What is Software Piracy?
There are numerous forms of software piracy, each of which contributes to the billions lost in revenue to the software industry annually. The following are the most common types of software piracy that have an impact on Borland:
This occurs when users make additional copies of software without authorization. This includes casual copying between individuals to companies who do not strictly monitor the number of licenses they have installed vs. the number of licenses they have paid for.
Reseller piracy occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers. Reseller piracy also occurs when resellers knowingly sell counterfeit versions of software to unsuspecting customers. Indications of reseller piracy are multiple users with the same serial number, lack of original documentation or an incomplete set, and nonmatching documentation, where the documentation does not match the software version installed.
While Borland offers authorized versions of its software for sale online, either directly through Borland or via authorized distributors and/or resellers, there are numerous unauthorized operations on the Internet as well:
- Pirate websites that make software available for free download or in exchange for uploaded programs;
- Internet auction sites that offer counterfeit, out-of-channel, infringing copyright software; and
- Peer-to-Peer networks that enable unauthorized transfer of copyrighted programs.
- Internet piracy represents perhaps the single greatest threat to e-commerce.
If you see Borland software for sale on popular auction sites, and the price seems too good to be true, it probably is. Bidding on such software could open you up to major software piracy liability.
This is the illegal duplication and sale of copyrighted material with the intent of directly imitating the copyrighted product. In the case of packaged software, it is common to find counterfeit copies of CD's or diskettes, incorporating the software program, as well as related packaging, manuals, license agreements, labels, registration cards, and security features.
This occurs when illegal access is gained to protected software.