3
Most read
5
Most read
7
Most read
SOFTWARE THEFT
  GROUP MEMBERS:
   BALVEENDERJIT KAUR
     DASWEEN KAUR
       NUBASHINII
     SURINDER KAUR
     LECTURER:
     MISS CHRISTINE
WHAT IS SOFTWARE THEFT?

• is
   the unauthorised
 copying or distribution of
 copyright protected
 software.
WHEN DOES IT OCCUR?


    Occurs when someone :
1.    Steals software media
2.    Intentionally erases programs
3.    Illegally copies a program
4.    Illegally registers or activates a program
TYPES OF
SOFTWARE
  THEFT
TYPE 1
   Involves a perpetrator physically stealing a media
    that contain the software or the hardware that
    contains the media



   Example : An unscrupulous library patron might
    steal the Encyclopedia Britannica optical disc.
TYPE 2
   Occurs when a programmer is terminated from, or
    stops working for, a company.




   The programs are common property but some
    dishonest programmers intentionally remove or
    disable the programs they have written from
    company computers.
TYPE 3
   Occurs when software is stolen from software
    manufacturers.

   Also called piracy

   Most common form of software theft

   Software piracy is the unauthorized and illegal
    duplication of copyrighted software.
TYPE 4
   Involves users illegally obtaining registration
    numbers or activation codes.

   Keygen a program, short for key generator, creates
    software registration numbers and sometimes
    activation codes.

   Some create and post keygens so that users can
    install software without legally purchasing it.
SAFEGUARD AGAINST SOFTWARE THEFT
   To protect media from being stolen, owners should
    keep original software boxes in a secure location.

   All computer users should backup their files
    regularly.

   Escort terminated employees immediately to
    protect their softwares and programs (in big
    companies)
   Software manufacturers issue users license
    agreement.

    A license agreement is the right to use a software.

    The most common type of license is single-user
    license agreement or known as end-user license
    agreement (EULA)
In this agreement, users are permitted to:

o   Install the software on only one computer.

o   Make one copy of the software as a backup.

o   Give or sell the software to another individual, but
    only if the software is removed from the user’s
    computer first.
Users are not permitted to :

   Install the software on a network, such as school
    computer lab
   Export the software
   Rent or lease the software
Software theft

More Related Content

PPT
Security Measures
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
IT Security DOs and DONTs
PDF
Cyber Security
PDF
Malware and security
PPTX
Unauthorized access and use
PPTX
Security Measures
PPTX
My darkweb-presentation
Security Measures
Inetsecurity.in Ethical Hacking presentation
IT Security DOs and DONTs
Cyber Security
Malware and security
Unauthorized access and use
Security Measures
My darkweb-presentation

What's hot (20)

PPT
Cyber crime and cyber security
PPTX
Android Hacking + Pentesting
PPTX
Cyber crime ✔
PPTX
Internet safety
PPTX
Ethical hacking : Its methodologies and tools
PPT
Ethical hacking
PPTX
Ransomware
PPTX
CYBER SECURITY
PPTX
Computer security risks
PPTX
CYBER SECURITY
PPTX
Hardware theft
PPTX
Cyber crime
PPTX
Ethical hacking presentation
PPTX
Cyber Security
PPTX
Key logger,Why? and How to prevent Them?
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
DOCX
Cryptika cybersecurity - company profile
PPTX
Cyber crime & security
PPTX
WannaCry Ransomware
DOCX
Cyber crime
Cyber crime and cyber security
Android Hacking + Pentesting
Cyber crime ✔
Internet safety
Ethical hacking : Its methodologies and tools
Ethical hacking
Ransomware
CYBER SECURITY
Computer security risks
CYBER SECURITY
Hardware theft
Cyber crime
Ethical hacking presentation
Cyber Security
Key logger,Why? and How to prevent Them?
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Cryptika cybersecurity - company profile
Cyber crime & security
WannaCry Ransomware
Cyber crime
Ad

Viewers also liked (20)

PPT
3.2.1 computer security risks
PPTX
The legal, safe and ethical use of technology in the classroom
PPTX
PDF
Computer Security and Risks
PPT
Legal, Ethical and Social Issues in Technology
PPTX
Cyber crime and security
PPS
Workshop on Wireless Security
PPTX
Computer Security risks Shelly
PPTX
Safe and ethical use of technology in the classroom power point final
PPTX
Strategies for reading comprehension
PPTX
Legal and ethical issues for using technology in the classroom
PPT
Copyright Protection for Philippine Publications
PPTX
4.2.1 computer security risks
PPT
Chapter 3 Application Software
PPTX
Understanding the difference between Data, information and knowledge
PPT
Data vs. information
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
Chapter 4 Computer Ethics and Security
PPT
Computer Ethics
PPTX
Legal, Ethical, and Social Issues in Educational Computing
3.2.1 computer security risks
The legal, safe and ethical use of technology in the classroom
Computer Security and Risks
Legal, Ethical and Social Issues in Technology
Cyber crime and security
Workshop on Wireless Security
Computer Security risks Shelly
Safe and ethical use of technology in the classroom power point final
Strategies for reading comprehension
Legal and ethical issues for using technology in the classroom
Copyright Protection for Philippine Publications
4.2.1 computer security risks
Chapter 3 Application Software
Understanding the difference between Data, information and knowledge
Data vs. information
Computer Security and Safety, Ethics & Privacy
Chapter 4 Computer Ethics and Security
Computer Ethics
Legal, Ethical, and Social Issues in Educational Computing
Ad

