목차
2장은 OS이구
3장은 CD및 프로그램 복제법등등
3장은 CD및 프로그램 복제법등등
본문내용
the world, the country where the illegal copy is the most serious is China (91% in 97% in 94, in 99) and Vietnam (98% in 100% in 94, in 99) in the Asian area. It becomes low from 75% in 94 in the case of Korea with 50% in 99 to the lasting target.
Recently It is the computer program protection law violation law offender control present state of the prosecutors in 8 years (The prosecutors government statistic data).
1993
1994
1995
1996
1997
1998
1999
2000
restriction
66
14
28
13
59
72
78
19
The non- restriction
563
294
233
296
1,046
711
2,979
810
SUM total
629
308
261
309
1,105
783
3,057
829
* The illegality The checkpoint 7 step to have supported software control
Grasp the regular product right or wrong of the software to be possesing at present and u a countermeasure.
Step It examines all the software which was installed in the computer of 1 man (the company).
- It makes create all the software lists which were installed in the computer respectively by the staff.
The name of an article which is made from ( / The company name / The version number / Peculiar number )
- The software list to be possesing at present comes out to [the Control Panel-the program addition/the deletion].
It refers to the program list.
Step It makes prohibit software use except the regular product software to have provided 2 staff in the company and it receives a punishment in illegal copy software use and it is |m"SASERU" (The necessary time written oath sticking).
Step It checks whether or not it is illegal copy software, being 3 regularly product software.
- It secures ' deed ' under the place where you can prove that the software to be possesing is a regular product.
The disk and CD of all the regular product software which was used for the software establishment
The contract (the license contract, etc.) or the use assent deed of the copyright person in purchase
It is a guide book and a reference document in the original declension (the breeding, the setting sun).
Computer +s section software purchase +s when software is already established, etc.
* I think as all software which cannot prove that it is a regular product by the illegal software.
Step It deletes all 4 illegality copy software with the corresponding computer.
- It deletes all illegally duplicated software with the corresponding computer.
- Of [the Control Panel > program addition/the deletion] [Search receptacle > program file] It is and it deletes all corresponding software.
- It deletes all until register plum record as far as it is possible (To be in this way, it does a format and it is possible).
Step It is necessary to buy newly in 5 and the addition purchase creates a necessary software list.
Step It does a purchase question to the software specialty circulation industry Inc. in the estimate request which faced 6 necessity S/W, etc.
Step It makes a 7 software management general (the leader) and it implements the regular software check (of the moon or once of branch (aroused, the minute period)).
Recently It is the computer program protection law violation law offender control present state of the prosecutors in 8 years (The prosecutors government statistic data).
1993
1994
1995
1996
1997
1998
1999
2000
restriction
66
14
28
13
59
72
78
19
The non- restriction
563
294
233
296
1,046
711
2,979
810
SUM total
629
308
261
309
1,105
783
3,057
829
* The illegality The checkpoint 7 step to have supported software control
Grasp the regular product right or wrong of the software to be possesing at present and u a countermeasure.
Step It examines all the software which was installed in the computer of 1 man (the company).
- It makes create all the software lists which were installed in the computer respectively by the staff.
The name of an article which is made from ( / The company name / The version number / Peculiar number )
- The software list to be possesing at present comes out to [the Control Panel-the program addition/the deletion].
It refers to the program list.
Step It makes prohibit software use except the regular product software to have provided 2 staff in the company and it receives a punishment in illegal copy software use and it is |m"SASERU" (The necessary time written oath sticking).
Step It checks whether or not it is illegal copy software, being 3 regularly product software.
- It secures ' deed ' under the place where you can prove that the software to be possesing is a regular product.
The disk and CD of all the regular product software which was used for the software establishment
The contract (the license contract, etc.) or the use assent deed of the copyright person in purchase
It is a guide book and a reference document in the original declension (the breeding, the setting sun).
Computer +s section software purchase +s when software is already established, etc.
* I think as all software which cannot prove that it is a regular product by the illegal software.
Step It deletes all 4 illegality copy software with the corresponding computer.
- It deletes all illegally duplicated software with the corresponding computer.
- Of [the Control Panel > program addition/the deletion] [Search receptacle > program file] It is and it deletes all corresponding software.
- It deletes all until register plum record as far as it is possible (To be in this way, it does a format and it is possible).
Step It is necessary to buy newly in 5 and the addition purchase creates a necessary software list.
Step It does a purchase question to the software specialty circulation industry Inc. in the estimate request which faced 6 necessity S/W, etc.
Step It makes a 7 software management general (the leader) and it implements the regular software check (of the moon or once of branch (aroused, the minute period)).