SlideShare uma empresa Scribd logo
1 de 16
MULTIMEDIA-DIGITAL PIRACY
Introduction To Digital Piracy
• What is Piracy?
“Unauthorised copying of software,
music or films, so-called digital piracy”

While there are definitions of “pirated copyright
goods”, there is currently no specific legal
definition of digital piracy, which would be more
accurately described as “digital infringement of
copyright”.
What Is Copyright?
• Copyright is a legal concept, enacted by most
governments, giving the creator of an original
work exclusive rights to it, usually for a limited
time, with the intention of enabling the creator of
intellectual wealth (e.g. the photographer of a
photograph or the author of a book) to get
compensated for their work and be able to
financially support themselves. Generally, it is
"the right to copy", but also gives the copyright
holder the right to be credited for the work.
Music Piracy & Video Piracy
• Music Piracy
For music, it is the copying and distributing
of copies of a piece of music for which the
composer, recording artist, or copyright
holding record company did not give consent.
It is a form of copyright infringement(An act
that disregards an agreement or a
right), which is a crime in many countries.
Music Piracy & Video Piracy
• Video Piracy
Whereas for video piracy, a movie is
usually released in several formats and
different versions as the primary sources used
by a group for a particular movie may vary.
Pirated movies are primarily released by these
organized groups, commonly referred to as
scene groups or warez groups. The first
release of a movie is usually of a lower quality
due to a lack of sources, but is eventually
replaced with higher-quality releases as better
sources become available.
Consumer VS Producer
• Producer at a loss
• Producer at benefit
• Consumer at a loss
• Consumer at benefit
Anti-piracy
• Antipiracy in India
EIPR is the first to put India's excellent copyright
and intellectual property rights law to good use,
for the benefit of the manufacturers, artists,
entertainment industry, software developers
scientists intellectuals, creative thinkers, and the
nation of India as a whole.
Who are EIPR ?
EIPR is India's largest investigation agency
specialising in anti-counterfeiting solutions.
Reasons for Supporting Piracy
•
•
•
•
•

We're only hurting big business.
Authors already have a plenty of money.
Digital content is too expensive.
Everyone else is doing it.
We live in a different country so we don't get
movies/books/shows until months later.
Reasons for Going Against Piracy
•
•
•
•

Viruses & Malware
Good Quality Media
Against Law
If You are the producer
Advantages
• Piracy keeps music “alive”
• Drives up the sales of legal music
• Legal online file-sharing services exist at fair
prices and are much safer
Disadvantages
• People are taking the risk of getting caught
and receiving a criminal record when he/she
downloads illegally
• Free file-sharing sites often transmit viruses
• Quality of pirated movies and songs might
not be as accurate and précised as compared
to original copies
APPLICATIONS
• Forensics And Piracy Deterrence
Forensic watermark
• Forensic watermark applications enhance a
content owner's ability to detect and respond
to misuse of its assets. Forensic watermarking
is used not only to gather evidence for
criminal proceedings, but also to enforce
contractual usage agreements between a
content owner and the people or companies
with which it shares its content. It provides
positive, irrefutable evidence of misuse for
leaked content assets.
Deterrence Effects
There will still be a fairly equal amount of
people who are pirates and non pirates
What we can do?

We only can do is to get knowledge about
piracy and defend ourself from piracy
Multimedia digital piracy

Mais conteúdo relacionado

Mais procurados

Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracymsjasmin
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Copyright (MBA Project)
Copyright (MBA Project)Copyright (MBA Project)
Copyright (MBA Project)Kajal Jain
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentationvalliappan1991
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
 
IPR protection to computer softwares
IPR protection to computer softwaresIPR protection to computer softwares
IPR protection to computer softwaresShivani Sharma
 
Copyright & Music licensing
Copyright & Music licensingCopyright & Music licensing
Copyright & Music licensingZeeshan Chaudhry
 
What is a Copyright? What are its characteristics? [#04]
What is a Copyright? What are its characteristics? [#04]What is a Copyright? What are its characteristics? [#04]
What is a Copyright? What are its characteristics? [#04]Kamal Thakur
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 

Mais procurados (20)

Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Copyright act
Copyright actCopyright act
Copyright act
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What Is a Copyright?
What Is a Copyright?What Is a Copyright?
What Is a Copyright?
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Copyright (MBA Project)
Copyright (MBA Project)Copyright (MBA Project)
Copyright (MBA Project)
 
Digital Copyright
Digital CopyrightDigital Copyright
Digital Copyright
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentation
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
IPR protection to computer softwares
IPR protection to computer softwaresIPR protection to computer softwares
IPR protection to computer softwares
 
Copyright & Music licensing
Copyright & Music licensingCopyright & Music licensing
Copyright & Music licensing
 
What is a Copyright? What are its characteristics? [#04]
What is a Copyright? What are its characteristics? [#04]What is a Copyright? What are its characteristics? [#04]
What is a Copyright? What are its characteristics? [#04]
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
DELITOS INFORMATICOS
DELITOS INFORMATICOSDELITOS INFORMATICOS
DELITOS INFORMATICOS
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 

Destaque

Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingArka Ray
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracyMunish Sudan
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentationDCobbVt
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)k.surya kumar
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .SD Paul
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in indiaMahender Mahi
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 

Destaque (13)

Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and Cheating
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracy
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentation
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Space mouse[1]
Space mouse[1]Space mouse[1]
Space mouse[1]
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Safety of women
Safety of womenSafety of women
Safety of women
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Latest rbi ppt
Latest rbi pptLatest rbi ppt
Latest rbi ppt
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in india
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 

Semelhante a Multimedia digital piracy

Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfParshant Kumar
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and CommerceAdelphi Consulting
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Kristin Thomson
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGian Fiero
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationeam704
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distributionKristin Thomson
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidLeslie Lee
 

Semelhante a Multimedia digital piracy (20)

Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdf
 
Piracy
PiracyPiracy
Piracy
 
Music piracy
Music piracyMusic piracy
Music piracy
 
Copyrightbonneversion
CopyrightbonneversionCopyrightbonneversion
Copyrightbonneversion
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and Commerce
 
What is Copyright?
What is Copyright?What is Copyright?
What is Copyright?
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Copyright 2012
Copyright 2012Copyright 2012
Copyright 2012
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual Property
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentation
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distribution
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
Copyright.pptx
Copyright.pptxCopyright.pptx
Copyright.pptx
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still Valid
 

Último

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Multimedia digital piracy

  • 2. Introduction To Digital Piracy • What is Piracy? “Unauthorised copying of software, music or films, so-called digital piracy” While there are definitions of “pirated copyright goods”, there is currently no specific legal definition of digital piracy, which would be more accurately described as “digital infringement of copyright”.
  • 3. What Is Copyright? • Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time, with the intention of enabling the creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to get compensated for their work and be able to financially support themselves. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work.
  • 4. Music Piracy & Video Piracy • Music Piracy For music, it is the copying and distributing of copies of a piece of music for which the composer, recording artist, or copyright holding record company did not give consent. It is a form of copyright infringement(An act that disregards an agreement or a right), which is a crime in many countries.
  • 5. Music Piracy & Video Piracy • Video Piracy Whereas for video piracy, a movie is usually released in several formats and different versions as the primary sources used by a group for a particular movie may vary. Pirated movies are primarily released by these organized groups, commonly referred to as scene groups or warez groups. The first release of a movie is usually of a lower quality due to a lack of sources, but is eventually replaced with higher-quality releases as better sources become available.
  • 6. Consumer VS Producer • Producer at a loss • Producer at benefit • Consumer at a loss • Consumer at benefit
  • 7. Anti-piracy • Antipiracy in India EIPR is the first to put India's excellent copyright and intellectual property rights law to good use, for the benefit of the manufacturers, artists, entertainment industry, software developers scientists intellectuals, creative thinkers, and the nation of India as a whole. Who are EIPR ? EIPR is India's largest investigation agency specialising in anti-counterfeiting solutions.
  • 8. Reasons for Supporting Piracy • • • • • We're only hurting big business. Authors already have a plenty of money. Digital content is too expensive. Everyone else is doing it. We live in a different country so we don't get movies/books/shows until months later.
  • 9. Reasons for Going Against Piracy • • • • Viruses & Malware Good Quality Media Against Law If You are the producer
  • 10. Advantages • Piracy keeps music “alive” • Drives up the sales of legal music • Legal online file-sharing services exist at fair prices and are much safer
  • 11. Disadvantages • People are taking the risk of getting caught and receiving a criminal record when he/she downloads illegally • Free file-sharing sites often transmit viruses • Quality of pirated movies and songs might not be as accurate and précised as compared to original copies
  • 12. APPLICATIONS • Forensics And Piracy Deterrence
  • 13. Forensic watermark • Forensic watermark applications enhance a content owner's ability to detect and respond to misuse of its assets. Forensic watermarking is used not only to gather evidence for criminal proceedings, but also to enforce contractual usage agreements between a content owner and the people or companies with which it shares its content. It provides positive, irrefutable evidence of misuse for leaked content assets.
  • 15. There will still be a fairly equal amount of people who are pirates and non pirates What we can do? We only can do is to get knowledge about piracy and defend ourself from piracy