You are on page 1of 17

Temple University Software Management and Compliance Guidelines

Table of Contents
OVERVIEW ....................................................................................................................................................... 3 REASONS FOR FOLLOWING THE TERMS OF SOFTWARE LICENSES ................................................................................... 3 STEPS TO ENSURE SOFTWARE COMPLIANCE ..................................................................................................... 4 STEP 1. DESIGNATE A SOFTWARE MANAGER ............................................................................................................ 4 STEP 2. ESTABLISH RESPONSIBILITY ...................................................................................................................... 4 STEP 3. DISTRIBUTE THE TEMPLE UNIVERSITY SOFTWARE POLICY ................................................................................ 4 STEP 4. ASSESS THE CURRENT SITUATION .............................................................................................................. 4 STEP 5. MATCH OWNERSHIP DOCUMENTATION WITH SOFTWARE INVENTORY ................................................................... 5 STEP 6. INSTITUTE SOFTWARE PROCUREMENT PROCEDURES........................................................................................ 5 STEP 7. MAINTAIN SOFTWARE COMPLIANCE ............................................................................................................ 5 OTHER CONSIDERATIONS.................................................................................................................................... 6 COMPUTER SERVICES SOFTWARE MANAGEMENT PROCEDURES ......................................................................... 8 END USER RESPONSIBILITIES ............................................................................................................................... 8 IMPORTANT NOTE: END USERS ARE ULTIMATELY RESPONSIBLE FOR ANY SOFTWARE COPYRIGHT VIOLATIONS FOUND ON HIS/HER MACHINE(S). ................................................................................................................................................... 8 SOFTWARE MANAGER RESPONSIBILITIES................................................................................................................. 8 IMPORTANT NOTE: SOFTWARE MANAGERS ARE ONLY RESPONSIBLE FOR SOFTWARE COPYRIGHT VIOLATIONS ON HIS/HER MACHINE(S). ................................................................................................................................................... 8 DOCUMENTATION BINDER CONTENTS..................................................................................................................... 8 APPENDIX A: BLANK SOFTWARE AUDIT WORKSHEETS ..................................................................................... 11 INDIVIDUAL WORKSTATION SOFTWARE AUDIT WORKSHEET....................................................................................... 11 SUMMARY SOFTWARE AUDIT WORKSHEET ............................................................................................................. 12 APPENDIX B: SOFTWARE AUDIT WORKSHEET EXAMPLES ................................................................................. 13 INDIVIDUAL WORKSTATION SOFTWARE AUDIT WORKSHEET....................................................................................... 13 SUMMARY SOFTWARE AUDIT WORKSHEET ............................................................................................................. 14 APPENDIX D: PROOF OF PURCHASE DOCUMENTATION .................................................................................... 15 APPENDIX E: MESSAGE FROM THE VICE PRESIDENT OF COMPUTER AND INFORMATION SERVICES .................. 16 APPENDIX F: SOFTWARE CATEGORIES ............................................................................................................ 17 COMMERCIAL SOFTWARE ................................................................................................................................... 17 SHAREWARE .................................................................................................................................................. 17 FREEWARE .................................................................................................................................................... 17 PUBLIC DOMAIN SOFTWARE ............................................................................................................................... 17

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

Overview
This document is designed to assist departments in managing University software assets. Proper software management includes establishing responsibility, maintaining an accurate inventory, ensuring license compliance, and effectively allocating the use of software applications. This document offers best practice guidelines for software management and outlines the compliance process followed by the Department of Computer Services. Adoption and use of these guidelines are strongly encouraged in order to manage software assets efficiently and avoid consequences associated with illegal software use.

Reasons for Following the Terms of Software Licenses


Computer software is a form of intellectual property and is covered under the same provisions of copyright law that protect music, books and film from unauthorized distribution. Like the more traditional media, infringement of copyright law involving computer software carries stiff penalties. All software comes with a license that specifically states the terms and conditions under which the software may be legally used. Licenses vary from program to program, and may authorize as few as one computer or user to use the software, or as many as several hundred network users to share the application through the system. It is important to read and understand the license agreement accompanying the software program to ensure that you have sufficient legal copies for your college or departments needs.

Risks of illegal software use


Disciplinary action from the University, including termination Revocation of computer account(s) Personal liability Criminal charges Fines of up to $150,000 per infringed title Lack of product support Blemished reputation No product warranties Virus penetration

Note: Portions of this document are reprinted with permission from the Software Information Industry Associations (http://www.siia.net) Software Management Guide. Brand and product names are trademarks or registered trademarks of their respective companies.

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

Steps to Ensure Software Compliance


Temple University colleges and departments are responsible for implementing software management procedures that ensure software compliance and are in keeping with the Temple University Software Policy. A well designed procedure generally includes the following seven steps:

Step 1. Designate a Software Manager


Each college and department may benefit by assigning one (or more) employee(s) as a Software Manager. The Software Manager is a responsible, detail-oriented individual who serves as the focal point for software activities within the department. This person is knowledgeable about all aspects of the Temple University Software Policy as well as the college or department's software procurement procedures. End users should have easy access to the Software Manager and be instructed to address all software-related inquiries to that person. Please note: The Software Manager is NOT responsible for software copyright violations found on his/her colleagues computers. The Software Manager is strictly a resource for computer users to refer to with software acquisition related inquiries.

Step 2. Establish Responsibility


Each computer user at Temple University is ultimately responsible for any software copyright violations found on his/her computer. Most software copyright violations occur unwittingly because users either overlook or do not understand software license agreements. If computer users are unclear on the terms of a software agreement the Software Manager should be notified.

Step 3. Distribute the Temple University Software Policy


In many colleges and departments the Software Manager is the most knowledgeable individual on the topic of Temple Universitys policy regarding the acquisition and use of software. Therefore, the Software Manager should distribute the Temple University Software Policy annually to all employees (old and new). This policy is referred to in Vice President Timothy C. ORourkes memorandum to the University community, which is reprinted in Appendix E, Message from the Vice President of Computer Services.

Step 4. Assess the Current Situation


Take inventory of software assets
It is important to establish what software programs are installed on each computer in your college or department in order to determine the existence of illegal, unauthorized, or unlicensed programs. To request assistance in conducting an inventory of your college or departments computer system(s), please contact the Computer Services Help Desk at (215) 204-8000.

Note: Blank software audit worksheets are provided in Appendix A. examples are provided in Appendix B.

Completed software audit worksheet

Gather proof of purchase and ownership documentation


Each end user is responsible for gathering all purchasing and licensing information for software that is installed on his/her computer system(s). These records can include: sales order/invoice receipts, packing slips denoting the product(s) and quantity purchased; letter from the hardware manufacturer and/or software publisher denoting software applications that have been bundled or preloaded with purchased hardware; copy of completed Purchase Order; Software Site License Agreements and/or Software Site License Program Summary of Order forms that cross reference Temple University Purchase Requisitions; and/or unexpired License Agreement(s) for shareware or freeware.
Temple University Software Management and Compliance Guidelines 4

Revised 12/2/11

Step 5. Match Ownership Documentation with Software Inventory


Once the inventory of software installations is completed, the Software Manager compares the number of installations with the ownership documentation provided by each computer user. If illegal copies of software are identified, the Software Manager will either have them deleted from the end users computer or recommend that the appropriate license(s) be purchased immediately.

Step 6. Institute Software Procurement Procedures


Needs assessment
Departments should assess software purchasing decisions like any other investment. The college or department defines its software requirements, supervisors approve the requirements, and software packages are evaluated to determine which are best for the department. This process should be as prompt and efficient as possible so as not to create the situation where an employee is encouraged to make a copy of a software program to complete a specific task. Temple Universitys Software Site License Program, administered by the Department of Computer Business Services, offers products with deeply discounted prices as well as prompt and efficient order processing. For more information, please visit the Software Site License Program website at: http://www.temple.edu/cs/business

Planning and budgeting


Departments should budget software purchases just like hardware acquisitions. When planning hardware purchases, you should budget for software for new CPUs and existing equipment. Budgeting and providing for only computer hardware purchases encourages illegal software copying. Software expenditures can amount to fifty percent or more of the cost of the computer system it resides on. Because it is a significant expense and software is a critical component of the information processing function, it should be budgeted along with other aspects of information processing. To obtain the maximum value from your software assets, you should also budget for employee training. The key to developing a realistic budget is to effectively implement the first step -- the evaluation of the department's requirements for software, hardware, training, and maintenance. Training for popular applications supported by Computer Services is available free of charge to members of the University community. For more information, please visit: http://seminars.temple.edu.

Purchasing
It is essential that the purchasing of software be a standardized procedure just like the acquisition of other critical assets. All software purchases should proceed through the college or department's normal purchasing channel, which requires a purchase requisition or credit card (and supervisor or management approval). Even though many software packages may be inexpensive, software should not be purchased through employee expense reports, travel reports or from department petty cash, because it is then difficult to track purchases for budgeting and compliance purposes.

Step 7. Maintain Software Compliance


In order to effectively manage your college or departments software assets, the Software Manager should continually guard against the introduction of illegal software by: performing periodic spot checks on individual computers to make sure all software is legitimate; and conducting an annual software inventory or audit.

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

Audit process
The audit process is the critical step in implementing a software management plan. Without regular software audits, there is no way of knowing whether or not the management plan is effective. Audits can also enable the Software Manager to obtain a better sense of what software is being used, as well as what software is not being used and therefore may be unnecessary. The basic purpose of an audit is to: determine what software applications are installed on your computers; and remove and replace any unauthorized software found.

There are three types of audits: self, internal and external. Self audits The best way to expedite an audit is to use a tool such as an auditing software program. An auditing program allows the Software Manager to evaluate the contents of each users hard drive and network servers. Internal audits Please be advised that the Temple University Department of Internal Audits will conduct unannounced software license spot checks. Any non-compliance identified by Internal Audits will be reported to the Management Audit Committee and may result in disciplinary actions. External audits Outside agencies, such as the Business Software Alliance, have the right to conduct their own audits of Temple Universitys software installations. Such audits may be scheduled or unscheduled and may involve selected units or the entire organization. If an audit is scheduled, the affected unit is required to maintain the status quo the unit must not delete software or purchase new licenses until the audit has been completed. During the external audit, auditing software is used to identify all software programs installed on each workstation and file server. The audit results will then be compared to the organizations license agreements and purchasing records. A software application is considered unauthorized if ownership cannot be substantiated with documentation that proves purchase. (See Appendix D, Proof of Purchase Documentation.) Please note: Any fines or fees associated with the non-compliance of software license agreements will be charged back to the college or department where the illegal copies are located.

Other Considerations
Limiting who can install software
You can centralize control over which software is installed on your departments computers by using security and management programs, such as Fortres 101 (Windows - Fortres Grand Corporation) and/or FoolProof (Macintosh/Windows Riverdeep Interactive Learning). These applications lock a computers hard drive so that end users cannot install any software programs. A designated administrator will have the password to unlock the hard drive and perform the installation. Temple University has purchased an enterprise license for the Fortres 101 program. Under the terms of this site license, Fortres 101 can be installed on any computer located on the following campuses: Main, HSC, Ambler, Center City, Tyler, Fort Washington, and the School of Podiatric Medicine. To schedule the installation of Fortres 101 on computers within your department, please contact the Computer Services Help Desk at (215) 204-8000. For more information on FoolProof products contact Computer Business Services at (215) 204-5000.

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

Home computers and/or laptops


It is not unusual for employees to take work home or bring personal software to the office. However, this is another area of potential risk. Generally, employees should not be permitted to bring software from home and load it on Temple University computers because of: unnecessary liability; and potential risk of viruses brought in on the employees software.

Temple Universitys computers are important assets and risks to these assets should be minimized. To ensure that all software used in a college or department is both legal and virus-free, software should be purchased and installed through the established software procurement process only.

Using a standardized set of software applications


One way of reducing the work involved with tracking software is to choose a standard suite of products for your entire college or department and purchase only those products for each workstation.

Registration
Registration cards should be completed for all software as it is purchased and delivered, or in the case of online software purchases, the online registration form should be completed at the software publishers website. Promptly completing this process ensures that the college or department will receive product support and timely product announcements. The college or department should register all software in a standard format, such as Temple University followed by the college or department name. Therefore, when individuals leave, the registered software remains with the University and notifications of upgrades will be sent to the proper place. Proper registration will also result in the publisher having a record of the purchase that complements the existing Purchase Order and/or receipt.

Storage and security


After installing the program on the hard disk, the original software should be kept in a separate, secured storage area. By ensuring secure storage, the risk of software theft and unauthorized duplication of software is minimized. Original software should be stored so that it is not subject to damage by environmental factors such as heat, fire, and water. Each end user is responsible for the storage and security of his or her software documentation and media.

Documentation
Original manuals, tutorials and other user-oriented documentation should reside with the end user. This encourages employees to purchase legitimate software. If you work in a network environment, you may opt not to distribute a manual to each user. In that case, be sure to designate a resource person, such as the Software Manager, to respond to questions.

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

Computer Services Software Management Procedures


Computer Services uses the procedures outlined in this section to ensure software compliance. Temple University colleges and departments should consider using similar arrangements for assigning responsibility and maintaining proof of purchase documentation.

End User Responsibilities


Each end user is responsible for the following: maintaining a documentation binder that contains proof of purchase information for all software installed on the end users workstation; referring questions to the Software Manager regarding software licensing issues; and cooperating with the Software Manager when periodic audits (spot checks) are performed.

Important Note: End users are ULTIMATELY responsible for any software copyright violations found on his/her machine(s).

Software Manager Responsibilities


Computer Services has assigned multiple Software Managers to help coordinate software compliance. These Software Managers are based on logical groupings of individuals, such as geographic location and reporting structure. Each Software Manager is responsible for the following: serving as a focal point for software activities within the department; distributing the Temple University Software Policy; coordinating software acquisitions and consolidating purchases; assisting individuals in ensuring software compliance on their computers; educating individuals about software compliance; conducting self-audits to ensure software compliance; and maintaining summary documentation for software installed on computers within the scope of responsibility.

Important Note: Software Managers are ONLY responsible for software copyright violations on his/her machine(s).

Documentation Binder Contents


End users are responsible for maintaining a software documentation binder for each workstation. Documentation to be included varies according to the method used to obtain given software applications:

Site or Enterprise-Licensed Software (e.g Microsoft, SPSS)


The end user maintains copies of the following documents in the software documentation binder for each software product that is purchased: Purchase Requisition Software Site License Agreement Software Site License Summary of Order form

Note: For more information on the Temple University Software Site License Program, refer to the Computer Business Services website: http://www.temple.edu/cs/business

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

Non Site-Licensed Software (e.g. Adobe, Symantec)


Depending on how the software was purchased (Purchasing Card, Short Order Form, or Purchase Requisition), the end user generally receives one or more of the following documents, which should be placed in the software documentation binder: Purchase Requisition Sales order/invoice receipt Packing slip denoting product and quantity purchased Copy of completed Purchase Order

Consolidated Purchase Requests


Computer Services frequently purchases multiple copies of given software programs at one time. In this case, the Software Manager provides each license recipient with appropriate documentation that the end user files in his/her software documentation binder. Depending on how the software was purchased, the end user may receive one or more of the following documents: Sales order/invoice receipts, packing slips denoting the product(s) and quantity purchased Letter from the hardware manufacturer and/or software publisher denoting software applications that have been bundled or preloaded with purchased hardware Copy of completed Purchase Order Software Site License Agreements and/or Software Site License Program Summary of Order receipts that cross reference Temple University Purchase Requisitions Unexpired License Agreement for shareware or freeware

Example: A Software Manager within Computer Services consolidates purchase requests within the department and submits a Purchase Requisition to the Software Site License Program for ten copies of Microsoft Office XP Professional. Upon receipt of the licenses, the Software Manager records the name of each designated license recipient or CPU serial number on the Purchase Requisition, Software Site License Agreement, or Summary of Order form. Copies are distributed to each licensee for inclusion in their respective documentation binders.

Bundled or Preloaded Software


End users are responsible for keeping ownership documentation for software that is preinstalled on a new computer or bundled with a peripheral device. Depending on how the hardware or peripheral device was purchased (Purchasing Card or Purchase Requisition), the end user generally receives one or more of the following documents, which should be placed in the software documentation binder: Purchase Requisition Sales order/invoice receipt Packing slip denoting product and quantity purchased Copy of completed Purchase Order Letter from hardware manufacturer denoting software applications that have been bundled or preloaded with the purchased hardware

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

Shareware/Freeware
Shareware programs, such as WinZip, typically offer a trial period. After the trial period expires, the end user is responsible for either uninstalling or purchasing the program. For each shareware program, the end user is responsible for tracking the information described previously under Non Site-Licensed Software. For each freeware program, the end user maintains a copy of the license agreement. The license agreement can usually be found on the web site from which the software was downloaded or in the Readme file.

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

10

Appendix A: Blank Software Audit Worksheets


Individual Workstation Software Audit Worksheet
Use this worksheet to record the software found on a single computer. Computer:

(User Name; Computer ID or Serial Number)

Software Product & Version Number

Software Publisher

Software Serial Number

Proof of Purchase R L P SL SF

R L P SL S

Sales order/invoice receipts, packing slips denoting the product(s) and quantity purchased Letter from the manufacturer and/or publisher denoting what comes with the computer Purchase Order that the Purchasing Department has approved and processed Software Site License Agreement and/or Software Site License Program Summary of Order Unexpired License Agreement for Shareware or Freeware Temple University Software Management and Compliance Guidelines 11

Revised 12/2/11

Summary Software Audit Worksheet


Use this worksheet to summarize the results of an audit of all the computers in the college or department. Calculate the shortfall by subtracting the greatest number of Column D (R, L, P, SL, SF) from Column C (copies found). A
Product/Version

B
Publisher

C
# of Copies Found R L

D
Total Support Observed P SL SF

E
(C-D) Short fall

R L P SL SF

Sales order/invoice receipts, packing slips denoting the product(s) and quantity purchased Letter from the manufacturer and/or publisher denoting what comes with the computer Purchase Order that the Purchasing Department has approved and processed Software Site License Agreement and/or Software Site License Program Summary of Order Unexpired License Agreement for Shareware or Freeware

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

12

Appendix B: Software Audit Worksheet Examples


Individual Workstation Software Audit Worksheet
Use this worksheet to record the software found on a single computer. Computer: MicroLAN Laptop; S/N C8FD05F087C48093
(User Name; Computer ID or Serial Number)

Software Product & Version Number

Software Publisher

Software Serial Number

Proof of Purchase R L P SL SF

Acrobat Reader 4.05 QuickTime Talkback 2.2.2254 DVD Player 5.00.007.3 Office Pro 2010

Adobe Systems, Inc. Apple Computer, Inc. Full Circle Software, Inc. Mediamatics, Inc. Microsoft Corporation

N/A N/A N/A N/A 01-71348/2744840

R L P SL SF

Sales order/invoice receipts, packing slips denoting the product(s) and quantity purchased Letter from the manufacturer and/or publisher denoting what comes with the computer Purchase Order that the Purchasing Department has approved and processed Software Site License Agreement and/or Software Site Licensing Program Summary of Order Unexpired License Agreement for Shareware or Freeware Temple University Software Management and Compliance Guidelines 13

Revised 12/2/11

Summary Software Audit Worksheet


Use this worksheet to summarize the results of an audit of all the computers in the college or department. Calculate the shortfall by subtracting the greatest number of Column D (R, L, P, SL, SF) from Column C (copies found). A
Product/Version

B
Publisher

C
# of Copies Found R L

D
Total Support Observed P SL SF

E
(C-D) Short fall

Acrobat Reader 4.05 DropStuff 4.0 QuickTime Scrapbook 7.5.2 FileMaker Pro 4.0 Talkback 2.2.2254 DVD Player 5.00.007.3 Office Pro 2000 Word 97 Exchange 7.0 Internet Explorer 9.00.2014

Adobe Systems, Inc. Aladdin Systems, Inc. Apple Computer, Inc. Apple Computer, Inc. File Maker Inc. Full Circle Software, Inc. Mediamatics, Inc. Microsoft Corporation Microsoft Corporation Microsoft Corporation Microsoft Corporation . .

1 1 1 1 1 1 1 1 1 2 1 1 1 2 1 1 1

1 1

0 0 0 0 0

1 1

0 0 0 0 0

R L P SL SF

Sales order/invoice receipts, packing slips denoting the product(s) and quantity purchased Letter from the manufacturer and/or publisher denoting what comes with the computer Purchase Order that the Purchasing Department has approved and processed Software Site License Agreement and/or Software Site License Program Summary of Order Unexpired License Agreement for Shareware or Freeware

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

14

Appendix D: Proof of Purchase Documentation


Note: This appendix was developed by the Temple University Department of Internal Audits in consultation with University Counsel.
The following lists the alternative minimum acceptable documentation required for all new purchases and the criteria by which to flag noncomplying past purchases: Sales order/invoice receipts, packing slips denoting the product(s) and quantity purchased Letter from the manufacturer and/or publisher denoting what comes with the computer Purchase Orders that the Purchasing Department has approved and processed Software Site License Agreement and/or Software Site License Program Summary of Order that shows the customer number assigned Unexpired License Agreement for shareware or freeware

Please note that a number of these various types of documentation will routinely be received for each software license. To avoid unauthorized copying, care must be taken to unequivocally match the particular items of documentation with installation of the subject software on one, and only one microcomputer. Internal Audits will determine whether other documentation, such as the original diskette or CD-ROM, original license, or a copy of the completed registration card, which does not meet the acceptable documentation standard, is none-the-less sufficient to abrogate the need for the purchase of a new license depending on individual circumstances and the type of documentation and explanation.

Revised 12/2/11

Temple University Software Management and Compliance Guidelines

15

Appendix E: Message from the Vice President of Computer and Information Services
To: From: Date: Subject: The University Community Timothy C. ORourke, Vice President - Computer and Information Services April 2003 Software Policy Compliance

For the past several years, various colleges and departments within Temple University have been audited for compliance with the University's Software Policy. This memorandum is issued in an effort to remind the University community of the importance of complying with that policy and to reiterate the seriousness of failing to do so. Simply put, the unlicensed duplication or use of any software program is illegal and can expose both you and the University to civil and criminal penalties under copyright law. Temple University's Software Policy was adopted in order to: establish standards of conduct with respect to software acquisition, copying, transfer and use; inform students and employees of the repercussions associated with software misuse; set forth disciplinary procedures for such misuse; and avoid University liability for individual's violations of copyright law and software licenses. The Software Policy applies to all software acquired by or on behalf of Temple University and all software (however acquired) used on Temple University resources. Each user is individually responsible for reading, understanding, and adhering to the Software Policy, Computer Usage Policy and all licenses, notices, and agreements in connection with software, which he or she acquires, copies, transmits, or uses. An individual who violates the Software Policy is subject to any combination of the following: immediate system "lock-down" to prevent installation of future software; suspension or revocation of computer accounts; and disciplinary action as detailed by the relevant policies and rules for faculty, staff, and students. These actions may include suspension, expulsion or termination of employment. Without limiting the individual's personal liability, the applicable unit (e.g., administrative or academic department, center, institute, school or college) for any employee who violates the Software Policy is internally responsible for: any assessed or agreed to fee/fine/settlement/license amounts associated with remedying noncompliance and restoring an appropriately licensed system; costs associated with future installation/upgrade of software; and costs associated with monitoring compliance. In addition to University disciplinary actions, individuals who commit copyright infringement are personally subject to civil and/or criminal sanctions. Temple University is under no obligation to defend, indemnify or hold harmless such violators, as acting in violation of federal law is clearly outside the course and scope of employment. Furthermore, the University can be expected to cooperate with law enforcement officials in the investigation and prosecution of any violator. Temple University's Software Policy and Computer Usage Policy and a number of resources available to assist you in understanding software licensing and ensuring compliance with these policies including Instructional Course on Software Licensing and Related General Copyright Law and Software Management and Compliance Guidelines are located online at: http://www.temple.edu/terms. Please contact Computer Services at (215) 204-5000 should you have any questions or require assistance. Thank you for your cooperation.
Revised 12/2/11 Temple University Software Management and Compliance Guidelines 16

Appendix F: Software Categories


In terms of copyright, there are four broad classifications of software. To determine the category to which a software application belongs, refer to the following web site: http://www.temple.edu/cs/products.html

Commercial software
Commercial software represents the majority of software purchased from software publishers, commercial computer stores, etc. When you buy software, you are actually acquiring a license to use it, not own it. You acquire the license from the company that owns the copyright. The conditions and restrictions of the license agreement vary from program to program and should be read carefully. In general, commercial software licenses stipulate that (1) the software is covered by copyright, (2) although an archival copy of the software can be made, the backup copy cannot be used except when the original package fails or is destroyed, (3) modifications to the software are not allowed, (4) decompiling (i.e., reverse engineering) of the program code is not allowed without permission of the copyright holder, and (5) development of new works built upon the package (derivative works) is not allowed without the permission of the copyright holder.

Shareware
Shareware software is covered by copyright, as well. When you acquire software under a shareware arrangement, you are actually acquiring a license to use it, not own it. You acquire the license from the individual or company that owns the copyright. The conditions and restrictions of the license agreement vary from program to program and should be read carefully. The copyright holders for shareware allow purchasers to make and distribute copies of the software but demand that if you adopt it for use you must pay for it. In general, shareware software licenses stipulate that (1) the software is covered by copyright, (2) although one archival copy of the software can be made, the backup copy cannot be used except when the original package fails or is destroyed, (3) modifications to the software are not allowed, (4) decompiling (i.e., reverse engineering) of the program code is not allowed without permission of the copyright holder, and (5) development of new works built upon the package (derivative works) is not allowed without the permission of the copyright holder. Selling software as shareware is a marketing decision; it does not change the legal requirements with respect to copyright. That means that you can make a single archival copy, but you are obliged to pay for all copies adopted for use.

Freeware
Freeware also is covered by copyright and subject to the conditions defined by the holder of the copyright. The conditions for freeware are in direct opposition to normal copyright restrictions. In general, freeware software licenses stipulate that (1) the software is covered by copyright, (2) copies of the software can be made for both archival and distribution purposes but distribution cannot be for profit, (3) modifications to the software are allowed and encouraged, (4) decompiling (i.e., reverse engineering) of the program code is allowed without the explicit permission of the copyright holder, and (5) development of new works built upon the package (derivative works) is allowed and encouraged with the condition that derivative works must also be designated as freeware. That means that you cannot modify or extend freeware, and then sell it as commercial or shareware software.

Public domain software


Public domain software comes into being when the original copyright holder explicitly relinquishes all rights to the software. Under current copyright law, all copyrighted works (including software) are protected as soon as they are committed to a medium, for something to be public domain it must be clearly marked as such. Before March 1, 1989, it was assumed that intellectual works were NOT covered by copyright unless the copyright symbol and declaration appeared on the work. With the U.S. and Canadian adherence to the Berne convention this presumption has been reversed. Now all works assume copyright protection unless the public domain notification is stated. This means that for public domain software (1) copyright rights have been relinquished, (2) software copies can be made for both archival and distribution purposes with no restrictions as to distribution, (3) modifications to the software are allowed, (4) decompiling (i.e., reverse engineering) of the program code is allowed, and (5) development of new works built upon the package (derivative works) is allowed without conditions on the distribution or use of the derivative work.
Revised 12/2/11 Temple University Software Management and Compliance Guidelines 17

You might also like