Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Computerware a call at (703) 821-8200.

According to Survey, IoT Use is Up While Trust is ...
Tip of the Week: Your Productivity Doesn’t Depend ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Business Computing Managed Service Provider Productivity Backup Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Network Security User Tips Mobile Devices Business Continuity Mobile Office Disaster Recovery Computer Network Virtualization Microsoft Office Server Mobile Device Management VoIP Social Media Windows 10 Miscellaneous Upgrade Unified Threat Management Innovation Ransomware Android Windows Remote Monitoring Smartphone Holiday Operating System Remote Computing Passwords WiFi Vendor Management Mobile Computing BYOD Communication Apps Collaboration Marketing Facebook The Internet of Things History Managed IT services Firewall Users Analytics Cybersecurity IT Support Apple Alert Data Management Managed IT Services Save Money Productivity IT Consultant Phishing Outsourced IT Gmail Health Office Big data communications App Internet of Things Content Filtering Bring Your Own Device Automation Search Managed IT Browser Outlook Lithium-ion Battery Maintenance Hard Drives Budget Virus Artificial Intelligence Information Technology Best Practice Windows 8 BDR Spam Going Green Hiring/Firing Tech Support Wireless Technology Recovery Update Employer-Employee Relationship Cost Management Help Desk Antivirus Bandwidth Phone System Encryption IBM Mobile Device Money Data Backup Office 365 Printer Intranet Law Enforcement It Management Hard Drive Government Cybercrime Data storage Risk Management Legal Administration Proactive IT SaaS Computers Customer Service Data Recovery Travel Education Cloud Computing Hacking Networking Save Time Document Management Humor Saving Time Running Cable Securty DDoS Solid State Drive Current Events Excel Mobility Word Flexibility Cortana Password Digital Payment Windows 10 Hacker Comparison Downtime Augmented Reality Tablet PowerPoint Social Networking Company Culture VPN Two-factor Authentication Hosted Solution Wireless Robot Twitter Data Security Website iPhone Black Market Business Intelligence Fax Server Business Growth Project Management Telephone Systems Computer Repair Training User Disaster End of Support Avoiding Downtime Network Congestion Politics Pain Points Streaming Media Business Technology Inbound Marketing User Error Automobile Scam Chrome Cryptocurrency Google Docs Laptop How To Gaming Console Router Computer Accessories Digital Processors Office Tips Webcam Customer Relationship Management Start Menu USB Presentation Mouse Paperless Office Taxes Sports Software as a Service Vulnerabilities Text Messaging Uninterrupted Power Supply Mobile Technology Computing Virtual Desktop Access Control Identity Theft Documents Programming IT service Heating/Cooling Bitcoin Virtual Reality Compliance Patch Management Social Engineering Google Maps Co-managed IT Net Neutrality Retail Blockchain Computing Infrastructure Experience eWaste Redundancy Hack Lifestyle Monitors Private Cloud Telephony Trending YouTube Settings Distributed Denial of Service Unified Communications Specifications Statistics Safety Public Cloud Social Printing Electricity Windows Server 2008 Language Botnet Permissions Digital Signature Entertainment Unified Threat Management Thin CLient Business Metrics Writing switches Downloads WannaCry Windows 7 Computer Malfunction Analytic Time Management Fiber-Optic Leadership Chromebook Messenger Upselling Webinar Google Calendar Device Management Freedom of Information Work/Life Balance Motion Sickness Public Speaking Touchscreen Fraud Download Tracking Books Entrepreneur IT consulting Knowledge online Currency HIPAA Technology Tips Business Managemenet News Web Server Cleaning Electronic Payment CIO Best Practives Websites email scam Microchip Workers Reading Regulations Windows XP Tech Terms Microserver Access Fake News IP Address Society Human Resources Micrsooft Hacks Samsung Relocation GPS G Suite Turn Key Skype Spyware Microsoft Excel Physical Security Trojan Business Cards Notifications Tablets Ebay Reliable Computing Data Protection Mobile Payment 3D Sync Organize Teamwork Storage Recycling cache CCTV Music Upgrades PDF Piracy Pirating Information Corporate Profile Television Adminstration Bluetooth In Internet of Things Keyboard LiFi Best Available Data Loss Product Reviews Assessment Emails Domains Deep Learning Scalability Read Software License Rental Service VoIP SharePoint Memory Shortcut Visible Light Communication Content Management Value Data Breach Troubleshooting Consultation Tip of the week Wi-Fi Meetings Staffing Harddrive Environment IT Plan Cabling Video Surveillance Evernote Flash Administrator Competition Advertising Audit External Harddrive LinkedIn Business Owner Virtual Assistant Saving ZTime Supercomputer Google Wallet Displays Machine Learning Emergency Migration Worker Computer Care Debate Data Warehousing Application Archive Smart Phones Get More Done Google Drive Hard Drive Disposal Banking Employer Employee Relationship Drones File Sharing Licensing Printer Server Point of Contact Vulnerability CrashOverride 3D Printing Capital Productuvuty Desktop