Copy Protection

(kop pr -tek sh&n) (n.) Refers to techniques used to prevent the unauthorized copying of software. The idea of copy-protected software was created by software manufacturers who wanted to prevent software piracyusers copying programs and giving them to friends and colleagues free of charge.

As enticing an idea as it may be, copy protection has not proved to be a viable strategy. For one, it is practically impossible to create software that cannot be copied by a knowledgeable programmer. Second, many consumers shy away from copy-protected software because backup copies are difficult to make. Thus, if their original copy of the software is damaged, the user must contact the manufacturer for a new copy. Finally, some copy-protection techniques can actually damage other software on the system. For these reasons, copy-protected software is becoming less common.

Most software producers now protect their programs by issuing registration numbers with each package. When you install the software, you must enter the registration number. This does not prevent all piracy, but it limits it. In addition, users cannot get updates to a product unless they own the original diskettes and documentation.

An alternative strategy for dealing with the problem of software piracy is shareware, where users are actually encouraged to copy and disseminate programs. Shareware publishers rely on people’s honesty to pay for the products used.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Software

Table of contents What is Software? History of Software Software vs. Hardware Software vs. Hardware Comparison Chart What Types of Software Exist? Saas vs....

Email Address

What is an Email Address? An email address is a designation for an electronic mailbox that sends and receives messages, known as email, on a...

Information Technology (IT) Architect

The information technology architect applies IT resources to meet specific business requirements. The role requires a high degree of technical expertise as well as...

Built-In Function

A built-in function is a function that is already available in a programming language, application, or another tool that can be accessed by end...

Geotargeting

Geotargeting is a method of delivering data or content to users based on...

Agile Project Management

Agile project management enables business teams to approach their projects and tasks with...

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes...