What are the Prospects for Stopping Software Piracy?
|
|
- Christiana Miles
- 8 years ago
- Views:
Transcription
1 Repicky - p0 What are the Prospects for Stopping Software Piracy? A research paper written by Matthew Repicky in partial fulfillment of requirements for a course in computer-related crime at the Rochester Institute of Technology, May Abstract: Individual processes involved in the creation, duplication, distribution and use of pirated software are explored to determine which path or paths of social response are best suited to controlling the problem of copyright infringements on the intellectual property.
2 Repicky - p1 Introduction and Literature Review Software piracy is a worldwide problem causing financial losses to major software companies. In the Unites States the nationwide total for retail losses due to software piracy totaled $2.6 billion (BSA 2001). According to the same report Japan and China had the 2 nd and 3 rd greatest losses of $1.6 billion and $1.2 billion respectively. Software piracy is the illegal duplication of copyrighted information or the failure to abide by the license agreements of legally obtained software. Inside of this broad definition lie three steps in the process of software piracy, including the most common occurrence of software piracy known as softlifting. The first step of software piracy is acquiring software and copying it from its original form or creating new software based upon the intellect behind the original product. The second step involves the distribution of the illegal product, most commonly using means of the Internet or copies of the program on a CD-Rom. The third and final step in software piracy and copyright infringements involves the receiving of known pirated software or using legally purchased software in a way that the license does not permit. This third step is referred to as softlifting. Depending upon what surveys you look at and when they were conducted, it is estimated that for every legally purchased and used copy of software there is anywhere between two to ten instances of software piracy for the same product. Realistically, these figures are merely guesses, because a measure cannot be obtained for something that isn t reported. A closer figure would most likely be the current national average rate for software piracy 24 % (BSA 2001). That means that nearly one in every four of all software in the United States is pirated. The
3 Repicky - p2 numbers out of this report are still estimates; however, they are developed through a comparison of gathered data for supply and demand of applications and are not mere guesses. Why people pirate software has been analyzed for several years. Anonymous questionnaires like the kind in Table 1 have been used to compile data on why people pirate software and why people purchase software. The data that has been collected suggests that there are nine major reasons for software piracy, listed in Table 3. The data also suggests ten reasons for purchasing software as opposed to pirating it, listed in Table 2. All of these major reasons can be simplified to a decision process using the price (p) of the product, the cost (c) involved in pirating the software and the value (v) that the product has to the user. BUY if P </= (min (V, C), PIRATE if C < min (P, V), and DO WITHOUT if V < min (P, C). The nine reasons behind software piracy from Table 3 lend weight to lessening the cost of software piracy, justification for piracy because the price of the product is too high and lessening the estimated value of the program to further prove that the price is too high for the value of the program. On the opposite side the ten reasons to purchase software from Table 2 factor into the formula by raising the cost of piracy. Each reason from the table relates to increase of risk, sacrificing something that comes with the purchased product, or making it harder to obtain the pirated software which increases the overall cost of piracy. This simple set of choices represents the major part of the decision making process that each person goes through when choosing whether or not to pirate software. The first case, when the price is less than the value that the product has to the customer or is less than the assigned cost of pirating software, the person would buy the product. The cost of pirating software does not mean literally going out and
4 Repicky - p3 buying pirated software. It mostly relates to the fear of getting caught and the difficulty to obtain a pirated copy of the product. If the cost of pirating the software is less than the price or value of the product, then in most cases the person would pirate the software. And finally if the value that the product has is less than either the price of the product or the cost of pirating it, then the person would neither purchase nor pirate the software, but instead do without it. There are both civil and criminal laws in place to combat software piracy. One might have to pay $250,000 along with the possibility of up to 5 years in jail if pressed with criminal charges. Along with the possibility of criminal charges, civil charges may also be brought against any offenders by the owners of the software. Civil penalties can include actual damages, which can be the loss that the developing company sustained from the illegal piracy along with the profits that can be tied with the use of the pirated software, and statutory damages which can be up to $150,000 for each program illegally pirated. Currently two organizations, Business Software Alliance and Software & Information Industry Association, perform audits on companies to determine whether the software that is being used has legitimate licenses and complies with copyright laws. If companies do not voluntarily submit to these audits civil lawsuits are often filed and proceedings continue from there. BSA is the voice of some 19 software developers including Microsoft, Adobe, Compaq, Dell, Intel and Apple. Auditing large and small corporations is one thing, but to prevent software piracy in the homes and among individual users becomes a whole separate problem. Using the Internet or borrowing legally purchased software from an associate or friend allows an unknown number of people to pirate software. To stop software piracy for this faceless and unknown multitude of
5 Repicky - p4 people is nearly an impossible task. Onto whom should the burden be placed of checking to find out where the use of pirated software is taking place? The scope of software piracy has to be broadened beyond just the actions occurring domestically in the United States. Software piracy needs a global solution to a worldwide problem. With the Internet breaching nations borders, pirated software distributors can provide the software to home users in a totally different country from where they are or where the site is that has software. Currently law enforcement concentrates on the makers and distributors of pirated software which may be the only answer; however, with the anonymity of the Internet and the rate at which sites change, move and are replaced, catching and stopping the software pirates is not an easy job. The question therefore is: What are the prospects of stopping software piracy? Methodology and Analysis To construct an analysis of how to best stop software piracy in all its forms, five social responses have been applied to theoretical situations and the reasons for pirating or purchasing software from Tables 2 and 3. The goal is to determine if any one or combination of the social responses can stop the three steps in the process of software piracy. The first social response is education. The goal of education is to instill in people the moral fibers that they are lacking when it comes to software piracy. Educating people that pirating software hurts the developing company by lowering its profits, hurts consumers by rising of the price of the product and that it affects the economy in causing job losses and the loss of taxes that should go back to the government. Where education needs to be the most effective is in the instance of Table 4. Table 4 shows both people who pirate and do not pirate software
6 Repicky - p5 and compares their reactions to the same statements. Not only is it necessary to teach the people who do not pirate software what is the difference between legal and illegal, there exists a need to provide the lacking morals in those software pirates that know that what they are doing is wrong but continue to do it anyways. The test of this social response is carried through with the reading of an article collected from Issues in Accounting Education, Instructional Case: Software Piracy Who does it impact? The article is meant to teach accounting students the issues in legality related to software piracy; however, it could be a good instrument to teach people the effect their actions have on others. A main misconception of software piracy is that it is a victimless crime. Using this article it is possible to show that there are possible consequences to each action. Unfortunately to those people who read the article and then answered whether or not it would affect their pirating software in the future, they answered that it would not dissuade them from continuing in software piracy. The second social response is public law enforcement. This directly relates to the attitude that the thief believes he or she has little chance of being caught (Table 3). This is still true for the most part. The individual user has very little to fear because law enforcement cannot nearly track each and every instance of software piracy. Law enforcement can merely tackle the larger distributors and makers or copiers of the software. The best case example of this is right here at RIT. Six computers were seized from six students that were connected in a warez group. This action was taken and done successfully; however, the current state of software piracy on campus has not stopped nor even quelled from its original state, but has probably become worse than ever before.
7 Repicky - p6 The third response comes from the private sector, meaning business. Businesses can file lawsuits for each case of software piracy that they can prove. The trial of every instance of software piracy, once again, is nearly impossible and shares many of the problems faced by the enforcement of the laws. For this reason development companies generally stick with large lawsuits that they can win against other companies and receive restitution in a large sum of money. A major example of how this works is in the Lotus Development Corporation s lawsuits against Rixon Corporation and a health care organization in Tennessee for over $10 million well over 15 years ago (Christensen 1991). The lawsuits were settled out of court. Similar lawsuits are still filed today if and when major companies fail to comply with software licensing. Another way businesses can help stop software piracy is to track down Internet sites that are distributing the copyrighted product, and take steps to get those sites shut down. Microsoft has brought legal action against internet sites located in 27 countries on 6 continents (Phillpot 2000). The fourth response comes from technology. The development of new technologies will bring a halt to software piracy by securing the information and forcing users to conform to using the software according to the licensing agreement. New technology is a promising way to keep people from copying the CDs that products are distributed on; however, we have seen technologies introduced in the past which have been ineffective and have been bypassed by software pirates in order to once again distribute the information freely. From the user [RIT]Browndog in a chat window in Direct Connect, a file sharing program: New Technology to stop software piracy is such a joke, just as soon as it comes out so will the ability to break it.. It may sound like overconfidence in the ability of software pirates to outdo the software developers, but as patterns have shown from the past it is true. An example of failed technology is Microsoft s Windows XP. It was initially designed so that it would not be able to be pirated
