Friday, July 26, 2019
Several Choices Available - Highlighted Essay Example | Topics and Well Written Essays - 750 words
Several Choices Available - Highlighted - Essay Example Dealing with the piracy to the software is a herculean task which has proven difficult even to the most developed parts of the world. Intellectual property right allows for the owner of an invention to posses the ownership of such creativity. Some of the ways in which intellectual property right ensures that the innovator is protected is through provision of patent, copyrights, designs as well as trademark. One of the most rampant problems that has increasingly grown in the world of software is its unlawful duplication and sharing as well as the piracy. Though software piracy has been a problem in United States and North America, the rate of piracy would not be compared to that of the other parts of the world. (Craig, P., Honick, R., & Burnett, M., 2005) This is majorly because in several parts of the world, copyrights and patent laws specifically those in the United States are not recognized in such places. Additionally, because it is quite easy to distribute the software, it becomes difficult to control the intellectual property rights beyond borders. For software privacy to be ensured there is a need for amalga mation of technology, education, and legislation that would be accompanied by enforcement. (Greg, A., 2009)The policies that need to be developed should be in a manner that ensure promotion of anti-piracy but in no means deterring the use of the software by the legal users. The illegal copying and sharing of software applications and packages that violates patent laws and software licenses would be referred to as software piracy. (Johns, A., 2009) Like laws that protect any other intellectual properties, such as literature, music and movies, software, Software is also protected by such laws. However, software is a new entrant within the intellectual property protection. Software piracy is not always considered as stealing considering that users only do that through making of copies as well as
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.