Software Piracy: The Law and Our Captain Sparrows
Just shout out aloud about a software piracy raid near a small or medium enterprise and it is likely to shut shop and lie low for a couple of days. Such is the chilling effect of the anti-piracy raids conducted by giant multinational corporations (MNCs) selling packaged software. These companies, legitimately, need to attack piracy and their legal and compliance teams, with annual targets, usually work together with the police. 
Ironically, software piracy is one area where people don’t realise that their use of pirated software is no different from being Captain Sparrow (of Pirates of the Caribbean). Many convince themselves that software ought to come free along with their computer. Few acknowledge that using MS Office’s home version in office or using the trial version of CorelDraw for professional purposes amounts to piracy. It is a criminal offence and has civil remedies as well.
Let me share a few cases. An MIT-returned Marwari guy ran an advertising agency out of his bungalow, with over 50 computers. There wasn’t a single licensed copy of any software on his premises. On being raided by an anti-piracy team accompanied by the police, his younger brother demanded to see a warrant and the ID of policemen. My advice in dealing with the police is that it is best not to get into arguments, especially when there prima facie evidence of wrongdoing. The raiding party, already angry at the attitude of the younger brother, scanned his MacBook and discovered a trove of porn films. They then extracted a revenge that he will never forget, at the MIT-grad’s expense. 
The victim reached out to me during the raid. I told him that the Sections under which he was charged were bailable and my junior would help with the formalities. A little while later, he called to say they had struck a deal and he was to be produced before a magistrate at his residence, since it was almost 8pm. I thought that was the end of it. A week later, he sought an appointment. On meeting me, he burst into tears and said he has been in police custody for seven days. The police tricked him and his brother; instead of making a simple software piracy case, they have slapped some dreaded pornography Sections against him. His laptop was confiscated and the police also told his younger brother that software piracy is a non-bailable offence; they also tricked him into purchasing some blue film CDs and added these to the MacBook, making a nice case to ensure that the older brother’s bail was rejected. 
Around February-March every year, another client of mine gets accused of committing software piracy with software companies even claiming to have proof of pirated software being installed at his premises. Every year, my office shoots off a legal notice to these target-hungry software companies and things die down. 
My last case is about something that has probably been faced by several businessmen in Mumbai. A bunch of goon-like persons will ‘raid’ your premises based on four things—a letter of authorisation from a software MNC, a couple of policemen in uniform who accompany them, their confidence of being able to extort some money based on your harbouring some pirated software, trial version of a software or some pirated font. The raiding party even implants pirated fonts to fabricate a case. My experience is that these are extortionists who share their booty with the police. A Google search suggests that counter-cases have been filed against such shady operators; but they keep popping up unfazed. 
Where does the law stand on this issue? Well, software piracy is a crime under two or three different laws: Sections 66 to 85 of The Copyright Act, 1957; Section 120B read with Section 420 of the Information Technology Act, 2000, and Sections 468 and 471 of Indian Penal Code.
Section 63-B applies to the knowing infringement of copyright with punishment including imprisonment from seven days to three years and a fine of Rs50,000 to Rs2 lakh. If the infringement is not for business or trade, one may get away with a maximum fine of Rs50,000. 
Smaller companies who find legal software expensive must switch to open source software, to avoid being defamed by anti-piracy raids. 
  • Like this story? Get our top stories by email.


    Twitter plans new rules to curb violence, abuse
    After Twitter CEO Jack Dorsey announced plans to act more aggressively on violence and sexual abuse, the micro-blogging website has now detailed new rules it will implement soon.
    In an internal email which was obtained by, Twitter's head of safety policy has emailed members of its Trust and Safety Council on new rules to promote free speech and curb violence and sexual harassment.
    "We hope our approach and upcoming changes, as well as our collaboration with the Trust and Safety Council, show how seriously we are rethinking our rules and how quickly we're moving to update our policies and how we enforce them," Twitter said on Wednesday.
    "We will immediately and permanently suspend any account we identify as the original poster/source of non-consensual nudity and/or if a user makes it clear they are intentionally posting said content to harass their target," the email read.
    "If the account appears to be dedicated to posting non-consensual nudity then we will suspend the entire account immediately," it added.
    On hate symbols and imagery, it said: "We are still defining the exact scope of what will be covered by this policy. At a high level, hateful imagery, hate symbols, etc will now be considered sensitive media (similar to how we handle and enforce adult content and graphic violence)".
    On violent groups, Twitter said it will take enforcement action against organisations that use or have historically used violence as a means to advance their cause.
    "Consistent interpretation and enforcement of our rules is our objective. We also need to remove the burden of reporting from those who are targeted. We've prioritised the work," Dorsey said in a tweet.
    Disclaimer: Information, facts or opinions expressed in this news article are presented as sourced from IANS and do not reflect views of Moneylife and hence Moneylife is not responsible or liable for the same. As a source and news provider, IANS is responsible for accuracy, completeness, suitability and validity of any information in this article.
  • User 

    Google introduces physical security key
    In order to protect journalists, business leaders and member of political campaign teams at higher risk of being targetted by hackers, Google has rolled out an Advanced Protection Programme.
    This programme includes a physical "Security Key" that replaces other forms of two-factor authentication (2FA).
    "To provide the strongest defence against phishing, Advanced Protection goes beyond traditional 2-Step Verification. You will need to sign into your account with a password and a physical Security Key," Google wrote in a blog post on Wednesday.
    Other authentication factors, like codes sent via SMS or the Google Authenticator app, will no longer work.
    "This will replace and disable other forms of authentication like SMS and the Google Authenticator app," the post added.
    The advanced protection feature will automatically limit third-party apps from accessing your most sensitive data -- your emails and your Drive files.
    "Third-party apps that want access to Gmail or Drive will no longer have permission. For secure access, you will need to use the Gmail app or Inbox by Gmail," Google said.
    You will only be able to use the Chrome browser to access signed-in services like Gmail or Photos.
    Apple Mail, Contacts and Calendar apps do not currently support Security Keys and will not be able to access your Google data.
    Instead, you can use the Gmail, Inbox or Google calendar apps on iOS.
    A common way that hackers try to gain access to accounts is by impersonating the users and pretending they have been locked out of their account.
    To provide users with the strongest safeguards against this type of fraudulent account access, Advanced Protection adds extra steps to verify the identity.
    "If you ever lose access to your account and both of your Security Keys, the added verification requirements will take a few days to restore access to your account," the post said.
    Disclaimer: Information, facts or opinions expressed in this news article are presented as sourced from IANS and do not reflect views of Moneylife and hence Moneylife is not responsible or liable for the same. As a source and news provider, IANS is responsible for accuracy, completeness, suitability and validity of any information in this article.
  • User 

    We are listening!

    Solve the equation and enter in the Captcha field.

    To continue

    Sign Up or Sign In


    To continue

    Sign Up or Sign In



    online financial advisory
    Pathbreakers 1 & Pathbreakers 2 contain deep insights, unknown facts and captivating events in the life of 51 top achievers, in their own words.
    online financia advisory
    The Scam
    24 Year Of The Scam: The Perennial Bestseller, reads like a Thriller!
    Moneylife Online Magazine
    Fiercely independent and pro-consumer information on personal finance
    financial magazines online
    Stockletters in 4 Flavours
    Outstanding research that beats mutual funds year after year
    financial magazines in india
    MAS: Complete Online Financial Advisory
    (Includes Moneylife Online Magazine)
    FREE: Your Complete Family Record Book
    Keep all the Personal and Financial Details of You & Your Family. In One Place So That`s Its Easy for Anyone to Find Anytime
    We promise not to share your email id with anyone