Anti-Piracy Information

Anti-Piracy Information

Welcome to Intuit’s anti-piracy information website. This site provides basic information on software piracy and its negative effects on businesses and consumers, including the risks associated purchasing or using counterfeit software.

What is software piracy?

Software piracy is the duplication, distribution or use of software without authorization from the copyright owner. It includes:

  • Downloading unlicensed copies of software from the Internet.
  • Making copies for, or loaning disks to, friends or associates.
  • Installing one licensed copy onto multiple computers (where not allowed by license terms).
  • Selling counterfeit or back-up copies online or elsewhere.
  • Using unlicensed or counterfeit copies.

It’s important to understand that software is not owned by an end-user, but rather licensed to the end-user by the copyright owner through an End-User License Agreement, often referred to as the EULA. The EULA contains the terms and conditions for using the software. Software publishers maintain ownership of the software they create, and control the right to duplicate and distribute their products.

Why is software piracy an important issue?

Our anti-piracy information shows that piracy is not just a concern for software publishers; it also affects consumers and the economy as a whole.

Other negative effects of piracy:

  • Virus threats – When users install software from counterfeit CDs, they expose themselves to risks that such CDs might also contain other material, including potentially destructive material like computer viruses. Obviously there are no quality control guarantees when buying and using counterfeit CDs.
  • Impact on research and development – Piracy undermines software companies’ ability to invest in research and development, slowing the industry’s ability to bring new and innovative solutions to consumers.
  • Identity theft risks – Piracy can expose end-users to potential risks of identity theft if criminals who sell counterfeit software CDs obtain a buyer’s name, address, credit card and other information during purchase.
  • Support and maintenance – Piracy deprives consumers of the basic protections offered by properly licensed software like money-back guarantees, installation support, maintenance releases, and upgrade rebatesOur .

What are the different types of piracy?

There are three primary types of piracy:

Organized counterfeit sales – This is the illegal duplication and sale of copyrighted software without authorization from the copyright owner and can result in both civil and criminal penalties. These sales frequently occur online, including through online auctions and online storefronts, as well as through physical venues like flea markets and swap meets. To protect yourself from counterfeit software, please see the section below entitled “What you should watch out for when buying software”.

Unlicensed use – This occurs when people and companies (including their employees) reproduce or share copies of software without adequate licenses. Unlicensed use can occur when:

  • The product has a single-user license but is installed on more than one computer.
  • The product is a counterfeit or restricted-use version of software and is used or sold in violation of the license terms or without proper qualifications. This includes non-qualified use of academic, not-for-resale, hardware-prebundled or trial versions.
  • The product is shared over the Internet or downloaded from a peer-to-peer network in violation of federal law and license requirements.

Hard-disk loading – This is the unauthorized installation of software onto new or used computers by another person or company, typically to make the purchase of the computer a better deal.

What are the legal penalties for Copyright infringement?

  • Actual damages experienced by the copyright owner, including recovery of the profits from any illegal sales.
  • The Copyright Act also makes provision for criminal penalties – a fine (a maximum of R5 000 per infringement) and/or imprisonment of up to 3 years for a first conviction. The maximum fine and/or imprisonment penalty for a second conviction is R10 000 and/or 5 years.

What should you watch out for when buying your software licenses?

If you are buying a license to use Intuit software from someone other than Intuit or a well-known, trusted retailer, you should watch out for the following warning signs:

Previously registered software – If the product is being advertised as “used” or “previously registered,” its license is generally not transferable. Any attempted resale would therefore be prohibited. If you have questions about a particular auction or a copy of Intuit software you received from an online seller, please contact Intuit via e-mail at piracy@intuit.com

Restricted-use software – Restricted-use versions of Intuit software, such as academic, not-for-resale, hardware-prebundled or trial versions, may only be acquired by qualified users and generally cannot be resold. Sales of these versions on auction sites, so-called “discount software” sites or elsewhere, may violate the EULA and may not be permitted by law.

Multi-license packs – Some Intuit software products are available in 5- or 10-license packs or other configurations. As explained in the license terms, such packages cannot be broken up and sold separately.

“CD-ROM only” sales without proper packaging – Authentic Intuit software CDs that are sold by legitimate resellers are always packaged in Intuit-manufactured and branded packaging and never packaged for resale in plain-white sleeves or plastic jewel cases. Software offered for sale without legitimate Intuit-branded packaging may indicate that it is not genuine or legally licensed.

Additionally, authentic Intuit software CD-ROMs are always manufactured using a sophisticated printing process where the ink is screened directly onto the surface of the CD-ROM. Intuit does not use paper or plastic CD labels that merely stick to the top surface of the CD. Additionally, Intuit software is always manufactured on CD-ROM media, not so-called CD-R media — a recordable disk medium that is typically used to “burn” copies of music and movies and which often has serial numbering on the plastic inner ring of the CD.

“Too good to be true” pricing – While some offers may seem like a “great deal,” buyers may not get what they expect. Those victimized by purchasing counterfeit software may expose themselves to the risks noted above. Additionally, buyers will ultimately need to purchase a legitimate license (or licenses) to continue using the software lawfully. As the old adage says, “If it looks too good to be true, it usually is!”

What can you do if you unwittingly obtained pirated software?

Our anti-piracy information recommends that you report it to Intuit. We will investigate the source of the software and take appropriate action, where necessary.

Sign up for our EasyBiz Newsletter

Stay up to date with the latest payroll & HR trends

Please fill out the form below to receive the trail demo link

Personal Information
Where a party receives any personal information (“PI”) related to the other party, the party who receives the PI, will comply with and have adequate measures in place to ensure that its employees, agents, subsidiaries and representatives comply with the provisions and obligations contained in the Protection of Personal Information Act, No. 4 of 2013. Any PI pertaining to one party which is required by the other party, will only be used by that other party for the purposes of this contract and will not be further processed or disclosed without the written consent of the latter and the recipient of that PI will take all reasonable precautions to preserve the integrity and prevent any corruption or loss, damage or destruction of the PI. If and when the contract is terminated, each party will, save to the extent that it is required to do otherwise by any applicable law, erase or cause to be erased, all PI and all copies of any part of the PI relating to the other party”.

Please fill out the form below to receive the trail demo link

Personal Information
Where a party receives any personal information (“PI”) related to the other party, the party who receives the PI, will comply with and have adequate measures in place to ensure that its employees, agents, subsidiaries and representatives comply with the provisions and obligations contained in the Protection of Personal Information Act, No. 4 of 2013. Any PI pertaining to one party which is required by the other party, will only be used by that other party for the purposes of this contract and will not be further processed or disclosed without the written consent of the latter and the recipient of that PI will take all reasonable precautions to preserve the integrity and prevent any corruption or loss, damage or destruction of the PI. If and when the contract is terminated, each party will, save to the extent that it is required to do otherwise by any applicable law, erase or cause to be erased, all PI and all copies of any part of the PI relating to the other party”.