facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need to Have Your Software Licenses in Check

You Need to Have Your Software Licenses in Check

When you own a vehicle, you get a little document called a vehicle title. This certificate establishes the legal owner of the vehicle. When you own software, you are given a software license. Like any contract, things can go south if you violate the terms.

Continue reading

Why Properly Managing Your Software Licenses Should Be a Priority

Why Properly Managing Your Software Licenses Should Be a Priority

Every software your company uses comes with a license, even freeware like Google Chrome and Firefox. Often times, you’ll see the license during the installation process when you’re asked to opt into the terms and conditions. We know how easy it is to blow through the pages of legal mumbo jumbo, yet, at the very least you should have a grasp of the details pertaining to the license.

By ignoring such important information, you very well could be setting yourself up for trouble down the road.

Understanding Software Licenses
Software developers are the ones that determine the licensing details of their product, which includes terms such as where and how often you can install the software, whether or not you can redistribute it, what modifications are allowed, and more. By going through with the software installation process, you’re agreeing to these terms. This grants you use of the software, as well as holds you and your organization responsible should any of the terms be violated.

Protection from having the software shared and distributed without the developer's consent (aka, theft) is one of the most common clauses found in software licenses. Additionally, if you read the fine print closely, you may spot some rather unusual terms. One of the more famous examples comes from Apple, which forbids iTunes users from creating missiles and nuclear weapons.

How Negligence Can Lead to Big Fines
For many programs, at the time of installation, the software is activated and automatically sends a message to the developer in order to authenticate the license. During this activation process, one thing that the software checks for is whether or not the particular license has been installed before, or if it’s active anywhere else. If this is detected, you won’t be allowed to proceed and use the software. In some scenarios, you may be able to still use the software and you won’t find out you’re doing so illegally until your mailbox is hit with a cease and desist letter from the developer.

Although, this worst-case scenario isn’t something to be too worried about. Typically, developers have protocols in place that allow them to catch this discrepancy and provide users with an offer to purchase additional licenses. In some cases, a business owner may even be offered
a site licensing deal which allows for the purchase of multiple licenses at a discount.

Software Auditors Want to Talk With You
One motivation for making sure your software licenses are all in order is the very real chance of an audit by a group like the Business Software Alliance (BSA). This is an organization tasked with looking into businesses suspected of abusing software licenses, like running multiple copies of Windows and Microsoft Office off a single license. Should you be found guilty of such an infraction, you’ll receive a letter in the mail that will pretty much ruin your day.

Now, you may be wondering how the BSA can even find out if a business is violating software licenses. Well, one tactic employed by the BSA is to offer whistleblowers that report software violations by their current or former employer thousands of dollars in rewards, along with full confidentiality. It’s a method that can really be effective if a particular business has any former employees that may be rather disgruntled.

Failing such an audit can lead to a major fine that ends up being way more than what it would have been to simply pay for the software licenses in the first place; or, worse yet, jail time. If you happen to receive such a letter accusing you of software license violations, then you’ll want to seek the counsel of a lawyer and the assistance of an IT professional.

How to Prevent Software License Mismanagement From Ruining Your Day
As is the case with the majority of technology-related woes, a proactive approach to managing your software licenses is the best way to prevent this problem. This includes documenting your software licenses. When doing so, be sure to keep information up to date like, how many users you have, who is using it, how many devices the software runs on, and where it is deployed. You’ll also want to track the expiration dates of all of your software licenses, along with the terms and conditions. Plus, be mindful that a typical software license will allow for a single user to install the software on perhaps a few different devices, like your workstation and home PC--which is NOT the same as splitting a single license with two different users.

It’s understandable how easy it is to overlook software licenses. However, software licenses are a necessary part of doing business, allowing for developers to protect their product so they can in turn create better versions of the software you use every day.

