There Are Five Main Types of Software Piracy
Counterfeiting This type of piracy is the illegal duplication, distribution and/or sale of copyrighted material with the intent of imitating the copyrighted product. In the case of packaged software, it is common to find counterfeit copies of the compact discs incorporating the software programs, as well as related packaging, manuals, license agreements, labels, registration cards and security features.
This occurs when software is downloaded from the Internet. The same purchasing rules apply to on-line software purchases as for those bought in compact disc format. Common Internet piracy techniques are:
- Websites that make software available for free download or in exchange for others
- Internet auction sites that offer counterfeit or out-of-channel software
- Peer-to-peer networks that enable unauthorized transfer of copyrighted programs
End User Piracy
This occurs when an individual reproduces copies of software without authorization. These include:
- Using one licensed copy to install a program on multiple computers
- Copying discs for installation or distribution
- Taking advantage of upgrade offers without having a legal copy of the version to be upgraded
- Acquiring academic or other restricted or non-retail software without a proper license
- Swapping discs in or outside the workplace
Client-Server Overuse This type of piracy occurs when too many users on a network are using a central copy of a program at the same time. If you have a local-area network and install programs on the server for several people to use, you have to be sure your license entitles you to do so. If you have more users than allowed by the license, that's "overuse".
Hard-Disk Loading This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive.