home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Feb 7, 1993 Volume 5 : Issue 11
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Editor: Etaion Shrdlu, Junoir
-
- CONTENTS, #5.11 (Feb 7, 1993)
- File 1--Introduction to a Chat with the SPA
- File 2--A Chat with the SPA
- File 3--How does the SPA Calculate Piracy?
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
- at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
- 466893; and using anonymous FTP on the Internet from ftp.eff.org
- (192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
- /cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
- ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail server at
- mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 29 Jan 93 23:49:21 CST
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Introduction to a Chat with the SPA
-
- Over the past few months, CuD talked with severeal SPA staff about
- their organization, goals, tactics, and membership. In CuD # 4.63, we
- reposted several SPA position papers and summarized their broad goals.
- Here, we attempt to present in more detail the SPA's view of its
- organization, mission, and activities from their perspective.
-
- We began our inquiry into the SPA knowing little about them other than
- what we had read in the press. Press accounts seemed taken primarily
- from SPA literature, which leave a number of questions unasked. We
- also were initially influenced by the rumors and other sources of
- information that portrayed the SPA as an evil entity inclined to
- invoke the law for its own narrow interests. Between these two
- extremes--an altruistic group devoted to high ideals and an
- opportunistic frontier sheriff, we found considerable middle ground
- and support for both views.
-
- The SPA is divided into two fairly distinct, but somewhat overlapping,
- groups. The first, represented by the SPA's General Fund, provides
- the same services for members that any solid professional organization
- does. It provides support, conferences, information, and other
- assistance for members. The bulk of the SPA's activities are devoted
- to these services, and from all accounts they do it well and take
- justifiable pride in their accomplishments. The second, represented
- by the SPA's Copyright Protection Fund (CPF) garners the publicity and
- raises the questions that prompted our initial inquiries. Although
- linguisticially awkward, the SPA calls each segment a "fund," rather
- than a group or a division. Some have called the CPF cyber-tech
- bounty hunters for its aggressive style in pursuing its targets and
- using the threat of law to obtain out-of-court settlements that have
- been has high as a half-million dollars. Those whom the SPA represent
- justifies this style as a necessary method to protect software authors
- from potential predators whose actions, if unchecked, reduce the
- compensation for intellectual property.
-
- We have said it before, and we'll repeat it: Both CuD editors are
- unequivocally opposed to all forms of predatory behavior, whether by
- the lawless or by those who ostensibly defend law. We strongly
- believe that if one obtains software, whether conventional copyright
- or shareware, and uses it regularly, it should be purchased. Period.
- This is the official position of CuD, and it is the strong personal
- view of both editors.
-
- However, we also judge the "zero-tolerance" approach to copying and
- distributing unpurchased software both unreasonable as a legal and
- ethical stance, and ultimately unhealthy for the software industry and
- for end-users. The recent passage of PL 102-561, the federal
- anti-piracy bill (formerly S893) is an example of a bad law that
- over-criminalizes "piracy," creates a broad category of offenses that
- lump both minor lapses in judgement with serious predations, provides
- an easy means for prosecutorial abuse, and gives a coercive weapon to
- groups inclined to seek out-of-court settlements.
-
- We are of two minds about the SPA. On one hand, their commitment to
- members interests, their willingness to engage in educational
- activities to raise the consciousness of end-users' obligations to
- software publishers, and their devotion to their cause are laudable.
- On the other hand, some of their tactics raise ethical questions, and
- their hard-line stance on "zero-tolerance" are not.
-
- Our intent in this and subsequent discussion of the SPA (and the
- Business Software Alliance) is not simply to criticize them.
- Instead, we hope to raise some of the issues underlying their methods
- and philosophy for the purpose of striking a balance between the
- rights of *both* publishers and users.
-
- In our discussions, we found the SPA staff without exception to be
- friendly and cooperative. They patiently answered repetitious
- questions and promptly provided information that we requested.
- Although we doubt that anything we say in CuD will influence them one
- way or the other, we hope they interpret our critiques in subsequent
- issues in the collegial spirit intended, and we invite them to engage
- in dialogue with the past and future comments that we and other
- readers provide.
-
- One might ask why the SPA should bother engaging in dialogue in
- Cu-Digest. Let me suggest a few reasons:
-
- 1) CuD's readers are primarily professional (computer types,
- attorneys, law enforcement, media) and discussion would reach at least
- 40,000 people, probably closer to 60,000. Readers are obviously
- computer-literate, and most are affected in some way by intellectual
- property issues.
-
- 2) Engaging in dialogue is healthy. Conflicting views, when publicly
- aired, can lead to sharpening of and changes in public thinking.
-
- 3) The SPA may have an image problem. Whatever they think they do,
- their actions are clearly misunderstood by many people. Public
- dialogue would give them the opportunity to reflect on the image and
- to assess if it's the one most-appropriate to their goals.
-
- 4) The SPA's goal of educational outreach would be served by
- contributing to the dialogue in CuD. Outreach is invaluable in
- challenging people's thinking, raising issues, and imparting
- information. For the SPA, the value is not whether people accept or
- reject their methods, but rather that the simple act of discussing
- them publicly serves to raise awareness about the problems and
- stimulate people to think in new ways about proprietary information
- for them. It's a no-lose situation for them.
-
- 5) The SPA staff came across as dedicated, well-meaning, and
- honorable, which suggests that they would welcome a public dialogue.
-
- We look forward to hearing from them.
-
- ------------------------------
-
- Date: 30 Jan 93 01:03:34 CST
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
- Subject: File 2--A Chat with the SPA
-
- ((MODERATORS' NOTE: The following is a summary of conversations with
- SPA personnel between October, 1992 and January, 1993. The contacts,
- especially Terri Childs (SPA Public Relations Manager), Illene
- Rosenthal (SPA General Counsel), David Tremblay (Research Director),
- and Katherine Borsecnik, were patient, cordial and open. They also
- spoke slowly, allowing for occasional verbatim note-taking.
- The narrative attempts to present the SPA from their own perspective.
- We strongly encourage rational responses that address the issues raised)).
-
- THE ORIGINS OF THE SPA
-
- Ken Wasch, the founder and Executive Director of the SPA, was an
- attorney working for the federal government in 1984. Perhaps because
- the Beltway is an environment teeming with trade associations, he
- recognized a need for a trade association for the rapidly growing PC
- software industry. Unlike a professional association, which supports
- individuals in furthering their professional career, a trade
- association furthers the interests of companies in furthering their
- enterprise. He perceived a need, and he hoped to fill the vacuum.
- When 25 software companies signed up, the SPA officially came into
- existence as a non-profit organization. His motivation, according to
- one SPA staff person, was that he simply liked the software industry
- and wanted to further its goals. The SPA was officially founded on
- April 5, 1984. Its current staff of about two dozen people provides a
- variety of services to software publishers and others.
-
- SPA MEMBERSHIP
-
- Unlike some associations, such as the Business Software Alliance, SPA
- membership is open to any legitimate software or trade-related
- company. SPA membership reached 1,000 in fall of 1992, and continues
- to grow. As a trade association, it represents companies, *not*
- individuals. So, if an individual wants to join, they do so as a
- company. About two-thirds of the members are software developers, and
- one-third are companies who support the software industry, including
- venture capitalists, market researchers, public relations firms, and
- companies whose clients are software manufacturers. The diversity of
- membership is seen as one strength of the SPA, because it infuses a
- variety of ideas and perspectives into programs and policy.
-
- DUES AND BUDGET: SPA dues are assigned on an "ability-to-pay" sliding
- scale, depending on the company's annual revenues. Dues range from
- $750 to $125,000 a year. About 60 percent of the members pay in the
- three lowest categories, which are $750, $850, and $1,000. Annual
- dues for a small software company are about the same as the costs for
- a one-year family subscription to cable a cable television full
- service, and are therefore not prohibitive even for the smallest
- companies.
-
- EDUCATIONAL AND COPYRIGHT FUNCTIONS:
-
- The SPA is divided into two divisions, each with a separate operating
- budget. The first, the GENERAL SPA FUND, is the association's main
- group with an annual operating budget of about $4.5 million. The
- second, the COPYRIGHT PROTECTION FUND (CPF), has a budget of about
- $2.86 million for fiscal year 1993. The term "fund" is used to refer
- to each group, and does not refer only to a pool of money.
-
- The general fund provides for rent, maintenance, conferences, and
- salaries for the non-copyright protection personnel. The copyright
- Protection Fund's budget provides for enforcement, educational
- outreach activities such as producing videos, going into schools, and
- publishing SPA brochures, which are given away or at nominal cost. The
- question of how much the SPA spends on education is complex, because
- both groups engage in educational activities. According to Katherine
- Borsecnik:
-
- Remember, our primary mission is to serve our members, who
- are primarily software publishers. The copyright protection
- fund is a separate fund that pays for all our anti-piracy
- work, both the litigation and the education. The kind of
- education that you mention, going into schools, or going
- into businesses, or general speeches, all of that is related
- to copyright and intellectual property, so it all comes out
- of Copyright Protection Fund. We have a very large
- education budget in the general fund that goes for things
- like conferences for our members in the software
- industry. . . . I think we're talking about two different
- things here. You're talking about general education as
- anti-piracy stuff. . . . So, the $2. 86 million budget includes
- speeches, brochures, videos, and other information that goes
- to end users. . . They are more expensive, because we do them
- in large quantities, than our legal expenses.
-
- The SPA's anti-piracy activities are its most visible and dramatic,
- but they constitute only a portion of what the SPA does for members.
- Ms. Borsecnik explained:
-
- There's a laundry list of member benefits. We do a lot of market
- research. A lot of companies join because that market
- research is very valuable to them, and they'd never get the
- kind of research that we do. So we do tons of market
- research. We track sales in 25 diferent software categories
- every single month. We also do market-specific end-user
- studies....
