Bredy Network Management Corporation Blogs

3 minutes reading time (642 words)

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
BNMC can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at 978-482-2020 to ensure your business is protected.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, August 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Malware Business Computing Software Hackers Microsoft Internet Google Computer IT Services Hosted Solutions Ransomware Business Mobile Devices Network Security Tech Term Small Business Android Managed IT Services Backup Smartphone Windows IT Support Data Management Efficiency Saving Money Business Continuity Hardware User Tips Data Recovery Internet of Things Data Cloud Computing App Data Backup Browser Cybersecurity Innovation Windows 10 Business Management Facebook Server Artificial Intelligence Gmail Remote Monitoring Encryption Smartphones Productivity Infrastructure Chrome Windows 10 Managed Service Provider Managed IT Services Phishing Communication Analytics communications Tip of the week Office 365 Word Outsourced IT Network Productivity Vulnerability Money IT Support Disaster Recovery Passwords Big Data Robot Google Drive Content Filtering Settings Bandwidth Upgrade Applications Government YouTube Antivirus Risk Management Social Media Microsoft Office Website Data storage Office Tips Employer-Employee Relationship IT Management LiFi Server Management Vendor Management Business Technology Monitors Hosted Solution Save Money VoIP Virtual Private Network HIPAA Administration Unified Threat Management Mouse Data loss Automation Telephone Systems Mobile Security Miscellaneous End of Support Virtual Reality Apple Workplace Tips Firewall Two-factor Authentication Maintenance Business Intelligence Storage Avoiding Downtime SaaS Scam Holiday Company Culture BYOD Wireless Alert Managing Stress Spam Computing Outlook VPN Mobile Device Data Security Information Paperless Office The Internet of Things WiFi Cabling Alerts USB Budget Legislation Tech Support WannaCry Motherboard Cables Social Google Maps Fraud Cost Management Information Technology Touchscreen SharePoint Onboarding Identity Continuity Typing Humor Microsoft Excel Chromebook Quick Tips Techology Slack Social Engineering Downtime Smart Office Best Practice Managed IT Smart Technology Cybercrime Screen Reader Charging Current Events Marketing Licensing Dongle Statistics Tablet Websites Wires How To Lenovo Assessment Apps Downloads Solar Cryptocurrency Mail Merge Blockchain Gadgets VoIP Unified Threat Management Monitoring Safety desktop Work Google Docs Shortcut Distributed Denial of Service Digital Payment Smart Tech IT solutions Going Green Remote Computing Disaster Cooperation Service Level Agreement Bluetooth Comparison Digital Router Voice over Internet Protocol Education Hacks Firefox Superfish Collaboration Hotspot Internet Exlporer Google Wallet Compliance Bitcoin Address Permissions Network Congestion Users Halloween Printing User Error Spying IT Technicians Optimization Business Growth Patch Management Managed IT Service Connectivity Analysis Writing Uninterrupted Power Supply Staff Leominster Legal Specifications Wi-Fi Document Management Spyware Modem FinTech Password Customer Relationship Management File Sharing Language Value Unified Communications Drones Heating/Cooling Multi-Factor Security Computer Care IBM Regulations Windows 8 Computers Scary Stories Time Management Printer Employee-Employer Relationship Solid State Drive Mirgation Recycling Hacker Break Fix Dark Data Running Cable IoT Networking Managed Service Retail Buisness Augmented Reality K-12 Schools Deep Learning Search Black Friday Identity Theft Cookies MSP Computing Infrastructure Professional Services Servers Google Calendar Politics Virtual Desktop Training Corporate Profile Social Networking Emergency Display Sports Star Wars Network Management Access Control PowerPoint Hard Disk Drive Chatbots eWaste Alt Codes Dark Web Customer Service Laptop Automobile Office Samsung Dell Wearable Technology Network upgrade Bring Your Own Device Operating System Cyber Monday Nanotechnology Development Motion Sickness Staffing Black Market Law Enforcement Taxes Administrator Notifications Web Server what was your? Electronic Medical Records IT Budget Twitter Physical Security GPS BDR Upgrades Gadget IT Consultant Emoji Crowdsourcing Cameras Regulation Meetings Personal Information Botnet Tracking 3D Printing Cleaning Cortana CCTV Processors Webcam Machine Learning Unsupported Software Virtualization Update Error Point of Sale Ben McDonald shares Computer Repair Relocation Mobile Device Management Travel Mobile Data How To Work/Life Balance G Suite Recovery Health Private Cloud Supercomputer CrashOverride Mobile Computing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3