SlideShare a Scribd company logo
1 of 34
Submitted to: Sir Waqar Malik
Submitted by: Maryam Jamil,37
Zahida Malik,13
Amna Ashfaq,29
Maryam Yaseen,14
 "Regardless of how the infringer sees it... piracy is theft of
intellectual property and is no more justifiable than shoplifting,
stealing cable service or other utilities. Developers invest time and
money to develop a... product and deserve to make a fair profit - so
they can develop new ...products. This is particularly crucial for
small developers... whose survival depends on income from sales to
a limited market“
 "Pirated copyright goods shall mean any goods which
are copies made without the consent of the rightholder
or person duly authorised by the rightholder in the
country of production and which are made directly or
indirectly from an article where the making of that copy
would have constituted an infringement of a copyright
or a related right under the law of the country of
importation"
 The explosion of media piracy was galvanized by the
invention of the MP3 format back in 1993. This
format allowed the copying of CDs to computer
devices, from which pirate CD replicas could then be
produced. The MP3 format wasn't used as widely for
piracy until the Napster website opened in 1999.
This highly publicized site allowed users to trade and
download musical files. Though Napster was
eventually closed after the recording industry
brought a number of lawsuits against it, a variety of
peer-to-peer file services has since sprung up across
the Net, making it easy to download media files
illegally.
 Print
 Music
 Films
 Software
 Internet (online)
 Any unauthorized use of a copyrighted work, such as a
book, school manual, journal article or sheet music,
represents an infringement of copyright or a case of
copyright piracy, unless covered by a copyright exception.
Piracy of printed works affects both paper copies and works
in digital format. In some developing countries, trade in
pirated books often exceeds the legitimate market.
Educational institutions represent a primary target market
for pirates.
Infringing activities include both illegal commercial
photocopying and/or printing and reproduction of books
and other printed material in digital form, as well as
distribution in hard copy or digital format.
 Music piracy includes both traditional unlawful use of
music and unauthorized use of music on on-line
communication networks.
 Bootlegging (unauthorized recording and duplication of a
live or broadcast performance)
 Counterfeiting (unauthorized copying of the material
support, labels, artwork and packaging) are the most
widespread types of traditional music piracy.
 The unauthorized uploading and making available to the
public of music files or downloading such files from an
Internet site is referred to as Internet or on-line piracy. On-
line piracy may also include certain uses of "streaming"
technologies.
As in the case of music, film piracy is either traditional
or done over the Internet. It includes, but is not limited
to, videocassette and optical disc piracy, theatrical
camcorder piracy, theatrical print theft, signal theft and
broadcasting piracy, and on-line piracy.
Software piracy refers to practices that involve the
unauthorized copying of computer software.
 The unauthorized downloading or distribution over
the Internet of unauthorized copies of works such as
movies, music, videogames and software is generally
referred to as Internet or on-line piracy. Illicit
downloads occur through file-sharing networks, illegal
servers, websites and hacked computers. Hard goods
pirates also use the Internet to sell illegally duplicated
DVDs through auctions and websites.
 Low level of public awareness
 High consumer demand for cultural products
 Misconceptions about piracy
 Inefficient intellectual property protection and weak
enforcement of rights
 High cost of cultural goods
 Difficulty of access to legitimate works
 Considerable business profits for pirates
 In the United States, as in many countries around the
world, breaking copyright on media is illegal
 If an individual breaks federal law regarding media
piracy, she is liable to end up in court. Even a first-time
offender can end up paying as much as $250,000 in fines,
or face a maximum five years in jail. Copyright holders,
like the Recording Industry Association of America, also
