Solved

Is it legal to download and use Access 2003 runtime?

Posted on 2011-03-09
8
41 Views
Last Modified: 2016-06-02
Hi,
Regarding legality.   Is it legal for anyone do download and install the Access 2003 runtime from
<link removed by SouthMod>
and use it for their own purposes like  running my application or any other?    If not, it would not be ethical for me to suggest that they do it.  And I would still need to locate and purchase the Access 2003 Developer Extensions to produce a legitimate runtime environment for use with my application.  dhs

0
Comment
Question by:DuaneSch
8 Comments
 
LVL 75

Accepted Solution

by:
DatabaseMX (Joe Anderson - Access MVP) earned 125 total points
ID: 35088526
No.  Unless you are a licensed user of A2003 that originally included the Runtime Extensions ... it is not legal.  

Again, I would call Microsoft and see what options you have ... get the straight scoop.

mx
0
 
LVL 1

Assisted Solution

by:axemaster
axemaster earned 125 total points
ID: 35088551
No, only runtimes that Microsoft distributes on their download.microsoft.com site are legal to download and use per the terms listed with the download and this is not one of them.  You'll need the developer tools to create a legal distributable software with runtimes.
0
 
LVL 84
ID: 35088699
You can often use the 2007 or 2010 runtimes (which are free) to run your 2003 .mde/.mdb files. You should thoroughly test this, of course, but many people have reported good results doing this.
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 
LVL 75
ID: 35871358
Has this question been resolved?  Can we close the question ?

thx.mx
0
 

Expert Comment

by:EE_AutoDeleter
ID: 41627434
I've requested that this question be deleted for the following reason:

                           
No comment has been added to this question in more than 21 days, so it is now classified as abandoned and is now flagged for deletion.


If there is a valid solution, please OBJECT and indicate the comments that are, or would otherwise lead to, a solution.


Use the specific format https:#axxxxxxxx for comment ID(s).


Also, please don't object simply because the author did not respond to your comment. While we understand this is frustrating, unfortunately we cannot force the author to return to the question. Unless you feel you have presented a valid, verifiable solution we'll simply delete the question.


Experts-Exchange Auto Deleter
0
 
LVL 75
ID: 41627435
Delete request pending?

Why ?
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Top 1 of each supplier 55 57
Access report groups with sums 5 29
Create report using crosstab query 11 29
Label with definitive value after closing ms access 19 15
This article is a continuation or rather an extension from Cascading Combos (http://www.experts-exchange.com/A_5949.html) and builds on examples developed in detail there. It should be understandable alone, but I recommend reading the previous artic…
I see at least one EE question a week that pertains to using temporary tables in MS Access.  But surprisingly, I was unable to find a single article devoted solely to this topic. I don’t intend to describe all of the uses of temporary tables in t…
In Microsoft Access, when working with VBA, learn some techniques for writing readable and easily maintained code.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question