Effective Date: August 8th, 2018
K7 Computing Pvt. Ltd., a company registered under the Companies Act, 1956 (hereinafter shall be referred to as "K7", "Company", "We", "Us", "Our", and terms of similar meaning).
Illegally distributing and using software is a significant problem that hurts K7. Our products, solutions, and services exists to assure the technology that powers the user's (hereinafter referred to as "You", "Your", "User", "Customer") business is secure and available from the desktop to the network core, and across the servers the Users rely on to deliver the competitive advantage. We want the Users to have the information that the Users need, to ensure that they get the maximum value from Our products legally.
Software piracy is a significant problem costing the industry millions of rupees annually. K7 is committed to educating Our authorized Users and, when necessary, bringing those violating our licenses into compliance.
Types of Software Piracy
Software piracy is the illegal distribution and/or reproduction of software. Purchasing software refers to purchasing of a license to use the software. The license spells out how a User may legally use such software. A license agreement is executed with the end user which details the terms and conditions of the use of the software. Any time someone uses the software beyond the scope of the license agreement, that User is violating the license agreement and the applicable provisions under the copyright laws. Whether software piracy is deliberate or not, it is still illegal and punishable under law.
Software piracy comes in many forms. The types that impact K7 Computing include:
1. Corporate or end user: Underreporting software installations acquired through volume purchase agreements Making additional copies of the software without having the proper number of licenses Swapping disks inside or outside of work
2. Subscription licensing: Using subscription-licensed software past the expiration date.
3. Support entitlement: Accessing support entitlements (e.g., .DATs, super .DATs, updates, or upgrades) without a current agreement.
4. Internet piracy: This can occur in many different forms, including: Auction sites that offer counterfeit and/or outdated products Peer-to-peer networks that allow for unauthorized file sharing
5. Counterfeiting: Refers to the act of a User attempting to copy the product and packaging so that the end product looks similar/alike to that of K7's original.
6. Hard-disk loading: The act of illegally installing software on the computers to enable higher sales of computers without the execution of any agreement with software vendors.
Steps to Effective Software Asset Management
The User to possess adequate knowledge on the type of K7 product/software installed in the computer.
The User shall conduct regular audits to determine the Users' software assets with the help of available software audit tools.
The User shall run the software audit tools and compare the results of the User's license documentation to determine the extent of compliance.
The User shall adopt adequate anti-piracy/IT policy to ensure that the User's employees are prohibited from illegally copying the software.
In the event of non-compliance, User with the assistance of K7 shall acquire appropriate licenses as required by K7.
Purchase of Authorized Software
The User may purchase any of the K7 products/software by accessing the K7 website i.e. K7 Computing or at the site of any of the partners or resellers of K7.
In the event of the User being found guilty of software piracy, the User may be subjected to an criminal prosecution including fines and the if the User is an individual, the said individual may be arrested, as per the applicable laws.
In the event K7 initiates civil proceedings, K7 may obtain its lost profits plus the infringer's profits, or statutory damages per product. In addition, K7 may seek to recover its attorneys' fees.
Reporting a Case of Software Piracy
K7 Computing encourages the User to notify K7 of any and all instances in which a business or individual may be using or distributing our software illegally. Reporting this type of action helps K7 in the reduction of software piracy problem and enables K7 to provide better support and assistance for its existing products.
Any complaints, concerns or instance of piracy may be reported by the User to the K7 Computing's Compliance Group at privacy@K7computing.com.
The User specifically agrees and consents that the collecting, storing, processing, transferring and sharing of information related to K7 and the User is confidential and will only be used by K7 Computing's Compliance Group.
For more information, tools, and resources, visit:
Business Software Alliance
The Business Software Alliance (BSA) is the foremost organization dedicated to promoting a safe and legal digital world. BSA educates consumers on software management and copyright protection, cybersecurity, trade, e-commerce, and other Internet-related issues.
Software & Information Industry Association
The work of the Software & Information Industry Association (SIIA) has brought together the leading companies in the software and digital information industry, expanding market opportunities and forging the way toward a stronger industry. SIIA protects its members' intellectual property and advocates a legal and regulatory environment that benefits the entire industry.
The terms of the End User License Agreement as available at End User License Agreement shall mutatis mutandis apply to this Anti Piracy Policy.