have the ability to sue individuals, and can potentially be
awarded as much as $150,000 for every copyrighted file
distributed illegally.
 Authorities responsible for enforcing the copyright law
1. Police- Section 74 (3) of the Copyright Law.
2. Federal Investigation Agency- Second Schedule of FIA Act of 1974.
3. Customs- Sections 58, 65A to 65C of the Copyright Law.
4. Judiciary- Civil/Criminal- Sections 59 to 77 of the Copyright Law.
5. Pakistan electronic Media Regulatory Authority (PEMRA)-
PEMRA Ordinance 2007
 Megaupload, a Hong-Kong based company, was a file
sharing site founded by Kim Dotcom in 2005. Users could
freely upload and download files from the site, but needed
to pay a small sum to upgrade their access to "premium
access" so as to have access to faster download speeds, no
file limitations etc. However, the site was shut down on the
19 January 2012, after being accused of costing copyright
holders of films, music and other content more than $500
million dollars in revenue by enabling millions of free
downloads of these materials. Movie industry was
complaining that the company was making money out of
pirated material
 One of the world's largest file sharing sites.
 User base of at least a 150 million people around the
world
 So widely used that profits earned founder Kim
Dotcom 42 million dollars in 2011
 82,764,913 unique visitors
 1,000,000,000 page views throughout history
 25 petabytes of storage
1. Counterfeiting
2. Internet Piracy
3. End User Piracy
4. Client-Server Overuse
5. Hard-Disk Loading
 This type of piracy is the illegal duplication,
distribution and/or sale of copyrighted material with
the intent of imitating the copyrighted product.
 This occurs when software is downloaded from the
Internet. The same purchasing rules apply to on-line
software purchases as for those bought in compact disc
format.
 This occurs when an individual reproduces copies of
software without authorization.
 This type of piracy occurs when too many users on a
network are using a central copy of a program at the
same time
 This occurs when a business sells new computers with
illegal copies of software loaded onto the hard disks to
make the purchase of the machines more attractive.
 Warning Sign
1. Prices that are too good to be true.
 Auction Sites
1. Unbundled OEM and System Builder software
2. No box and manual on CD
3. No tech support
4. Key/serial number only
5. Disc only
6. CD-R/backup copy
7. Software delivered via e-mail
8. Software described as "cannot be registered"
9. Compilation - more than one program on a single CD
 Spam
1. Be cautious of unsolicited spam that promotes Symantec/Norton branded software
2. File spam complaints with FTC
3. Visit sources of spam for more information on spam
1. Decrease in Sales of Legal Copies
2. Retail Price Effects of Piracy
3. Estimating the Amount of Piracy
4. The Expectation of Piracy
5. Non-profit Losses
6. A Past Piracy Problem
 In June of 1996, the largest ever video piracy operation in the United States was
dismantled in New York. The nationwide counterfeit business sold more than
100,000 pirated videos a week, grossing approximately $500,000. The
investigation, dubbed “Operation Copy Cat”, culminated when search warrants
were executed by the New York City Police Department, assisted by the MPAA,
on 17 locations, including four labs. Authorities arrested 36 people and seized
817 VCRs, 77,641 pirated videos, $40,000 in case, 37,000 blank cassettes, more
than 100,000 sleeves, labels and other sophisticated equipment used in the
duplicating process. The economic impact on MPAA member companies is
estimated to be more than $87 million a year.
 There are two methods proposed by Peter Troost may help in the
war on piracy.
1. build copy protection into an operating system
2. Meterware (superdistribution)
 Even though anti-piracy organizations have made
great strides in their fight, with the enormous growth
of the Internet, current anti-piracy methods will not
completely stop piracy.
 The damage done to the industry and legitimate end
user does not outweigh the few advantages that piracy
does have. The chances of being caught, the fines, and
the jail sentences are constantly increasing.
 Organizations and industry need to come up with
solutions to increase copyright protection, inform the
uneducated, and negate the advantages that computer
piracy has.
Media piracy

