• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Copyright patents act

Extracts from this document...

Introduction

´╗┐MATTHEW ALLEN N5 Copyright Patents Act What is it? The copyright patents act of 1988 states that it is illegal to copy software without the permission of the person/company that owns the copyright of the software. The copyright holder is usually the author of the software. Illegal copying of software reduces the income to software companies. Having invested money in producing the software, these companies need to earn income from software sales to make profits. Offences which are outlawed by the act: * Unauthorised copying of software. ...read more.

Middle

* Compensation is also often awarded to the software company that has had its software copied. Despite the fact that copying software is illegal many people still do it. To prevent this some software companies use copy protection methods to make it harder to copy software. Software companies also use licensing agreements to restrict what customers can do with the software that they purchase ? so they can?t copy it and sell it on. Copyright patents act breaches 1. A man from Reading was sentenced for running an illegal football streaming website. ...read more.

Conclusion

1. In 2009 four men were jailed for a year. They were also ordered to pay £3 million in damages. They were all found guilty of breaking copyright law. The 4 men were behind The Pirate Bay, the world’s most high profile file sharing website. This was a breach of the law because they sold films and songs etc. that didn’t belong to them (they didn’t own the copyrights) - they were illegally downloaded. Also by running the sight they gave other people the opportunity to breach the act and share illegal files. www.en.wikipedia.org/wiki/The_Pirate_Bay ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Data Protection Act

    It should be noted that observance of these requirements will not ensure fair processing unfair. There is a general duty of fairness, which consists in part of the fair processing requirements of the Act.2 2.1 Second Principle "Personal data shall be obtained only for one or more specified and lawful

  2. Privacy and Data Protection: IT Law

    US, it was clear from the beginning that the US was unlikely to be considered an "adequate" jurisdiction. The EU commissioned two prominent US law professors to write an expertise, which highlighted many gaps in US protection65. The US first strongly lobbied the EU and its member countries to find

  1. Critically evaluate the extent to which it can be said that copyright law gives ...

    is actually needed to constitute a piece of work being considered 'artistic craftsmanship'. In this case a proto-type made for a suite of furniture was held not to be a work of craftsmanship. In order for something to be classed as a work of artistic craftsmanship it must have some 'artistic quality'.

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    increased use of the internet for information retrieval and distribution, communication, and interaction by a global audience. This set of new users do not feel bound by academic standards, or the set of rules known as `Netiquette' that previously governed users' conduct in cyberspace and thus they feel that anything

  1. Assets table - recording the copyright information on the logos and pictures I used.

    The purpose of it is because it was a perfect sized picture of biscuits that I was able to use on my information point.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Usually, these are kept extremely secure by well-known sites and this is maintained by the Data Protection Act. But shady sites can often steal this information and use it to steal Mr Ajaib's identity, use his details to make their own purchases and other such fraudulent behaviours.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    to be highly secured and some of them maybe minimally vital, which may need less protection. Highly sophisticated encryption shall be needed for the data which are crucial and important. Therefore not all data will need to be highly secured and is something that should be mentioned in this specific law.

  2. How has technology changed and affected shopping trends and the social behaviour of customers?

    The ICT industry is a permanent state of evolution; it's always continuously changing. The product cycles seems to be getting shorter and shorter. Customers are demanding faster response times for delivery and repairs, and there is a consistent requirement for a reduction in stock levels and inventory costs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work