StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Anti-Piracy Laws - Essay Example

Cite this document
Summary
As the paper "Anti-Piracy Laws" tells, corporate policies alone cannot and do not ensure employee compliance with anti-piracy laws and regulations. Since, however, it is the company, who is held liable for copyright infringements, they often look for deterrence mechanisms that go beyond policies…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Anti-Piracy Laws
Read Text Preview

Extract of sample "Anti-Piracy Laws"

Table of Contents Table of Contents 1.0 Introduction 2 2.0 Preventative Solutions 2 2 Hardware-Based Techniques 3 2 1 Dongles 3 2 2 Tamperproof CPUs 4 2.1.3 Smartcards 4 2.2 Software-based Techniques 4 3.0 Cost-Benefit 5 4.0 Conclusion 6 5.0 References 7 1.0 Introduction Anti-piracy laws are strict and offenders, whether individuals or corporations, are often confronted with very high fines. As regards organizations, it is the responsibility of management to ensure that employees do not violate anti-piracy laws. This responsibility is often delegated to the IT, or ICT, department. Corporate policies alone cannot, and do not, ensure employee compliance with anti-piracy laws and regulations (Kizza, 2002). Since, however, it is the company, not employees, who are held liable for copyright infringements, they often look for deterrence mechanisms which go beyond policies. Following an audit by the Business Software Alliance, in which our organization was found guilty of violating copyright laws and of running unlicensed, pirated, software on some of its computers, the ICT department experimented with both software and hardware deterrence mechanisms prior to implementing the former. 2.0 Preventative Solutions With the proliferation of peer-to-peer software and the growing ease of downloading and installing pirated software, organizations often confront serious difficulties in implementing anti-piracy regulations. Certainly, there are few, if any, organizations which do not have clear-cut anti-piracy policies but employees often assume that they will not be caught.' The fact is that they can very well be, with the organization left liable for the payment of the resultant fines and vulnerable to lawsuits by the software producers in question (Kizza, 2002). It is for this reason that policies have to be complimented with hardware or software-based deterrent techniques. Following a February 2006 audit by the Business Software Alliance, our organization decided that since policies were not effectively deterring employees from infringing anti-piracy laws, software and hardware mechanisms were required. A thorough study of the advantages and disadvantages of each was conducted prior to implementing software solutions. 2.1 Hardware-Based Techniques Special purpose hardware is commonly used in proof of ownership, to provide secure data storage and to provide a secure execution context for security-sensitive applications. Such hardware is typically more cumbersome for the user and more expensive than software based techniques. 2.1.1 Dongles A dongle is a hardware device distributed with software. Possession of the device proves ownership of software. A dongle typically connects to an I/O port and computes the output of a secret function. While running, the software periodically queries the dongle. If the communication fails or the results of the query are wrong, the software reacts appropriately (Craig and Burnett, 2005). There are three major drawbacks to dongles. These are cost, impracticality and vulnerability. Dongles are expensive at $10 per unit and distributing them with software is not practical. Thirdly, the attack point is clearly defined since the interface to the device is a hardware interface. This means that the signals passing over the interface must conform to the software standards. This gives attackers and analysis advantage (Craig and Burnett, 2005). 2.1.2 Tamperproof CPUs Tamperproof CPUs aid in piracy prevention by providing a secure context and/or secure data storage. By executing the software in a secure environment, the pirate is unable to gain access to the software. This technique prevents the attacker from observing the behavior of the software which means he is unable to identify portions of the software to remove. The obvious drawback to this technique is the cost of requiring all users to have tamperproof hardware (Flynn, 2005). 2.1.3 Smartcards Smartcards store cryptographic keys for use in authentication and authorization systems. A typical smartcard consists of an 8-bit microprocessor with ROM, EEPROM and RAM on a single chip with serial input and output. The EEPROM is used to store the secure information. Through the manipulation of voltage, an attacker can bypass the smartcard. Indeed, researchers have noted that attackers can do so simply by using a microscope and a laser, with the implication being that smartcards are not an effective anti-piracy mechanism (Craig, 2005). 2.2 Software-based Techniques Software-based solutions, such as code obfuscation, software tamperproofing, software watermarking, and software birthmarking, provide a number of advantages over hardware based techniques. First, the protection is cheaper to implement due to the lack of special purpose hardware. Second, many of the currently proposed hardware-based solutions have proven vulnerable and, hence, ineffective. Certainly, somre attacks require specialized equipment but many of the side-channels are relatively cheap. For example, the protection provided by some smartcards can be defeated by shinning a common lightbulb on the card. Third, many hardware based solutions can be difficult to deploy. For instance, it can take several months, possibly over a year, for an organization to upgrade all its computers to tamperproof ones. Besides the cost involved, once the tamperproof CPUs protection mechanism has been defeated, it cannot be fixed without upgrading the hardware again (Craig, 2005; Flynn, 2005). Software-based techniques take a different approach than hardware-based techniques because it is generally believed that given enough time a determined adversary will be able to defeat any protection mechanism. The goal, instead, is to develop techniques which require the expenditure of an inordinate amount of time and effort for the user to be able to install a pirated copy on the machine in question (Craig, 2005). 3.0 Cost-Benefit A quick overview of the advantages and disadvantages of either mechanism leads to the identification of software-based techniques as the more effective of the two. Software Based Hardware Based Ranges from cheap to manageable cost Ranges from costly to cost-prohibitive Violation requires the expenditure of tremendous time and effort Violation can be a simply matter of flashing a lightbulb Implementation is relatively simple Implementation is highly complicated Upgrading (pending discovery of a vulnerability) is cost-effective and simple Upgrading (pending discovery of a vulnerability) is cost-prohibitive and complicated As is evidenced through the above table, software mechanisms appear to be the more effective of the two choices. According to our organization's ICT director, subsequent to the decision to implement software-based techniques, a software programming company was hired to write a program which would specifically prevent the installation and use of pirated companies on any of the company's machines, including laptops which employees were allowed to take home with them. The program cost a little under $15,000 and within one month was installed on all our computers. It has, ever since its installation 8 months ago, prevented the downloading and running of pirated software on our computers. 4.0 Conclusion Anti-piracy laws have placed organizations in the position where they must control their employees' activities vis--vis pirated software. Should an organization fail to do so and should employees run pirated software on company machines, the organization becomes liable to costly legal action and retaliation. It is, thus, that organizations need to supplement their anti-piracy policies with either hardware ir software based deterrent mechanisms. 5.0 References Craig, P. and Burnett, M. (2005) Software Piracy Exposed. NY: Syngress. Flynn, N. (2005) The E-Policy Handbook; Designing and Implementing Effective Email, Internet and Software Policies. NY: AMACOM. Kizza, J. (2002) Ethical and Social Issues in the information Age. NY: Springer. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Anti-Piracy Laws Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1533364-anti-piracy-laws
(Anti-Piracy Laws Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/miscellaneous/1533364-anti-piracy-laws.
“Anti-Piracy Laws Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1533364-anti-piracy-laws.
  • Cited: 0 times