-
- And then we have a sales certification program, sort of like
- in the recording industry, gold and platinum, and these are
- programs that help companies with marketability programs,
- those little labels they put on the box that say "certified,
- 100,000 sold" or whatever.
-
- In addition, the general division does consumer and end-user studies
- on education, provides salary studies, and distributes publications
- that include newsletters, a recently-published book on distribution
- channels, and lengthy articles. They also host three conferences a year.
- They conduct an annual awards presenation modeled on the academy
- awards, and this year 525 products are being nominated for 25
- categories of awards.
-
- THE COPYRIGHT PROTECTION FUND
-
- The Copyright Protection Fund's staff includes one clerical position,
- an administrative assistant, two or three non-attorney investigators,
- and Illene Rosenthal, the SPA's general counsel and overseer of the
- CPF. She and Ken Wasch, the SPA's Executive Director, are the
- only two attorneys on staff.
-
- The Copy Right Protection Fund, formed in 1985, is a separate subset
- of the SPA. It was initially set up and funded by contributions by
- some of the members to help "prime the pump" in the SPA's anti-piracy
- efforts. After that initial pump-priming, it has been entirely
- self-funded by litigtion settlements. A separate committee directs the
- staff a to what kinds of actions to take and is the overseer of the
- anti-piracy's efforts. Similar to a board of directors, the committee
- includes members from the software industry. The dual goals are to
- educate the public about acceptable software use and copyright law and
- to litigate against those judged to abuse copyright law. The fund
- filed its first suit in March, 1988, against "The Clone Store," a San
- Leandro, Calif., computer dealer. The case was settled out of court
- for $10,000.
-
- The CPF has generated considerable publicity for its aggressive
- reactive opposition to software piracy, but education, not
- enforcement, is the division's professed primary goal. According to
- staff.
-
- The CPF produces brochures explaining copyright protection for
- end-users, promotes awareness of the problem of "soft-lifting," a term
- for using unauthorized copyright software akin to shoplifting, and
- delivers its anti-piracy message to schools, business, and others.
- The SPA's rap-video, "Don't Copy that Floppy" (reviewed in CuD #4.63)
- is available at no cost. The SPA has also developed a program called
- SPAUDIT intended to help end-users, especially companies and schools,
- identify over 650 software programs of members that might be installed
- on a personal computer. The program allows a user to first identify
- which programs exist, and then sort out and remove those that might be
- unpurchased. The program is about 43K and quite easy to use. However,
- in using it on my own system, it identified 13 programs, but at least
- four of the "hits" were false in that these programs were not on my
- system. Nonetheless, the program, even if not particularly accurate,
- possesses a symbolic function in that it raises the consciousness of
- system supervisors and helps establish an ethos of attention to
- outside software on "the boss's" computer.
-
- THE CPF--SOFTWARE POLICE?
-
- The CPF actively promotes a self-image of "software cop."
- The June 17, 1991, issue of Information Week carried a cover graphic
- similar to a 1940s' comic book: Two respectable looking office workers
- are in their office when a super-hero in a suit and trenchcoat bursts
- through the door, knocking it off its hinges. "Nobody Move! Keep your
- hands away from those keyboards," he says. "Oh my gosh! It's the
- SPA!!" exclaims a shocked male worker. "QUICK! Stash the disks!!" says
- the female. Other advertisements, which it either sponsors or
- endorses, carry the same law-and-order/piracy-will-get-you-jailed
- theme. According to Ms. Rosenthal, the ads and the motif are intended
- to be humorous and not necessarily literal, but they nonetheless
- symbolize what many observers see as a simplistic ethos of harshly
- punitive responses to what in fact is a complex problem. Whether
- justified or not, the SPA has the reputation of simply "not getting
- it" when it comes to possession or use of unpurchased software. It is
- not that the SPA's critics condone theft or support the practice of
- regularly and intentionally violating copyright protections. Rather,
- critics point to what they judge to be questionable tactics in the
- SPA's war on piracy. The SPA responds by stressing that the rights of
- software publishers must be protected from rip-off and deprivation of
- fair compensation for their labor.
-
- TARGETING "PIRATES"
-
- Contrary to public perception, SPA personnel indicate that they do not
- target a particular group or type of offender. They respond to each
- case individually and target those for whom there is "clear evidence"
- of abuse. Despite their reputation for threats of litigation, they
- stress that their primary strategy is to obtain voluntary compliance
- with copyright law. CuD asked several staff members to explain,
- step-by-step, how they respond to a complaint of copyright violations.
-
- First, the SPA receives information from employees, whistle-blowers,
- or private citizens who call its highly publicized "anti-piracy"
- hotline (800-388-PIR8). They receive between 50-150 calls a week, but
- only about 2 to 10 of these are pursued. The first step in pursuing a
- case is to obtain as much information as possible. According to Illene
- Rosenthal:
-
- We want to know how long the person's been working,
- where they've been working, what the relationship is they
- have with the company....Obviously, we want to know as
- much as possible. We want to know where the person
- worked, how long they've worked there, how they know this
- information, whether or not they've discussed it with
- management, basically, everything you do in an
- investigation. What specific programs are involved, how
- many programs, illegal programs, there are. This kind of
- information you're going to get over several phone calls.
