Bredy Network Management Corporation Blogs

3 minutes reading time (642 words)

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
BNMC can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at 978-482-2020 to ensure your business is protected.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Internet Software Hosted Solutions Ransomware Microsoft Network Security Google Computer Business Smartphone Mobile Devices Android IT Services Windows Managed IT Services Data Management Backup Windows 10 Browser Small Business Innovation Internet of Things Cloud Computing Tech Term App Business Continuity Hardware Artificial Intelligence Encryption IT Support Remote Monitoring Server Data Recovery Saving Money User Tips Data Gmail Data Backup Vulnerability Productivity Infrastructure Smartphones IT Support Business Management Office 365 Managed Service Provider Phishing Outsourced IT Efficiency Productivity Cybersecurity Tip of the week Disaster Recovery Antivirus Robot Data storage Passwords Big Data Money Managed IT Services Settings Chrome Communication IT Management Facebook Government Word Google Drive Bandwidth Upgrade Windows 10 Social Media Risk Management Office Tips Vendor Management Paperless Office Monitors Scam Save Money Network The Internet of Things Automation Unified Threat Management End of Support Data loss Telephone Systems Spam Computing Virtual Reality Outlook WiFi VPN Data Security LiFi Business Technology Firewall Hosted Solution Server Management SaaS Maintenance Administration Workplace Tips Virtual Private Network Holiday HIPAA Content Filtering Mouse Microsoft Office BYOD YouTube Miscellaneous Mobile Security Alert Applications Analytics Apple Employer-Employee Relationship communications Website Storage Mobile Device Two-factor Authentication Connectivity Password Avoiding Downtime Sports User Error Tech Support Dell IT Technicians Legal Patch Management Virtual Desktop Managed IT Service Customer Relationship Management Laptop Cabling Staff Unified Communications Leominster Drones Specifications Chromebook WannaCry Modem Windows 8 Google Maps Language Value Heating/Cooling Multi-Factor Security Regulations Hacker Social Engineering IoT Time Management Printer Websites Mirgation Deep Learning Break Fix Networking Augmented Reality K-12 Schools VoIP Search Black Friday Cookies Computing Infrastructure Professional Services Servers Downtime Google Calendar Social Networking Alt Codes Cybercrime Emergency Safety Star Wars Marketing Network Management Access Control desktop Chatbots Bring Your Own Device Operating System Dark Web Remote Computing Digital Payment Gadgets Disaster Wearable Technology Network upgrade Budget Cyber Monday Network Congestion Digital Nanotechnology Social Collaboration Alerts USB Information Technology Legislation Motherboard Typing Humor Fraud Cost Management Current Events Touchscreen SharePoint Wi-Fi Identity Best Practice Microsoft Excel Writing Screen Reader Users Quick Tips Halloween Techology Uninterrupted Power Supply Managed IT Smart Technology Computers Document Management Spyware How To Lenovo File Sharing Licensing Apps Dongle Statistics Tablet Dark Data Computer Care IBM Cryptocurrency IT solutions Assessment Going Green Downloads Solid State Drive Google Docs Mail Merge Blockchain Retail Wireless Education Smart Tech Hacks VoIP Scary Stories Unified Threat Management Politics Shortcut Distributed Denial of Service Display Identity Theft Firefox Running Cable Superfish Cooperation Service Level Agreement Google Wallet Bluetooth Comparison Customer Service Training Corporate Profile Router Bitcoin Hotspot Internet Exlporer Printing Buisness Hard Disk Drive Compliance Business Growth Address Permissions Office Samsung Automobile Optimization Black Market Supercomputer CrashOverride Law Enforcement Motion Sickness Staffing Administrator Electronic Medical Records Taxes Notifications Mobile Device Management Physical Security Web Server what was your? Recycling Twitter IT Budget Upgrades Gadget Emoji GPS Crowdsourcing IT Consultant Mobile Computing Personal Information Botnet Cameras eWaste 3D Printing Meetings Cortana Tracking Cleaning Machine Learning CCTV Processors Unsupported Software Webcam Smart Office Virtualization Update BDR Computer Repair Relocation Error Mobile Data Point of Sale Ben McDonald shares Work How To Work/Life Balance Travel Recovery Health Private Cloud G Suite

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3