Tabberone Logo

Tabberone is pronounced tab ber won
not tay ber own

Tabbers Temptations     www.tabberone.com/Trademarks/ Home | Site Index | Disclaimer | Email Me!
"The only thing necessary for the triumph of evil is for good men to do nothing"
Edmund Burke


The Tabberone™ Archives
These articles concern what we consider major trademark and copyright issues. They are usually reproduced with the original source referenced. Bear in mind, these articles are copyrighted and commercial use without permission of the authors may be considered infringement. The intended use here is educational, commentary and non-commercial. The reason they are reproduced in the Tabberone™ Archives, as opposed to just providing a link, is because links disappear and pages are removed. That presents a messy confirmation process that is annoying to the browser (you) but also presents a credibility issue. We do not claim any rights in these pieces. Do not regard the absence of a copyright statement or © to mean the article is not copyrighted. Some sites do not have a copyright statement.

When an article or a comment is posted on the internet by the copyright owner, the owner is seeking a world-wide, 24/7 audience; sometimes for a limited amount of time, sometimes indefinitely. In essence, an internet posting intentionally relinquishes one's copyright for exclusivity because the owner has posted it on the internet to been seen by everyone, everywhere. The Tabberone™ Archives non-commercial duplication of the posting is simply a continuance of the original wishes of the copyright owner. We post these articles for reference, for commentary and for confirmarion of our position.

Source:
http://www.bsacybersafety.com/threat/software_piracy.cfm

July 27, 2008 - content has not been altered

Software Piracy Defined?

Also Known As:
Unlicensed software use, Pirated software, Ripped software, Counterfeit software, Warez.

Description:
The illegal use and/or distribution of software protected under intellectual property laws. Software piracy may take many forms:

  • End-user piracy occurs when an individual or organization reproduces and/or uses unlicensed copies of software for its operations.
  • Client-server overuse occurs when the number of users connected to or accessing one server exceed the total number defined in the license agreement.
  • Counterfeiting is the illegal duplication of software with the intent of directly imitating the copyrighted product.
  • Hard-disk loading occurs when a computer hardware reseller loads unauthorized copies of software onto the machines it sells.
  • Online software theft occurs when individuals download unauthorized copies of software from the Internet.
  • License misuse occurs when software is distributed in channels outside those allowed by the license, or used in ways restricted by the license.
Notice what they claim under Online software theft? This is where they blame an innocent purchaser for buying what the Business Software Alliance claims are "unauthorized copies". You bought, you didn't know, tough apples, you must pay.

General
Articles | Cease and Desist Letters | Federal Court Cases | FAQs & Whines | Glossary | Hall Of Shame | Contributions

Corporate Lawyers
Cartoons | Code Of Ethics | Courtroom Remarks | Definition Of A Lie | Jokes | Lawyers | Lying | Who Have Lied

eBay - Land The Game

Definitions

Trademark Definitions
Blurring   |   Confusion   |   Damages   |   Dilution   |   History   |   Initial Interest Confusion   |   Likelihood Of Confusion   |   Material Difference Standard
Parallel Imports   |   Post-sale Confusion   |   Puffery   |   Secondary Meaning   |   Subsequent Confusion   |   Trademark Abuse
Unauthorized Use   |   Unfair Competition   |   What is a Trademark?
Copyright Definitions
Angel Policies   |   Contributory Infringement   |   Copyrightability   |   Copyright Extortion   |   Copyright Misuse Doctrine
Derivative   |   The Digital Millennium Copyright Act   |   EULA   |   Fair Use   |   First Sale Doctrine   |   Product Description
Registration   |   Registration Denied   |   What is a Copyright?   |   What is not Copyrightable?
Other Issues
Embroidery Designs   |   FAQs & Whines   |   Image and Text Theft   |   Licensed Fabric   |   Licensing & Licenses
Patterns   |   Patterns Index   |   Profit   |   Quilting   |   Selvage   |   Stanford School of Law Case Outline
Tabberone Disclaimer   |   Trademark Extortion   |   Urban Myths   |   What To Do If You Are Veroed

Federal Court Cases
Alphabetically | by Federal Circuit | by Subject | by Court Quotations

Federal Statutes
Copyright Act 17 U.S.C. 5 | Digital Millenium Copyright Act 17 U.S.C. 12 | Lanham Act 15 U.S.C. 22

VeRO (Verified Right's Owner Program)
VeRO Commandments | VeRO-Verified Rights Owners Program | Counter Notice Letter
Counter Notice (pre-2003) | Counter Notice present | On-Line Survey from 2004 | Articles about VeRO | What To Do If You Are Veroed

Original material by Karen Dudnikov & Michael Meadors is © 1999-2016

 

  [an error occurred while processing this directive]