SlideShare uma empresa Scribd logo
1 de 15
PIRACY A Presentation on the ways, causes & effects of piracy
What comes to your mind when you think “PIRATES” ? PIRATES?
But what about this ??? PIRACY is defined as : “The act of violence or depredation on the high seas; also, the theft of Intellectual Property, especially in electronic media.”
What is PIRACY ??? Piracy is a form of copyright violation. It includes the unauthorized use, reproduction, and/or distribution of material, electronic or printed, that is covered by copyright law in a manner that violates one of the copyright owner’s exclusive rights.
What constitutes PIRACY ??? ,[object Object]
Create derivative works based on the work
Distribute copies of the work to the public by sale, rental, lease/lending or other transfer of ownership
Perform or display the work publicly. (Performance and Broadcasting Rights) ,[object Object]
Piracy of Music Compilations such as “Greatest Hits” of any artist or collection of a specific genre MP3 downloads
Piracy of Movies Using camcorders to copy movies shown in a theatre. Recording the telecast from DTHs. (HDTV Rip) Copying Screener DVDs & Original DVDs
Piracy of Software Using same Serial Key in multiple PCs Use of pirated Operating Systems Use of Cracks and Key-Generators Copying licensed software
How is it all done ???
Factors Causing Piracy It’s a business and is making hugeprofits. Original products (Books, Software) are not available in the market. Prices are very high that’s why people are compelled to purchase pirated products. (Books & Software)  Government taxes levied on import of original software and books increases their prices, so people resort to pirated products.
Effect of Piracy ,[object Object]
It causes great losses to companies.

Mais conteúdo relacionado

Mais procurados

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Infringement under copyright law
Infringement under copyright lawInfringement under copyright law
Infringement under copyright lawShalaka Patil
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Pornography and ethics - India specific
Pornography and ethics - India specificPornography and ethics - India specific
Pornography and ethics - India specificNithya Ramachandran
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 

Mais procurados (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Infringement under copyright law
Infringement under copyright lawInfringement under copyright law
Infringement under copyright law
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Pornography and ethics - India specific
Pornography and ethics - India specificPornography and ethics - India specific
Pornography and ethics - India specific
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 

Destaque

Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy PowerpointMbradber
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Piracy - An Ancient Risk With Modern Faces
Piracy - An Ancient Risk With Modern FacesPiracy - An Ancient Risk With Modern Faces
Piracy - An Ancient Risk With Modern FacesOpen Knowledge
 
MUSIC PIRACY AND THE INTERNET
MUSIC PIRACY AND THE INTERNETMUSIC PIRACY AND THE INTERNET
MUSIC PIRACY AND THE INTERNETAlbert Ong
 
Maritime Piracy in the 21st Century
Maritime Piracy in the 21st CenturyMaritime Piracy in the 21st Century
Maritime Piracy in the 21st Centuryjmgillis
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 

Destaque (20)

Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Say NO to Piracy
Say NO to PiracySay NO to Piracy
Say NO to Piracy
 
Dawn Of Modern Piracy
Dawn Of Modern PiracyDawn Of Modern Piracy
Dawn Of Modern Piracy
 
Piracy - An Ancient Risk With Modern Faces
Piracy - An Ancient Risk With Modern FacesPiracy - An Ancient Risk With Modern Faces
Piracy - An Ancient Risk With Modern Faces
 
MUSIC PIRACY AND THE INTERNET
MUSIC PIRACY AND THE INTERNETMUSIC PIRACY AND THE INTERNET
MUSIC PIRACY AND THE INTERNET
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
Maritime Piracy in the 21st Century
Maritime Piracy in the 21st CenturyMaritime Piracy in the 21st Century
Maritime Piracy in the 21st Century
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 

Semelhante a Piracy

CYBER SECURITY (PIRACY)
CYBER SECURITY (PIRACY)CYBER SECURITY (PIRACY)
CYBER SECURITY (PIRACY)Ketan Nayak
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital PiracyErick Prajogo
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Special Edition: SOPA PIPA Controversy
Special Edition: SOPA PIPA ControversySpecial Edition: SOPA PIPA Controversy
Special Edition: SOPA PIPA ControversyRay Brannon
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracymsjasmin
 
