SlideShare a Scribd company logo
2
Most read
7
Most read
14
Most read
SOFTWARE PIRACY
BY:- TIWARI AKHIL
BCA SEM-VI
What is software piracy?
 Software piracy is the unauthorized copying or
distribution of copyrighted software.
 Software piracy can be done by copying, downloading,
sharing, selling or installing multiple copies of
software onto personal or work computers.
 If you make more copies of the software or install the
software more times than the license permits, upload
software code to a website so that others can download
and use it, share software license codes or activation
keys, or in some cases, share your user ID and
password for a web-based software application (‘cloud’
computing), you are pirating software and breaking
the law.
Examples of software piracy include:-
Distributing software or mobile apps from the Internet
in a manner that violates the license terms
Buying a single copy of a software program and
installing it without authorization on multiple devices
Making and/or sharing copies of installation CDs
Sharing the login credentials (without authorization)
used to access a web-based software application
(“Software as a Service”)
Software piracy
Top 10 Most Pirated Software
of 2017
 Microsoft Office
 Adobe Photoshop
 Windows 10
 Adobe Premiere
 Final Cut Pro
 Adobe Illustrator
 Ableton Live
 Windows 7 (Why?)
 Avast
 Sony Vegas
TYPES OF SOFTWARE PIRACY
 1. Soft Lifting
 2. Hard Disk Loading
 3. Renting
 4. OEM Unbundling
 5. Counterfeiting
 6. Online Piracy
 1. Soft Lifting
 Means sharing a program with someone who is
not authorized by the license agreement to use it.
 Also known as soft loading.
 A common form of soft lifting involves
purchasing a single licensed copy of software and
then loading the software onto several computers
2. Hard Disk Loading
 Often committed by hardware dealers
 This form of piracy involves loading an unauthorized
copy of software onto a computer being sold to the end
user.
 To attract customers
 3. Renting
 Renting involves someone renting out a copy of
software for temporary use, without the permission of
the copyright holder.
 The practice, similar to that of renting a video from
Blockbuster, violates the license agreement of
software.
4. OEM Unbundling
Means selling stand-alone software originally meant to
be included with a specific product.
 An example of this form of piracy is someone
providing drivers to a specific printer without
authorization.
5. Counterfeiting
 Means producing fake copies of software, making it
look authentic.
 This involves providing the box, CDs, and manuals, all
designed to look as much like the original product as
possible.
Software piracy
6. Online Piracy
 The fastest-growing form of piracy is Internet piracy.
 There are hundreds of thousands of "warez" sites
providing unlimited downloads to any user.
Effects of Piracy
On the Industry
 Reduces profits for the software developer.
 Reduces development money for future
products.
On the Pirate
 Expense, embarrassment, ethically wrong.
 Fines up to $250,000.
 Jail sentence of up to 5 years.
 payment of legal fees.
Simple steps to avoid piracy
 Buy from an authorized dealer.
 Understand what it is you are buying.
 Check the prices and ask for receipts.
 Be sure you are given a license.
 Retain the original media.
 Call the software publisher.
CONCLUSION
 Software piracy is theft of intellectual property.
 Developers invest time and money to develop a
product and deserve to make a fair profit, so they can
develop new products in future.
 The damage done to the industry and legitimate end
users does not balance the few advantages that piracy
does have.
Software piracy

More Related Content

PPTX
Presentation on Software Piracy
PDF
AirBnB Pitch Deck
PDF
Technopreneurship: What it is and What its not
PPTX
LDAP - Lightweight Directory Access Protocol
PPTX
IP addressing and Subnetting PPT
PPTX
Software piracy
PPT
Theft
PPT
Business Plan Powerpoint 1
Presentation on Software Piracy
AirBnB Pitch Deck
Technopreneurship: What it is and What its not
LDAP - Lightweight Directory Access Protocol
IP addressing and Subnetting PPT
Software piracy
Theft
Business Plan Powerpoint 1

What's hot (20)

PPT
Software Piracy Powerpoint
PPTX
Cyber Forensics Overview
PPTX
Computer worms viruses and Prevention
DOCX
Cyber laws with case studies
PPT
Software Piracy
PPTX
Cybercrime and Security
PPTX
Cyber crime
PPTX
Cyber crime
PPTX
Introduction to Cyber Crime
PPTX
SOFTWARE PIRACY.pptx
PPTX
Cybercrime investigation
PPTX
Privacy , Security and Ethics Presentation
PPTX
Cyber Crime
PPTX
Cyber forensics ppt
PPTX
cyber stalking
PPTX
Cyber Crime
PPTX
Cyber crime lecture one definition and nature
PPTX
Cyber attack
PPT
Network Security Threats and Solutions
Software Piracy Powerpoint
Cyber Forensics Overview
Computer worms viruses and Prevention
Cyber laws with case studies
Software Piracy
Cybercrime and Security
Cyber crime
Cyber crime
Introduction to Cyber Crime
SOFTWARE PIRACY.pptx
Cybercrime investigation
Privacy , Security and Ethics Presentation
Cyber Crime
Cyber forensics ppt
cyber stalking
Cyber Crime
Cyber crime lecture one definition and nature
Cyber attack
Network Security Threats and Solutions
Ad

