crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
Integrated Business Technologies can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at (918) 770-8738 to ensure your business is protected.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 17 August 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity IT Services Workplace Tips Hosted Solutions Hackers Backup Malware Email Software Mobile Devices Business IT Support Data Hardware Small Business Network Communication Server Smartphones Upgrade VoIP Computer Business Continuity Google Windows Efficiency Mobile Device Management Microsoft Office Disaster Recovery Virtualization Innovation Miscellaneous Mobile Office Vendor Management Social Media Holiday Gadgets Data Backup Quick Tips Passwords Outsourced IT BYOD Tech Term Android User Tips Network Security Smartphone Mobile Computing WiFi Bring Your Own Device Internet of Things Browser Managed IT services Windows 10 Best Practice Spam Remote Monitoring Ransomware The Internet of Things Apple Users Remote Computing Data Management Data Recovery Wireless Technology Alert Trending Operating System Firewall Content Filtering Artificial Intelligence Unified Threat Management History Going Green Save Money Gmail App Big Data Office Managed IT Customer Relationship Management Router Printer Tech Support Analytics Encryption IT Solutions Lithium-ion Battery Information Technology Current Events Facebook IT Consultant Antivirus Maintenance Paperless Office Hard Drives Document Management Collaboration Two-factor Authentication Productivity IT Support Windows 8 Humor Saving Time Applications Avoiding Downtime Cloud Computing Employer-Employee Relationship Website Customer Service Hacking Computers Fax Server Outlook Digital Payment Health Mobile Device VPN Risk Management Managed IT Services Automation Marketing Excel Office Tips Retail Phishing Phone System IT service Compliance Chrome Cybersecurity Business Growth Apps Wi-Fi Application Bandwidth Virus Mouse Office 365 Data Security User Error Password Managed Service Net Neutrality Co-Managed IT Social Unified Communications Infrastructure Presentation File Sharing PowerPoint Social Networking Budget Tablet Recovery Inbound Marketing Government Money iPhone Running Cable Licensing Administration Project Management Augmented Reality Regulations Training Proactive IT Computer Repair Flexibility Point of Sale Hosted Solution Help Desk Statistics Company Culture Data storage Twitter Blockchain Tip of the week HIPAA Competition Network Congestion Robot IBM Printing eWaste Downtime End of Support LiFi Wearable Technology Computing Search USB Virtual Desktop Internet Exlporer Business Owner Display Alerts Storage Smart Technology Mobile Security Hacker Vulnerability Scam User Programming Data loss IoT Analyitcs Education Intranet BDR Business Intelligence Safety Redundancy Specifications Recycling Settings Cost Management Wireless Files Save Time Cybercrime Piracy Mobility Hiring/Firing Sports Microsoft Excel Windows 10 Cache Bitcoin Wires Operations Data Breach Public Cloud Software Tips Gaming Console Cookies Technology Tips Domains communications Management Hacks Touchscreen Fun Technology Laws Sync Nanotechnology Comparison Word Permissions Public Speaking Server Management Enterprise Resource Planning MSP IT Technicians Cortana Unified Threat Management Mobile Device Managment Screen Reader Black Friday Fraud Virtual Reality Mobile Proactive Adminstration Mirgation Knowledge Access Control Environment Monitors 3D Conferencing Smart Tech Cyber Monday Patch Management SaaS Samsung Deep Learning Managing Stress Google Wallet Remote Monitoring and Management Experience PC Care SharePoint Troubleshooting G Suite Debate Writing Value Connectivity Heating/Cooling eBay Consumers Chromebook Crowdfunding Enterprise Content Management Drones WPA3 Remote Support Migration Leadership Downloads Travel Skype Social Engineering Streaming Media Buisness New Additions Distributed Denial of Service Scheduling Text Messaging Hotspot IP Address Virtual Private Network Print Server Identities Vulnerabilities Backups Fleet Tracking Work Station Chatbots Multi-Factor Security Refrigeration How To Disaster LinkedIn CIO Star Wars Congratulations Managed IT Service Geography Video Surveillance Language Telephony Law Firm IT Solid State Drive Identity Theft Windows 8.1 Update Legal Asset Tracking Identity Google Calendar Break Fix Assessment Digital Signature Best Available Utility Computing Alt Codes High-Speed Internet Computing Infrastructure Techology Memory OneNote Laptop Legislation Dark Web IT Management YouTube Healthcare Typing Development Cooperation Disaster Resistance Business Technology Documents Machine Learning Bluetooth Online Currency Google Drive Employee-Employer Relationship Motherboard Halloween Entrepreneur Data Warehousing Undo Network Management How To Hard Drive Macro Cryptocurrency Cables Computer Accessories Staff 5G IT Consulting Networking PDF Private Cloud People Google Docs Remote Workers Modem Scary Stories Software as a Service

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...