Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
BNMC can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at 978-482-2020 to ensure your business is protected.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 17 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Malware Network Security Hackers Business User Tips Google Software Productivity Tech Term Computer Microsoft Internet Mobile Devices IT Services Hosted Solutions Efficiency Ransomware Communication Small Business Data Android IT Support Hardware Smartphone Innovation Backup Saving Money Managed IT Services Managed IT Services Windows 10 Windows Browser Internet of Things Cloud Computing Workplace Tips Data Recovery Data Management Business Continuity Business Management Productivity Data Backup Server Cybersecurity App Microsoft Office Disaster Recovery Windows 10 Encryption Artificial Intelligence Gmail Passwords Outsourced IT Word Facebook Phishing Vulnerability Remote Monitoring Mobile Device Office 365 Upgrade VoIP Smartphones Tip of the week Network Money Information Chrome IT Support Managed Service Provider Employer-Employee Relationship Users Applications Website Analytics BYOD communications Infrastructure Company Culture Employee-Employer Relationship Display Managed Service Big Data Maintenance Data storage Antivirus Save Money Settings Robot Automation Virtual Reality YouTube Google Drive Access Control Content Filtering IT Management Bandwidth Paperless Office Government Router Risk Management Miscellaneous Social Media Office Tips Telephone Systems Laptop Retail Alert Printing The Internet of Things desktop Managing Stress Hacker Firewall Two-factor Authentication Downtime Vendor Management Avoiding Downtime Monitors Development Document Management Scam Spam Computing Outlook Gadgets Operating System Wireless WiFi LiFi Networking End of Support HIPAA Hosted Solution VPN Mobile Security Administration Mouse Data Security Business Technology SaaS Server Management Business Intelligence Virtual Private Network Touchscreen Holiday Apple Quick Tips Computers Education Data loss Storage Unified Threat Management Tablet Regulations Mail Merge Blockchain Business Growth Language Value Downloads Managed Services Shortcut Distributed Denial of Service Politics Legal IoT Digital Payment VoIP Unified Threat Management Password Mirgation Recycling Comparison Unified Communications Drones Cookies MSP Digital Firefox Superfish Customer Service Windows 8 Augmented Reality K-12 Schools Disaster Device Bluetooth Social Networking Address Permissions Computing Infrastructure Professional Services Collaboration LED Office Samsung Laptops Patch Management Managed IT Service Tech Support Deep Learning Star Wars Cybercrime PowerPoint User Error Mobile Device Management Chatbots eWaste Specifications Nanotechnology Spyware Customer Relationship Management Chromebook Wearable Technology Network upgrade Uninterrupted Power Supply Marketing Mobility Motherboard Cables Computer Care IBM Alt Codes Alerts USB File Sharing Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Solid State Drive Software as a Service Break Fix Websites Bring Your Own Device Fraud Cost Management Onboarding Time Management Printer Identity Continuity Search Black Friday Budget Screen Reader Charging Identity Theft Slack Social Smart Office Print Toner Information Technology Wires Training Corporate Profile Emergency Typing Humor Licensing Dongle Halloween Content Servers Google Calendar Safety G Suite Hard Disk Drive Dark Web Best Practice Assessment Automobile Digital Signage Network Management Remote Computing Current Events Solar Shortcuts Cyber Monday Smart Tech Monitoring Network Congestion Work Dell Apps Voice over Internet Protocol WannaCry Cryptocurrency Cooperation Service Level Agreement Cabling Scary Stories Streaming Legislation Microsoft Excel Wi-Fi Google Docs Hotspot Internet Exlporer Google Maps Running Cable Troubleshooting SharePoint Writing IT solutions Going Green Compliance Buisness Security Cameras Managed IT Smart Technology Connectivity Spying Techology Virtualization Hacks IT Technicians Optimization Google Wallet Modem FinTech Analysis Virtual Desktop How To Lenovo Dark Data Update Bitcoin Staff Leominster Sports Human Error Statistics IT Consultant Computer Repair Relocation Printers Mobile Data Cameras How To Work/Life Balance Tracking Recovery Meetings Cleaning Health Private Cloud Black Market CCTV Law Enforcement Webcam Electronic Medical Records Notifications Physical Security Error Twitter Mobile Computing Upgrades Gadget Emoji Point of Sale Ben McDonald shares BDR Travel Crowdsourcing Entertainment Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Taxes Machine Learning Administrator Processors Unsupported Software IT Budget Web Server what was your? GPS

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3