Similar to Software piracy (20)

PPTX
Soft piracy
PPT
Bauer Heather Software Piracy
PPT
Chapter 7 Copy Rights And Intellectual Property
PPTX
SOTWARE INFRINGEMENT
PPTX
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
PPT
Aiims Chip
PPT
Aiims Chip
PDF
swpiracyslideshare-180302131348.pdf
PPT
Introduction to Software Licensing
PDF
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
PPTX
iGCSE Theory Unit 6 – Effects of Using ICT
PDF
Ce hv6 module 50 software piracy and warez
PPTX
Understand the importance of getting only genuine software
PPT
Copyright Ingringement
PPTX
Software piracy athira
PDF
Cisco cybersecurity essentials chapter 3
PDF
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
PPTX
SOFTWARE PIRACY.pptx
PPTX
You think you are safe online. Are You?
Soft piracy
Bauer Heather Software Piracy
Chapter 7 Copy Rights And Intellectual Property
SOTWARE INFRINGEMENT
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
Aiims Chip
Aiims Chip
swpiracyslideshare-180302131348.pdf
Introduction to Software Licensing
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
iGCSE Theory Unit 6 – Effects of Using ICT
Ce hv6 module 50 software piracy and warez
Understand the importance of getting only genuine software
Copyright Ingringement
Software piracy athira
Cisco cybersecurity essentials chapter 3
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
SOFTWARE PIRACY.pptx
You think you are safe online. Are You?
Ad

Recently uploaded (20)

PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
communication and presentation skills 01
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
737-MAX_SRG.pdf student reference guides
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Artificial Intelligence
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
R24 SURVEYING LAB MANUAL for civil enggi
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
communication and presentation skills 01
Module 8- Technological and Communication Skills.pptx
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
Categorization of Factors Affecting Classification Algorithms Selection
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Fundamentals of safety and accident prevention -final (1).pptx
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Management Information system : MIS-e-Business Systems.pptx
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Abrasive, erosive and cavitation wear.pdf
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
737-MAX_SRG.pdf student reference guides
Information Storage and Retrieval Techniques Unit III
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Artificial Intelligence
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx

Software piracy

  • 1. SOFTWARE PIRACY BY:- TIWARI AKHIL BCA SEM-VI
  • 2. What is software piracy?  Software piracy is the unauthorized copying or distribution of copyrighted software.  Software piracy can be done by copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.  If you make more copies of the software or install the software more times than the license permits, upload software code to a website so that others can download and use it, share software license codes or activation keys, or in some cases, share your user ID and password for a web-based software application (‘cloud’ computing), you are pirating software and breaking the law.
  • 3. Examples of software piracy include:- Distributing software or mobile apps from the Internet in a manner that violates the license terms Buying a single copy of a software program and installing it without authorization on multiple devices Making and/or sharing copies of installation CDs Sharing the login credentials (without authorization) used to access a web-based software application (“Software as a Service”)
  • 5. Top 10 Most Pirated Software of 2017  Microsoft Office  Adobe Photoshop  Windows 10  Adobe Premiere  Final Cut Pro  Adobe Illustrator  Ableton Live  Windows 7 (Why?)  Avast  Sony Vegas
  • 6. TYPES OF SOFTWARE PIRACY  1. Soft Lifting  2. Hard Disk Loading  3. Renting  4. OEM Unbundling  5. Counterfeiting  6. Online Piracy
  • 7.  1. Soft Lifting  Means sharing a program with someone who is not authorized by the license agreement to use it.  Also known as soft loading.  A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computers
  • 8. 2. Hard Disk Loading  Often committed by hardware dealers  This form of piracy involves loading an unauthorized copy of software onto a computer being sold to the end user.  To attract customers
  • 9.  3. Renting  Renting involves someone renting out a copy of software for temporary use, without the permission of the copyright holder.  The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software.
  • 10. 4. OEM Unbundling Means selling stand-alone software originally meant to be included with a specific product.  An example of this form of piracy is someone providing drivers to a specific printer without authorization.
  • 11. 5. Counterfeiting  Means producing fake copies of software, making it look authentic.  This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible.
  • 13. 6. Online Piracy  The fastest-growing form of piracy is Internet piracy.  There are hundreds of thousands of "warez" sites providing unlimited downloads to any user.
  • 14. Effects of Piracy On the Industry  Reduces profits for the software developer.  Reduces development money for future products. On the Pirate  Expense, embarrassment, ethically wrong.  Fines up to $250,000.  Jail sentence of up to 5 years.  payment of legal fees.
  • 15. Simple steps to avoid piracy  Buy from an authorized dealer.  Understand what it is you are buying.  Check the prices and ask for receipts.  Be sure you are given a license.  Retain the original media.  Call the software publisher.
  • 16. CONCLUSION  Software piracy is theft of intellectual property.  Developers invest time and money to develop a product and deserve to make a fair profit, so they can develop new products in future.  The damage done to the industry and legitimate end users does not balance the few advantages that piracy does have.