Software Piracy Laws in India PDF
Software Piracy Laws in India PDF
Software Piracy Laws in India PDF
IT Act 2000 »
Software Piracy & Indian Law
I get a call from companies or original can be made in no time. Most manuals, license agreements, labels,
professionals when they are under often, the actual cost of creating goods registration cards, security features and
software piracy raid by police or if a private is determined by the production cost of often look authentic. The intention is to
case is filed by a software company or individual item. However with software, directly imitate the copyrighted product.
KPMG, PWC etc companies conduct the reverse is true. The cost of producing This is a more serious offence as it is done
Software asset management audit (SAM) copies is negligible compared to the in an organized manner and the buyer is
on them or to secure a bail if they are cost of constructing the original. Hence also made to believe that he is buying a
arrested with their machines confiscated. it becomes very easy and all the more genuine product.
Software Gap Analysis is a activity which attractive to make copies of unauthorized
Internet Piracy :
is thought after any of the above event software. Internet Piracy is unauthorized
happens or Software Piracy definition or
Why should we buy license: downloading of software over the Internet.
the existence of the said crime comes to
By using legal licensed software, it is Any form of software piracy that involves
knowledge only after above said events.
ensured that critical updates are available the use of the Internet either to market or
This is the apathy of Indian IT users.
when needed, that the products are fully distribute copyrighted software programs
Software Piracy Definition : supported, reliable and above all it is legal. can be termed as Internet Piracy. Many
Software piracy is copying and use of There are Four primary ways to pirate websites on the internet make
Software without proper license from the legally obtain a software license : software available as free download or in
developer. Similarly, simultaneous use of 1. Purchasing a new PC equipped with exchange for uploaded programs. Many
single user license software by multiple OEM software and equipment. online auction sites offer counterfeit or
users or loading of a single user license 2. Purchasing products “off the shelf” infringing copyright software. Email, IRC,
software at multiple sites, also amounts from a certified retailer. News Groups and FTP could be the tools
to software piracy. Using trial version 3. Signing a License Agreement online. which facilitate in illegally uploading or
software for commercial gains is also 4. Buying a software as a service downloading of copyrighted software
piracy, Piracy is also can be punishable programs over Internet.
if you install an pirated software do your Types of software piracy:
Hard-Disk Installation:
work and then delete this software from End-User piracy: Hard-disk Installation occurs when
the machine with enough evidences to End-User Piracy is unauthorized a business that sells new computers,
show the activity. reproduction of copies of licensed loads illegal copies of software onto the
Any Copyright infringement is software. Using one licensed copy to hard disks to make the purchase of their
the unauthorized use of copyrighted install a program on multiple computers machines more attractive.
material in a manner that violates one of or acquiring academic or other restricted
the copyright owner’s exclusive rights, versions and using the same for commercial Pre-installed Software Piracy:
such as, the right to reproduce or to purpose also amounts to End-User Piracy. When a computer manufacturer uses
make derivative works that build upon This type of piracy also includes, both, one licensed copy of software and illegally
it. For electronic and audio-visual media, casual copying and distribution between installs it on more than one computer it is
such unauthorized reproduction and individuals and companies who do not called Pre-installed Software Piracy. To
distribution of a copyrighted work is often strictly monitor the number of software avoid this type of piracy the consumers
referred to as piracy (however there is no licenses they install and do not acquire should be on the lookout for proper
legal basis for the term ‘piracy’). enough number of licenses to cover their license documentation when purchasing
The society doesn’t really treat software installations. a new PC in order to ensure that they’re
software piracy like other kinds of theft as getting what they paid for.
nothing is physically taken away. There is Software Counterfeiting : Client-Server license Overuse :
no immediate effect on the inventory or When illegal copies of software are Client-Server overuse occurs when a
productive capacity of the programmer. made and distributed in packaging that software is installed on the server for
Only copies of the disk or other storage replicates the original manufacturer’s simultaneous use by several people over
medium are made and the legal owner is packaging it amounts to Software the network. Simply put Client-Server
still in possession of the software. With Counterfeiting. Counterfeit software Overuse is having more users than
digital technology, perfect copies of the copies come out with similar packaging, allowed by the license.
Contd. on pg.34
...Contd. on pg. 35
CSI Communications | January 2012 | 42 www.csi-india.org