facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need to Have Your Software Licenses in Check

You Need to Have Your Software Licenses in Check

When you own a vehicle, you get a little document called a vehicle title. This certificate establishes the legal owner of the vehicle. When you own software, you are given a software license. Like any contract, things can go south if you violate the terms.

0 Comments
Continue reading

Why Properly Managing Your Software Licenses Should Be a Priority

Why Properly Managing Your Software Licenses Should Be a Priority

Every software your company uses comes with a license, even freeware like Google Chrome and Firefox. Often times, you’ll see the license during the installation process when you’re asked to opt into the terms and conditions. We know how easy it is to blow through the pages of legal mumbo jumbo, yet, at the very least you should have a grasp of the details pertaining to the license.


By ignoring such important information, you very well could be setting yourself up for trouble down the road.

Understanding Software Licenses
Software developers are the ones that determine the licensing details of their product, which includes terms such as where and how often you can install the software, whether or not you can redistribute it, what modifications are allowed, and more. By going through with the software installation process, you’re agreeing to these terms. This grants you use of the software, as well as holds you and your organization responsible should any of the terms be violated.

Protection from having the software shared and distributed without the developer's consent (aka, theft) is one of the most common clauses found in software licenses. Additionally, if you read the fine print closely, you may spot some rather unusual terms. One of the more famous examples comes from Apple, which forbids iTunes users from creating missiles and nuclear weapons.

How Negligence Can Lead to Big Fines
For many programs, at the time of installation, the software is activated and automatically sends a message to the developer in order to authenticate the license. During this activation process, one thing that the software checks for is whether or not the particular license has been installed before, or if it’s active anywhere else. If this is detected, you won’t be allowed to proceed and use the software. In some scenarios, you may be able to still use the software and you won’t find out you’re doing so illegally until your mailbox is hit with a cease and desist letter from the developer.

Although, this worst-case scenario isn’t something to be too worried about. Typically, developers have protocols in place that allow them to catch this discrepancy and provide users with an offer to purchase additional licenses. In some cases, a business owner may even be offered
a site licensing deal which allows for the purchase of multiple licenses at a discount.

Software Auditors Want to Talk With You
One motivation for making sure your software licenses are all in order is the very real chance of an audit by a group like the Business Software Alliance (BSA). This is an organization tasked with looking into businesses suspected of abusing software licenses, like running multiple copies of Windows and Microsoft Office off a single license. Should you be found guilty of such an infraction, you’ll receive a letter in the mail that will pretty much ruin your day.

Now, you may be wondering how the BSA can even find out if a business is violating software licenses. Well, one tactic employed by the BSA is to offer whistleblowers that report software violations by their current or former employer thousands of dollars in rewards, along with full confidentiality. It’s a method that can really be effective if a particular business has any former employees that may be rather disgruntled.

Failing such an audit can lead to a major fine that ends up being way more than what it would have been to simply pay for the software licenses in the first place; or, worse yet, jail time. If you happen to receive such a letter accusing you of software license violations, then you’ll want to seek the counsel of a lawyer and the assistance of an IT professional.

How to Prevent Software License Mismanagement From Ruining Your Day
As is the case with the majority of technology-related woes, a proactive approach to managing your software licenses is the best way to prevent this problem. This includes documenting your software licenses. When doing so, be sure to keep information up to date like, how many users you have, who is using it, how many devices the software runs on, and where it is deployed. You’ll also want to track the expiration dates of all of your software licenses, along with the terms and conditions. Plus, be mindful that a typical software license will allow for a single user to install the software on perhaps a few different devices, like your workstation and home PC--which is NOT the same as splitting a single license with two different users.

It’s understandable how easy it is to overlook software licenses. However, software licenses are a necessary part of doing business, allowing for developers to protect their product so they can in turn create better versions of the software you use every day.

