Thursday, May 2, 2019
Several Choices Available - Highlighted Essay Example | Topics and Well Written Essays - 750 words
Several Choices Available - Highlighted - Essay exercisingDealing with the piracy to the software system is a herculean task which has proven difficult even to the closely developed split of the world.Intellectual property right allows for the owner of an invention to posses the ownership of such(prenominal) creativity. approximately of the ways in which intellectual property right ensures that the innovator is protected is through provision of patent, copyrights, designs as well as trademark. One of the most rampant problems that has increasingly grown in the world of software is its unlawful duplication and sharing as well as the piracy. Though software piracy has been a problem in United States and North America, the rate of piracy would non be compared to that of the other parts of the world. (Craig, P., Honick, R., & Burnett, M., 2005) This is majorly because in several parts of the world, copyrights and patent laws specifically those in the United States are not accepted in such places. Additionally, because it is quite easy to distribute the software, it becomes difficult to control the intellectual property rights beyond borders. For software privacy to be ensured there is a need for amalgamation of technology, education, and legislation that would be accompanied by enforcement. (Greg, A., 2009)The policies that need to be developed should be in a manner that ensure furtherance of anti-piracy but in no means deterring the use of the software by the legal users.The illegal copy and sharing of software applications and packages that violates patent laws and software licenses would be referred to as software piracy. (Johns, A., 2009) Like laws that protect some(prenominal) other intellectual properties, such as literature, music and movies, software, Software is also protected by such laws. However, software is a new entrant within the intellectual property protection.Software piracy is not always considered as stealing considering that users onl y do that through making of copies as well as
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.