PRESS RELEASE: ISLAM – HOW IS SOFTWARE TIED TO GREATER SIN 26?

FOR IMMEDIATE RELEASE:

SoftwareWithoutSin announces its vision in building out Computer and Software Operating-Compliance models for Shariah and other regulatory framework requirements.

TAGS: #ISLAMICFINANCE, #GREATERSIN26, #SOFTWAREFRAUD, #ShariaCompliance

Sunni or Shia – its all the same. SOFTWARE IS THE ‘next-gen’ FIELD-HAND WHO GUIDES THE NEW WORKHORSE – YOUR COMPUTER, IN PRODUCING THE WORK YOU DIRECT IT TO DO FOR YOU. As such where you get the software from, and where the Vendor’s obtained those software methods they are selling you the services of also becomes critical.

islam-religion-19168379

Software is the field hand. That is a very important analogy because a Computer is functionally today a mechanical slave or bonded worker. You must feed it electricity and give it software to run. But your Computer is a slave, make no mistake. You will turn it off in an instant if it annoys you.

So then, managing your slave is your field-hand, that being your software packages. You as the Plantation Owner/Operator interface with the Field Hand directly for the most part.

LET ME ASK – WHAT PART OF THIS ISNT CLEAR THEN? IF SOFTWARE IS SOMETHING YOU USE FOR DIRECTING THE WORK OF YOUR SLAVE – THE COMPUTER, UNDER ISLAMIC LAW, THIS IS ALREADY VERY TRANSPARENT.

Greater Sin 26 does apply to software which contains property which the vendors didn’t pay for, or obtained which was previously tainted by some other action.

The Shia rules for instance for Greater Sin 26 penalty for not making amends for the unethical and unpermitted uses of another property is a variant of the Greater Sin 23 penalty, it is 500 years in hell in the Afterlife. There are similar ones for Sunni faithful as well. In all instances using software with stolen IP inside it is Haraam.

Imagine what this means in voting for instance?


Say this voting system has IP inside it that the US Government decided to cover-up certain frauds which happened legitimately. For the US Government who operates under Christian Law this isnt a problem They and any staff they have working on the systems containing stolen software they grant Judicial Immunity and ignore the Christian ethical issues therein.

But for those outside the Christian faith this has much farther reaching implications. They cannot just wash their hands and drop to one knee begging forgiveness for being a party to the Government’s frauds herein. Their faith is beyond those lies and while this may seem nonsensical to Christians who don’t really care about those matters, those of Islamic Faith are bound fully to those frauds. The Christian Government’s setting those frauds aside creates a hurdle for the Muslim individuals working or living in areas where those governments set those criminal frauds aside but never corrected the underlying crime or sought justice for the victims in any form.

Under Islamic Law, Sunni or Shia,  the person committing the ultimate crime here, the party using that software is liable for those damages as well as the Government who created the mess in the first place. Again under Christian operating models this is easily hidden but under Islamic and Judaic Law both, this is unacceptable.

In Islam, the rules of ethical transparency under Sharia and as administered through these Greater Sins are very important. As such in Islamic culture and for Muslim’s everywhere this is an important aspect of Islamic Faith and they cannot associate themselves with these stolen devices or practices using those stolen properties without cleansing themselves through the Greater Sin 26 “Making Amends” process.

It is for that reason we created SoftwareWithoutSin.COM.

#SoftwareFraud #MoneyLaundering #AML #GreaterSin26 #IslamicCommmerce #IslamicComputing #ShariaCompliance #FinancialTransparency

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s