More Related Content

What's hot

Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornographySAMBIT SWAIN
 
Internet is producing Copycats !!!
Internet is producing Copycats !!!Internet is producing Copycats !!!
Internet is producing Copycats !!!NigamanandaRao
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Digital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyDigital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyColm Walsh
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Homosexuality
HomosexualityHomosexuality
HomosexualitySanalol
 

What's hot (16)

cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Piracy
PiracyPiracy
Piracy
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Online defamation
Online defamationOnline defamation
Online defamation
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Internet is producing Copycats !!!
Internet is producing Copycats !!!Internet is producing Copycats !!!
Internet is producing Copycats !!!
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Digital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyDigital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of Society
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Piracy
PiracyPiracy
Piracy
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Homosexuality
HomosexualityHomosexuality
Homosexuality
 

Similar to Media piracy

Similar to Media piracy (10)

Piracy Essay
Piracy EssayPiracy Essay
Piracy Essay
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
2010 US Congress on pirate states
2010 US Congress on pirate states2010 US Congress on pirate states
2010 US Congress on pirate states
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Berkley Law Writing Competition
Berkley Law Writing CompetitionBerkley Law Writing Competition
Berkley Law Writing Competition
 
Intellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & StrategiesIntellectual Property Crimes : Research Tools & Strategies
Intellectual Property Crimes : Research Tools & Strategies
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Media piracy

