Know and understand the methods that software producers employ to prevent software copyright legislation being broken, and appreciate how the audience influences the design and delivery of ICT solutions.
In ICT, the audience is the group of people who will use or be affected by a solution. Identifying audience needs helps shape the functionality, usability, and legal compliance of software.
Example: most commercial office suites require users to accept an EULA before the software can be installed.
Example: a 2023 UK High Court ruling (*Microsoft Corp v. FS Software Ltd*) upheld an injunction against a company distributing cracked versions of Windows, confirming that circumvention of DRM is illegal under the Copyright, Designs and Patents Act 1988.
Example: Microsoft Office 365 requires activation after installation.
Respecting copyright is not only a legal requirement; it protects users from the hidden risks of pirated software, such as malware, data breaches, and unreliable performance. By using legitimate software, audiences help sustain a trustworthy digital ecosystem and preserve the rights of developers.
| Method | How it works | Advantages | Disadvantages |
|---|---|---|---|
| EULA | Legal contract displayed at installation; user must accept before proceeding. | Clearly defines user obligations; easy to enforce in court. | Relies on users reading and understanding the text; can be ignored. |
| Copyright notice | Visible statement of ownership placed on software screens, manuals or web pages. | Simple, low‑cost reminder of legal ownership. | Does not prevent copying; only serves as evidence of claim. |
| Enforcement actions | Legal proceedings, cease‑and‑desist letters, or court orders against infringers. | Strong deterrent when publicised; can remove illegal copies. | Time‑consuming and costly; may not stop widespread piracy. |
| DRM | Encryption plus licence‑server verification controls who can decrypt and run the software. | Robust technical barrier; can limit unauthorised distribution. | May inconvenience legitimate users; can be cracked over time. |
| Product activation | Unique key is checked online; full functionality is unlocked only after successful validation. | Prevents mass distribution of unauthorised copies. | Requires internet access; activation servers can experience downtime. |
| Serial numbers / licence keys | Alphanumeric code entered during installation; often verified against a local database. | Simple to implement; familiar to users. | Easily shared or generated by key‑gens if not combined with online checks. |
| Hardware dongle | Physical device must be present for the software to run; the programme checks for the dongle at start‑up. | Very difficult to duplicate; ties licence to a specific machine. | Additional hardware cost; can be lost or damaged. |
| Obfuscation | Code is transformed (renamed, reordered, encrypted) to hide logic and structure. | Raises the skill level required to reverse‑engineer the software. | Does not stop copying; only slows down attackers. |
| Watermarking | Unique, hidden identifiers are embedded in the executable or output files. | Helps trace the source of illegal copies. | Can be removed by skilled crackers; adds processing overhead. |

Task: In groups of 3‑4, choose a common school software (e.g., a graphics editor, a learning management system, or a spreadsheet). Produce a short poster that includes:
Present your poster to the class and discuss how the chosen protection methods balance security with user convenience.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.