- You're not going to necessarily get it on the first phone
- call. But, we do a thorough investigation, and when we're
- comfortable with that information, what we're going to do
- is pursue the case. If we're not comfortable with that
- information, obviously we're not going to pursue the
- case.
-
- Depending on the evidence, the seriousness of the alleged offense, and
- the motivation, one of several courses of action exist. The first is
- THE RAID, which involves entering the alleged offender's premises and
- searching the computer system(s). Second is an AUDIT LETTER, in which
- the SPA provides a target with an opportunity to voluntarily comply
- with a request to examine hard drives for "unauthorized" software. Third
- is a CEASE AND DESIST LETTER, which is a letter notifying an alleged
- offender that they may be in violation of copyright law and provides
- the target with the opportunity to voluntarily stop the perceived
- offense and avoid further action. The letter option allows the
- company or BBS to do its own investigation and report back to the SPA.
-
- The decision on which option to invoke depends on a number of criteria
- on a case-by-case basis. According to Ms. Rosenthal:
-
- We discuss this in a group of about seven of us, and we sit
- down and discuss the cases, and we'll throw out the
- various factors and sometimes we'll say, "Look, I need more
- information," and they'll get back to the source to get more
- information. But, ultimately, you get the information you
- need so that you can feel as comfortable as possible taking
- whatever action you decide to pursue or not pursue in a
- given case. . . .We really look at each case on a
- case-by-case basis. It's not that we're looking for
- particular types of industries or particular types of
- organizations. It's the information that comes out, the
- quality of the information, the credibility of the
- informant, the seriousness of the violation, the
- willfulness of the violation, they're just all factors
- that go into it.
-
- The AUDIT LETTER presumes good faith on the part of the target. It
- requests permission for SPA personnel to conduct a software audit on
- the premises. In return, the SPA will forgo litigation. The SPA's
- Background Information brochure identifies four principles in the SPA
- software audit:
-
- 1. An SPA representative observes as the directories of each PC are
- printed.
-
- 2. Directory information is compared with purchase records.
-
- 3. The company agrees up front to make a penalty payment to the SPA
- Copyright Protection Fund in the amount equal to the retail price of
- each illegal software program found during the course of the audit.
-
- 4. All unauthorized copies are destroyed, and the audited
- company agrees to replace them with legitimate copies.
-
- Critics argue that this policy constitutes a double penalty.
- First, they claim, there is the equivalent of a coerced fine
- in payment of software costs. Second, purchasing a copy of
- each product found may exceed what some companies need or
- even were aware they had on the systems. SPA supporters
- counter by arguing the payments are voluntary and if the
- company feels an injustice has occured, they are able to
- pursue it through the litigation option.
-
- According to SPA staff, it would be difficult for the target to erase
- "evidence," because auditors normally have prior information of what
- software exists and where it is located. "People have tried that
- before and gotten caught," say staff. Staff also indicate that, when
- they choose an audit option, they normally have a source of
- information to inform them of whether the target is answering in good
- faith or not. Although this presumably means an "inside source," SPA
- staff stopped short of saying that it necessarily meant that the
- informant was still employed for or involved with the target: "We
- always have access to information when we send out the audit letters,"
- according to Ms. Rosenthal. What happens if a target says "no!" to an
- audit letter? "We sue 'em," she said.
-
- The CEASE AND DESIST LETTER, the least intrusive of the options,
- conveys the threat of a suit if the recipient fails to comply, but
- generally the letter accomplishes the goal.
-
- Although the SPA has NEVER actually gone to court against an alleged
- software transgressor, to date they have initiated about 150 civil
- actions. All have been settled out of court, largely on the basis of
- the evidence. According to the SPA General Counsel, in only one case
- has the SPA been "wrong." The SPA's Background Information sheet
- (July, 1992), indicates that the Copyright Protection Fund's first law
- suit was filed in March, 1988, against "The Clone Store," a San
- Leandro, California, computer dealer. The case was settled for
- $10,000. In a larger settlement, the SPA won $350,000 (plus attorneys'
- feels) in a settlement against Parametrix, Inc., a Seattle-based
- environmental and engineering consulting firm in 1991. The
- information sheet also reveals that in 1991 the SPA won a settlement
- with the University of Oregon Continuation Center for $130,000, which
- included an agreement that the University organize and host a national
- conference in Portland, Oregon, on copyright law and software use.
- The University denied the allegations and, according to the University
- legal counsel, the settlement in no way implied an admission or
- concession of guilt.
-
- Why would a company chose to settle if they are innocent? According
- to one trial lawyer, it is often the most economically feasible.
