+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Software licensing

Essay, term paper, research paper:  Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Technology: Software Licensing, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.

In 1993 worldwide illegal copying of domestic and international software cost $12.5
billion to the software industry, with a loss of $2.2 billion in the United States
alone. Estimates show that over 40 percent of U.S. software company revenues are
generated overseas, yet nearly 85 percent of the software industry's piracy losses
occurred outside of the United States borders. The Software Publishers Association
indicated that approximately 35 percent of the business software in the United States
was obtained illegally, which 30 percent of the piracy occurs in corporate settings.
In a corporate setting or business, every computer must have its own set of original
software and the appropriate number of manuals. It is illegal for a corporation or
business to purchase a single set of original software and then load that software onto
more than one computer, or lend, copy or distribute software for any reason without the
prior written consent of the software manufacturer. Many software managers are
concerned with the legal compliance, along with asset management and costs at their
organizations. Many firms involve their legal departments and human resources in
regards to software distribution and licensing.
Information can qualify to be property in two ways; patent law and copyright
laws which are creations of federal statutes, pursuant to Constitutional grant of
legislative authority. In order for the government to prosecute the unauthorized
copying of computerized information as theft, it must first rely on other theories of
information-as-property. Trade secret laws are created by state law, and most
jurisdictions have laws that criminalize the violations of a trade-secret holder=s
rights in the secret. The definition of a trade secret varies somewhat from state to
state, but commonly have the same elements. For example, AThe information must be
secret, Anot of public knowledge or of general knowledge in the trade or business, a
court will allow a trade secret to be used by someone who discovered or developed the
trade secret independently or if the holder does not take adequate precautions to
protect the secret.
In 1964 the United States Copyright Office began to register software as a form
of literary expression. The office based its decision on White-Smith Music Co. v.
Apollo , where the Supreme Court determined that a piano roll used in a player piano did
not infringe upon copyrighted music because the roll was part of a mechanical device.
Since a computer program is textual, like a book, yet also mechanical, like the piano
roll in White-Smith, the Copyright Office granted copyright protection under the rule of
doubt.
In 1974, Congress created the Natural Commission on New Technological Uses
(CONTU) to investigate whether the evolving computer technology field outpaced the
existing copyright laws and also to determine the extent of copyright protection for
computer programs. CONTU concluded that while copyright protection should extend beyond
the literal source code of a computer program, evolving case law should determine the
extent of protection. The commission also felt copyright was the best alternative among
existing intellectual property protective mechanisms, and CONTU rejected trade secret
and patents as viable protective mechanisms. The CONTU report resulted in the 1980
Computer Software Act, and the report acts as informal legislative history to aid the
courts in interpreting the Act.
In 1980 The Copyright Act was amended to explicitly include computer programs.
Title 17 to the United States Code states that it is illegal to make or to distribute
copies of copyrighted material without authorization, except for the user=s right to
make a single backup copy for archival purposes. Any written material (including
computer programs) fixed in a tangible form (written somewhere i.e. printout) is
considered copyrighted without any additional action on the part of the author.
Therefore, it is not necessary that a copy of the software program be deposited with the
Copyright Office in Washington, D.C. for the program to be protected as copyrighted.
With that in mind then a copyright is a property right only. In order to prevent anyone
from selling your software programs, you must ask a court (federal) to stop that person
by an injunction and to give you damages for the injury they have done to you by selling
the program.
The Software Rental Amendments Act Public Law 101-650) was approved by Congress
in 1990, this Act prohibits the commercial rental, leasing or lending of software
without the express written permission of the copyright holder. An amendment to Title
18 to the United States Code was passed by Congress in 1992. This amendment. Known as
Public Law 102-561 made software piracy a federal offense, and instituted criminal
penalties for copyright infringement of software. The penalties can include
imprisonment of up to five years, fines up to $250,000 or both for unauthorized
reproduction or distribution of 10 or more copies of software with a total retail value
exceeding $2,500 or more.
Under United States law duplicating software for profit, making multiple copies
for use by different users within an organization, and giving an unauthorized copy to
someone else - is prohibited. Under this law if anyone is caught with the pirated
software, an individual or the individual=s company can be tried under both civil and
criminal law. A Civil action may be established for injunction, actual damages (which
includes the infringer=s profits) or statutory damages up to $100,000 per infringement.
The criminal penalties for copyright infringement can result in fines up to $250,000
and a jail term up to five years for the first offense and ten years for a second
offense or both. When software is counterfeit or copied, the software developer loses
their revenue and the whole software industry feels the effect of piracy. All software
developers spend a lot of time and money in developing software for public use. A
portion of every dollar spent in purchasing original software is funneled back into
research and development of new software. Software piracy can be found in three forms:
software counterfeiting, which is the illegal duplication and sale of copyrighted
software in a form that is designed to make it appear to be a legitimate program; Hard
disk loading, whereby computer dealers load unauthorized copies of software onto the
hard disks of personal computers, which acts as an incentive for the end user to buy the
hardware from that particular dealer; and downloading of copyrighted software to users
connected by modem to electronic bulletin boards and/or the Internet. When software is
pirated the consumer pays for that cost by new software and/or upgrade version being
very expensive. Federal appellate courts in the U.S. have determined that operating
systems, object code and software cotained in ROMs are protected by copyright, and some
lower federal courts have also determined that microcode (the instructions set on
microprocessor chips), and the look and feel of computer screens is subject to
copyright protection. Which leads to the problems of the widespread development of
multimedia applications that has brought out major problems in clearing copyright for
small elements of text, images, video and sound..
The United States Government has been an active participant in protecting the
rights of the software industry. When the Business Software Alliance (BSA) conducts a
raid, Federal Marshals or local law enforcement officials participate also. An
organization known as the Software Publishers Association (SPA) is the principal trade
association of the PC software industry. SPA works closely with the FBI and has also an
written enforcement manual for the FBI to help them investigate pirate bulletin board
systems and organizations (audits). With the help of the FBI, the result of enforcement
actions resulted in recoveries from anti-piracy actions totaling $16 million since the
program started in 1990.
The Software Publishers Association (SPA) funds a educational program to
inform individuals and corporations about software use and the law. This program
provides all PC users with the tools needed to comply with copyright law and become
software legal. The SPA also publishes brochures free of charge about the legal use of
software for individuals and businesses. Also available to help corporations
understand the copyright law is a 12-minute videotape, which is composed of the most
commonly asked questions and answers to them. The video tape is available in French and
Spanish and all together over 35,000 copies of the tape had been sold.
SPA has also compiled a free Self-Audit Kit with which organizations can examine
their software use practices. Included in the kit, is a software inventory management
program designed to help an organization track their commercial software programs that
are on all hard disks. The program searches PC hard disks for more than 1300 of the
most common programs used in business.
Also available is the SPA Software Management Guide which helps companies audit
their current software policies, educate employees about the legal use of software, and
establish procedures to purchase, register, upgrade and backup computing systems. The
guide in addition also provides an Internal Controls Analysis and Questionnaire. The
guide also contains all of the SPA=s current anti-piracy materials.
The U.S. software industry is facing the challenges of more sophisticated
network environments, greater competition among software companies along with hardware
manufacturers. At this moment more software than ever before is distributed on a high
volume, mass marketed basis. There are many types of software out on the market and
increasing every day. They range from graphical user interfaces for application
programs such as mass-market spreadsheets, to more sophisticated technical software used
to design integrated circuits. The use of software plays a more vital role daily in
our lives such as embedded software, which is critical to equipment in locations as a
doctor=s office or an automotive shop. The instrument and devices found there depend
more and more on software, because software provides the flexibility to meet the many
different needs to the end user. As our lives our shaped and enhanced more by
technology, there is already a greater demand that impacts the software industry.
One of the main concerns of the software industry is how to deal with the issues
of Asoftware licensing@. More and more customers want customized software suited for
their business or personal need, and expect the software development firms to
accommodate to their wishes. The other side of this issue is that software development
firms are concerned with unrealized revenue and excess costs in the form of software
piracy, unauthorized use, excess discounts and lengthened sales cycles. For the
customer and the software development firm, both have high administrative costs in
regards to software programs. Software licensing policies were originally a result of
software developers= need to protect their revenue base in the face of potential piracy.
Product delivery for software is made up of a number of different components,
which are referred to as Asoftware licensing@. The following factors are taken into
consideration when determining a cost for a Asoftware license@; physical delivery
pricing, metric discounts, license periods support and maintenance, license management
Tech support, change in use bug fixes and Platform Migration Product enhancements.
The most commonly found type of software license found in business is known as
a , ANetwork@ license. There are four types of categories that are classified as a
network license.
Concurrent use licenses authorized a specified number of users to access and execute
licensed software at any time. Site licenses authorize use at a single site, but are
slowly being phased out and replaced by enterprise licenses. Enterprise licenses cover
all sites within a corporation because of more virtual computing environments. Node
licenses are also slowly being phased out because they are mainly used in a
client/server environment , since the licensed software may be used only on a specified
workstation in which a user must log on to in order to access and execute the software
application. Currently the trend in a network system is to use measurement software,
which allows vendors to be more flexible in licensing arrangements. This management
software monitors and restricts the number of users or clients who may access and
execute the application software at any one time. This is significant because a user
pays only for needed use and a vendor can monitor such use to protect intellectual
property. A new type of license that is emerging is known as a, Acurrency-based@
license. This type of license work on the basis that it provides to the end user a
specified dollar amount of software licenses. For example, licenses for different
business application software, so long as the total value in use at a given time is
less than dollars. Another type of license emerging is known as a
Aplatform-independent@ licensing, which one license permits software to be used on a
variety of different computer systems within a business, instead of buying a different
license for each version of the same software used by different systems. The most
common type of licensing is known as AShrink-wrap@, the concept behind this that the
licenses terms are deemed accepted once the end user breaks a shrink-wrap seal or opens
a sealed envelope containing the software.
A reason for these new types of licensing emerging is that when software
licensing was first introduced, the software development firms assumed that most
businesses would use the software for a 8 to 10 hour period. Yet, did not take into
consideration that with the advancement of technology, more businesses would want a
Afloating@ license across the world for 24 hours - thus it was not cost effective for
the software development firm. A floating license is a license that is made available
to anyone on a network. The licenses are not Alocked@ to particular workstations,
instead they Afloat@ to modes on the network.
Shareware, freeware and public domain are different type of software available
to the end user, and are distinguished by different rules about how programs may be
distributed, copied, used and modified. The term Ashareware@ refers to software that
is distributed at a low cost, but which requires usually a payment after a certain time
period and registration for full use. Copies of this software are offered on a trial
basis, the end user is free to try a scaled down version of the program. If the end
user wants the shareware program, included in the program is information specifying how
to register the program and what fee is required. Once registered the end user will
typically receive a printed manual, an updated copy of the software (often with
additional features), and the legal right to use the program in their home or business.
The advantage that shareware has is that it lets the end user thoroughly test a program
to see if it=s useful before making a purchase. The authors of shareware programs
retain their copyright on the contents, and as other copyrighted software should not be
pirated.
Freeware is also distributed at a very low cost and like shareware is found
mainly on the Internet. The authors of the freeware program do not expect payment for
their software. Typically, freeware programs are small utilities or incomplete programs
that are released by authors for the potential benefit to others, but the drawback to
this is that there is no technical support. Public domain software is generally found
on the Internet and is released without any condition upon its use. It may be copied,
modified and distributed as the end user wishes to do.
A license manager is a system utility-like application that controls or monitors
the use of another end-user application. It is generally implemented to protect
intellectual property (meaning to stop illegal copying) and/or to become more
competitive by offering new ways in which to evaluate, purchase and pay for software.
Since the license manager controls the number of application users, there is not a need
to control the number of application copies. This process lets the end user run one or
more applications between machines, without violating the terms of the license
agreement.
SPA has created a program that companies can use to help discover and correct
problems before they result in legal actions, fines and also negative publicity. The
eight point program is as follows:
1. Appoint a software manager to implement and monitor all aspects of company
software policy.

2. Implement a software codes of ethics for everyone to adhere to. The ethics
should state that copyrighted software, except for backup and archival purposes,
is a violation of the law.

3. Establish a procedure for acquiring and registering software. Determine your
companies software needs, evaluate software packages, and also have supervisors
approve the plans. Keep the lines of communication open.

4. Establish and maintain a software log. The log should state the date of when
the software was acquired, the registration of it, serial number, network
version, location of where the software is in use, where the original is,
licensing agreement and the location of the original disks.

5. Conduct periodic audits or on a as needed basis comparing the software log
and/or other purchase records.

6. Establish a program to educate and train your employees about every aspect of
software and its uses.

7. Maintain a library of software licenses and provide users with copies of the
agreement.

8. Having done the above seven points, the company can benefit by having obtained
software legally, receive full documentation, technical support when needed and
also upgrade notices.

Patents do not cover specific systems, instead they cover particular techniques
that can be used to build systems or particular features that systems can offer. Patent
grants the inventor a 17 year monopoly on its use. Once a technique or feature is
patented, it may not be used in a system without the permission of the patent-holder -
even if it is implemented in a different way. Since a computer program usually uses
several techniques and provides many features, it can infringe many patents at once. A
computer program is built out of ideal mathematical objects whose behavior is defined,
not modeled approximately, by abstract rules. An example of this is Borland
International, Inc. complained in the 1st Federal District Court gave Lotus Development
Corp. the benefit of patent protection to Lotus 1-2-3 menu commands and their order, but
failed to require Lotus to meet the requirements of patent law, including novelty,
examination and contribution to the prior art. The Supreme Court sided with the 1st
Circuit decision that one entity cannot own the user interface to programs. Meaning
such as file formats, menu structures and programming languages.
Software license agreements emerged as the most popular means of protection of
proprietary rights in computer software. They coexist with other forms of intellectual
property rights as patent and copyright. Software license agreements serve several
functions in transactions involving the transfer of computer technology. One of the
most important legal functions is the protection of the proprietary rights of the
licenser in the transferred software. Other functions include controlling the revenue
generated by licensed software and determining the rights and responsibilities of the
parties regarding the performance of the licensed technology. Issue related to these
functions include the applicability of Article 2 of the Uniform Commercial Code,
including offer and disclaimer of warranties, determining the appropriate types of
licenses to utilize, such as single users/CPU licenses, Site/enterprise licenses and
network/concurrent licenses
Trade secret, copyright and patent law are Astatic@ forms of protection in the
sense that they may exist independently of any underlying business transactions and do
not necessarily require any transfer of intellectual property from one party to another.
Whereas, the need for a license agreement usually arises as one of the contractual
forms of protection when the underlying business transaction involves the transfer of
intellectual property, such as computer software. Transactions involving the transfer
of computer software are subject to both federal and state laws. Generally, state law
governs contractual and trade secrets aspects of the transaction, while federal law
governs aspects related to patent, copyright and antitrust issues.
Each state has its own version of a doctrine of a trade secret, the common
thread through these state-specific laws is that if you show that you are seriously
treated information as confidential and that the confidential information helped your
competitive position, you can stop others from using it if the information was
improperly acquired by them, and even collect damages from the wrongdoers.
A computer is useless without software. The two types of software typically
found on a computer are operating systems software and application software. Operating
system software Aprovides@ interface@ that makes it easier to develop programs for the
system by reducing the amount of code that must be written. The operating system acts
as an interface between the computer hardware, application programs and the end user.
Application software consists of one or more computer program that fulfill a specific
function for the user like word processing, bookkeeping or financial analysis.
Two legal cases recently within the last few years has brought to light the
controversy regarding the copyright protection of software elements. Until 1992, most
of the federal courts followed the decision in Whenlan v Jaslow Dental Laboratory as a
precedent of similar cases. Whenlan, a small software company wrote a accounting
program for Jaslow Dental Laboratory company. Jaslow rewrote the software to run on
personal computers and proceeded to sell the product. The software was identical to
Whenlans in the data structures, logic, and the program structure, except for the
source code. Jaslow argued that the duplicated elements were part by the of the idea -
not the expression. The court in response felt that the data structures, logic, and
the program structure comprised to make a single function of a computer program,
therefore copyright protection should be given to those elements also.
In 1992, this protection was weakened by Computer Associates v. Altai, Inc. ,
when Altai a software developer was accused of copying various modules of a software
package developed by Computer Associates which controlled the running of applications on
IBM mainframes. The court rejected Whelan=s premise that a computer program embodies
one function because programs are made up of sub-routines that contain their own idea.
The court recognized this would narrow the scope of software copyright protection and
found this in accordance with Congressional intent of computer programs with copyright.
This resulted in why currently software copyright is not as broad as it once was.


Bibliography:

Brandel, William, "Licensing stymies users,"
URL:"http://www.viman.com/license/license.html#policy", Viman Software, Inc.,
1994.

Business Software Alliance, "Software Piracy and the Law,"
URL:"http://www.bsa.org/bsa/docs/soft_pl.html", Business Software Alliance,
1995.

Software Publishers Association, "SPA Anti-Piracy Backgrounder,"
URL:"http://www.spa.org/piracy/pi_back.htm", Software Publishers Association,
1995. 

Other sample model essays:

Technology / Stealth Aircraft
Thesis: Military aircraft has become more sophisticated in variety, effectiveness in war situations, and special maneuvering techniques in recent years. Military aircraft has become mor...
Technology / Switched Networks
Switched Networks Networks are getting more and more popular, and because of this more people use them, which slows them down. Networks in the future will need to have enough bandwidth to sup...
America has been a country full of optimism, perseverance, and freedom of ideas and beliefs. The frontier- a mental or physical area where much remains to be done- is a belief that has and still prope...
Sociology Essays / Technological Impact
Technological Impact. · Changes in market demand · Marketing strategy: - As a company devpelopes and matures it will have to changes it's marketing strategy to compete and grow with othe...
Technology / Technology
Technology Recently while having a get together with some friends we were relating some experiences that seem quite pertinent to the subject of how communication is or will change. David the so...
Technology and the invasion of privacy and its effects onthe criminal justice system over the last 100 years Will searching the internet for more than 5 hours on this topic I found a quote tha...
Technology / Technology Paper
Introduction When mainframe and minicomputers provided the backbone of business computing, there were essentially networked environments in the sense that "dumb" terminals shared access to ...
Technology / Technology Transfer
Analyzing the transfer of technology from one place to another can be a very difficult task. People have tried to trace the origins of specific technologies and map out what cultures it affected, ...
1. 23-Sep-99: "Free Web Services Challenge AOL"s Dominance" - Internet business analysts generally are not yet convinced of the viability of the free web service business model for bring profitable. ...
Computers are one of the most important inventions ever. If computers had not been invented, technology would not be developed to its current state. Since the computers invention, society has ch...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD