A system and method for detecting and locating improper or illicit use of
digitized information such as illegal pirating, copying, alteration, and
the like. The digitized information may include software, digital music,
digital movies, multi-media or the like that may be placed on a user's
computer and possibly copied to other computers. The system or method
preferably operates in the background so as to be unnoticeable to the
user and preferably does not interfere with operation of the digitized
information even if determined that copying or alteration has occurred.
Thus, there is little motivation to remove the routine that effects
transmission over the Internet to a server of information such as a
program identification indicia, a computer identification indicia,
program alteration identification. The computer routine may be installed
on the user's computer by many methods and acts to determine and store
the information until such time as an Internet connection is made
whereupon the information is transmitted to a server for storage. If
information received by the server indicates the same program
identification on numerous computers then a signal may be provided or
produced that would cause further investigation. The system and method
may also provide a routine to detect if alterations have been made to the
digitized information to be protected.