facebook linkedin twitter

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Computerware a call at (703) 821-8200.

According to Survey, IoT Use is Up While Trust is ...
Tip of the Week: Your Productivity Doesn’t Depend ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Saving Money Network Security Email Malware IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices Smartphones User Tips Gadgets Business Continuity Innovation Disaster Recovery Social Media Microsoft Office Android Mobile Office Network Virtualization VoIP Data Backup Mobile Device Management Collaboration Communication Server Smartphone Miscellaneous Productivity Data Recovery Ransomware Tech Term Upgrade Windows 10 Unified Threat Management Windows IT Support communications Passwords Holiday Facebook Remote Monitoring Operating System Managed IT services Vendor Management Apps Cybersecurity Mobile Computing BYOD Remote Computing BDR WiFi Phishing Users The Internet of Things Automation Mobile Device Analytics Marketing Apple Firewall Outsourced IT History Managed IT Services Data Management Alert Browser Internet of Things Artificial Intelligence Save Money App Encryption IT Consultant Big data Spam Content Filtering Health Going Green Gmail Bring Your Own Device Office Antivirus Bandwidth Maintenance Printer Windows 10 Cloud Computing Office 365 Best Practice Information Technology Hiring/Firing Lithium-ion Battery Hard Drives Budget Two-factor Authentication Saving Time Outlook Help Desk Windows 8 Wireless Technology Business Technology Cybercrime Search Managed IT Cost Management Virus Tech Support Money Document Management Phone System IBM Computers Access Control VPN Travel Training Recovery Employer-Employee Relationship Blockchain Update Hacking Save Time Networking Legal Running Cable Proactive IT Information Customer Service Regulations Twitter Government Healthcare Intranet SaaS Website It Management Education Administration Law Enforcement Risk Management Humor Hard Drive Applications Compliance Managed Service Data storage Mobility Digital Payment Black Market Social Engineering Flexibility Hacker Data Breach Router Downtime iPhone Cryptocurrency Digital Laptop Project Management Comparison Tablet Business Growth Websites Excel User Company Culture Computer Repair Current Events Social Networking Social Customer Relationship Management Paperless Office Machine Learning Augmented Reality Wireless Telephone Systems Sports PowerPoint DDoS Disaster Computing Hosted Solution Fax Server End of Support Data Security Robot Securty Word Patch Management File Sharing Data Loss Value Scam Google Maps Password Solid State Drive Cortana Business Intelligence Avoiding Downtime Emails Conferencing Automobile Evernote Chromebook Vendor Processors Computing Infrastructure Hack USB Google Docs Computer Accessories Pain Points Experience Monitoring Presentation How To Download Monitors Start Menu Tech Terms Private Cloud Trending Cleaning Mobile Technology Virtual Desktop Office Tips Mouse Specifications Safety User Error Software as a Service Telephony Management Co-managed IT Microchip Taxes Programming YouTube Uninterrupted Power Supply Statistics Documents Distributed Denial of Service Network Congestion Heating/Cooling Vulnerabilities Gaming Console Entertainment Unified Communications Settings Bitcoin Storage Text Messaging Lifestyle Webcam Data Protection Public Cloud Streaming Media Identity Theft Retail IT service eWaste Net Neutrality Virtual Reality Inbound Marketing Redundancy Politics Chrome Bluetooth Business Managemenet Adminstration Environment Pirating Information Get More Done Touchscreen News Telephone System Content Management HIPAA Leadership Bookmark VoIP Mobile Security Google Play Turn Key Consultation Motion Sickness Multi-Factor Security Cost Competition Deep Learning Printer Server Knowledge Scalability Software License Trends Electronic Payment Work/Life Balance Technology Tips Devices Trojan Virtual Assistant Messenger Fraud Tracking Tactics online Currency Business Owner Visible Light Communication Memory Processor Fake News Rental Service Meetings IT consulting IP Address Browsers Organize Audit UTM Content Security Cameras Data Warehousing Web Server Legislation Error Application User Tip IT Plan Cabling Enterprise Resource Planning LinkedIn Human Resources Access Wi-Fi Administrator Accountants A.I. CIO Emergency Hard Drive Disposal Books email scam Workers Addiction Upselling Advertising Flash Navigation Skype Staffing Google Wallet Video Surveillance Microsoft Excel Supercomputer Archive Windows XP Data Analysis Computer Care Multi-factor Authentication GDPR Google Drive Windows Server 2008 Wireless Headphones Telephone Digital Signature Saving ZTime Displays Webinar Migration Worker Connected Devices Society Spyware Mobile Payment Equifax Fleet Tracking Point of Contact Teamwork Micrsooft Vulnerability Reading Samsung Network Management Tech G Suite Device security MSP Drones Debate Employer Employee Relationship Harddrive Fileless Malware Electricity Printing Modem Windows 7 Hacks Physical Security Nanotechnology Social Network Proxy Server Desktop Licensing Finance GPS PDF cache Television Banking Botnet Startup Asset Tracking External Harddrive Best Available Analytic Keyboard Electronic Medical Records Relocation Business Cards Tablets Service Level Agreement Recycling Permissions Language Term Sync Username Product Reviews Best Practives Unified Threat Management Backup and Disaster Recovery Domains Directions WannaCry Downloads 3D Music Ebay SSID Time Management Freedom of Information Notifications CCTV Screen Reader Customer Resource management Read switches Thin CLient Public Speaking Writing Dark Web Corporate Profile Gamification Processing Microserver Assessment SharePoint Business Metrics Computer Malfunction Smart Tech Distribution Smart Phones Shortcut Upgrades Health IT Reliable Computing Piracy Upload Google Calendar In Internet of Things HTML Entrepreneur Tip of the week Fiber-Optic Database Device Management Troubleshooting LiFi Managed IT Service Cooperation Managing Stress Regulation Medical IT 3D Printing Capital Productuvuty Printers CrashOverride