to the end user and is usually open to many people. The fourth type of software piracy is known as counterfeiting. This is the illegal duplication and sale of copyrighted/illegal software. This can be a very complex and sophisticated way of piracy. This can include a relatively significant effort to duplicate the original packaging, logos and other anti-counterfeiting techniques such as holograms. This type of piracy can also be very unsophisticated by the copying of the software and placing different of different labels on the copied media and then just blatantly selling it to whomever they choose. This is not just the distributing of pirated software this is the selling of the software with a motive for undue profit. The fifth method of software piracy is over computer networks. A network is a series of computers physically linked to one or more main computers called servers. Each server stores the software for all the computers it serves. Each time a computer accesses the server for a program it copies the program on to the local computer for use. This in itself is legal but the owner of the network must have licenses for each copy of a program that is being used otherwise this is copyright infringement. The sixth and final type of software piracy is known as 'Software Rental.' This is where software is "rented" to individuals who typically copy the software to their individual computers and return the original rented piece of software to the renter. This method of piracy is not as common as the rest due the nature of the distribution but it does exist. The Software Publishers Association (S.P.A.) have sued the owner of a store located in Winnipeg called 'Microplay' for the renting of software to its customers. This type of piracy does exists but it is usually halted soon after it starts. These are the many ways that software piracy can be and is committed. Even th...

< Prev Page 3 of 8 Next >

    More on Software Piracy...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA