"What happens to liars"?
Office is periodically "reactivated". The activation center triggers a check of the status of activations recorded at the activation center. If it finds "too many" active at the same time they can simply "deactivate" the product key and none of your installations
will work. This is what happens when MS learns that product keys from a volume license have been illegally bootlegged/resold to people on the internet. All of the keys on the license are deactivated.
MS did not build a use accessible "deactivation" process in the local installation licenses 2013 and earlier. I am guessing that is because they assumed that user deactivation would not be used very frequently. They finally have included used controlled
deactivation for Office 365 (2013) only.
Here are some links about activation that may provide more specific information you are looking for:
General info about Activate 365 Home Premium / 2013 local install / Volume Licenses
http://office.microsoft.com/en-us/support/activate-office-2013-programs-HA102819770.aspx
https://officesetup.getmicrosoftkey.com/?origin=HA103858759 - 365 Home user activation page
Lots of Good detailed info about 2010 Activation
http://forums.mydigitallife.info/threads/21062-New-Office-2010-Repository
Transfer an Installation, Phone Activate
http://answers.microsoft.com/en-us/office/wiki/officeversion_other-office_install/copy-move-or-transfer-an-office-installation-to/956244a0-385d-4e21-a21e-87b4179111d1?tm=1388767837238
Uninstall Office 2010 - http://office.microsoft.com/en-us/excel-help/repair-or-remove-office-2010-HA010357402.aspx?CTT=1
Description of Microsoft Product Activation
http://support.microsoft.com/kb/293151
Office 2002-2007
http://support.microsoft.com/kb/302806/
OFFICE 2002-2007, WIN XP-VISTA
MS Product Activation FAQ
http://support.microsoft.com/contactus/cu\_sc\_prodact\_master
**What is Microsoft Product Activation (MPA)?**Learn
how product activation works and which Microsoft products include MPA.
**Contact a Microsoft Product Activation Center**Use this article to
learn how to obtain the appropriate telephone number by running the Product Activation Wizard.
**Understanding Microsoft Product Activation**Learn how product activation
works and when to activate a product. (Win Vista, Win XP, Office 2007, 2003, 2002)
**Learn how to identify, locate, or replace a Product Key**Help with finding
or replacing your Product Key required for Product Activation.
**Learn how to change or update your Product Key**Steps
to help you use the Change Product Key feature.
**Locate your Product Key sticker and learn its importance.******See examples of Certificate of Authority (COA) labels.
**What is the difference between Product Activation and Product Registration?**You
must activate your Microsoft product but you are not required to register your product, learn more about the differences.
So you’re not personally identifying me, but you are still requiring information about the make and model of my PC.
To ensure the end user’s privacy, Microsoft uses a one-way mathematical algorithm to create the hardware hash used by Product Activation to create the Installation ID. Once created, the hash information cannot be calculated back to its original
values. Hardware information is sent through the algorithm in the software on the PC-not at Microsoft-to create the hash. The raw hardware information is not known or sent to Microsoft. Ensuring end user privacy is a No. 1 design goal for Microsoft with Product
Activation.
Win7 Activation Technologies: an unauthorized inside look
http://www.zdnet.com/blog/bott/windows-activation-technologies-an-unauthorized-inside-look/1803?tag=rbxccnbzd1
-
activation is re-run every 90 days
-
uses HTTPS to connect to MS
According to Microsoft’s privacy policy, no personally identifiable information is exchanged and the IP address of the uploading machine is not associated with the validation upload and is discarded within 24 hours after validation completes.
Microsoft’s privacy policy, which was last updated in February 2010, specifically lists the following items of information that are collected as part of the validation activity
and may be included in the ID hashes shown in the screenshot above:
- Computer make and model
- Version information for the operating system and software
- Region and language settings
- A unique number assigned to your computer by the tools (Globally Unique Identifier or GUID)
- Product Key (hashed) and Product ID
- BIOS name, revision number, and revision date
- Hard drive volume serial number (hashed)
- Whether the installation was successful if one was performed
- The result of the validation check, including error codes and information about any activation exploits and any related malicious or unauthorized software found or disabled
If the validation check identifies an activation exploit, the following additional information is collected and will be transmitted to Microsoft’s servers
- The activation exploit’s identifier
- The activation exploit’s current state, such as cleaned or quarantined
- Original equipment manufacturer identification
- The activation exploit’s file name and hash of the file, as well as a hash of related software components that may indicate the presence of an activation exploit
- The name and a hash of the contents of the computer’s start-up instructions file (commonly called the boot file) to help [Microsoft] discover activation exploits that modify this file.
How product activation works
Product activation is a simple, straightforward process that is completely software based. In most cases, the only information that is needed to activate a product is an installation ID, which is created by the software itself. The information that
is collected during activation will not be used to personally identify the user.