How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Computerware a call at (703) 821-8200.

According to Survey, IoT Use is Up While Trust is ...
Tip of the Week: Your Productivity Doesn’t Depend ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices User Tips Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Server VoIP Social Media Android Smartphone Mobile Device Management Windows 10 Upgrade Miscellaneous Innovation Ransomware Windows Unified Threat Management Remote Monitoring Operating System Communication Holiday Mobile Computing Remote Computing Passwords Apps Collaboration WiFi BYOD Vendor Management Marketing Facebook Cybersecurity The Internet of Things Firewall Managed IT services Users Analytics History Apple IT Support Alert Data Management communications Productivity Data Backup Save Money Data Recovery Managed IT Services Phishing Outsourced IT Automation Internet of Things IT Consultant App Content Filtering Mobile Device Bring Your Own Device Office Health Big data Gmail Bandwidth Spam BDR Browser Hiring/Firing Best Practice Information Technology Cybercrime Windows 8 Lithium-ion Battery Hard Drives Outlook Going Green Maintenance Printer Virus Tech Support Artificial Intelligence Wireless Technology Antivirus Search Budget Tech Term Managed IT Recovery Employer-Employee Relationship Encryption IBM Computers Hacking Cost Management Help Desk Office 365 Update Phone System Money Document Management Data storage Training Proactive IT Running Cable Saving Time VPN Legal Networking Humor Hard Drive Intranet Travel It Management Education Administration Cloud Computing SaaS Risk Management Customer Service Two-factor Authentication Save Time Law Enforcement Website Government Compliance Telephone Systems Comparison Tablet Black Market Company Culture Flexibility Excel Computer Repair Word Fax Server Social Networking Laptop Password Cortana Business Growth Access Control Augmented Reality Hacker PowerPoint Twitter Mobility Data Security Regulations Paperless Office Social Engineering Blockchain Disaster Data Loss User Hosted Solution End of Support Business Intelligence Robot Digital Payment Securty Wireless Current Events Avoiding Downtime Data Breach DDoS Windows 10 Downtime Solid State Drive iPhone Project Management Bluetooth Distributed Denial of Service Websites Pain Points Trending Start Menu Tech Terms Mobile Technology Mouse Retail Cryptocurrency Lifestyle Public Cloud Software as a Service eWaste Google Docs Identity Theft Statistics Experience Customer Relationship Management Uninterrupted Power Supply Value Programming Cleaning Network Congestion Monitors Bitcoin Office Tips Google Maps Gaming Console Virtual Reality Processors Vulnerabilities Politics Data Protection Automobile Text Messaging Emails Webcam Business Technology Streaming Media USB YouTube Presentation Unified Communications Settings Chromebook Patch Management Sports Computing Computing Infrastructure Hack How To Net Neutrality Specifications Safety Scam Virtual Desktop Chrome Redundancy Social Applications Private Cloud IT service Inbound Marketing Documents Co-managed IT Telephony Router Heating/Cooling User Error Digital Computer Accessories Storage Taxes LiFi Multi-Factor Security Fake News PDF Software License Reading Samsung Audit G Suite Data Warehousing LinkedIn Fraud Tactics Employer Employee Relationship Best Available Keyboard Devices Access Domains Work/Life Balance Monitoring Hacks Physical Security Emergency Hard Drive Disposal Deep Learning UTM Licensing Archive Public Speaking Visible Light Communication Memory Legislation Banking Botnet Microsoft Excel Skype IT Plan Relocation Tablets Upselling Computer Care Sync Video Surveillance Google Drive Windows Server 2008 email scam Addiction File Sharing Shortcut IT consulting Accountants Best Practives Spyware Mobile Payment Troubleshooting Management Notifications CCTV Saving ZTime Vulnerability Point of Contact Entrepreneur Multi-factor Authentication Printing HIPAA Advertising Flash Wireless Headphones Business Metrics Computer Malfunction Environment CIO Migration Microserver Reliable Computing Electricity In Internet of Things Debate Windows 7 Electronic Payment Staffing Google Wallet Harddrive Competition Windows XP Equifax GPS cache Television Recycling Business Owner Society Healthcare Analytic Displays Device security Get More Done WannaCry Downloads IP Address Nanotechnology Printer Server Motion Sickness External Harddrive Product Reviews Micrsooft Desktop Turn Key Scalability Startup Trojan Time Management Freedom of Information Human Resources Drones Business Cards Messenger Tracking Corporate Profile Read Application 3D Ebay Assessment SharePoint Unified Threat Management Backup and Disaster Recovery Organize Rental Service Meetings Thin CLient Google Calendar Device Management Permissions Language Screen Reader Download Web Server Smart Phones Tip of the week Cabling Smart Tech Wi-Fi Administrator Touchscreen News Business Managemenet Piracy Books Workers VoIP Content Management Digital Signature Adminstration Pirating Information Consultation Evernote Entertainment Music Fiber-Optic Database Supercomputer Leadership Knowledge Teamwork switches Writing HTML Technology Tips online Currency Conferencing Webinar Microchip Virtual Assistant Upgrades Mobile Security Machine Learning Worker Capital Productuvuty 3D Printing CrashOverride