8 Repicky - p7 for use on many systems because each copy would be registered with Microsoft. It is capable, however, with the pro version of Windows XP to not register the operating system and just continue use like normal. The only requirement is that a valid key is obtained. An example of a successful technology shift is in the multi-player game Half-Life. Prior to recent updates, in previous versions of the game it was possible to play the game online with up to three computers at the same time using the same CD-Key. This was made possible because there were three servers that checked for unique keys, but did not share with each other which keys were in use. This along with the ability to set which server to use for authentication allowed for three users to connect to the three different servers at the same time with the same key. Once each user was authenticated, they could play on any of the game servers on the Internet. With the change from version to Sierra, the developers of Half-Life fixed the problem and made it such that every CD-Key can only be in use by one person at one time. This meant that people who were sharing keys would have to go and get their own if they wished to play online while their friends are online. The success was noticeable in Media Play, Best Buy and Comp USA, stores located nearby RIT, Rochester Institute of Technology, where the shelves quickly sold out of copies of the game. The fifth and final response is to lower the prices. This may seem like giving in to software pirates and for the most part it is. However, if the price becomes less costly than pirating of the software or the value of it to the user, then it is most likely that the user will purchase the software. The main goal should not be to just stop software piracy, but also to try to convert people who are pirating software into buying legal copies of their software for the future and also attract those people that decided to just do without the program. Of the reasons listed in Table 3 to pirate software, the highest ranked reasons are that software is too expensive,
9 Repicky - p8 the user just wants to try out the software, they can t afford the software, and they are only planning on using it for a short while. Two of these reasons are associated with the price (p) of the product and the other two are associated with the value (v) of the product to the user. From this table it is apparent that the problem is that users feel the program is not worth the price tag that accompanies it. This comes back to the original three pathway decision process where the users are pirating because the cost to pirate (c) is less than the both the price and the value of the software. It is evident that when the compulsion to pirate software is at its highest is when the user wants to try out the software for a short period of time, meaning that the program is not of very high value to the user and the price of the software is more than the user feels that the software is worth. Therefore from the formula, p > v so the user is not going to buy the product no matter what cost it is to them to pirate the software. The final determining factor to whether or not the user will pirate the software is dependant upon whether the value is greater than the cost to pirate, c < v. Whether c < v will determine on each particular user and his or her qualms about pirating software and how difficult it is for him or her to obtain pirated software. Findings, Conclusion and Recommendations The best way to prevent software piracy is not going to be found in any one of these social responses. Instead a possible solution could be found in a combination of responses each aimed at a different step in the process. Lowering the prices for the product is the first step and one of the most effective means of controlling software piracy aimed at the users of the software. Along with the lower prices, targeting the distributors of software piracy using either law enforcement or through better technology, making it impossible to copy software, will provide the ability to slow down if not stop software piracy. By lowering the price (p) and raising the
10 Repicky - p9 cost (c), the decision path of buying the software becomes the most fitting expression. If p < min(v, c) where v stays the same, but c increases and p decreases, then the chances increase that p will become less than c and the user will purchase the software. The only other possibility to stop software piracy is to cause software pirates to fear what they are doing. If software pirates fear that what they are doing will get them into trouble the majority of them will stop pirating and start buying their software. Currently, software piracy is like stepping onto a people mover at an airport. You just step on and let it take you past all the slower people walking, bypassing the traffic. There is no effort involved and no worries either. With software piracy the ability to remain anonymous and yet quickly get free software is too appealing without any drawbacks. The only way to scare a software pirate is to take away all the programs they have, their computer, and their ability to get more.
11 Repicky - p10 Apendix: Table 1. Research Instrument In the first column, please rank the reasons/motivations/justifications for purchasing a software package; in the second column do the same for copying without purchasing a software package. (1 is the most important motivation, 2 is the second most important, etc.). Put the number 0 next to any reasons that in your opinion are not important or do not apply. Reasons to purchase Required for school work or workplace Use the software all the time Availability of manual Can use technical support in case of problems It's the law Can't find someone who has it It's school/company policy Don't have to worry about computer viruses Stay informed of upgrades Prestige of having own copy Other (if any) Reasons to copy Only use it for a short time It is easy to copy software Software too expensive New version is coming up Want to try out the software Software license too restrictive Little chance of being caught Most people I know copy software Can't afford the software Other (if any) -----
12 Repicky - p11 Table 2. Why Individuals Purchase Software Legend for Chart: A - Order of importance B - Reason to purchase software C - Mean D - Standard deviation E - Signif. test t stat. (p value) A B C D E P value 1 Required for school work or workplace N/A 2 Use the software all the time Availability of manual It's the law Can use technical support in case of problems It's school/company policy Can't find someone who has it Don't have to worry about computer viruses Stay informed of upgrades Prestige of having own copy Table 3. Why Individuals Pirate Software A B C D E P value 1 Software too expensive N/A 2 Want to try out the software Can't afford the software Only use it for a short time It's easy to copy software New version is coming up Little chance of being caught Most people I know copy software Software license too restrictive *Table 1-3 comes from Cheng, Hsing K.; Sims, Ronald R.; Teegen, Hildy To Purchase or to Pirate Software: an Empirical Study, Journal of Management Information Systems, Spring 97 Vol. 13 Issue 4, p49. Business Source Premier. EBSCO. Wallace Library
13 Repicky - p12 TABLE 4. KNOWLEDGE AND AWARENESS OF COPYRIGHT LAWS Legend for Chart: A - STATEMENTS CONCERNING COPYRIGHTED SOFTWARE: B - PERCENTAGE AGREEING WITH STATEMENTS, WHO PIRATE SOFTWARE C - PERCENTAGE AGREEING WITH STATEMENTS, WHO DO NOT PIRATE SOFTWARE B C 1. It is illegal to purchase and 29.6% 30.6% use on multiple machines. 2. It is illegal if purchased by school 49.5% 55.6% and used on my home computer. 3. It is illegal if purchased by employer 69.1% 80.6% and used on my home computer. 4. It is illegal if purchased by friends 73.2% 99.9% and used on my home computer.[a] 5. It is illegal to possess 32.3% 25.0% unauthorized software. 6. The copyright laws are 3.3% 5.7% enforced strongly. 7. I have read the licensing agreement 50.0% 51.4% on software packages. a significant at p <.055 *Table 4 comes from Christensen, Anne L.; Eining, Martha M. Factors influencing software piracy; Implications for accountants Journal of Information Systems Spring 91, Vol. 5 Issue 1, p67. Business Source Premier. EBSCO. Wallace Library
14 Repicky - p13 Bibliography Business Software Alliance (BSA) Global Home Page - Business Software Alliance 2000 U.S. Software State Piracy Study ; BSA 2001 Cheng, Hsing K.; Sims, Ronald R.; Teegen, Hildy To purchase or to pirate software: An empirical study Journal of Management Information Systems, Spring97, Vol. 13 Issue 4, p49. Business Source Premier. EBSCO. Wallace Library Christensen, Anne L.; Eining, Martha M. Factors influencing software piracy; Implications for accountants Journal of Information Systems Spring 91, Vol. 5 Issue 1, p67. Business Source Premier. EBSCO. Wallace Library Christensen, Anne L; Eining, Martha M. Instructional Case: Software piracy -- who does it impact Issues in Accounting Education. Spring 94, Vol. 9 Issue 1, p 151. Business Source Premier. EBSCO. Wallace Library Christensen, Kory D. Fighting software piracy in Cyberspace: Legal and technological solutions Law & Policy in International Business. Winter 97, Vol. 28 Issue 2, p435. Business Source Premier. EBSCO. Wallace Library Conner, Kathleen Reavis; Rumelt, Richard P. Software Piracy: An analysis of protection strategies Management Science. Feb 91, Vol. 37 Issue 2, p125. Business Source Premier. EBSCO. Wallace Library Givon, Moshe; Mahajan, Vijay Software piracy: Estimation of lost sales and the impact on software diffusion. Journal of Marketing, Jan 95, Vol. 59 Issue 1, p29. Business Source Premier. EBSCO. Wallace Library Goldman, Neal D Software theft: A $4.5 billion headache Business Forum, Spring 92, Vol. 17 Issue 2, p10. Business Source Premier. EBSCO. Wallace Library Gopal, Ram D.; Sanders, G. Lawrence Preventive and deterrent controls for software piracy Journal of Management Information Systems, Spring97, Vol. 13 Issue 4, p29. Business Source Premier. EBSCO. Wallace Library Phillpot, Julia How to beat software piracy Sep 2000, Issue 102, p3 ABI/Inform Global. Proquest. Wallace Library Ramakrishna, H.V.; Kini, Ranjan B.; Vijayaraman, B.S. Shaping of moral intensity regarding software piracy in university students: Immediate community effects Journal of Computer Information Systems. Summer 2001, Vol. 41 Issue 4, p47. Business Source Premier. EBSCO. Wallace Library
15 Repicky - p14 Robert Lemos Has the warez battle been won? ZDnet.com - Software & Information Industry Association Building the Digital Economy - Stolpe, Michael Protection against software piracy: a study of technology adoption for the enforcement of intellectual property rights Economics of Innovation & New Technology. Jan 2000, Vol. 9 Issue 1, p25. Business Source Premier. EBSCO. Wallace Library Thong, James Y.L.; Chee-sing Yap Testing an ethical decision-making theory: The case of softlifting Journal of Management Information Systems. Summer 98, Vol. 15 Issue 1, p213. Business Source Premier. EBSCO. Wallace Library Traphagan, Mark; Griffith, Anne Software piracy and global competitiveness: Report on global software piracy International Review of Law, Computers & Technology, Oct98, Vol. 12 Issue 3, p431. Business Source Premier. EBSCO. Wallace Library
Software Piracy: What You Should Know
Software Piracy: What You Should Know Whether you call it borrowing, copying, sharing or "fair use," software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college
More informationSoftware Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis
Software Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis We study a problem of two software firms competing on price in a market where consumers can choose between purchasing
More informationHow to Survive a Software Audit through Effective Software Management. By John Tomeny, Sassafras Software Inc.
assafras oftware Box 150, Hanover, NH 03755 (603) 643-3351 http://www.sassafras.com info@sassafras.com How to Survive a Software Audit through Effective Software Management By John Tomeny, Sassafras Software
More informationThe CFO s Guide to Document Retention: What Records to Keep and How Long?
