Computerware

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Computerware a call at (703) 821-8200.

According to Survey, IoT Use is Up While Trust is ...
Tip of the Week: Your Productivity Doesn’t Depend ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, August 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Microsoft Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Network Security Google Efficiency Small Business Smartphones Quick Tips Gadgets User Tips Mobile Devices Business Continuity Computer Disaster Recovery Microsoft Office Mobile Office Virtualization Network Android Innovation Server VoIP Mobile Device Management Social Media Miscellaneous Smartphone Ransomware Windows 10 Upgrade Unified Threat Management Windows Operating System Remote Monitoring Collaboration Communication Passwords Holiday Data Backup BYOD Managed IT services Mobile Computing Remote Computing Data Recovery Tech Term Apps Facebook Cybersecurity WiFi IT Support Vendor Management Marketing communications The Internet of Things Analytics Firewall History Users Apple Automation BDR Internet of Things Alert Productivity Data Management Mobile Device Managed IT Services Save Money Outsourced IT Artificial Intelligence Phishing App IT Consultant Bring Your Own Device Bandwidth Office Maintenance Big data Content Filtering Health Spam Gmail Going Green Hard Drives Browser Cybercrime Windows 8 Outlook Wireless Technology Cost Management Antivirus Search Managed IT Printer Encryption Tech Support Virus Budget Best Practice Information Technology Lithium-ion Battery Hiring/Firing IBM Recovery Employer-Employee Relationship Computers Help Desk Travel Hacking Update Office 365 Two-factor Authentication Money Phone System Document Management Government Website Running Cable Proactive IT Cloud Computing SaaS Saving Time VPN Law Enforcement Windows 10 Intranet Administration Education Compliance Data storage Humor Risk Management Training Access Control Save Time Networking Customer Service Legal Hard Drive It Management Business Technology Regulations Mobility Current Events Company Culture Paperless Office Patch Management Blockchain Social Engineering Computer Repair Data Loss Customer Relationship Management Social Networking Augmented Reality Computing Disaster Word End of Support PowerPoint Hosted Solution Robot Data Breach Applications Securty Twitter Fax Server Password Cortana Project Management Hacker Solid State Drive Machine Learning Flexibility Telephone Systems Black Market Avoiding Downtime Laptop Business Intelligence User iPhone Business Growth Digital Payment File Sharing Downtime Wireless Data Security Tablet Excel DDoS Comparison Politics YouTube Healthcare Storage Virtual Reality Trending Emails Sports Co-managed IT Automobile Unified Communications User Error Settings Mouse Scam Chromebook Gaming Console Programming Retail Computing Infrastructure Hack Statistics Redundancy eWaste Network Congestion How To Value Text Messaging Private Cloud Lifestyle IT service Webcam Download Digital Telephony Streaming Media Websites Start Menu Tech Terms Bluetooth Processors Taxes USB Mobile Technology Distributed Denial of Service Monitoring Inbound Marketing Presentation Cryptocurrency Net Neutrality Software as a Service Google Docs Uninterrupted Power Supply Public Cloud Chrome Virtual Desktop Specifications Safety Experience Pain Points Social Monitors Router Management Identity Theft Cleaning Bitcoin Office Tips Data Protection Computer Accessories Documents Heating/Cooling Google Maps Vulnerabilities Device security MSP Upselling Displays WannaCry Downloads In Internet of Things Society LinkedIn PDF Micrsooft Corporate Profile Nanotechnology Video Surveillance Time Management Freedom of Information Desktop Finance Drones Webinar Skype Startup Asset Tracking Best Available Keyboard Scalability Archive Assessment SharePoint Business Cards Service Level Agreement Saving ZTime Motion Sickness Tip of the week Username Messenger Tracking Google Calendar Unified Threat Management Backup and Disaster Recovery Domains Harddrive Rental Service Meetings Point of Contact VoIP Screen Reader Debate Public Speaking Permissions Language Touchscreen News Gamification Knowledge Smart Tech Distribution GPS Shortcut Cabling Consultation Evernote Piracy Upload Web Server Virtual Assistant HTML Managed Service Entrepreneur Books Workers switches Writing Technology Tips Fiber-Optic Database External Harddrive Troubleshooting Wi-Fi Administrator Music Environment Supercomputer Upgrades Analytic Audit Conferencing HIPAA Best Practives Recycling Fake News Mobile Security Product Reviews Multi-Factor Security Cost 3D Ebay Competition Worker LiFi Data Warehousing Software License Trends Thin CLient Electronic Payment Microchip Emergency Hard Drive Disposal Devices Reading Samsung Microserver Read Access Fraud Tactics Smart Phones Business Owner Employer Employee Relationship Deep Learning Computer Care IP Address G Suite Work/Life Balance Microsoft Excel UTM Content Legislation Error Adminstration Pirating Information Application Licensing Visible Light Communication Get More Done Memory Device Management Google Drive Windows Server 2008 IT Plan Enterprise Resource Planning Leadership Hacks Human Resources Physical Security Vulnerability Accountants A.I. Relocation Tablets IT consulting Turn Key Content Management Spyware Mobile Payment email scam Addiction Banking Botnet Printer Server Business Managemenet Electricity Printing Sync Trojan Multi-factor Authentication Information Notifications CCTV CIO Organize Wireless Headphones Digital Signature Advertising Flash online Currency Windows 7 Migration Connected Devices Equifax Fleet Tracking Teamwork Reliable Computing Windows XP cache Television Network Management Entertainment Business Metrics Computer Malfunction Staffing Google Wallet CrashOverride Capital Managing Stress Regulation Productuvuty 3D Printing

toner1.7