Welcome to YLOAN.COM
yloan.com » Software » Copyright Infringement Of Software
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Copyright Infringement Of Software

Existing and proposed laws

Existing and proposed laws

Main articles: Copyright infringement and History of copyright law

Demonstration in Sweden in support of software piracy, 2006.

In most third world countries, the term of a copyright never exceeds any useful life a program may have. The oldest legacy computer systems used today are still less than 40 years old. The copyright on them will not expire in the United States and Europe until about 2030. Changes, operating systems, network environments and user expectations usually make programs obsolete much faster than in 70 years (the current copyright length).

Under the proposed US Uniform Computer Information Transactions Act (UCITA), a controversial model law that has been adopted in Virginia and Maryland, software manufacturers are granted broad rights to shut down unauthorized software copiers without court intervention similar to some of the provisions found in Title II of the US DMCA, the Online Copyright Infringement Liability Limitation Act, which allows copyright holders to demand that an online service provider (OSP) expeditiously block access to infringing materials. If the OSP complies, it is granted a safe harbor, providing it immunity from infringement claims. If it doesn't comply, it doesn't become liable, but may instead rely on the protection of the Communications Decency Act.

Title I of the US DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a software manufacturer has some kind of software, dongle or password access device installed in the software any attempt to bypass such a copy protection scheme may be actionable though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the software to become inoperable or which are no longer supported by their manufacturers.

Most commercially exploited proprietary software is developed in the United States and Europe, hence for those located in economically disadvantaged economies it can be prohibitively expensive to pay for all the end user licenses for those products rather than to purchase just one license and then copy the software without paying any additional licensing fees. Some critics in the developing countries of the world see this as an indirect technology transfer tax on their country preventing technological advancement and they use this type of argument when refusing to accept the copyright laws that are in force in most technologically advanced countries. This idea is often applied to patent laws as well.

Notable Exceptions

France distanced itself from other Copyright enforcers by issuing a ruling that entitled bank secrecy to infringe Copyright. Under the ruling issued by the General Prosecutor of Paris, bank FINAMA (100% held by French insurer GROUPAMA) was able to scupper a $200 million software piracy trial by just invoking bank secrecy .

The effects of copyright infringement on digital culture

Peer to peer (P2P) file sharing technologies have lowered the threshold of knowledge needed to acquire massive amounts of information. Large networks have been created which are dedicated to share knowledge, but these same networks can be used to infringe copyright. Identifying infringing use can be difficult, since the users can modify the name and content of material being shared.

Rise of quality in free alternative software also helps to lower the use of copied software worldwide. Illegally copying software is seen by some software producers as a "lesser evil" than actually buying or illegally copying a competitor's software. Jeff Raikes, a Microsoft executive, stated that "If they're going to pirate somebody, we want it to be us rather than somebody else." He also added that "We understand that in the long run the fundamental asset is the installed base of people who are using our products. What you hope to do over time is convert them to licensing the software."

Traian Bsescu, the president of Romania, stated that "piracy helped the young generation discover computers. It set off the development of the IT industry in Romania."

Microsoft admits that piracy of its Windows operating system has helped give it huge market share in China that will boost its revenues when these users "go legit." Bill Gates said, "It's easier for our software to compete with Linux when there's piracy than when there's not." He has also said in reference to China:

As long as they are going to steal it, we want them to steal ours. They'll get sort of addicted, and then we'll somehow figure out how to collect sometime in the next decade.

ill Gates

References

International Journal of Research in Marketing, December 2003 (Volume 20, No. 4), "How many pirates should a software firm tolerate?"

Journal of Business, 2004, (Volume 77, No. 2),oftware Piracy: Market penetration in the Presence of Network Externalities

Albacea, E., Payongayong M. T. and A. Pinpin (2005) Computer Ethics.UPOU Los Baos Philippines. p 78.

G.Frederick, (2007) Software Piracy: Some Facts, Figures, and Issues.

^ "GROUPAMA cooking evidences to shut-down massive Piracy case". TWD Industries AG. http://www.remoteanything.com/archives/GROUPAMA.pdf.

^ http://arstechnica.com/journals/microsoft.ars/2007/03/12/microsoft-executive-pirating-software-choose-microsoft

^ Nathan Davis. Thanks for letting us pirate. 5 February 2007.

^ The Economist, Piracy: Look for the Silver Lining (July 19th-25th, 2008 ed.), pp.23

^ "Gates, Buffett a bit bearish". CNET. July 2, 1998. http://news.cnet.com/2100-1023-212942.html.

See also

Abandonware

Australian copyright law

Computer Associates Int. Inc. v. Altai Inc.

Copyleft

Dongle

Federation Against Software Theft

File sharing

iLok Smart Key

Matrix Software License Protection System

Product activation

Software copyright

Warez

Windows Genuine Advantage

External links

The "Software Piracy" Controversy by The Linux Information Project (LINFO)

Further reading

Siva Vaidhyanathan. Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity. New York University Press, 2001. 243 pages. ISBN 0-8147-8806-8


Claus Pedersen, Krise eller Strategi?: Pladebranchen 1995 til 2005, 2005 (?), Piratgruppen.org, http://piratgruppen.org/spip.php?page=rapport (Danish)

Categories: Copyright infringement of software | Computer crimesHidden categories: All articles with specifically-marked weasel-worded phrases | Articles with specifically-marked weasel-worded phrases from June 2009 | All articles with unsourced statements | Articles with unsourced statements from June 2009

Copyright Infringement Of Software

By: weihua
Software Selling Tips: Sell Software Products More Successfully Customers Warned After Bank Giveaway Errors What Is Photo Editing Software ? Looking For Property Management Software? Appointment Book Software - The Importance Of Time Management In The Workplace Appointment Scheduling Software - Arrange Clutter Clusters For Improved Office Efficiency Is Fap Turbo Software All Its Made Out To Be? Finding Hidden Costs in Dental Software Free Fax Server Software Explained Keep Your System Error Free And Running Smoothly with Registry Easy How To Fix Z800wh95.sys Error? Learn To Fix Runtime Error 89 On Your Own - Boost Program Options Tutorial - Option Trading Software
print
www.yloan.com guest:  register | login | search IP(216.73.216.63) California / Anaheim Processed in 0.031162 second(s), 5 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 95 , 7497, 95,
Copyright Infringement Of Software Anaheim