The CFO s Guide to Document Retention: What Records to Keep and How Long? Abstract Chief Financial Officers must organize all of a business financial paperwork in order to protect the business from penalties,
More informationSoftware Copyright. 1. Introduction. Last update: July 2009
- 1. Introduction...1-1.1. The scope of this briefing paper...1-1.2. "Software" defined...1-2. What is software copyright?...2-3. The Community Directive on software copyright...3-3.1. What does software
More informationHow To Get A License From A Business To A Computer (For A Business)
Six Steps to Completing a Software Audit and Ensuring Compliance While Saving Money A Guide to Assessing Vulnerabilities and Ensuring Ongoing Software License Compliance 200 West Mercer Street Suite E300
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationWHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic
More informationIntroduction to Microsoft Small Business Server
Summary The aim of this article is to present some basic information about Small Business Server 2003 and how it can fit in with your business. Topics What is Small Business Server? (also known as SBS)
More informationSo why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a
Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,
More informationMUSIC, VIDEO AND SOFTWARE PIRACY POLICY
Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian
More informationSTRENGTHENING ANTICOUNTERFEITING CANADA
STRENGTHENING ANTICOUNTERFEITING LAWS and PROCEDURES in CANADA Canada Task Force INTA Anticounterfeiting Committee February 2013 I. Introduction: The Harms of Counterfeits Counterfeiting is the most serious
More informationTechnology Law Alert. Is Your Company Committing Software Piracy? (Before You Answer - Chances Are 1 in 4 That It Is!) Autumn 2001
Autumn 2001 Technology Law Alert The Facts Your company uses commercial software products on a daily basis. Management relies on a single IT person or IT department to install all of the company s commercial
More informationPIRATES OF THE DIGITAL MILLENNIUM
PIRATES OF THE DIGITAL MILLENNIUM By John Gantz and Jack B. Rochester Upper Saddle River, NJ, Financial Times Prentice Hall, 2005, ISBN0-13-246315-2 (Price $25.95) pp. 294. Reviewed by Rachel S. Leeds
More informationUS Environmental Protection Agency Office of Environmental Information GUIDELINES
US Environmental Protection Agency Office of Environmental Information GUIDELINES for the Software Management and Piracy Policy June 2003 IO 2104-G-01.0 (no former number) Purpose: Audience: The Environmental
More informationDefending Your Organization from the Software Police
PEOPLE & TECHNOLOGY Defending Your Organization from the Software Police If anyone in your organization copies software, you can be fined and sent to prison. Couldn t happen to you? Don t bet on it! BY
More informationTOP QUESTIONS ABOUT MICROSOFT AUDITS
20 TOP QUESTIONS ABOUT MICROSOFT AUDITS 1745 Broadway, 17th Floor, New York, NY 10019, USA Tel. 646 475 2103 The word audit scares many people, but if your company licenses software, you will be audited
More informationApplication for The Northwest Academic Computing Consortium (NWACC) Joanne R. Hugi Excellence Award
Application for The Northwest Academic Computing Consortium (NWACC) Joanne R. Hugi Excellence Award TITLE: INSTITUTION: DEPARTMENT: CATEGORY: Managing P2P File Sharing on a Residential Campus Central Washington
More informationSOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION
SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION Pamela A. Dupin-Bryant, Utah State University, pam.dupin-bryant@usu.edu ABSTRACT Software piracy,
More informationCITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION
CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer
More informationSOFTWARE PIRACY 2.0? ONLINE SHARING: DIGITAL MUSIC AND
DIGITAL MUSIC AND ONLINE SHARING: SOFTWARE PIRACY 2.0? Considering the similarities and unique characteristics of online file sharing and software piracy. Rapid advances in Internet connectivity and digital
More informationTHE IMPACT OF TECHNICAL COPY PROTECTION AND INTERNET SERVICES USAGE ON SOFTWARE PIRACY - AN INTERNATIONAL SURVEY ON SEQUENCER SOFTWARE PIRACY -
THE IMPACT OF TECHNICAL COPY PROTECTION AND INTERNET SERVICES USAGE ON SOFTWARE PIRACY - AN INTERNATIONAL SURVEY ON SEQUENCER SOFTWARE PIRACY - Djekic, Petar, Dept. of Media Management, University of Cologne,
More informationThe Case for a Processor Serial Number Control Unit
Introduction Cyber-Rights & Cyber-Liberties (UK) Report on the Intel 1 Pentium 1 III Processor Serial Number Feature Recently Intel have announced that the new Pentium III processor, due for release in
More informationINSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including
More informationEnd-User Software License Agreement
End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation
More informationAnchor Bay Schools Software Policy
Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual
More informationJuvenile Court Mock Trial
Juvenile Court Mock Trial CAST: One of the Judges of the juvenile court will preside. Defense Attorney: Attorney court tour guide. Prosecutor: Attorney court tour guide. A student selected by the teacher.
More informationSpecial Report: 5 Mistakes Homeowners Make When Selling A House. And The Simple Tricks To Avoid Them!
Special Report: 5 Mistakes Homeowners Make When Selling A House And The Simple Tricks To Avoid Them! 1 Special Report: 5 Mistakes Homeowners Make When Selling A House Dear Homeowner, And The Simple Tricks
More informationCommon Myths About Personal Injury and Wrongful Death Cases 1. By B. Keith Williams
Common Myths About Personal Injury and Wrongful Death Cases 1 By B. Keith Williams There are several myths about accident cases and the attorneys that handle them. It is important to keep these myths in
More informationVictims of Crime the help and advice that s available
Details about Victim Support Your local Victim Support Scheme is: Victims of Crime the help and advice that s available You can also contact the Victim Supportline on: 0845 30 30 900 Or, if you prefer,
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationCSCA0101 Computing Basics CSCA0101 COMPUTING BASICS. Chapter 7 Software
CSCA0101 COMPUTING BASICS Chapter 7 1 1. Computer Application 2. Types of Computer 3. Licensing 4. Types of License 5. Piracy 2 Computer software, or just software, is a collection of computer programs
More informationRingling College of Art and Design
Ringling College of Art and Design Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of the Ringling College of Art and Design Network Version 5 December 2010 12/16/10;
More informationJustifying projects in software license compliance
Justifying projects in software license compliance The role of software license compliance within an organization White paper Introduction... 2 Software license compliance the risk... 2 Sources of software
More informationA Game Cultural Tour of Brazil
A Game Cultural Tour of Brazil by James Portnow Part One Last month, business brought me to Brazil. I spent most of December wandering the country; talking to members of the industry and gamers alike.
More informationAn edited version of this article was published in the London Review of Books 37 (10), 21 May 2015, p.38 (www.lrb.co.uk)
An edited version of this article was published in the London Review of Books 37 (10), 21 May 2015, p.38 (www.lrb.co.uk) Spoofing Donald MacKenzie On April 21, the west London financial trader, Navinder
More informationYOUR LEGAL RIGHTS DURING
YOUR LEGAL RIGHTS DURING AND AFTER BANKRUPTCY: MAKING THE MOST OF YOUR BANKRUPTCY DISCHARGE Copyright April 2011, Legal Aid Society of Hawai`i All rights reserved. These materials may not be reproduced
More informationMusic and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationAn Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy
An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims
More informationPEER-TO-PEER FILE SHARING POLICY
1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,
More informationUCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?
UCO Copyright Compliance As members of the UCO community, all faculty and staff members are expected to comply with federal copyright law. Unauthorized use of copyrighted material is illegal and may result
More informationCONTROLLING. Your TRADES, MONEY& EMOTIONS. By Chris Vermeulen
CONTROLLING Your TRADES, MONEY& EMOTIONS By Chris Vermeulen INTRODUCTION In this condensed guide I have put together some key points which I think should be read a few times in order for these critical
More informationAPPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
More informationIntellectual Property
Intellectual Property Ethics and Computing Chapter 8 Summer 2001 CSE 4317: Intellectual Property 1 Motivation Most new ideas in the computer field involve intellectual property Intellectual property must
More informationProfessional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users
Professional Ethics for Computer Science Lecture 2: Ethics for IT Professionals and IT Users Klaus Mueller Computer Science Department Stony Brook University Objectives What key characteristics distinguish
More information! Insurance and Gambling
2009-8-18 0 Insurance and Gambling Eric Hehner Gambling works as follows. You pay some money to the house. Then a random event is observed; it may be the roll of some dice, the draw of some cards, or the
More informationA White Paper from AccessData Group. The Future of Mobile E-Discovery
A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+
More informationOffice of the City Auditor. Audit Report. AUDIT OF SOFTWARE LICENSE COMPLIANCE (Report No. A14-010) April 11, 2014. City Auditor. Craig D.
CITY OF DALLAS Dallas City Council Office of the City Auditor Audit Report Mayor Michael S. Rawlings Mayor Pro Tem Tennell Atkins AUDIT OF SOFTWARE LICENSE COMPLIANCE (Report No. A14-010) Deputy Mayor
More informationYOUR CITY/MUNICIPALITY
The Red Flags Rule What Companies Need to Know About Complying with the New Privacy Laws for Fighting Identity Theft Is YOUR CITY/MUNICIPALITY In Compliance FACTA / GLB Safeguard Rule / The RED FLAGS RULE?
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationMarch 10, 2014. Dear Chairman Coble and Representative Nadler:
March 10, 2014 Rep. Howard Coble, Chairman Rep. Jerry Nadler, Ranking Member United States House of Representatives Judiciary Subcommittee on Courts, Intellectual Property and the Internet 2138 Rayburn
More informationMonitoring & Managing Effective Compliance Programs
Monitoring & Managing Effective Compliance Programs BY LYNN FOUNTAIN, CPA, CGMA T here is no understating the importance of the establishment of a solid compliance program within today s business environment.
More informationSoftware Piracy in the Arab Region
EGM on Enabling Environment for the Development of Arabic e-services Beirut, 8-9 March 2011 Software Piracy in the Arab Region Status, Impact and the Way Ahead Mansour Farah Consultant on ICT for Development
More informationINSIDER TRADING. a. Charles Fogarty d. Texas Gulf Sulphur. b. Martha Stewart e. U.S. Security and Exchange Commission
Insider Trading 1 INSIDER TRADING PRE-READING QUESTIONS 1. What do you know about these people or organizations? a. Charles Fogarty d. Texas Gulf Sulphur b. Martha Stewart e. U.S. Security and Exchange
More informationTAXI and TLC-Licensee CASES
TAXI and TLC-Licensee CASES A Guide to Your Hearing at the OATH Tribunal 40 Rector Street, 6th Floor New York, NY TABLE OF CONTENTS Taxi and TLC-Licensee Cases Heard at OATH.......3 Should I Get a Lawyer?.