  • 1. Submitted to: Sir Waqar Malik Submitted by: Maryam Jamil,37 Zahida Malik,13 Amna Ashfaq,29 Maryam Yaseen,14
  • 2.  "Regardless of how the infringer sees it... piracy is theft of intellectual property and is no more justifiable than shoplifting, stealing cable service or other utilities. Developers invest time and money to develop a... product and deserve to make a fair profit - so they can develop new ...products. This is particularly crucial for small developers... whose survival depends on income from sales to a limited market“
  • 3.  "Pirated copyright goods shall mean any goods which are copies made without the consent of the rightholder or person duly authorised by the rightholder in the country of production and which are made directly or indirectly from an article where the making of that copy would have constituted an infringement of a copyright or a related right under the law of the country of importation"
  • 4.
  • 5.  The explosion of media piracy was galvanized by the invention of the MP3 format back in 1993. This format allowed the copying of CDs to computer devices, from which pirate CD replicas could then be produced. The MP3 format wasn't used as widely for piracy until the Napster website opened in 1999. This highly publicized site allowed users to trade and download musical files. Though Napster was eventually closed after the recording industry brought a number of lawsuits against it, a variety of peer-to-peer file services has since sprung up across the Net, making it easy to download media files illegally.
  • 6.  Print  Music  Films  Software  Internet (online)
  • 7.  Any unauthorized use of a copyrighted work, such as a book, school manual, journal article or sheet music, represents an infringement of copyright or a case of copyright piracy, unless covered by a copyright exception. Piracy of printed works affects both paper copies and works in digital format. In some developing countries, trade in pirated books often exceeds the legitimate market. Educational institutions represent a primary target market for pirates. Infringing activities include both illegal commercial photocopying and/or printing and reproduction of books and other printed material in digital form, as well as distribution in hard copy or digital format.
  • 8.  Music piracy includes both traditional unlawful use of music and unauthorized use of music on on-line communication networks.  Bootlegging (unauthorized recording and duplication of a live or broadcast performance)  Counterfeiting (unauthorized copying of the material support, labels, artwork and packaging) are the most widespread types of traditional music piracy.  The unauthorized uploading and making available to the public of music files or downloading such files from an Internet site is referred to as Internet or on-line piracy. On- line piracy may also include certain uses of "streaming" technologies.
  • 9.
  • 10. As in the case of music, film piracy is either traditional or done over the Internet. It includes, but is not limited to, videocassette and optical disc piracy, theatrical camcorder piracy, theatrical print theft, signal theft and broadcasting piracy, and on-line piracy.
  • 11.
  • 12.
  • 13. Software piracy refers to practices that involve the unauthorized copying of computer software.
  • 14.  The unauthorized downloading or distribution over the Internet of unauthorized copies of works such as movies, music, videogames and software is generally referred to as Internet or on-line piracy. Illicit downloads occur through file-sharing networks, illegal servers, websites and hacked computers. Hard goods pirates also use the Internet to sell illegally duplicated DVDs through auctions and websites.
  • 15.
  • 16.  Low level of public awareness  High consumer demand for cultural products  Misconceptions about piracy  Inefficient intellectual property protection and weak enforcement of rights  High cost of cultural goods  Difficulty of access to legitimate works  Considerable business profits for pirates
  • 17.
  • 18.  In the United States, as in many countries around the world, breaking copyright on media is illegal  If an individual breaks federal law regarding media piracy, she is liable to end up in court. Even a first-time offender can end up paying as much as $250,000 in fines, or face a maximum five years in jail. Copyright holders, like the Recording Industry Association of America, also have the ability to sue individuals, and can potentially be awarded as much as $150,000 for every copyrighted file distributed illegally.
  • 19.  Authorities responsible for enforcing the copyright law 1. Police- Section 74 (3) of the Copyright Law. 2. Federal Investigation Agency- Second Schedule of FIA Act of 1974. 3. Customs- Sections 58, 65A to 65C of the Copyright Law. 4. Judiciary- Civil/Criminal- Sections 59 to 77 of the Copyright Law. 5. Pakistan electronic Media Regulatory Authority (PEMRA)- PEMRA Ordinance 2007
  • 20.  Megaupload, a Hong-Kong based company, was a file sharing site founded by Kim Dotcom in 2005. Users could freely upload and download files from the site, but needed to pay a small sum to upgrade their access to "premium access" so as to have access to faster download speeds, no file limitations etc. However, the site was shut down on the 19 January 2012, after being accused of costing copyright holders of films, music and other content more than $500 million dollars in revenue by enabling millions of free downloads of these materials. Movie industry was complaining that the company was making money out of pirated material
  • 21.  One of the world's largest file sharing sites.  User base of at least a 150 million people around the world  So widely used that profits earned founder Kim Dotcom 42 million dollars in 2011  82,764,913 unique visitors  1,000,000,000 page views throughout history  25 petabytes of storage
  • 22.
  • 23.
  • 24. 1. Counterfeiting 2. Internet Piracy 3. End User Piracy 4. Client-Server Overuse 5. Hard-Disk Loading
  • 25.  This type of piracy is the illegal duplication, distribution and/or sale of copyrighted material with the intent of imitating the copyrighted product.
  • 26.  This occurs when software is downloaded from the Internet. The same purchasing rules apply to on-line software purchases as for those bought in compact disc format.
  • 27.  This occurs when an individual reproduces copies of software without authorization.
  • 28.  This type of piracy occurs when too many users on a network are using a central copy of a program at the same time
  • 29.  This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive.
  • 30.  Warning Sign 1. Prices that are too good to be true.  Auction Sites 1. Unbundled OEM and System Builder software 2. No box and manual on CD 3. No tech support 4. Key/serial number only 5. Disc only 6. CD-R/backup copy 7. Software delivered via e-mail 8. Software described as "cannot be registered" 9. Compilation - more than one program on a single CD  Spam 1. Be cautious of unsolicited spam that promotes Symantec/Norton branded software 2. File spam complaints with FTC 3. Visit sources of spam for more information on spam
  • 31. 1. Decrease in Sales of Legal Copies 2. Retail Price Effects of Piracy 3. Estimating the Amount of Piracy 4. The Expectation of Piracy 5. Non-profit Losses 6. A Past Piracy Problem  In June of 1996, the largest ever video piracy operation in the United States was dismantled in New York. The nationwide counterfeit business sold more than 100,000 pirated videos a week, grossing approximately $500,000. The investigation, dubbed “Operation Copy Cat”, culminated when search warrants were executed by the New York City Police Department, assisted by the MPAA, on 17 locations, including four labs. Authorities arrested 36 people and seized 817 VCRs, 77,641 pirated videos, $40,000 in case, 37,000 blank cassettes, more than 100,000 sleeves, labels and other sophisticated equipment used in the duplicating process. The economic impact on MPAA member companies is estimated to be more than $87 million a year.
  • 32.  There are two methods proposed by Peter Troost may help in the war on piracy. 1. build copy protection into an operating system 2. Meterware (superdistribution)
  • 33.  Even though anti-piracy organizations have made great strides in their fight, with the enormous growth of the Internet, current anti-piracy methods will not completely stop piracy.  The damage done to the industry and legitimate end user does not outweigh the few advantages that piracy does have. The chances of being caught, the fines, and the jail sentences are constantly increasing.  Organizations and industry need to come up with solutions to increase copyright protection, inform the uneducated, and negate the advantages that computer piracy has.