unauthorized reproduction

See: fake
References in periodicals archive ?
Investors should be aware that any unauthorized reproduction of this conference call may not be an accurate reflection of its contents.
Counterfeit item: an unlawful or unauthorized reproduction, substitution or alteration that has been knowingly mismarked, misidentified or otherwise misrepresented to be an authentic, unmodified item from the original manufacturer or a source with the express written authority of the original manufacturer or design activity, including an authorized aftermarket manufacturer.
Unauthorized reproduction of this newsletter or its contents by xerography, facsimile, or any other means is illegal.
It appears on screen after the previews and before the start of the movie, and states in no uncertain terms that the unauthorized reproduction or distribution of the copyrighted work is illegal--and punishable by both fines and jail time.
Furthermore, the unauthorized use of a photograph downloaded from the Internet, even from a free site, infringes the copyright in the photograph regardless of the intent of the user, and a company is liable for such unauthorized reproduction by its employees, contractors or web designers.
In an earlier technology of audio tape cassettes, the unauthorized reproduction of music was made illegal to protect the lawful copyrights of those who originally produced the music.
The anti-piracy seal warns that the unauthorized reproduction or distribution of copyrighted work is illegal and punishable by up to five years in prison and $250,000 in fines.
The author defines film piracy "as the unauthorized reproduction or use of motion pictures.
Unauthorized reproduction or retransmission of EIN newsletters is forbidden under Federal Copyright Law.
A flash security feature prevents unauthorized reproduction of proprietary code.
It prevents unauthorized reproduction, public performance, recording, broadcasting, translation, or adaptation and allows the collection of royalties for authorized use.
Computer scientists have discovered connections between the problem of guessing secrets and various topics in computer science, such as separating systems into smaller units, diagnosing technical problems, protecting data from unauthorized reproduction, and authenticating ownership claims.