SlideShare a Scribd company logo
1 of 13
SOFTWARE THEFT
  GROUP MEMBERS:
   BALVEENDERJIT KAUR
     DASWEEN KAUR
       NUBASHINII
     SURINDER KAUR
     LECTURER:
     MISS CHRISTINE
WHAT IS SOFTWARE THEFT?

• is
   the unauthorised
 copying or distribution of
 copyright protected
 software.
WHEN DOES IT OCCUR?


    Occurs when someone :
1.    Steals software media
2.    Intentionally erases programs
3.    Illegally copies a program
4.    Illegally registers or activates a program
TYPES OF
SOFTWARE
  THEFT
TYPE 1
   Involves a perpetrator physically stealing a media
    that contain the software or the hardware that
    contains the media



   Example : An unscrupulous library patron might
    steal the Encyclopedia Britannica optical disc.
TYPE 2
   Occurs when a programmer is terminated from, or
    stops working for, a company.




   The programs are common property but some
    dishonest programmers intentionally remove or
    disable the programs they have written from
    company computers.
TYPE 3
   Occurs when software is stolen from software
    manufacturers.

   Also called piracy

   Most common form of software theft

   Software piracy is the unauthorized and illegal
    duplication of copyrighted software.
TYPE 4
   Involves users illegally obtaining registration
    numbers or activation codes.

   Keygen a program, short for key generator, creates
    software registration numbers and sometimes
    activation codes.

   Some create and post keygens so that users can
    install software without legally purchasing it.
SAFEGUARD AGAINST SOFTWARE THEFT
   To protect media from being stolen, owners should
    keep original software boxes in a secure location.

   All computer users should backup their files
    regularly.

   Escort terminated employees immediately to
    protect their softwares and programs (in big
    companies)
   Software manufacturers issue users license
    agreement.

    A license agreement is the right to use a software.

    The most common type of license is single-user
    license agreement or known as end-user license
    agreement (EULA)
In this agreement, users are permitted to:

o   Install the software on only one computer.

o   Make one copy of the software as a backup.

o   Give or sell the software to another individual, but
    only if the software is removed from the user’s
    computer first.
Users are not permitted to :

   Install the software on a network, such as school
    computer lab
   Export the software
   Rent or lease the software
Software theft

More Related Content

What's hot

Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
hanna91
 
Security Measure
Security MeasureSecurity Measure
Security Measure
syafiqa
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

What's hot (20)

Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Information security
Information security Information security
Information security
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
HACKING
HACKINGHACKING
HACKING
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Hacking
HackingHacking
Hacking
 
Spyware
SpywareSpyware
Spyware
 
امن المعلومات المحاضرة الخامسة
امن المعلومات المحاضرة الخامسةامن المعلومات المحاضرة الخامسة
امن المعلومات المحاضرة الخامسة
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 

Viewers also liked

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
Gabriella Maree Wheeler
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
ejl2
 
Strategies for reading comprehension
Strategies for reading comprehensionStrategies for reading comprehension
Strategies for reading comprehension
saaaira
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
jlknight
 
Chapter 3 Application Software
Chapter 3  Application  SoftwareChapter 3  Application  Software
Chapter 3 Application Software
norzaini
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 

Viewers also liked (20)

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Strategies for reading comprehension
Strategies for reading comprehensionStrategies for reading comprehension
Strategies for reading comprehension
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine Publications
 
Chapter 3 Application Software
Chapter 3  Application  SoftwareChapter 3  Application  Software
Chapter 3 Application Software
 
Understanding the difference between Data, information and knowledge
Understanding the difference between Data, information and knowledgeUnderstanding the difference between Data, information and knowledge
Understanding the difference between Data, information and knowledge
 
Data vs. information
Data vs. informationData vs. information
Data vs. information
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 

Similar to Software theft

swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
RijuDasgupta
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
management 2
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
wokk1d337
 

Similar to Software theft (20)

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Installing and uninstalling computer software
Installing and uninstalling computer softwareInstalling and uninstalling computer software
Installing and uninstalling computer software
 
Open source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOpen source software 101: Compliance and risk management
Open source software 101: Compliance and risk management
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......open_source_tools.pptx 4th sem bca......
open_source_tools.pptx 4th sem bca......
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Malicious
MaliciousMalicious
Malicious
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Cryptography presentation
Cryptography presentationCryptography presentation
Cryptography presentation
 
Spyware
SpywareSpyware
Spyware
 

More from chrispaul8676 (13)

Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
data representation
data representationdata representation
data representation
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
Chong ren jye
Chong ren jyeChong ren jye
Chong ren jye
 
System Unit
System UnitSystem Unit
System Unit
 
It presentation
It presentationIt presentation
It presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
It ppt new
It ppt newIt ppt new
It ppt new
 
System failure
System  failureSystem  failure
System failure
 
Hackers
HackersHackers
Hackers
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Software theft

  • 1. SOFTWARE THEFT GROUP MEMBERS: BALVEENDERJIT KAUR DASWEEN KAUR NUBASHINII SURINDER KAUR LECTURER: MISS CHRISTINE
  • 2. WHAT IS SOFTWARE THEFT? • is the unauthorised copying or distribution of copyright protected software.
  • 3. WHEN DOES IT OCCUR?  Occurs when someone : 1. Steals software media 2. Intentionally erases programs 3. Illegally copies a program 4. Illegally registers or activates a program
  • 5. TYPE 1  Involves a perpetrator physically stealing a media that contain the software or the hardware that contains the media  Example : An unscrupulous library patron might steal the Encyclopedia Britannica optical disc.
  • 6. TYPE 2  Occurs when a programmer is terminated from, or stops working for, a company.  The programs are common property but some dishonest programmers intentionally remove or disable the programs they have written from company computers.
  • 7. TYPE 3  Occurs when software is stolen from software manufacturers.  Also called piracy  Most common form of software theft  Software piracy is the unauthorized and illegal duplication of copyrighted software.
  • 8. TYPE 4  Involves users illegally obtaining registration numbers or activation codes.  Keygen a program, short for key generator, creates software registration numbers and sometimes activation codes.  Some create and post keygens so that users can install software without legally purchasing it.
  • 9. SAFEGUARD AGAINST SOFTWARE THEFT  To protect media from being stolen, owners should keep original software boxes in a secure location.  All computer users should backup their files regularly.  Escort terminated employees immediately to protect their softwares and programs (in big companies)
  • 10. Software manufacturers issue users license agreement. A license agreement is the right to use a software. The most common type of license is single-user license agreement or known as end-user license agreement (EULA)
  • 11. In this agreement, users are permitted to: o Install the software on only one computer. o Make one copy of the software as a backup. o Give or sell the software to another individual, but only if the software is removed from the user’s computer first.
  • 12. Users are not permitted to :  Install the software on a network, such as school computer lab  Export the software  Rent or lease the software