CHECK THESE SAMPLES OF Anti-Piracy Laws

Analysis of the Media Industry In India

The researcher of this descriptive essay mostly focuses on the discussion of the topic of media industry in India.... This report will analyze internal and external environment of the Media Industry in India through applying the SWOT analysis, PEST analysis and the Porter's Five Forces Analysis.... hellip; In addition the paper will also focus on Future of the Media Industry in India, it will highlight the Different types Of Media in India which includes the Print media, radio, electronic, outdoor and Television....
7 Pages (1750 words) Essay

Exploring Your Intellectual Property Policies

In acknowledgement of the economic/financial consequences of the aforementioned to the industry, stringent software copyright and Anti-Piracy Laws have been implemented on both national and international levels, in an effort to offset and stem this development.... hellip; More often than not, the two coincide, not only because employee legal infringements adversely impact upon a company's public image but because the violation of laws from within the organization, even if they are the independent action of single employees, places companies in questionable legal positions....
4 Pages (1000 words) Essay

Legal Studies and Industrial Relations

Liquor laws have, until recently, prohibited the sale of liquor by licensed shops on Sundays.... As evidenced in the preceding, the legislature under question here is liquor laws.... Proponents of the status quo maintain that existent laws are an integral way of maintaining control over drinking and, accordingly, for avoiding the social problems which arise from binge drinking.... AHA fears standards drop with new laws.... The Australian Hotel Association has formally announced its reservation regarding the proposed amendment to the NSW liquor licensing laws....
11 Pages (2750 words) Essay

What are the various legal tools now available to cope with the organized crime problem

7 caters for such anti piracy laws with all partner nations.... It was to cater for all terrorist activities on US soil and made amendments to immigration laws, banking laws, money laundering laws and the Foreign Intelligence Surveillance Act (FISA).... anti-piracy initiatives involve international agreements, often through the World Trade Organization (WTO)....
2 Pages (500 words) Essay

Li Ning Company Limited Organizational Background and Audit

Li Ning Company Limited is a publicly-traded company in China.... Its main line of business is in the sports industry, dealing with sports-related products such as footwear, apparel, equipment, and accessories.... It is engaged in manufacturing, distribution, retailing, and franchising of such products....
10 Pages (2500 words) Assignment

Strategic Plan for the Indonesian Music Shop

The research report “Strategic Business Plan for the Indonesian Music Shop” examines the Indonesian music industry, which has seen a gradual fall in the recent past time due to several reasons which have actively contributed in strengthening its fall.... hellip; The author of the paper states that the Indonesian recording industry has been so affected by the activities of piracy that the companies involved into the business of music and entertainment needed to take a major step in order to protect their business revenue and the business operations in Indonesia....
14 Pages (3500 words) Assignment

The Problem of Online File-sharing in Digital Economy Act 2010

The author critically accesses the Digital Economy Act 2010 and answers the question whether it is an appropriate response to the problem of online file-sharing and gives reasons for the answer and supports the argument with appropriate evidence… The author states that Digital Economy Act 2010 is not the appropriate response to the “problem” of online file-sharing it is actually an overkill....
12 Pages (3000 words) Essay

How Serious Is Software Piracy

From the paper "How Serious Is Software Piracy " it is clear that the study on piracy covers a period between 2011 and 2013.... In 2011 software piracy was 42 percent and it jumps to 43 percent in 2013, the finding underscores the need to adopt a better way of managing software piracy.... hellip; In terms of regions, the region with the highest overall rate of software piracy is Asia pacific with 62 percent and the region with the lowest rate of software piracy in North America with 19 percent....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us