Essay, Research Paper: Software Piracy 

Computers

Free Computers research papers were donated by our members/visitors and are presented free of charge for informational use only. The essay or term paper you are seeing on this page was not produced by our company and should not be considered a sample of our research/writing service. We are neither affiliated with the author of this essay nor responsible for its content. If you need high quality, fresh and competent research / writing done on the subject of Computers, use the professional writing service offered by our company.

Software piracy is defined as the illegal copying of software for commercial or
personal gain. Software companies have tried many methods to prevent piracy,
with varying degrees of success. Several agencies like the Software Publishers
Association and the Business Software Alliance have been formed to combat both
worldwide and domestic piracy. Software piracy is an unresolved, worldwide
problem, costing millions of dollars in lost revenue. Software companies have
used many different copy protection schemes. The most annoying form of copy
protection is the use of a key disk. This type of copy protection requires the
user to insert the original disk every time the program is run. It can be quite
difficult to keep up with disks that are years old. The most common technique of
copy protection requires the user to look up a word or phrase in the program's
manual. This method is less annoying than other forms of copy protection, but it
can be a nuisance having to locate the manual every time. Software pirates
usually have no trouble "cracking" the program, which permanently
removes the copy protection. After the invention of CD-ROM, which until lately
was uncopyable, most software companies stopped placing copy protection in their
programs. Instead, the companies are trying new methods of disc impression. 3M
recently developed a new technology of disc impression which allows companies to
imprint an image on the read side of a CD-ROM. This technology would not prevent
pirates from copying the CD, but it would make a "bootleg" copy differ
from the original and make the copy traceable by law enforcement officials
(Estes 89). Sometimes, when a person uses a pirated program, there is a
"virus" attached to the program. Viruses are self-replicating programs
that, when activated, can damage a computer. These viruses are most commonly
found on pirated computer games, placed there by some malignant computer
programmer. In his January 1993 article, Chris O' Malley points out that if
piracy was wiped out viruses would eventually disappear (O' Malley 60). There
are ways that a thrifty consumer can save money on software without resorting to
piracy. Computer companies often offer discounts on new software if a person has
previously purchased an earlier version of the software. Competition between
companies also drives prices low and keeps the number of pirated copies down
(Morgan 45). People eventually tire or outgrow their software and decide to sell
it. Usually, there is no problem transferring the program from one person to
another unless the original owner had been bound by a license agreement. In
order for the new owner to legally own the software, the old owner must tell the
company, in writing, that he would like to transfer the license to the new
owner. Most people fail to notify the company when selling software, thus making
the unsuspecting new owner a software pirate (Morgan 46). Consumers must be
careful when dealing with used software. United States copyright law allows
consumers to place a copy of a program on their computer and also make another
copy for backup purposes, in case the original disk fails or is destroyed. Some
software companies use licensing agreements to restrict people from making more
than one copy of a program. Such use of agreements can make an average consumer
into a software pirate, in his effort to make sure his expensive software is
safe (Murdoch 2). Before 1990 movie rental stores could rent computer software.
People who rented the software would copy the software before returning it. In
defense, Congress passed the Software Rental Act, outlawing the rental of
software. Even though illegal, many stores and even some software companies
still rent software. Since retail space in stores is extremely limited,
companies could rent older software that did not have a good showing in retail
stores (Champion 128). Software companies could take an idea from the home video
industry. The larger video makers found that if they sold videos in foreign
countries through their own dealerships, the amount of piracy decreased (Weisband
33). A rather unique strategy used by American software manufactures helps raise
local interest in stopping software piracy. Companies invest money to begin
software corporations in foreign countries. After a few years, the US companies
hope that the new, foreign companies will initiate their own anti-piracy
organizations (Weisband 30). Microsoft has led the venture by creating small
software companies to help battle piracy. By doing this, the companies would
want to report piracy because they would be losing money just like American
companies are doing now (Weisband 33). The Software Publishers Association,
based in Washington, D.C., was developed to combat software piracy. As of 1993
the SPA has brought more than 1300 court cases against software pirates. The SPA
has a toll-free number that has helped catch many pirates and prosecute them (O'
Malley 50). The SPA is not merely a law enforcement agency. It meets twice a
year with representatives from software companies. Together they decide how to
make their software better and also how to better serve the consumer. In the
spring 1993 conference the SPA decided that if software packages could develop a
standard way to clearly label a software box, the consumer would immediately
know if the program would run well on his computer. This labeling would help
reduce the number of software returns in stores (Karnes 4). Since software
stores cannot resell returned software, the software companies lose money on the
software. Even though only a few of the larger corporations have been prosecuted
by the SPA, the penalties are extremely severe. A company that is caught making
or owning illegal software can face jail time and fines of double the cost of
the software or fifty thousand dollars, whichever is greater (Mamis 127).
Companies need to keep good records in order to survive a suprise audit by the
SPA. The SPA is not without heart; they offer companies amnesty if the companies
confess and pay for all illegally copied software (Davis 50). Unfortunately,
there are some people who support software piracy. These people see software
companies as rich, cold-hearted businesses who make so much profit that they can
afford to take a loss. While this statement might prove true for large companies
like Microsoft or IBM, smaller businesses can be financially devastated by even
a few pirated copies (Hope 40). Supporters of software piracy do not consider
their actions wrong. They argue that software needs to be freely distributed in
order to speed economic development (Weisband 30). The Software Publishers
Association and its sister company the Business Software Alliance have succeeded
where the US government has failed. The SPA handles cases in the US, while the
BSA works in over thirty foreign countries. In cooperation with local law
enforcement, these two organizations have attacked individual companies with
moderate success (Weisband 31). The toughest obstacle the BSA faces is trying to
get local governments to make copyright laws and to get local law enforcement to
cooperate in investigations. The BSA has to rely on diplomatic threats in
countries like China and Thailand where the governments are totally
uncooperative. While the US government has the power to impose trade sanctions
on guilty countries, they rarely use this power (Gwynne 16). Many Asian
businesses are not used to copyright laws, so the consider violations as minor
infractions, much like exceeding the speed limit. The BSA tries to educate these
companies by holding software seminars (Gwynne 16). Asian retail centers also
frequently give away pirated copies along with their new computers. These
crooked dealers are the main targets of Microsoft, developer of MS-DOS, the most
widely used operating system in the world (Gwynne 15). Asian software pirates
are so good that they are able to release pirated software copies before the
real copies are released to the market. Pirate prices, which are usually
ninety-five percent lower than retail, still nets the pirates a good profit. In
most countries, including the US, the public is more interested in a lower price
instead of a clear conscience (Gwynne 15). The largest case of Asian piracy
involved Microsoft in Taiwan. A large pirate ring had made perfect copies of
Microsoft's MS-DOS. Microsoft traced the copies through five Asian countries
until they found the source in a Chinese government supported "research
institute." Microsoft confiscated 450,000 fake MS-DOS stickers. Microsoft
was shocked when they discovered these stickers, which were made out of metal
embossed with a hologram and thought to be uncopyable. Microsoft also found
records showing orders for three million more copies (Weisband 33). After this
monumental case, China introduced a copyright law. The law is very weak and only
protects Chinese produced software. Microsoft is still tying to recover some of
the millions of dollars they and many other companies lost in China (Young 42).
In most foreign countries software costs more than a worker would make in a
month. These high prices combined with a disregard for copyright laws, drive the
amount of software copied in foreign countries into the high thousands. The main
question to be asked is: "Why would anybody want to pay seventy dollars for
an original copy when they could buy the same program for fifteen dollars on the
street?" (Weisband 30). Extremely expensive hardware in the United Kingdom
has led to mass piracy by most of the computer users. The main problems are the
high costs that software vendors have to pay for American software. IBM brand
PCs are not the mainstay as they are in the US. In the UK technology tends to
lag behind the US by two to three years. This lag, combined with high prices for
American hardware, has led Europeans to purchase older Amiga brand computers.
Piracy between the one million Amiga owners has forced manufacturers to stop
producing software for the Amiga. Since the Amiga software and the IBM software
are incompatible, the software companies have shifted to producing software for
the smaller IBM market (Nelson S-15). Mexico's software police is a
government-sponsored agency called the National Association of the Computer
Program Industry. In conjunction with large software firms like Microsoft and
Lotus they have successfully prosecuted over thirty companies. The Association
has made other Mexican companies better educated on software laws and has gotten
many companies to confess and pay for their pirated software before the
Association prosecuted them (Hope 40). One of the most blatant examples of
government supported piracy is in Cuba, where any Cuban can call the National
Software Interchange Center and download any foreign software for free (Weisband
30). The US government has failed, in most cases, to act against countries found
guilty of software piracy. Fear of starting trade wars and the US need to keep
good relations with hostile countries keep the government from trying to
prosecute these countries. Even when the US acts on countries with large scale
piracy, America's actions are! so weak they have no effect on the offending
country (Weisband 30). Piracy is not just a foreign problem. The largest example
of US piracy happened in 1993 when the FBI and the SPA joined together to raid
the headquarters of Rusty and Eddy’s Bulletin Board System, a private
operation, one of the largest in the world, with 124 phone lines. The FBI
received tips from the SPA's 1-800 line that the bulletin board was distributing
pirated software. The FBI confiscated the equipment and arrested the owners (Chamption
128). As more people buy computers, software piracy will increase. When software
companies develop new ways to protect their software, software pirates will find
ways to defeat these protection schemes and ways to avoid weak copyright laws.
Perhaps in the future the US government will help the software designers by
passing stronger laws and penalizing countries that do not abide by
international copyright laws.

