Software Piracy
Piracy is a
growing concern throughout the software industry, and many people don't know
when they are violating the software license agreement or that they have
installed pirated versions of software.
Software piracy can take the following forms:
·
Installing and using software on the machine of an individual who is not
the licensed user:
- · Over-installing software for use beyond the licensed quantity
- · Using the software on more “designated computers” than you are licensed for
- · Installing the software on a local-area network for use by individuals who are not licensed users
- · Using the software in unauthorized geographical regions
- · Acquiring academic or student software for commercial use
Internet Piracy
Internet piracy occurs when users download software from the Internet.
The same purchasing rules apply to online software purchase as to those bought
in traditional ways. Examples:
- · Pirate Web sites that make software available for free download, or that post cracked passcodes
- · Internet auction sites that offer counterfeit, out-of-channel, or copyright-infringing software
- · Peer-to-peer networks that enable unauthorized transfer of copyrighted programs
Why is
preventing piracy important?
Developing
software is a team effort that involves the creative ideas and talents of
development engineers, writers, and designers. Computer software, just like
other creative works, is protected by copyright laws. Our goal is to accelerate
the pace of discovery, innovation, development, and learning in engineering and
science through the software we create. To this end, we make substantial and
continuing research and development efforts, which are funded through the sales
of our software products.
Software
piracy hurts everyone because it:
- · Reduces the funding for ongoing development efforts
- · Reduces job opportunities
- · Allows for unauthorized copies of our software that may contain bugs and viruses to be used in the field
- · Prevents users from getting high-quality technical support and product updates
- Piracy is not only a problem of Microsoft Company. It is an industry and worldwide issue.
Software Piracy is
stealing. If you or your company were caught pirating software, you could be
held liable under both civil and criminal law. If a copyright owner brings a
civil action against you.
How can I help to keep my software licenses
compliant?
There are several good ways to keep track of your licenses and users:
·
Use available software asset management systems, audit tools, and other
resources to help you ensure software compliance
- · Educate your staff on the licensing requirements of your software purchases
- · Conduct a self-audit of your software licenses
- · Acquire any licenses needed for full compliance
What is software
companies doing to prevent piracy?
Software companies have formed a License Compliance Team to help educate
customers on the legal use of software licenses and to coordinate anti-piracy
efforts. The team's activities include:
- · Developing customer communications on the legal use of our software licenses
- · Working with individual customers to resolve licensing concerns
- · Participating in the Business Software Alliance (BSA), an organization dedicated to promoting a safe and legal digital world
- · License Compliance Audits - Like many software companies, they uses a license compliance audit process, assisted by an independent third-party auditing firm. Selected customers are notified in advance to discuss audit timing and procedures - this is done in a manner to minimize the impact to daily operations during the process.
The only secure method of protecting software is not giving it to the user. You'll notice you can't "pirate" Google Docs,
for example. Ultimately, if you're trying to secure something, you have to
assume they have full knowledge of anything you give them. You can't trust the
client. This applies to preventing piracy just as much as it does to protecting
a system against being compromised.
Since the
existing software distribution models are based around giving the client the
whole package and then attempting to protect it on hardware the potential attacker controls, the distribution model is incompatible with any concept
of "unpirateable" software.
Therefore, a
combination of approaches- new laws, technical solutions, and privacy
policies-is required to balance the scales. Reasonable limits must be set on
government and business access to personal information; new information and
communication technologies must be designed to protect rather than diminish
privacy; and appropriate corporate policies must be developed to set baseline
standards for people’s privacy. Education and communication are essential as
well.