You are on page 1of 5

Group

Introduction of the issue:

Software piracy:
Software piracy is the unauthorized use, duplication, or distribution of copyrighted software.
This can take many forms, including downloading and using cracked versions of software,
making copies of the software for friends or classmates, or using a single licensed copy of a
program on multiple computers.

In Pokhara universities, software piracy is a common issue. Many students and staff members are
participating without being aware of the legal and ethical implications of using pirated software
and didn’t realize that they are breaking the law. Additionally, the high cost of many software
programs is also making it difficult for universities to afford to purchase the number of licenses
needed to legitimately use the software across their entire campus.

One of the main consequences of software piracy is that it harms the software development
industry. When people use pirated software, they deprive the developers and publishers of the
revenue they would have earned from selling legitimate copies of the program. This can make it
difficult for companies to continue developing and updating their software, which can ultimately
harm users by limiting the availability of new features and security updates.
Proposed Solutions:

Introduction:

Pokhara University, like many institutions of higher education, faces a number of challenges
when it comes to managing data access, preventing software piracy, and addressing bribery and
censorship. These issues can have a significant impact on the university's ability to operate
effectively, and can also put the institution at risk from legal and financial penalties. In order to
address these challenges, it is important to develop a comprehensive strategy that includes both
technical solutions and policies to address these issues.

One of the key components of this strategy is to implement a robust data management system
that allows for secure access to university data and resources. This could include the use of
encryption, firewalls, and other security measures to protect against unauthorized access and data
breaches. Additionally, the university could also implement measures to prevent software piracy
and ensure that all software used on campus is properly licensed and used in accordance with
copyright laws. To address bribery and censorship, the university could also develop policies and
procedures that clearly outline the consequences of these actions and encourage a culture of
integrity and transparency within the institution.

Objectives:
 To identify the causes and effects of software piracy and propose solutions to prevent it.
 To examine the current state of data management within the organization and identify
areas where improvement is needed.
 To identify the problem of censorship and propose solutions to ensure freedom of
expression.
 To assess the prevalence of bribery within the organization and recommend actions to
prevent it.
 To provide an overview of the legal and regulatory requirements for addressing software
piracy, data management, and bribery.
 To recommend best practices for ongoing monitoring and compliance to ensure ongoing
prevention and protection against these issues.
 To provide a detailed action plan for implementing the proposed solutions and
recommendations.
 To measure the effectiveness of the implemented solutions and make any necessary
adjustments.
 To report the overall impact of the implemented solutions on the organization and
suggest any further improvements that can be made.
 To create awareness within the organization and educate employees on the importance of
ethical practices and compliance.
Deliverables:

For software piracy and bribery:


One way to solve the problem of software piracy at Pokhara University is through the use of digital rights
management (DRM) technology. This technology allows software companies to encrypt their products so
that they can only be used by authorized users. DRM can be used to control the number of times a piece of
software can be installed or to limit its use to a specific time period. Additionally, software companies can
use product activation, which requires users to enter a unique code in order to use the software, as an anti-
piracy measure.
Another way to combat software piracy is through legal action. Software companies can work with law
enforcement agencies to identify and prosecute individuals and organizations that engage in software piracy.
Software companies can also file lawsuits against individuals and organizations that are found to be
distributing pirated software. Additionally, governments can create laws and regulations to make software
piracy a criminal offence, with severe penalties for those who are caught engaging in this illegal activity.
To combat bribery, companies may want to implement strict policies, procedures and controls to ensure that
their employees and partners are aware of their responsibilities and obligations. This could include clear
statements of their policies, strict codes of conduct, regular monitoring and compliance audits, and
implementing special training programs on anti-corruption and bribery prevention. This includes
appropriate due diligence processes when establishing new relationships or partnerships, and a
whistleblower system for employees to report any suspicions or observed violations of anti-corruption and
bribery policies.
Implementation of an effective compliance management system can be another way to fight bribery as it
helps an organization to identify and mitigate risks and ensure compliance with regulations, laws and
standards. This can be supported by compliance software which provides real-time risk management and
fraud detection, which can detect any suspicious activities in a timely manner.
System manual
Introduction:

Welcome to the Security System Manual for our organization. This manual provides detailed
instructions on how to use and maintain the security systems that have been implemented to
protect our organization from risks such as software piracy, bribery, censorship and unmanaged
access data.

