facebook linkedin twitter

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Computerware a call at (703) 821-8200.

According to Survey, IoT Use is Up While Trust is ...
Tip of the Week: Your Productivity Doesn’t Depend ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Mobile Office Virtualization Network Microsoft Office Android Social Media Server VoIP Mobile Device Management Smartphone Collaboration Communication Miscellaneous Upgrade Ransomware Windows 10 Data Recovery Unified Threat Management Data Backup Windows Tech Term Operating System IT Support Remote Monitoring Passwords BYOD Remote Computing Holiday Vendor Management Mobile Computing Managed IT services Apps communications Productivity Facebook Cybersecurity WiFi Analytics BDR Marketing The Internet of Things Firewall History Users Automation Apple Data Management Phishing Outsourced IT Internet of Things Alert Managed IT Services Mobile Device App Browser IT Consultant Artificial Intelligence Save Money Encryption Spam Bring Your Own Device Antivirus Maintenance Gmail Health Content Filtering Office Bandwidth Going Green Big data Outlook Windows 8 Help Desk Office 365 Wireless Technology Hiring/Firing Budget Search Hard Drives Two-factor Authentication Printer Virus Tech Support Cybercrime Lithium-ion Battery Best Practice Information Technology Managed IT Cost Management Business Technology Money Document Management Training Computers Saving Time VPN Recovery Travel Employer-Employee Relationship Phone System Update Cloud Computing IBM Hacking Save Time It Management Legal Networking Administration Humor Regulations Customer Service Proactive IT Running Cable SaaS Website Windows 10 Government Hard Drive Intranet Education Law Enforcement Compliance Data storage Risk Management Access Control Hacker Augmented Reality Business Intelligence PowerPoint Laptop Digital Payment Downtime Business Growth Fax Server Data Security Applications Machine Learning User Patch Management Blockchain Comparison Tablet Company Culture Telephone Systems Data Loss Paperless Office Computer Repair Sports Wireless Social Networking Disaster Avoiding Downtime DDoS Computing Data Breach Hosted Solution End of Support File Sharing iPhone Robot Project Management Twitter Securty Information Mobility Word Excel Social Engineering Solid State Drive Current Events Password Cortana Black Market Customer Relationship Management Flexibility Cryptocurrency How To Chrome Private Cloud Google Docs Download Bitcoin Gaming Console Processors Router Vendor Experience Lifestyle Data Protection USB Cleaning Webcam Presentation Computer Accessories Monitors Telephony Text Messaging Office Tips Taxes Virtual Desktop Managed Service Distributed Denial of Service Specifications Safety Trending Mouse YouTube Conferencing Scam Social Public Cloud Redundancy Documents Unified Communications Settings Inbound Marketing Heating/Cooling Programming Statistics Network Congestion Identity Theft Storage Monitoring Digital Google Maps Websites Pain Points IT service Streaming Media Virtual Reality Retail Management Start Menu Politics Tech Terms Automobile Mobile Technology Emails eWaste Value User Error Chromebook Software as a Service Co-managed IT Bluetooth Vulnerabilities Computing Infrastructure Hack Net Neutrality Healthcare Uninterrupted Power Supply Work/Life Balance Desktop Finance Spyware Mobile Payment HIPAA Saving ZTime Device Management Deep Learning Nanotechnology Social Network Rental Service Vulnerability Meetings Environment Electricity Printing Cabling Competition Content Management Bookmark Startup Asset Tracking Web Server Electronic Payment Business Managemenet Visible Light Communication Memory Business Cards Service Level Agreement Username Wi-Fi Administrator Windows 7 Harddrive Business Owner IT consulting Unified Threat Management Backup and Disaster Recovery Books Workers Debate Gamification cache Television IP Address online Currency Screen Reader Customer Resource management Supercomputer GPS WannaCry Downloads Worker External Harddrive Application Browsers CIO Best Practives Smart Tech Distribution Microchip Human Resources Advertising Flash Piracy Upload User Tip Staffing Google Wallet HTML Time Management Freedom of Information LinkedIn Windows XP Fiber-Optic Database Corporate Profile Reading Samsung Society Microserver Mobile Security Assessment G Suite SharePoint Thin CLient Displays Telephone System Employer Employee Relationship 3D Ebay Software License Trends Google Calendar Licensing Smart Phones Digital Signature Archive Micrsooft Multi-Factor Security Cost Hacks Physical Security Tip of the week Skype Teamwork Get More Done Drones Devices Banking Touchscreen Botnet News Entertainment Fraud Tactics VoIP Relocation Tablets Turn Key UTM Content Consultation Sync Evernote Leadership Printer Server Knowledge Adminstration Pirating Information Point of Contact IT Plan Enterprise Resource Planning Technology Tips Trojan Legislation Error Notifications CCTV Virtual Assistant PDF Permissions Language Reliable Computing Audit Best Available Keyboard Proxy Server Accountants A.I. Business Metrics Computer Malfunction Fake News Organize email scam Addiction Electronic Medical Records Analytic Music Multi-factor Authentication In Internet of Things Data Warehousing Domains Recycling switches Writing Migration Connected Devices Access Public Speaking Upgrades Wireless Headphones Telephone Emergency Hard Drive Disposal Product Reviews Scalability Computer Care Shortcut Dark Web Read Equifax Fleet Tracking Motion Sickness Microsoft Excel Upselling LiFi Network Management Health IT Device security MSP Google Drive Windows Server 2008 Troubleshooting Webinar Messenger Tracking Entrepreneur Video Surveillance 3D Printing Managing Stress CrashOverride Data Analysis Printers Regulation Capital Productuvuty

toner1