crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
Integrated Business Technologies can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at (918) 770-8738 to ensure your business is protected.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Mobile Devices Software Data IT Support Hardware Small Business Network Communication Server Smartphones VoIP Computer Upgrade Google Windows Efficiency Business Continuity Mobile Device Management Innovation Disaster Recovery Virtualization Microsoft Office Miscellaneous Mobile Office Vendor Management Tech Term Data Backup Outsourced IT Gadgets Social Media Holiday Network Security BYOD User Tips Quick Tips Passwords Android Smartphone Mobile Computing Browser WiFi Bring Your Own Device Productivity Internet of Things Windows 10 Managed IT services Spam Ransomware Best Practice Data Recovery The Internet of Things Remote Monitoring Data Management Remote Computing Artificial Intelligence Alert Users Save Money Trending Operating System Wireless Technology Apple Content Filtering Office Collaboration Going Green History Firewall Gmail Customer Relationship Management Unified Threat Management Encryption Router Big Data Printer Tech Support Information Technology Current Events Cloud Computing Managed IT App Analytics IT Solutions Lithium-ion Battery Facebook IT Support IT Consultant Document Management Two-factor Authentication Mobile Device Humor Saving Time Paperless Office Avoiding Downtime Phishing Maintenance Applications Hard Drives Employer-Employee Relationship Website Windows 8 Antivirus Bandwidth Digital Payment Project Management Cybersecurity VPN Risk Management Automation Apps Office Tips Application Retail Virus IT service Fax Server Chrome Phone System Business Growth Outlook Wi-Fi Health Government Customer Service Managed IT Services Hacking Marketing Computers Excel Compliance Inbound Marketing Regulations Files Net Neutrality Social Presentation File Sharing Budget PowerPoint Social Networking Tablet Training Data Security Recovery Unified Communications Money Running Cable iPhone Help Desk Healthcare Licensing User Error Co-Managed IT Administration Infrastructure Augmented Reality Managed Service Office 365 Proactive IT Computer Repair Point of Sale Password Mouse Scam Company Culture Competition Twitter Network Congestion BDR eWaste Redundancy Downtime IBM Internet Exlporer Storage Machine Learning Smart Technology Search USB Mobile Security Virtual Desktop Hosted Solution Wearable Technology Business Owner Flexibility IoT Conferencing Mobility Data storage Hacker Display Alerts User Programming Robot Analyitcs Windows 10 Printing Education End of Support LiFi Safety Intranet Specifications Tip of the week Computing Settings Business Intelligence Cost Management Wireless Recycling Save Time Cybercrime Remote Workers Hiring/Firing Piracy Information Blockchain HIPAA Sports Vulnerability Statistics Data loss Telephony Alt Codes Screen Reader Fun Black Friday Virtual Private Network Cyberattacks Mobile Fraud Word YouTube Mirgation Public Speaking Access Control Touchscreen Scheduling How To Proactive Typing Smart Tech Cortana Cyber Monday Identity Theft Read Only Google Drive Managing Stress SharePoint Assessment How To Remote Monitoring and Management Cryptocurrency Connectivity Knowledge Environment Bookmarks Google Docs Enterprise Content Management Migration Downloads IT Management Samsung WPA3 Private Cloud Bitcoin Experience Distributed Denial of Service Troubleshooting Business Technology Debate Networking Favorites Vulnerabilities Hotspot Heating/Cooling communications Chatbots Multi-Factor Security Consumers Network Management Crowdfunding PC Care Fleet Tracking Public Cloud Hacks Star Wars Managed IT Service Value eBay Macro Instant Messaging Geography Language Identity IP Address Google Calendar Remote Support Leadership Asset Tracking New Additions Sync Utility Computing Skype Break Fix Streaming Media Print Server Techology Disaster Text Messaging Software Tips High-Speed Internet Computing Infrastructure Refrigeration Legislation Work Station Virtual Reality OneNote Congratulations Mobile Device Managment Consulting LinkedIn Dark Web Gaming Console Law Firm IT Disaster Resistance Digital Signature Video Surveillance Monitors Development Cooperation Deep Learning Motherboard Windows 8.1 Update Server Management Memory SaaS Employee-Employer Relationship Managed Services Provider Google Wallet Hard Drive Laptop Best Available Data Warehousing IT Consulting Writing Cables Staff Modem Software as a Service Documents Chromebook G Suite E-Commerce Drones Cache Halloween Microsoft Excel Entrepreneur Operations Undo Bluetooth Data Breach Social Engineering Wires Buisness Identities Cookies 5G Online Currency Technology Tips PDF Adminstration Patch Management People Travel Features Backups Management Scary Stories 3D CIO Technology Laws Computer Accessories Politics Monitoring Solid State Drive Nanotechnology Comparison Meetings Electronic Health Records Legal Enterprise Resource Planning Permissions IT Technicians Domains Unified Threat Management MSP

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code