1. Software Licensing System:

The software licensing system is designed to ensure that only legitimate users are able to access
and use the software. This system includes product activation, serial key verification, and online
validation. To activate the software, users must enter their serial key and verify it against a
database of valid keys. If the key is legitimate, the software will be activated and the user will be
able to access all features. If the key is not legitimate, the user will be prompted to purchase a
legitimate license. The database of valid keys is regularly updated to prevent piracy.

2. Bribery detection and prevention system:

The bribery detection and prevention system are designed to detect and prevent any attempts at
bribery. This system includes regular audits, compliance checks, and the use of sophisticated
monitoring tools. Employees are trained in the detection and prevention of bribery, including
how to report suspicious behavior. Regular internal audits and compliance checks are conducted
to identify any potential bribery. Monitoring tools such as fraud detection software are used to
detect any suspicious transactions or activities. Any reported or detected bribery is investigated
and appropriate action is taken to prevent it from happening again.

3. Censorship and Content Filtering System:

The censorship and content filtering system is designed to detect and block any content deemed
inappropriate or harmful. This system includes keyword filtering, IP blocking, and sophisticated
algorithms. The system is regularly updated to ensure it is effective against the latest threats and
vulnerabilities. Keyword filtering is used to detect and block any content deemed inappropriate
or harmful. IP blocking is used to block access to certain websites or content that is deemed
inappropriate or harmful. Sophisticated algorithms are used to detect and block any content that
is deemed inappropriate or harmful. The system is regularly reviewed and updated to ensure it is
effective against the latest threats and vulnerabilities.

4. Data Access Management System:

The data access management system is designed to ensure that only authorized users are able to
access sensitive data. This system includes user authentication, role-based access control, and
encryption. User authentication is used to ensure that only authorized users are able to access
sensitive data. Role-based access control is used to ensure that users can only access the data
they are authorized to view. Encryption is used to protect sensitive data from unauthorized
access. The system is regularly reviewed and updated to ensure it is effective against the latest
threats and vulnerabilities.

5. Regular Updating and Maintenance of All Security Systems:

All security systems must be regularly updated and maintained to ensure they are effective
against the latest threats and vulnerabilities. The effectiveness of all security systems is
monitored and any necessary changes are made. All security systems are tested regularly to
ensure they are functioning properly.

6. Regular Security Audits and Penetration Testing:

Regular security audits and penetration testing are conducted to identify any weaknesses or
vulnerabilities in the system. All aspects of the system, including the software, network, and
infrastructure, are tested. Any vulnerabilities or weaknesses are identified and addressed
promptly.

7. Training Employees on Security Best Practices:

Training materials on security best practices, including password security, phishing scams, and
suspicious activity, are developed. Regular training sessions are conducted for employees.

Reference

Tanvir, F. (2022, 03 21) What is Software Piracy- 6 Incredible Ways to Prevent It. Retrieve
from Appsero: https://appsero.com/user-guide/what-is-software-piracy-how-to-prevent-/

Types of privacy (2022,04 27). Retrieved from NortonLifeLock:


https://www.nortonlifelock.com/us/en/legal/anti-piracy/types-piracy/
Software Piracy: Is it Happening in Your School or University? (1998, 01 04) Retrieved from
The JOURNAL: https://thejournal.com/Articles/1998/04/01/Software-Piracy-Is-it-Happening-in-
Your-School-or-University.aspx

Andy, S. (2022, 12 14) 6 Ways to Stop Digital Piracy. Retrieved From Viaccess-orca:
https://www.viaccess-orca.com/blog/six-ways-to-stop-digital-piracy

You might also like