Tuesday, March 24, 2015

Software Piracy
Piracy is a growing concern throughout the software industry, and many people don't know when they are violating the software license agreement or that they have installed pirated versions of software.
Software piracy can take the following forms:
·        Installing and using software on the machine of an individual who is not the licensed user:
  • ·        Over-installing software for use beyond the licensed quantity
  • ·        Using the software on more “designated computers” than you are licensed for
  • ·        Installing the software on a local-area network for use by individuals who are not licensed users
  • ·        Using the software in unauthorized geographical regions
  • ·        Acquiring academic or student software for commercial use


Internet Piracy
Internet piracy occurs when users download software from the Internet. The same purchasing rules apply to online software purchase as to those bought in traditional ways. Examples:
  • ·        Pirate Web sites that make software available for free download, or that post cracked passcodes
  • ·        Internet auction sites that offer counterfeit, out-of-channel, or copyright-infringing software
  • ·        Peer-to-peer networks that enable unauthorized transfer of copyrighted programs


Why is preventing piracy important?
Developing software is a team effort that involves the creative ideas and talents of development engineers, writers, and designers. Computer software, just like other creative works, is protected by copyright laws. Our goal is to accelerate the pace of discovery, innovation, development, and learning in engineering and science through the software we create. To this end, we make substantial and continuing research and development efforts, which are funded through the sales of our software products.
Software piracy hurts everyone because it:
  • ·        Reduces the funding for ongoing development efforts
  • ·        Reduces job opportunities
  • ·        Allows for unauthorized copies of our software that may contain bugs and viruses to be used in the field
  • ·        Prevents users from getting high-quality technical support and product updates

  • Piracy is not only a problem of Microsoft Company. It is an industry and worldwide issue.

Software Piracy is stealing. If you or your company were caught pirating software, you could be held liable under both civil and criminal law. If a copyright owner brings a civil action against you.
How can I help to keep my software licenses compliant?
There are several good ways to keep track of your licenses and users:
·        Use available software asset management systems, audit tools, and other resources to help you ensure software compliance
  • ·        Educate your staff on the licensing requirements of your software purchases
  • ·        Conduct a self-audit of your software licenses
  • ·        Acquire any licenses needed for full compliance


What is software companies doing to prevent piracy?
Software companies have formed a License Compliance Team to help educate customers on the legal use of software licenses and to coordinate anti-piracy efforts. The team's activities include:
  • ·        Developing customer communications on the legal use of our software licenses
  • ·        Working with individual customers to resolve licensing concerns
  • ·        Participating in the Business Software Alliance (BSA), an organization dedicated to promoting a safe and legal digital world
  • ·        License Compliance Audits - Like many software companies, they uses a license compliance audit process, assisted by an independent third-party auditing firm. Selected customers are notified in advance to discuss audit timing and procedures - this is done in a manner to minimize the impact to daily operations during the process.

The only secure method of protecting software is not giving it to the user. You'll notice you can't "pirate" Google Docs, for example. Ultimately, if you're trying to secure something, you have to assume they have full knowledge of anything you give them. You can't trust the client. This applies to preventing piracy just as much as it does to protecting a system against being compromised.
Since the existing software distribution models are based around giving the client the whole package and then attempting to protect it on hardware the potential attacker controls, the distribution model is incompatible with any concept of "unpirateable" software.

Therefore, a combination of approaches- new laws, technical solutions, and privacy policies-is required to balance the scales. Reasonable limits must be set on government and business access to personal information; new information and communication technologies must be designed to protect rather than diminish privacy; and appropriate corporate policies must be developed to set baseline standards for people’s privacy. Education and communication are essential as well.

No comments:

Post a Comment