Similar to Software theft (20)

PPTX
Virus and malware presentation
PDF
swpiracyslideshare-180302131348.pdf
PPTX
Presentation on Software Piracy
PPTX
Introduction to computer software
PPTX
Spyware and rootkit
PPT
cyber security cyber security cyber security cyber security
PPTX
Installing and uninstalling computer software
PDF
Open source software 101: Compliance and risk management
PPT
Chapter 7 Copy Rights And Intellectual Property
PPTX
Malicious software and software security
PPT
Rajul computer presentation
PPTX
Firewall , Viruses and Antiviruses
PPTX
open_source_tools.pptx 4th sem bca......
PPTX
Computer viruses - A daily harm
PPTX
Chapter 11 Malicious Software - HCMUT.pptx
PPT
Copy of antiviruse
PPT
Malicious
PPTX
Basics of Network Security
PPTX
Chapter 5.pptx
PPT
data protection Google Slides Background Themes
Virus and malware presentation
swpiracyslideshare-180302131348.pdf
Presentation on Software Piracy
Introduction to computer software
Spyware and rootkit
cyber security cyber security cyber security cyber security
Installing and uninstalling computer software
Open source software 101: Compliance and risk management
Chapter 7 Copy Rights And Intellectual Property
Malicious software and software security
Rajul computer presentation
Firewall , Viruses and Antiviruses
open_source_tools.pptx 4th sem bca......
Computer viruses - A daily harm
Chapter 11 Malicious Software - HCMUT.pptx
Copy of antiviruse
Malicious
Basics of Network Security
Chapter 5.pptx
data protection Google Slides Background Themes

More from chrispaul8676 (13)

PPTX
Buses in a computer
PPTX
Expansion Slot
PPT
Power Supply
PPTX
Ports and connectors
PPT
data representation
PPT
Dhacaini
PPTX
Chong ren jye
PPT
System Unit
PPTX
It presentation
PPTX
Identity theft
PPTX
It ppt new
PPTX
System failure
PPTX
Hackers
Buses in a computer
Expansion Slot
Power Supply
Ports and connectors
data representation
Dhacaini
Chong ren jye
System Unit
It presentation
Identity theft
It ppt new
System failure
Hackers

Recently uploaded (20)

DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Hospital Case Study .architecture design
PPTX
Reproductive system-Human anatomy and physiology
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PPTX
Climate Change and Its Global Impact.pptx
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Farming Based Livelihood Systems English Notes
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
Macbeth play - analysis .pptx english lit
PDF
Compact First Student's Book Cambridge Official
Cambridge-Practice-Tests-for-IELTS-12.docx
Hospital Case Study .architecture design
Reproductive system-Human anatomy and physiology
Environmental Education MCQ BD2EE - Share Source.pdf
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
2025 High Blood Pressure Guideline Slide Set.pptx
Journal of Dental Science - UDMY (2020).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Everyday Spelling and Grammar by Kathi Wyldeck
Climate Change and Its Global Impact.pptx
Civil Department's presentation Your score increases as you pick a category
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Farming Based Livelihood Systems English Notes
Laparoscopic Colorectal Surgery at WLH Hospital
The TKT Course. Modules 1, 2, 3.for self study
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
UNIT_2-__LIPIDS[1].pptx.................
Macbeth play - analysis .pptx english lit
Compact First Student's Book Cambridge Official

Software theft

  • 1. SOFTWARE THEFT GROUP MEMBERS: BALVEENDERJIT KAUR DASWEEN KAUR NUBASHINII SURINDER KAUR LECTURER: MISS CHRISTINE
  • 2. WHAT IS SOFTWARE THEFT? • is the unauthorised copying or distribution of copyright protected software.
  • 3. WHEN DOES IT OCCUR?  Occurs when someone : 1. Steals software media 2. Intentionally erases programs 3. Illegally copies a program 4. Illegally registers or activates a program
  • 5. TYPE 1  Involves a perpetrator physically stealing a media that contain the software or the hardware that contains the media  Example : An unscrupulous library patron might steal the Encyclopedia Britannica optical disc.
  • 6. TYPE 2  Occurs when a programmer is terminated from, or stops working for, a company.  The programs are common property but some dishonest programmers intentionally remove or disable the programs they have written from company computers.
  • 7. TYPE 3  Occurs when software is stolen from software manufacturers.  Also called piracy  Most common form of software theft  Software piracy is the unauthorized and illegal duplication of copyrighted software.
  • 8. TYPE 4  Involves users illegally obtaining registration numbers or activation codes.  Keygen a program, short for key generator, creates software registration numbers and sometimes activation codes.  Some create and post keygens so that users can install software without legally purchasing it.
  • 9. SAFEGUARD AGAINST SOFTWARE THEFT  To protect media from being stolen, owners should keep original software boxes in a secure location.  All computer users should backup their files regularly.  Escort terminated employees immediately to protect their softwares and programs (in big companies)
  • 10. Software manufacturers issue users license agreement. A license agreement is the right to use a software. The most common type of license is single-user license agreement or known as end-user license agreement (EULA)
  • 11. In this agreement, users are permitted to: o Install the software on only one computer. o Make one copy of the software as a backup. o Give or sell the software to another individual, but only if the software is removed from the user’s computer first.
  • 12. Users are not permitted to :  Install the software on a network, such as school computer lab  Export the software  Rent or lease the software