- Trials are costly, and even winning a case can be more costly than a
- settlement. To lose can be even more costly. Hence, settling without
- an admission of guilt, as insurance and other companies have learned,
- can be the most rational strategy.
-
- When calculating the dollar amount of a settlement, SPA personnel look
- at a number of factors, including the amount of unlicensed software on
- a system. However, staff indicate that rarely will they include or
- respond to non-members' software that might be present, and focus
- instead on their memberships' programs. Nor do members share in
- settlement fees. All monetary awards are returned directly into the
- Copyright Protection Fund to pay for education, salaries, and
- other expenses. Ms. Borsecnik added:
-
- All of the money for our settlements goes back into the
- Copyright Protection Fund. The philosophy behind that is
- that that's how we produce the educational materials.
- Because, with the exception of one book that we charge for,
- all of our materials are either free or nominal cost because
- of postage. So our settlements help us continue our
- educational activities. The companies that pay membership
- dues don't pay for what we do on behalf of them in
- copyright. It's all self-funded. They pay us money, and we
- do a lot of other things. . . .education and publications, and
- just tons of stuff we do that have nothing to do with
- piracy. Those things are our primary mission. Piracy is
- something in addition we do for them. They don't pay us
- extra to do that.
-
- SPA personnel resist the accusation that they are more interested
- in litigating than in broader educational activities.
- According to the General Counsel:
-
- Our primary strategy is to get people to voluntarily comply
- with the software laws. And, we do that by a two-fold
- approach. The first is that we have an extremely effective
- and extremely good educational program. We give over a
- hundred lectures a year about the copyright laws and how to
- manage software, we give a lot of free material, we have the
- SPA audit kit, we have brochures that we give away for
- free--we've given away over 60,000 brochures that, in
- English, tell you what the copyright law is and what you
- have to do to comply, we have videos that talk to you about
- the software laws for about 12 minutes, we have educational
- videos that we give to schools for free.
-
- However, the SPA does feel that voluntary compliance requires
- a threat, as the General Counsel explains:
-
- ((As a criminologist)), you're certainly aware that people are
- unlikely to comply voluntarily if they think that there's no
- risk to complying. This is the perfect situation of where you
- really have to have some reasonable threat of enforcement or
- there's really no incentive for most people to comply.
-
- There is considerable debate among criminologists over the degree to
- which coercion is necessary to constrain behavior, and according to
- SPA data, software "piracy" steadily declined from 1989 to 1991. 1992
- data is not yet available. In 1989, they estimated that about 48
- percent of PC was pirated, declining to 37 percent in 1990, and 22
- percent in 1991. This trend seems to challenge the view that
- aggressive litigation has contributed to the decline, because the
- heaviest SPA litigation and corresponding publicity has occured in the
- past two years. Critics would suggest that education and emphasis on
- "computer ethics" has been far more successful in curtailing illicit
- use.
-
- THE SHRINK-WRAP LICENSE
-
- There is considerable disagreement between attorneys and others over
- the legal status of shrinkwrap licenses. The SPA adheres to the view
- that the shrinkwrap license is a legally binding agreement between an
- end-user and the software author. A SHRINK-WRAP license is so-named
- because most software programs come in a cellophane wrapping that
- seals it.
-
- The typical shrinkwrap licence, as typified by the package that
- Microsoft's DOS 5.0 came in, provides among other things that 1) The
- software is owned by the manufacturer, and the user is only licensing
- it; 2) The user may install the program on one and only on one disk;
- 3) Only one backup/archival and no others may be made; 4) The user may
- not decompile or disassemble the program; and 5) If the program is
- transfered or given to another, no copies may be retained by the
- original user.
-
- Despite the many criticisms of these licenses, the SPA argues that
- unsealing by breaking the cellophane is an explicit and unalterable
- agreement that the user will abide by whatever restrictions on use and
- copying are contained in the small print. Although nothing on point
- has been established in a court of law, the SPA defends shrinkwrap as
- a valid contract. Others, however, aren't so sure (see Lance Rose's
- commentary in CuD 5.06).
-
- SUMMARY
-
- Whether one supports or opposes the SPA's methods, several points seem
- clear:
-
- 1) The SPA is committed to serving its members, and does so
- aggressively.
-
- 2) When discussing the SPA, care should be taken to distinguish
- between its general activities and the Copyright Protection Fund.
-
- 3) The SPA's actions have been instrumental in raising the issues of
- software piracy to a level that demands public dialogue regarding
- whether and/or where an acceptable line should be drawn between
- "zero-tolerance" and permissable fair-use.
-
- 4) The issues raised by the SPA's aggressive anti-piracy campaign
- extend beyond a single organization or policy. They raise issues of
- reconciling competing interests--those of publishers and
- end-users--and of identifying appropriate social responses to alleged
- transgressions. The issues also include resolving the problem of
- applying familiar legal and ethical concepts and theories to changes
- brought by revolutionary technology.
-
- The SPA certainly deserves credit for raising the issues
- of software abuse. However, some of its methods continue to be subject
- to severe criticism. In the interstices between "zero-tolerance" and
- fair-use lies considerable room for honest intellectual disagreement.
- It is not sufficient for those of us who are critical of some of the
- SPA's methods to simply sit back and take shots at their method. If we
- don't like the methods, we are certainly bound to criticize them, but
- we are also obligated to develop constructive alternatives to balance
- the rights of both users and publishers. Among the questions we pose
- to readers:
-
- 1) What, if any, are the acceptable limits of software copying and
- distribution beyond those authorized by shrinkwrap licenses?
-
- 2) What legal sanctions ought be provided for the wide range of
- possible infractions that recognize extreme abuse on one hand and
- casual ethical lapses on the other?
-
- 3) How might current or future laws be revised or written that would
- minimize potential prosecutorial abuse on one hand, but provide
- sufficient sanctions for appropriate transgressions on the other?
-
- 4) When does "fair-use" become ripoff?
-
- These and other issues will be explored in future issues.
-
- ((CONCLUDING NOTE: We invited the SPA to read this issue prior to
- publication. We delayed it by over a week to provide them the
- opportunity. We indicated that we would be amenable to correcting any
- errors, and would be willing to revise whatever they found inaccurate
- or unfair. I was given an email address, and it was confirmed as
- correct. Several notes and two of the three files were sent. The third
- was to be sent when I received confirmation of receipt. I received no
- response. I left a message on the appropriate SPA staffer's answering
- machine indicating that the files had been sent and reaffirmed
- encouragement to read the files and provide feedback. I received no
- answer as of Feb 7.
-
- We encourage the SPA to engage in a dialogue over the issues to be
- addressed in this and coming issues. If they are as serious about
- public outreach and education as they repeatedly emphasized, we hope
- they welcome the opportunity to engage in a dialogue with CuD
- readers)).
-
- ------------------------------
-
- Date: 01 Feb 93 22:51:51 CST
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
- Subject: File 3--How does the SPA Calculate Piracy?
-
- The Software Protection Association (SPA) estimates that software
- piracy has declined between 1989-91. But, says the SPA, piracy still
- cost the industry over $1.2 billion in lost revenues in 1991. Critics
- argue that the piracy rate and its costs are grossly over-estimated.
- The SPA believes that its estimates, while perhaps imperfect,
- nonetheless are quite conservative and, if anything, significantly
- underestimate the extent of software piracy. Who's right? How does
- the SPA arrive at its estimates? The information below comes from SPA
- documents and from SPA David Tremblay, SPA's Research Director.
-
- Identifying and counting behaviors that are normally hidden presents
- several methodological problems. Calculating the extent of piracy is
- no exception. First, there is no victim in the traditional sense.
- There are no snatched purses, dead bodies, empty bank accounts,
- trashed computers, or other directly obvious signs of predation.
- Therefore, we rarely have direct knowledge of an alleged "offense."
- Second, the concepts used to define or measure an "offense" can pose
- particular problems, because definitions are subject to imprecision.
- Third, "victims" of piracy are often unaware that they are victims
- until informed by someone who measures victimization, such as the SPA.
-
- The "DARK FIGURE OF CRIME" is the knowledge-gap between crimes KNOWN
- to have occured and crimes that ACTUALLY occured. No existing
- methodolgy can precisely measure this dark figure, and even the most
- sophisticated provide only approximations. It's therefore not
- surprising that the SPA's attempts to measure the "dark figure of
- piracy" face methodological problems.
-
- The Methodology
-
- Four sets of facts and an assumption underlie the SPA's methodology.
- One set of facts is hardware sales from Dataquest, a marketing
- research company in San Jose, Calif. The calculations begin by
- determining the number of Intel- and MacIntosh-based PCs sold during a
- given year.
-
- The second set of data derives from an SPA reporting program in which
- about 150 of the generally larger companies report their unit sales
- and revenue to the SPA. The business applications sales are taken
- from the report and used to estimate the the total unit sales of
- software in the U.S. in a given year. Operating systems are excluded.
- The data do not constitute a random sample, but are based on voluntary
- self-reporting of the participating companies. This method is common
- in survey research and, if used with caution, the lack of randomness
- or representativeness of the population surveyed need not be a
- problem.
-
- The third set of facts is the average number of applications that
- users are estimated to have on their personal computers. This body of
- data comes from member research that is sent back to the SPA. The
- members obtain this information from several sources, including
- surveys of their own customer base and from returned registration
- cards. The SPA estimates that the typical DOS (or Intel-based) PC user
- has three applications, and the typical MacIntosh user has five. One
- reason that Mac users may have more than Intel-based users is the ease
- of use and the cross-learning between different Mac programs that
- reduces the learning curve and better-integrates the Mac programs with
- each other.
-
- The fourth datum is the average price for a software program in a
- given year. However, in calculating the total dollar volume of
- revenues lost to piracy, David Tremblay indicates that "street value"
- prices are factored in, rather than assuming that each program would
- sell for market list price.
-
- Finally, the methodology is based on the ASSUMPTION that all of the
- units of software that are purchased in a calendar year are purchased
- by or for use on PCS that are new that year. It assumes no application
- sales to computers purchased in previous years.
-
- These data are then plugged into a formula (figures are illustrative):
-
- 1. The PC hardware sales (in number of units) are multiplied by the
- number of applications used. If there are 1 million Intel-based units
- sold, and each has 3 commercial software applications (excluding the
- operating system itself), we get a figure of 3 million.
-
- 2. The number of applications used is subtracted from the number of
- applications purchased during that year. If 2.4 million applications
- are sold, the difference is 600,000. This is assumed to be the number
- of applications pirated.
-
- 3. The number of applications pirated is then multiplied by the
- average cost of a software package, which has declined from $189 in
- 1989 to $152 in 1991.
-
- David Tremblay candidly recognizes the methodological problems,
- although he feels that, on balance, the problems understate rather
- than overstate the level of piracy. He recognizes several market
- problems that could affect the estimates (the skewing directions are
- my own):
-
- 1) Since 1989, the average price per software application has
- decreased. This skews DOWNWARD the proportion of dollar losses from
- year to year.
-
- 2) Hardware sales have been revised downward by Dataquest, which
- reduces the base number of PCs on which piracy estimates are based.
- This skews the piracy estimate UPWARD.
-
- 3) Contrary to the assumption of "no application sales to installed
- base," there is evidence that an increasing percentage of software is
- being sold for use on existing PCs. This skews the piracy estimate
- UPWARD.
-
- There are additional problems. Among them:
-
- 1) The total software sales include sales of upgrades. This would
- seem to under-estimate the extent of illicit software, because it
- over-estimates the base-figure of software sold. For example, if 100
- PCS are sold in a given year, and if each PC has an average of three
- applications, we would expect 300 applications to be sold. If,
- however, we find that only 270 applications are sold, the "piracy
- score" would be 300-270= 30; 30/300 = .1, or ten percent. If upgrades
- are included, and if 20 percent of sales are upgrades, that means
- 300-216 = 84; 84/300 = .28, or a 28 percent piracy rate. Including
- upgrades skews the piracy estimate DOWNWARD but the costs of piracy
- UPWARD.
-
- This, however, is misleading, because the base number of applications
- is taken for *all* PCs, not just the PCs purchased in the first year.
- There is no evidence to suggest that the number of applications on a
- PC declines overtime. The evidence, as the SPA acknowledges, is the
- opposite. Hence, the base-figure of total applications (3) does not
- give an accurate expectation of the expected number of software sales,
- which would dramatically inflate the base of software sales. Consider
- this example: Person A purchases a computer and three software
- programs in 1989. Person A purchases two more programs in 1990, and
- one in 1991. Person B purchases a computer in 1991 and three
- applications in 1991. Assuming that they are the only ones who
- purchased software or hardware in 1991, the average number of
- installed applications on a PC is 4.5. The number of software sales in
- 1991 is 4. An awkward percentage aside, The piracy score is .5 (half a
- program, or 12.5 percent piracy rate). In reality, all applications
- can be matched to sales, but the method's assumptions inflate the
- score. It's currently difficult to assess how severely inclusion of
- installed applications on previously purchased computers exaggerates
- the piracy figure. But, if the SPA's current piracy estimate of 20
- percent is correct, even a small influence would produce a dramatic
- inflation of the estimate. The SPA's method of including all
- installed applications in its base data, while restricting comparison
- to only applications purchased in the most recent year, is to my mind
- a fatal flaw.
-
- In short, the applications on a PC include not only applications
- purchased the first year, but also include all those collected in
- subsequent years. Further, even if upgrades are included (which would
- push the piracy score DOWNWARD), the price of upgrades at street
- prices is generally a fraction of cost for a program's first-purchase,
- and failing to take this into account skews loss of revenue UPWARD.
-
- 2) A second problem involves the reliability (consistency) and validity
- (accuracy) of reporting methods of company-generated data, especially
- registration card data. It cannot be assumed that the methodological
- procedures of different reporting companies are either consistent
- among themselves (which means they may not be reporting the same
- things) or that their procedures are uniformly accurate. Differing
- definitions of concepts, variations in means of tracking and recording
- data, or differences in representative are but a few of the problems
- affecting reliability and validity. This could skew estimates EITHER
- upward or downward.
-
- 3) The value of lost revenue also is dramatically inflated by other
- questionable assumptions. For two reasons, it cannot be assumed that
- every unpurchased program represents a lost sale. First, there is no
- evidence to support, and much evidence to challenge, the assumption
- that if I did not possess a copy of dBase or Aldus Pagemaker
- "borrowed" from my employer that I would purchase it. The ethics of
- such borrowing aside, such an act simply does not represent nearly
- $1,000 of lost revenue. Second, as an actual example, I (and many
- others at my university) have dBase and Word Perfect (and many other
- programs) licitly installed on a home or office PC. These two programs
- alone have a street value of about $700. I would include them as
- "installed" programs in a survey. However, I did not purchase either
- program. Hence, they would not show up in sales statistics, and would
- therefore be attributed to "piracy." But, I did not obtain them
- illicitly. They were obtained under a site license and are installed
- licitly. Consider another example. When I purchased a PC in 1988, it
- came (legitimately) loaded with two programs. I bought two more. Now,
- I have four legitimate programs loaded, but only two would show up in
- normal sales figures. It would seem, from the statistics, that I had
- two "pirated" programs--two purchased, two unpurchased, even though
- there were none. BOTH the piracy score and the lost revenue estimate
- are skewed UPWARD.
-
- Although the subject of a separate article, the SPA's method also
- fails to consider the possibility that casual copying and sharing may
- enhance rather than reduce sales by creating a "software culture" and
- increasing the visibility and end-user facility with the products. If
- sales are increased, it would skew the lost revenues UPWARD. Whatever
- the result, this is an assumption that cannot be discarded without
- strong empirical evidence.
-
- These are just a few of the problems that inflate the overall picture
- of piracy and why I cannot accept the figure given by the SPA as
- accurate. And, if the piracy rate for 1991 is only about 20 percent
- (and in decline), it would appear that--even if the problem is only
- mildly inflated--the losses are far, far less (and the problem
- therefore not as severe) as anti-piracy advocates claim. Yet, despite
- dramatic evidence of decline on a variety of key indicators, SPA
- rhetoric, its advocacy for broader and more punitive legislation, and
- its lucrative aggressive litigation campaigns continue to escalate.
-
- A caveat: David Tremblay, the SPA Research Directory, makes no claims
- about total accuracy. He is also aware of and quick to point out some
- of the methodological problems. He would not agree with my view of at
- least some of the problems, and perhaps has antidotes for others. In
- my own discussions with him, he was careful not to speak beyond the
- data, and--like any good methodologist--approached the task of
- calculating piracy as a puzzle. His own attitude, if I understood him
- correctly, was that he's more than willing to modify the method with a
- better procedure if one can be pointed out. Perhaps I misunderstood
- him, but I was continually left with the impression that his goal was
- not to "prove" a preferred outcome, but to refine the data and method
- to provide as accurate an estimate possible, whatever answer it might
- provide. In short, he has no preconceived ideological ax to grind in
- coming up with his figures.
-
- It should be noted that if a different methodology were used, it is
- quite possible that both the extent of piracy and the lost revenue
- costs *could* be much higher than the SPA's estimates. However, at
- stake is *this* methodology. Contrary to SPA claims, *this*
- methodology appears to INFLATE the frequency and costs.
-
- This, however, does not alter the fact that SPA press releases and
- other material appear to manipulate the data to promote a distorted
- image of piracy. We can agree that there are those who unethically
- (and illegally) profit from piracy, and we can agree that if one uses
- a commercial software program regularly, payment should be made. This
- does not mean that we must also accept the dramatic image of rampant
- piracy and multi-billion dollar revenue loss by casual "chippers."
- Software piracy is, according to SPA data, in dramatic decline.
- Evidence suggests that this decline is the result of education and
- awareness, rather than coercive litigation. At stake is not whether
- we accept ripoff, but rather what we do about it. The statistical
- method and its results do not seem sufficient to warrant increased
- demands for tougher piracy laws or for expanding the law enforcement
- attention to address what seems to be a declining problem.
-
- If I am correct in judging that the SPA's estimate of piracy is
- significantly inflated, then it seems that they are engaging in
- hyperbole to justify its highly publicized litigation campaign. Some
- might find this a good thing. My own concern, however, is that the
- litigation campaign is a revenue-generating enterprise that--to use
- the SPA's own promotional literature--resembles a law unto itself,
- more akin to a bounty hunter than a public-interest group. The SPA
- appears to have an image problem, and the root of the image problem
- lies in some critics see as speaking beyond the data in describing
- piracy and in using the law to fill its coffers. It is unfortunate
- that the many valuable things the SPA does are overshadowed by its
- self-laudatory high-profile image as a private law enforcement agency.
-
- The methodology underlies an ideological opposition not just to
- intellectual property, but to human interaction and socal norms. In
- promoting a zero-tolerance attitude toward a strict definition of
- "piracy" and rigid adherence to the limitations of shrinkwrap
- licenses, the SPA would isolate the causal swapper and criminalize
- along with major predators non-predators as well. As Richard Stallman,
- a promoter of freeware, argues in the first issue of _Wired_ Magazine
- (p. 34), violation of shrinkwrap is called piracy, but he views
- sharing as being a "good neighbor:"
-
- I don't think tht people should ever make promises not to
- share with their neighbor.
-
- It's that gray area between being a good neighbor and crossing over
- into unacceptable behavior that, to my mind, poses the dilemma over
- which there is room for considerable honest intellectual disagreement.
-
- ------------------------------
-
- End of Computer Underground Digest #5.11
- ************************************
-
-