To understand the status of your company’s various software licenses, a good first step is to have Computerware perform a network audit. We’ll be able to investigate the compliance of your software, and take action to make sure that your business is in good standing. For help managing all of your company's technology needs, call Computerware today at (703) 821-8200.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Backup Productivity Business Hosted Solutions Managed Service Provider Email Productivity IT Services Malware Saving Money Google Efficiency Innovation Small Business Computer User Tips Collaboration IT Support Data Backup VoIP Quick Tips IT Support Network Smartphones Data Recovery communications Business Continuity Mobile Devices Disaster Recovery Microsoft Office Gadgets Android Social Media Cybersecurity Smartphone Upgrade Phishing Mobile Office Communication Server Virtualization Miscellaneous Mobile Device Management Passwords Mobile Device Ransomware Users Operating System Vendor Management Holiday Windows Managed IT Services Windows 10 Outsourced IT Internet of Things Tech Term Apps BDR Unified Threat Management Remote Monitoring Facebook BYOD Automation WiFi Data Management Remote Computing Apple Managed IT services Mobile Computing Analytics Windows 10 History Cloud Computing Artificial Intelligence Training Marketing The Internet of Things Browser Help Desk Save Money Covid-19 Business Technology Firewall Health Alert App Encryption Big data Spam Bandwidth IT Consultant Office Office 365 Budget Managed Service Information Technology Two-factor Authentication Printer Hard Drives Bring Your Own Device Cybercrime Information Antivirus Access Control VPN Windows 7 Managed IT Blockchain Content Filtering Going Green Gmail Government Maintenance Employer-Employee Relationship Tech Support Retail Wireless Technology Virus Computers Healthcare Search Saving Time Cost Management Remote Work Wi-Fi Lithium-ion Battery Best Practice Windows 8 Outlook Networking Document Management Hiring/Firing Recovery Computing Hacking Travel Education It Management Phone System Data Security Update iPhone Data Loss Conferencing Customer Service IBM Augmented Reality Project Management Storage Money Humor Computer Repair Running Cable Proactive IT Mobility Administration SaaS Value Password Vendor Intranet Hacker Twitter Law Enforcement Avoiding Downtime Compliance Current Events Solid State Drive Applications Patch Management Data storage Flexibility Risk Management Laptop Wireless Save Time Voice over Internet Protocol Data Breach Customer Relationship Management Downtime Legal File Sharing Website Hard Drive Regulations PowerPoint Company Culture Management Paperless Office Google Maps Word Employee/Employer Relationship Sports Software as a Service Social Engineering Vulnerabilities Disaster Social Networking End of Support Cooperation Hosted Solution Cortana Robot Meetings Securty Private Cloud Telephony User Black Market Machine Learning Telephone Systems Virtual Desktop Cryptocurrency Net Neutrality Scam Social Chrome Excel Business Intelligence Fax Server Digital Payment Business Growth Router Monitoring DDoS Digital Websites Comparison Tablet YouTube How To Trending Start Menu Tech Terms Multi-factor Authentication Mobile Technology Virtual Reality Telephone Managed Services Text Messaging Mouse Unified Communications Settings Politics Webcam Automobile eWaste Managed IT Service Emails Programming Chromebook Statistics Uninterrupted Power Supply Network Congestion Computing Infrastructure Hack Vulnerability How To Processor IT service Bitcoin Download Inbound Marketing Data Protection Processors Streaming Media USB Downloads Distribution Co-managed IT Bluetooth Presentation Solutions User Error Pain Points Employees Microchip Taxes Professional Services Distributed Denial of Service Specifications Safety Cost Memory Redundancy Integration Google Docs Licensing Documents Smart Devices Lifestyle Experience Public Cloud Monitors Evernote Teamwork Heating/Cooling Cleaning Entertainment Identity Theft Video Conferencing Managed Services Provider Computer Accessories Virtual Assistant Office Tips Gaming Console Notifications Dark Web Harddrive Free Resource Displays Data Warehousing Business Metrics Computer Malfunction Best Available Keyboard Supply Chain Management SSID Debate Microserver Society LinkedIn Reliable Computing Micrsooft Access In Internet of Things Wireless Headphones Internet Service Provider Processing GPS Emergency Hard Drive Disposal Domains Migration Connected Devices Health IT AI Equifax Fleet Tracking IT Assessment Wasting Time Archive Microsoft Excel Public Speaking Network Management External Harddrive Regulations Compliance Logistics Get More Done Virtual Machines Drones Skype Computer Care MSP Bookmark Printer Server Google Drive Windows Server 2008 Motion Sickness Shortcut Remote Working Cyber security Turn Key Scalability Device security Point of Contact Spyware Mobile Payment Entrepreneur Nanotechnology Social Network Google Play 3D Telephone Service Ebay Permissions Language Messenger Tracking Troubleshooting Desktop Finance Supply Chains Employer/Employee Relationships Thin CLient Trojan Environment Startup Asset Tracking Electronic Health Records Managing Costs Organize Rental Service HIPAA Business Cards Service Level Agreement Smart Phones Financial Data Microsoft 365 Electricity Printing Username Memes Browsers switches Writing Web Server Competition Unified Threat Management Backup and Disaster Recovery Medical IT Trend Micro Music Cabling Electronic Payment Proactive Maintenance Leadership Upgrades Analytic cache Television Administrator Screen Reader Customer Resource management Managing IT Services Security Cameras Adminstration Threats Pirating Information Recycling Books Workers Business Owner Gamification User Tip 2FA Smart Tech Surveillance Navigation Virtual Machine LiFi Supercomputer IP Address Piracy Upload Telework Product Reviews WannaCry Human Resources HTML IT Data Analysis Webinar Read Time Management Freedom of Information Application Fiber-Optic Database Remote Workers eCommerce Corporate Profile Worker Printers Remote SQL Server Deep Learning Assessment SharePoint Telephone System Virtual Private Network GDPR Managing Risk Work/Life Balance Reading Samsung Mobile Security Google Calendar G Suite Multi-Factor Security Development Tech Hypervisor Device Management Visible Light Communication Tip of the week Employer Employee Relationship Software License Trends FinTech Devices Fileless Malware Upselling Hybrid Cloud IT consulting Content Management Touchscreen News Hacks Physical Security Digital Signature Fraud Tactics Data Storage Holidays Business Managemenet VoIP Proxy Server Azure Consultation Banking Botnet Procurement Modem Strategy Video Surveillance Knowledge Relocation Tablets UTM Content Technology Tips Sync Legislation Error Term Advertising online Currency Flash IT Plan Enterprise Resource Planning Electronic Medical Records Organization Transportation Saving ZTime Best Practives CIO PDF Accountants A.I. Communitications Directions Display Windows XP Fake News CCTV email scam Addiction PCI DSS Recording Optimization Staffing Google Wallet Audit Productuvuty Personal Information Financial Managing Stress CrashOverride Regulation 3D Printing Capital