To understand the status of your company’s various software licenses, a good first step is to have Computerware perform a network audit. We’ll be able to investigate the compliance of your software, and take action to make sure that your business is in good standing. For help managing all of your company's technology needs, call Computerware today at (703) 821-8200.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Business Productivity Hosted Solutions Email Malware IT Services Saving Money Efficiency Computer Productivity User Tips Google IT Support Innovation Smartphones Small Business Mobile Devices Data Backup Quick Tips VoIP IT Support Network Gadgets Collaboration Business Continuity communications Microsoft Office Android Upgrade Social Media Data Recovery Server Disaster Recovery Cybersecurity Mobile Office Virtualization Communication Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Windows 10 Windows Vendor Management Tech Term Passwords Operating System Unified Threat Management Facebook Remote Monitoring Outsourced IT Internet of Things Apps Managed IT Services BDR Mobile Device Automation Managed IT services Apple Mobile Computing Users Data Management Analytics BYOD Remote Computing Windows 10 WiFi Marketing The Internet of Things History Artificial Intelligence Cloud Computing Save Money Firewall Browser App Big data Help Desk Alert Encryption Spam Office 365 Training IT Consultant Two-factor Authentication Bandwidth Business Technology Cybercrime Content Filtering Information Technology Maintenance Going Green Printer Health Hard Drives Access Control Bring Your Own Device Antivirus Gmail Government Office Managed IT Employer-Employee Relationship Retail Lithium-ion Battery Best Practice Cost Management Tech Support Information Virus Hiring/Firing Healthcare Budget Wireless Technology Saving Time Computers VPN Windows 7 Search Managed Service Windows 8 Outlook Recovery Update iPhone Humor Networking Hacking Project Management IBM Money Document Management Phone System Customer Service It Management Travel Education Blockchain Data Loss Risk Management Data Breach Value Password Save Time Legal Hacker Downtime Customer Relationship Management Regulations Augmented Reality PowerPoint Proactive IT Running Cable SaaS Computing Current Events Administration File Sharing Wireless Law Enforcement Applications Hard Drive Twitter Intranet Compliance Mobility Website Patch Management Solid State Drive Data storage Avoiding Downtime Conferencing Scam Black Market Fax Server Flexibility Word Voice over Internet Protocol Cryptocurrency Laptop Monitoring Business Growth Business Intelligence Private Cloud Cortana Excel Wi-Fi Digital Payment Digital Telephony Router Websites Management Machine Learning Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Sports Company Culture Cooperation Software as a Service Vendor Disaster User Computer Repair Hosted Solution Virtual Desktop Social Networking End of Support Social Robot Data Security Securty Google Maps DDoS Storage Social Engineering Chromebook Lifestyle Computing Infrastructure Hack Redundancy Smart Devices eWaste Net Neutrality Google Docs Pain Points Meetings Memory How To Experience Download Managed Services Provider Evernote Chrome Monitors Virtual Assistant Cleaning Office Tips Multi-factor Authentication Start Menu Tech Terms Microchip Taxes Telephone Processors Computer Accessories Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Trending Gaming Console Presentation Unified Communications Settings Uninterrupted Power Supply Public Cloud Licensing Mouse Webcam Processor Text Messaging Specifications Safety Vulnerability Identity Theft Statistics Programming Bitcoin Data Protection User Error Network Congestion IT service Co-managed IT Documents Teamwork Heating/Cooling Distribution Entertainment Virtual Reality Downloads Politics Professional Services Emails Streaming Media Bluetooth Inbound Marketing Automobile Leadership Software License Trends Motion Sickness Best Available Keyboard Product Reviews Tech Hypervisor Assessment SharePoint Adminstration Pirating Information Multi-Factor Security Cost Scalability Integration Fraud Tactics Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Messenger Tracking Domains Read Holidays Tip of the week Work/Life Balance Proxy Server Azure VoIP UTM Content Rental Service Best Practives Public Speaking Modem Strategy Touchscreen News Visible Light Communication Knowledge IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation IT consulting Legislation Error Cabling Device Management Electronic Medical Records Transportation Communitications email scam Addiction Administrator Microserver Entrepreneur Business Managemenet Directions Display Technology Tips Accountants A.I. Books Workers Troubleshooting Content Management Recording Optimization Environment Dark Web Free Resource Audit CIO Upselling Supercomputer HIPAA SSID How To Fake News Advertising Flash Employee/Employer Relationship Staffing Google Wallet Migration Connected Devices Get More Done Competition Processing Managed Services Data Warehousing Windows XP Video Surveillance Wireless Headphones Worker Electronic Payment online Currency Health IT IT Assessment Saving ZTime Network Management Turn Key Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Printer Server Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal Society G Suite LinkedIn Bookmark Computer Care Micrsooft Device security MSP Employer Employee Relationship Trojan IP Address Cyber security Microsoft Excel Employer/Employee Relationships Drones Harddrive Desktop Finance Hacks Physical Security Application Google Play Telephone Service Google Drive Windows Server 2008 Debate Nanotechnology Social Network Organize Human Resources Electronic Health Records Business Cards Service Level Agreement Banking Botnet Skype Managing Costs Spyware Mobile Payment GPS Startup Asset Tracking Relocation Tablets Archive Microsoft 365 Backup and Disaster Recovery Sync Browsers Electricity Printing Username Medical IT Trend Micro Permissions Language Memes External Harddrive Unified Threat Management User Tip Proactive Maintenance Gamification Notifications CCTV Digital Signature Point of Contact Security Cameras Threats Screen Reader Customer Resource management Music Surveillance Thin CLient Piracy Upload Business Metrics Computer Malfunction Navigation Virtual Machine cache Television switches Writing 3D Ebay Smart Tech Reliable Computing Webinar Solutions Fiber-Optic Database In Internet of Things Data Analysis Employees WannaCry Upgrades HTML eCommerce IT Smart Phones PDF Recycling SQL Server Corporate Profile Mobile Security Analytic GDPR Managing Risk Time Management Freedom of Information LiFi Telephone System Development CrashOverride Regulation 3D Printing Capital Personal Information Productuvuty Financial Printers Managing Stress

toner1