English citations of steal

Temporary use of tangibles

edit
  • 2004 February 9, Michael Brick, “DOG SHOW; Before Big Show, Dog Lovers Frolic and Prepare”, in New York Times:
    The dogs hopped around her, stealing her seat when she rose to go downstairs to her office

Time

edit
  • 2005 March, John H Richardson, “Who the Hell Is Ronnie EARLE”, in Esquire, volume 143, number 3, page 157:
    he dreamed a lot and read a lot and sometimes even hid in the doghouse so he could steal time from his chores and lose himself in Greek mythology

Intellectual property

edit
  • 1999 November, Beth Py-Lieberman, “The Colors of Childhood”, in Smithsonian, volume 30, number 8, page 32:
    Binney &; Smith is owned today by Hallmark Cards. And that company closely guards the Crayola trademark. (Ms. Crayola Walker of Bellow Falls, Vermont, and Ms. Crayola Collins of Pulaski County, Virginia, however, were graciously allowed to "borrow" the name.) Many companies, particularly foreign ones, would like to capitalize on the Crayola fame, and copycatters try to steal all the time.
  • 1999 June 25, Ira Flatow, “MEDICAL RECORDS PRIVACY AND DECIDING WHO HAS THE RIGHT TO VIEW PATIENT RECORDS”, in NPR_Science:
    Is there no penalty? If I'm in a doctor's office and I happen to see or a hospital and I happen to see a patient's record and it's got some juicy information that I know that I can make some money on or just pass it on to someone else, is there no penalty for me stealing that intellectual property?
  • 2003 February 13, Edward Iwata, “More U.S. trade secrets walk out door with foreign spies”, in USA Today:
    Three businessmen and three small Texas firms that pleaded guilty to stealing trade secrets from a Caterpillar subsidiary were ordered to pay Caterpillar $ 23 million.
  • 2011, “PBS NewsHour For July 14, 2011”, in PBS_NewsHour:
    Most of what we see today is exploitation -- that's theft, stealing secrets, either commercial or military

Non-Property

edit
  • 1995 October 22, A. M. ROSENTHAL, “THE U.N. AT 50: THE HISTORY;The Early Days: Threadbare Furniture, Wonton Soup and the I.R.T.”, in New York Times:
    Terrorism has stolen the life from many diplomats and the freedom of movement, contact and mind from the others
  • 1998 Fall, David B. McCurdy, “Creating an ethical organization.”, in Generations, volume 22, number 3, page 26:
    She begins to visit Mrs. Z on her days off and occasionally on weekends. The daughter complains to the agency: "She's trying to steal my mother's affections. She's after her money. [] "
  • 2000 September 16, Alex Todorovic, “Quiet Idealist Threatens to Topple Milosevic; Yugoslav professor holds big lead in polls”, in San Francisco Chronicle, page A1:
    "Milosevic might be able to get away with stealing 200,000 votes, but not half a million to a million," said Dragan Hiber, an election expert for the opposition
  • 2007 February 13, Leslie Cauley, “Consumers finally get a grip on VoIP; Internet calling tough concept to grasp, but its time may have come”, in USA Today, page 1B:
    If cable operators continue to use VoIP to steal phone customers, AT &T; and Verizon may have to fight fire with fire and start marketing VoIP like crazy.
  • 2011 March/April, Liaquat Ahamed, “Currency Wars, Then and Now.”, in Foreign Affairs, volume 90, number 2, page 92:
    There would have been an outcry from countries accusing Beijing of acting irresponsibly by trying to steal jobs at a time when employment everywhere was in free fall.
  • 2011, “PBS NewsHour For July 14, 2011”, in PBS_NewsHour:
    Most of what we see today is exploitation -- that's theft, stealing secrets, either commercial or military
edit
  • 1983 September, PC Magazine[1], volume 2, number 4, page 455:
    They do tell you, however, about going to jail if you steal the program and about how you are going to be out of luck in the case of a bad copy.
  • 1988, Electronic Musician[2], volume 4, numbers 1-6, page 109:
    Many software developers spend years creating a program to help you create better music — just because you don't personally know the programmers isn't any reason to steal the program by copying it.
  • 2000 June 7, “Analysis: Debate over new software that lets people trade and download music over the Internet for free”, in NPR_TalkNation:
    Do the young people who are at the leading edge of this movement think that it's not stealing to take someone's intellectual property? KARR: Some of them do think that it's not stealing. Some of them know that it's probably of dubious morality, if not dubious legality.
  • 2004, Kindred Spirits[3], page 207:
    Would somebody bent on stealing software programs go so far as to send an encrypted message? Why not just steal the program itself?
  • 2009 February 25, Daniel B. Wood, “Can a ^Day of Sharing^ save the music industry?”, in Christian Science Monitor, page 12:
    "Students just don't see file sharing as stealing," says Michal Strahelevitz, a professor of marketing at Golden Gate University in San Francisco. # Students make a distinction between common thievery and file-swapping, she says. "They are not walking into a store and taking something physical out without paying for it," she says. "So it doesn't feel like a crime to them." # Which, of course, is the point of "The Day of Sharing" - to argue that free file-sharing is stealing.

Failure to repay

edit
  • 2007 March 27, State Sen. Ron May, “THE OPEN FORUM - Letters to the editor”, in Denver Post, page B-06:
    Those funds represent the fines and fees that are used to pay for the many different programs and services for which that revenue is collected in the first place. In other words, they are supposed to be self-funded. Some of these funds also pertain to a specific industry and are sustained through fees assessed on businesses in that industry. Those who pay into those funds should have a reasonable expectation their money will not be siphoned off to underwrite the overall growth of government. # I believe if you borrow something and fail to give it back, you are stealing. It is disappointing that so many of my colleagues do not seem to understand that.

A copy

edit
  • 1992, Norman S. Goldenberg, Remedies: Adaptable to Courses Utilizing York, Bauman and [] , page 92:
    LYCSC (D) paid someone to steal a copy of a computer system developed by University Computing Co. (P), and the latter sued for misappropriation of a trade secret.
  • 1993, Roger C. Parker, David A. Holzgang, Wordperfect 6 Secrets[4], page 106:
    Just as you wouldn't steal a copy of an application program, so you shouldn't steal a copy of a font program.
  • 2002, Michael D Duffy, Getting Started with OpenVMS: A Guide for New Users[5], page 145:
    Note that this implies that an attacker already has access to at least one account in order to steal a copy of the authorization file.