Bibliography
Champion, Jill. "Not Such a Glorious Thing." Compute! May 1993:
128. ---. "Software Rental." Compute! July 1992: 128. ---Davis,
Stephen. "The Crackdown on Corporate Pirates." Working Woman March
1990: 50. ---Estes, Billy. "3M Technology Helps Prevent Piracy."
CD-ROM Professional February 1995: 89. ---Gwynne, Peter. "Stalking Asian
Software Pirates." Technology Review February/March 1992: 15-17. ----Hope,
Maria. "Mexico vs. the Software Pirates." World Press Review December
1993: 40. ---Karnes, Clifton. "Editorial License." Compute! May 1993:
4. ---Mamis, Edward A. "Don't Copy That Floppy." Inc. June 1992: 127.
---Morgan, Phillip. "The Great Software Bargain Hunt." Compute! May
1994: 42-47. ---Murdoch, Guy. "Sneaking Software." Consumers' Research
Magazine February 1993: 2. ---Nelson Mike. "How PC Games Play In
Europe." Compute! January 1994: S-15--S-16. ---O'Malley, Chris.
"Copying the Floppy." Popular Science December 1993: 50. ---
---"Stalking Stealth Viruses." Popular Science January 1993: 54-60.
---Weisband, Suzanne P. and Seymour E. Goodmannery. "Subduing Software
Pirates." Technology ---Review October 1993: 30-34. --- Young, Jim.
"China's New Wall." World Press Review Feburary 1992: 42.
0
0
Good or bad? How would you rate this essay?
Help other users to find the good and worthy free term papers and trash the bad ones.
Like this term paper? Vote & Promote so that others can find it

Get a Custom Paper on Computers:

Free papers will not meet the guidelines of your specific project. If you need a custom essay on Computers: , we can write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written papers will pass any plagiarism test, guaranteed. Our writing service will save you time and grade.




Related essays:

0
0
Let's face it, in today's world we are using computers more and more. The growth of accessibility to the Internet has given us a brand new definition to connectivity, thus exponentially widening the w...
2681 views
0 comments
0
0
Computers / Steve Wozniak 
At first I had began brainstorming trying to think of a subject for this paper. I had heard Mr. Perry speak of Apple computer and of Steve jobs. His rise to power and his fall from grace then his rebi...
2875 views
0 comments
0
0
Computers / SubSeven Virus
How do I remove SubSeven? Removing SubSeven is a two-step procedure due to you having to shutdown and delete the trojan. Firstly, boot into MS-DOS mode. Do this by shutting down your computer and star...
2777 views
0 comments
0
0
Computers / System Analyst
Systems Analyst analyses, designs and implements the information gathered previously to a system, the final product which is a report of yearly sales, profits, etc. The first thing a Systems Analyst d...
2618 views
0 comments
0
0
Computers / Trade Secrets
This country's economy thrives on its trade secrets and without them the economy would lack its competitive edge and economic value. The trade secret laws date back to Roman law which punished a pe...
3273 views
0 comments