Copyright And Fairuse
Copyright And FairuseCopyright And Fairuse
Copyright And Fairusewebbs1
 
Cultural Production: Barriers and Incentives To Sharing
Cultural Production: Barriers and Incentives To SharingCultural Production: Barriers and Incentives To Sharing
Cultural Production: Barriers and Incentives To SharingKathy Gill
 
Glyn moody ethics of intellectual monopolies - fscons 2010
Glyn moody   ethics of intellectual monopolies - fscons 2010Glyn moody   ethics of intellectual monopolies - fscons 2010
Glyn moody ethics of intellectual monopolies - fscons 2010FSCONS
 
Glyn moody: ethics of intellectual monopolies - fscons 2010
Glyn moody: ethics of intellectual monopolies - fscons 2010Glyn moody: ethics of intellectual monopolies - fscons 2010
Glyn moody: ethics of intellectual monopolies - fscons 2010glynmoody
 

Semelhante a Piracy (15)

CYBER SECURITY (PIRACY)
CYBER SECURITY (PIRACY)CYBER SECURITY (PIRACY)
CYBER SECURITY (PIRACY)
 
Media piracy
Media piracyMedia piracy
Media piracy
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Piracy Essay
Piracy EssayPiracy Essay
Piracy Essay
 
P 1
P 1P 1
P 1
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Special Edition: SOPA PIPA Controversy
Special Edition: SOPA PIPA ControversySpecial Edition: SOPA PIPA Controversy
Special Edition: SOPA PIPA Controversy
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
Copyright 2012
Copyright 2012Copyright 2012
Copyright 2012
 
Copyright And Fairuse
Copyright And FairuseCopyright And Fairuse
Copyright And Fairuse
 
Cultural Production: Barriers and Incentives To Sharing
Cultural Production: Barriers and Incentives To SharingCultural Production: Barriers and Incentives To Sharing
Cultural Production: Barriers and Incentives To Sharing
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Glyn moody ethics of intellectual monopolies - fscons 2010
Glyn moody   ethics of intellectual monopolies - fscons 2010Glyn moody   ethics of intellectual monopolies - fscons 2010
Glyn moody ethics of intellectual monopolies - fscons 2010
 
Glyn moody: ethics of intellectual monopolies - fscons 2010
Glyn moody: ethics of intellectual monopolies - fscons 2010Glyn moody: ethics of intellectual monopolies - fscons 2010
Glyn moody: ethics of intellectual monopolies - fscons 2010
 

Último

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Último (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Piracy

  • 1. PIRACY A Presentation on the ways, causes & effects of piracy
  • 2. What comes to your mind when you think “PIRATES” ? PIRATES?
  • 3. But what about this ??? PIRACY is defined as : “The act of violence or depredation on the high seas; also, the theft of Intellectual Property, especially in electronic media.”
  • 4. What is PIRACY ??? Piracy is a form of copyright violation. It includes the unauthorized use, reproduction, and/or distribution of material, electronic or printed, that is covered by copyright law in a manner that violates one of the copyright owner’s exclusive rights.
  • 5.
  • 6. Create derivative works based on the work
  • 7. Distribute copies of the work to the public by sale, rental, lease/lending or other transfer of ownership
  • 8.
  • 9. Piracy of Music Compilations such as “Greatest Hits” of any artist or collection of a specific genre MP3 downloads
  • 10. Piracy of Movies Using camcorders to copy movies shown in a theatre. Recording the telecast from DTHs. (HDTV Rip) Copying Screener DVDs & Original DVDs
  • 11. Piracy of Software Using same Serial Key in multiple PCs Use of pirated Operating Systems Use of Cracks and Key-Generators Copying licensed software
  • 12. How is it all done ???
  • 13. Factors Causing Piracy It’s a business and is making hugeprofits. Original products (Books, Software) are not available in the market. Prices are very high that’s why people are compelled to purchase pirated products. (Books & Software) Government taxes levied on import of original software and books increases their prices, so people resort to pirated products.
  • 14.
  • 15. It causes great losses to companies.
  • 16.
  • 17.
  • 18. Government should ban pirated products take stringent measures to prevent piracy.
  • 19.