You can stay protected from potential bugs, system crashes, and viruses that may be embedded within pirated software by understanding how such software gets into the market and onto computers.
It's easy to be an unknowing victim of end-user piracy. A common example of end-user abuse occurs when company employees make copies of software or share an installation CD without buying new licenses. Without the right license, you are ineligible for support, training, or upgrades.
Here are some examples of how end-user piracy happens:
Make sure your company knows the risks of inadvertently making unlicensed copies of software.
Software asset management
By implementing software asset management systems and protocols, you can help protect your business from many kinds of piracy. Read more about the benefits of software asset management and tips for getting started.
Pirates offer illegal software for download over the Internet in a number of ways. The only safe way to purchase Adobe® Genuine Software for download, however, is through the Adobe Store.
Different ruses used by pirate websites include:
Don't take any of these risks. Software obtained through these channels has a good chance of being faulty, impossible to register (which could make it unusable), and infected with spyware or viruses. A low price that is too good to be true is a sure sign that it is not Adobe Genuine Software.
When computer vendors load illegal copies of software onto the hard disk to make the purchase more attractive, it is known as hard-disk loading. Value-added resellers (VARs) need to avoid loading illegal software when developing and implementing enterprise solutions in the workplace.
When your computers don't have Adobe Genuine Software installed, they are not eligible for support, training, or upgrades — meaning you might need to buy new software at some point in the future when it's not budgeted.
If you suspect your computer was loaded with illegal software, report it and Adobe may be able to help you obtain a refund.
Counterfeiters illegally duplicate and sell copyrighted materials to unsuspecting customers who believe they're purchasing genuine software. It's difficult to identify counterfeit software because it often comes with sophisticated packaging, manuals, and even registration cards. Customers often first learn they've bought counterfeit software when they attempt to register it and can't, which may make it work improperly or not at all.
If you discover you've inadvertently bought an Adobe product that's suspicious, contact Adobe. Provide seller information and clear digital images of the packaging labels, media, and serial numbers. We'll help determine if the product is counterfeit and consider options for getting you a refund.
Generally, font software is copyrightable. The font software licensing agreement, also known as the End-User License Agreement (EULA), is a legally binding contract. If you make an unauthorized copy of font software, you lay yourself and your organization open to severe penalties and criminal proceedings. Even though you can distribute a document that requires a given font to other people, you can't give them a copy of the font you used unless they already have a license to use that font. Read the FAQ ›
The principal trade association for the software industry settled a suit in Germany against a vendor that imported software to sell it in another market without the trademark owner's permission.
Read the international IT industry group's study on the scale and negative impact of online software piracy and how to avoid pitfalls.