Indiana man gets 27 months in prison for selling counterfeit software on eBay
Software worth $700,000 was sold for $4,000 in more than 30 auctions
Computerworld - An Indiana man was sentenced yesterday to 27 months in prison for selling more than $700,000 worth of counterfeit software on eBay, according to the U.S. Department of Justice.
Courtney Smith of Anderson, Ind., was sentenced by the Southern District Court of Indiana for violating criminal copyright infringement laws by selling the counterfeit software over the Internet. Smith admitted in court that he bought counterfeit Rockwell Automation Inc. software through eBay, duplicated it and resold the software to other eBay users. Rockwell specializes in factory management software.
Between March and May 2004, Smith sold counterfeit copies of the software in 32 or more separate eBay auctions for more than $4,000, according to the district court. The retail value of the software was $700,000.
"Mr. Smith exploited eBay to sell hundreds of thousands of dollars' worth of counterfeit software at drastically reduced prices, thereby illegally profiting on the back of the copyright holder," Alice Fisher, assistant attorney general at the Justice Department, said in a statement.
The case stems from a DOJ effort to combat online auction piracy. In December 2004, FBI agents executed a search warrant at Smith's home, where they seized several computers, CDs and other devices used to manufacture and counterfeit software, the DOJ said.
Smith has forfeited the computers and other equipment used in the crime and will pay Rockwell restitution of $5,200. The judge also ordered Smith to pay a $2,000 fine and serve two years supervised release after being released from prison.
Read more about Legal in Computerworld's Legal Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts