Welcome to the Copyright Chapter!

Hello! When you create an amazing website, design a brilliant presentation, or write a groundbreaking program, that work belongs to you. This is why we need to understand Copyright.

In the ICT world, we constantly use other people's images, music, and software. This chapter teaches you the essential rules for using digital content legally and ethically. It’s all about respecting the creators!


9.2 Understanding Copyright Legislation

What is Copyright?

Copyright is a legal right granted to the original creator of a piece of work. This right gives the creator control over how their work is used and distributed by others.

Think of it as a protective shield for Intellectual Property (IP). IP includes anything you create with your mind, such as music, art, writing, and, crucially for us, computer software.

Key Principle of Copyright

The moment a creative work is recorded (e.g., written down, saved as a file, or filmed), it is usually automatically copyrighted. You don't necessarily have to register it.

In simple terms, Copyright means:

  • Only the owner can legally copy the work.
  • Only the owner can distribute the work (sell it, rent it, share it).
  • It prevents others from stealing or taking credit for the work.

Did you know? Copyright laws typically last for a very long time, often for the creator's life plus 50 or 70 years!

The Need for Copyright Legislation

Legislation simply means the set of laws or rules put in place by a government. We need copyright laws for several vital reasons:

1. Protection of Creators' Rights

Legislation ensures that the person who spent time and effort creating the software or digital asset is fairly rewarded. If people could just copy everything for free, creators would have no income and no incentive to produce more work.

2. Encouraging Innovation

By protecting investment, copyright encourages companies and individuals to spend money and resources developing new software and technologies, leading to better ICT tools for everyone.

3. Defining Legal Use

Copyright laws clearly set out what is allowed and what is illegal. For example, using a short clip of a song in a school project might be acceptable (under "fair use" principles, depending on the country), but mass distributing that song is definitely illegal.

Quick Review: Copyright legislation exists to protect the creator's income and creative control, ensuring future innovation.


Copyright Relating to Computer Software

One of the most important areas of copyright in ICT is computer software. Software companies invest millions in development, and they protect this investment fiercely using copyright.

Software Piracy

When someone illegally copies, shares, or uses software without purchasing a valid licence, this is called Software Piracy. This breaks copyright legislation.

Software piracy is a huge problem because digital files are so easy to copy perfectly and instantly.

Types of Software Piracy (You must know these!)
  • Counterfeiting: This is manufacturing fake copies of software, often sold in packaging that looks almost identical to the real product (e.g., fake installation discs).
  • Internet Piracy: Downloading illegal copies of software from the internet (e.g., torrent sites) or cracking the software's protection mechanism.
  • Softloading (or End-User Piracy): A company or individual buys one legal copy of software but installs it onto multiple computers without purchasing the required number of licences.
Why is Software Piracy Dangerous?

It is not just about the loss of money for the developers. For the user, pirated software often carries high risks:

  • It may contain viruses or malware that damage your computer or steal your data.
  • It might be incomplete or contain bugs, leading to system instability.
  • You will not receive updates or technical support from the software developer.

Analogy: Imagine selling homemade cookies. If someone steals your recipe and copies your cookies exactly, but sells them for free, you won't make money to buy new ingredients (innovation stops)!


Methods to Prevent Software Copyright Infringement (Piracy)

Software producers use various techniques to ensure users abide by the copyright legislation. These methods aim to stop illegal copying and ensure that only licenced users can access the full product.

1. Product Keys and Registration Codes

This is the most common method. The software requires the user to enter a unique string of characters (the product key or serial number) during installation.

  • The key proves that a legitimate purchase was made.
  • If the same key is detected being used on too many machines, the software might stop working or send an alert.

2. Online Activation / Digital Rights Management (DRM)

After installation, the software attempts to connect to the producer's central server via the internet.

  • It verifies the product key against a database to check if the key is genuine and has not been used too many times.
  • If validation fails, the software often runs in a limited "trial mode" or shuts down completely.

3. Use of Physical Hardware (Dongles)

A dongle is a small piece of hardware (like a USB stick) that must be plugged into the computer for the software to run.

  • This is often used for very expensive professional software (like CAD or video editing).
  • If the dongle is removed, the program stops working, even if the software files have been copied onto another machine.

4. End-User Licence Agreements (EULA)

Before you install software, you usually have to click "I Accept" on a long legal document. This is the EULA.

  • The EULA is a legal contract between the user and the software company.
  • It explicitly states what you are allowed to do (usually: install and use the software on one or two machines) and what you are not allowed to do (e.g., copy it, rent it out, reverse-engineer it).
  • Breaking the EULA means breaking the law.

5. Copy Protection Features

Historically, media like CDs and DVDs included specific data that was difficult for standard CD burners to copy. If the copy protection data was missing, the software would not load. While less common now, physical media still sometimes employs these features.

✔ Key Takeaway and Memory Aid

Remember the main prevention methods using the simple acronym A. C. K. L.:
Activation (Online checking)
Copier features (Preventing physical copies)
Keys (Product codes)
Legal Agreements (EULA) and Licence limits