More informationSoftware Asset Management Guide
Software Asset Management Guide WHY MANAGE SOFTWARE ASSETS Introduction IN TODAY'S ECONOMY, software is indispensable to every organization, large and small. Thanks to software, businesses are more efficient
More informationGrand Rapids Public Schools
4250-R Printing and Duplicating Service- Copyright 4250-R In accordance with Board policy 4250, the following regulations will be observed to comply with the copyright laws of the United States. Under
More informationProfitable vs. Profit-Draining Local Business Websites
By: Peter Slegg (01206) 433886 07919 921263 www.besmartmedia.com peter@besmartmedia.com Phone: 01206 433886 www.besmartmedia.com Page 1 What is the Difference Between a Profitable and a Profit-Draining
More information3 of 138 DOCUMENTS. Copyright (c) 2000 The University of Texas School of Law American Journal of Criminal Law. Summer, 2000. 27 Am. J. Crim. L.
Page 1 3 of 138 DOCUMENTS Copyright (c) 2000 The University of Texas School of Law American Journal of Criminal Law Summer, 2000 27 Am. J. Crim. L. 433 LENGTH: 4112 words BOOK NOTE: Bringing the Tools
More informationTHE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY
Volume 4, No. 7, July 2013 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY Essam Said Hanandeh
More informationFAQ. Autodesk License Compliance. Version 3.0 01 03 2009. license.compliance.ne@autodesk.com
FAQ Autodesk License Compliance Version 3.0 01 03 2009 license.compliance.ne@autodesk.com FAQ on Autodesk License Compliance Contents End User License Agreement...2 Training...6 Product Activation Details...9
More informationHAVE NO PAPERS/ARE OUT OF STATUS/ UNDOCUMENTED
Families Beware! Fighting For Our Rights When Getting Deported 1. Who Can Be Deported? Any Non-Citizen is AT RISK of detention/deportation and can be deported by ICE (Immigration Customs Enforcement) if
More informationComputer Forensics: an approach to evidence in cyberspace
Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based
More informationStaying Legal: The Challenges of Font License Compliance WHITE PAPER. 1.866.366.8778 +1.520.229.1212 www.insidersoftware.com
Staying Legal: The Challenges of Font License Compliance WHITE PAPER 1.866.366.8778 +1.520.229.1212 Font Licensing is a Serious Issue Virtually all graphics workflows include fonts, but very few organizations
More informationHow Fashion and Luxury Brands are Turning the Tide Against Rogue Websites
White Paper How Fashion and Luxury Brands are Turning the Tide Against Rogue Websites Executive Summary As counterfeiting in digital channels proliferates, fashion and luxury brands find themselves in
More informationApple s Media Monopoly The Ethics of itunes and ipods
by Kristin Hammer Apple s Media Monopoly The Ethics of itunes and ipods French Lawmakers Get Involved in the Digital Music Dispute o n March 21, 2006, the French government voted 296 to 193 in favor of
More informationRestitution Basics for Victims of Crimes by Adults
Restitution Basics for Victims of Crimes by Adults If you are the victim of a crime, you have a right to be repaid for losses that resulted from the crime. This booklet will help you understand: How to
More informationLaw & Ethics, Policies & Guidelines, and Security Awareness
Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of
More informationSTUDENT LEGAL SERVICES THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY A GUIDE TO THE LAW IN ALBERTA REGARDING OF EDMONTON COPYRIGHT AND DISCLAIMER
COPYRIGHT AND DISCLAIMER A GUIDE TO THE LAW IN ALBERTA REGARDING THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY version: 2008 STUDENT LEGAL SERVICES OF EDMONTON GENERAL All information is provided for
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More informationAcceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
More informationENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.
ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.
More informationCommunity Legal Information Association of PEI. Prince Edward Island, Inc.
Community Legal Information Association of Prince Edward Island, Inc. Sentencing This pamphlet gives you some information about sentencing in criminal court. If you are charged with a criminal offence,
More information2011 COUNTRY WATCH LIST
The Congressional International Anti-Piracy Caucus Senator Sheldon Whitehouse, Co-Chair Senator Orrin G. Hatch, Co-Chair Congressman Bob Goodlatte, Co-Chair Congressman Adam B. Schiff, Co-Chair 2011 COUNTRY
More informationSOFTWARE PIRACY AND ITS IMPACT ON SOCIAL WELFARE 1
SOFTWARE PIRACY AND ITS IMPACT ON SOCIAL WELFARE 1 Toomas Hinnosaar Software piracy involves usage, copying, selling and distributing computer programmes without the permission of its producer. Software
More informationOnline Press Releases For The Offline Business
Online Press Releases For The Offline Business How To Get Page #1 Google Rankings In 24-72 Hours And Charge $250 To $1,000+ Submitting Online Press Releases For Brick And Mortar Businesses 2014 Andrew
More informationA White Paper from AccessData Group. The Future of Mobile E-Discovery
A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+
More informationDIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
More informationTECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
More informationSoftware License Compliance Audit
Software License Compliance Audit October 24, 2014 Mayor Betsy Price Council Members Sal Espino, District 2 W. B. Zimmerman, District 3 Danny Scarth, District 4 Gyna Bivens, District 5 Jungus Jordan, District
More informationExecutive Summary. McAfee Labs Threats Report: Third Quarter 2013
Executive Summary McAfee Labs Threats Report: Third Quarter Although summer can be a relatively slow season for cybercriminal activity (even the bad guys need a break occasionally), the third quarter of
More informationIntellectual Property, Copyright and Fair Use: What Students Should Know
Intellectual Property, Copyright and Fair Use: What Students Should Know UMBC Faculty Development Center March 10, 2004 David McDonald Towson University Please Note: The information provided in this presentation
More informationBring your. own device
Bring your own device BYOD One thing is clear: Bring Your Own Device has landed and is here to stay. Employers need to understand what it means, the benefits it could bring and the risks it presents to
More informationWhat s Holding Back the Cloud?
MAY 2012 Peer Research What s Holding Back the Cloud? Intel Survey on Increasing IT Professionals Confidence in Cloud Security Why You Should Read This Document This report captures key findings from a
More information4.0 ISSUANCE OF REGULATIONS/STANDARD OPERATING PROCEDURES
Policy: 13.09 SUBJECT: SOFTWARE USAGE Supersedes: 2001-2002 DPS Policy Manual, No. 10.10 Computer Hardware/Software and Office Equipment Use, dated July 14, 2000 Effective: February 15, 2005 Page: 1 of
More informationSlide 1 Infrastructure, Hardware, Software, Technical Support
Slide 1 Infrastructure, Hardware, Software, Technical Support Harvey Barnett Senior Research Associate WestEd RTEC Hello. This is Harvey Barnett. Welcome to Infrastructure, Hardware, Software and Technical
More informationa threat made in school
a threat made in school ADAM S BACKGROUND LEADING UP TO THE CRIME Adam, 15, is the youngest of four children. His parents are divorced. He lives with his mother, has regular contact with his father, and
More informationHealthcare Applications and HIPAA. BA590-IT Governance Final Term Project Prof. Mike Shaw
Healthcare Applications and HIPAA BA590-IT Governance Final Term Project Prof. Mike Shaw Michael McIntosh 5/4/2007 Table of Contents 1. Abstract 3 2. Introduction 3 3. Section 1: HIPAA definition and history
More informationMaking the Business Case for IT Asset Management
1 The business case for IT Asset Management Making the Business Case for IT Asset Management Executive Summary IT Asset Management (ITAM) is an important business discipline that provides insight into
More informationCONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization
CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization 2009 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All
More informationAll Women. One Family Law.
8 Family Law Issues for Immigrant, Refugee and Non-Status Women ENG 008 FAMILY LAW FOR WOMEN IN ONTARIO All Women. One Family Law. Know your Rights. Family Law Issues for Immigrant, Refugee and Non-Status
More informationThe Legal Status of Software in Use in State Bodies
The Legal Status of Software in Use in State Bodies UHYLH RILQIRUPDWLRQ V\VWHPV Icelandic National Audit Office December 1999 Original title Um lögmæti hugbúnaðar hjá ríksiaðilum Translation: Jeffrey Cosser
More informationMoney Borrowing money
Money Borrowing money Aims: To enable young people to explore ways of borrowing money and the advantages and possible consequences of doing so. Learning Outcomes: By the end of the session the participants
More informationOn the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
More information*Reference Material For information only* The following was put together by one of our classmates! Good job! Well Done!
From: "We The People for Independent Texas" Subject: No contract - No case. *Reference Material For information only* The following was put together by one of our classmates! Good job! Well Done! Courts
More informationIn recent years, the issue of copyright protection for intellectual properties such as computer software, music
Vol. 7, No. 4, July August 008, pp. 60 66 issn 073-399 eissn 56-548X 08 704 060 informs doi 0.87/mksc.070.033 008 INFORMS Digital Piracy: A Competitive Analysis Sanjay Jain Mays Business School, Texas
More informationMega Transparency Report. March 2015. Requests for Removal of Content and for User Information
Mega Transparency Report March 205 Requests for Removal of Content and for User Information Introduction This is the first transparency report published by Mega since it commenced operations in January
More informationEthics in Internet. Joshi AG Centre for Information and Network Security University of Pune
Ethics in Internet Joshi AG Centre for Information and Network Security University of Pune The World Today Communication knows no physical boundaries Interconnected globe humming with electronic transmissions
More information