I should structure the response to first acknowledge the request, state the policy against providing pirated software, explain the consequences, and direct them to where they can legally obtain the product key. Also, offer to help with activation issues if they have a legitimate key.