Feeds

eBay UK takes down pirate software sales

Microsoft cracks the whip

  • alert
  • submit to reddit

The Power of One Infographic

Microsoft and eBay are working together to stop the sale of pirate software on the online auction site. According to Microsoft, more than 21,000 suspect software sales were removed from the UK eBay site between August and October this year.

Over half (52 per cent) were sales of counterfeit Microsoft Windows, while 36 oer cent were fake copies of Microsoft Office.

According to Microsoft, the crackdown is working. It says that eBay removed 11,535 suspected counterfeit sales from the site in August. This fell to 4,460 in September and 5,423 in October.

A band of approximately 100 suspected illegal traders accounted for more than 3,000 of the items.

Michala Alexander, Microsoft UK head of anti-piracy, said: "Purchasers of Microsoft software do not own copyright for the software; rather they license the technology and have permission to use it under the terms and conditions of the original licensing agreement. Traders should be aware of licensing agreements so as to avoid breaking the law by illegally selling our technology."

eBay does not monitor its website for fake goods, but it will remove infringing items once they have been brought to its attention by the rights owner or its representative.

It has set up the Verified Rights Owners Programme (VeRO) to assist rights owners. Participants have the ability to identify and request removal of allegedly infringing items and materials.

Copyright © 2005, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.