facebook linkedin twitter

Computerware Blog

You Need to Have Your Software Licenses in Check

You Need to Have Your Software Licenses in Check

When you own a vehicle, you get a little document called a vehicle title. This certificate establishes the legal owner of the vehicle. When you own software, you are given a software license. Like any contract, things can go south if you violate the terms.

What’s a Software License?

We’re not lawyers, and we’re going to keep this in plain English. A software license is a contract that talks about the use or redistribution of a piece of software. It basically explains what you, the user, are allowed to do with the software and what your limitations are.

Think of software like any other medium, such as a novel, a song, a film, or a painting. If a novel is copywritten, it’s illegal to make copies and sell or otherwise distribute them. The publisher, whose job is to distribute and protect the author’s work, has every right to come after you for damages. The same goes for selling or publicly broadcasting someone’s music, or any other copywritten material. Software is no different - someone, or some entity, put a lot of time, money, and talent to build the software in order to distribute or sell it, and they have every right to control how that is done.

The software license grants limitations to the user as far as how many users can use the software. Although we don’t want to go too deep into all of the different rights and limitations that software licenses can have, there are some common categories most software falls into:

Public Domain

This software doesn’t have a copyright. It’s available for anyone to download, distribute, modify, and even sublicense out. This means you can take this software, change it however you want, and redistribute it. There aren’t a lot of famous examples of Public Domain software that we expect most of our readers to recognize, but one example is a portion of 7-Zip (a popular file compression tool) software is open and available for the world to use.

Free and Open Source

This software tends to be free, but “as a matter of liberty, not price.” The software could be free, or the developer could charge for it, but the license allows you to run the program however you want for any purpose, alter the software, redistribute the software, and distribute copies that you’ve modified. There are tons of famous examples, including the Linux operating system, the Firefox web browser, the software that Wikipedia is based on, and the Android operating system.

This type of license does a lot of good for the world, because it allows other developers to improve upon software (adding new features, customizations, or even making it safer) and make it available to the public.


This category is for free (as in price) software. Unlike Free and Open Source software, however, the user doesn’t have the right to modify the software. Some famous examples of this type of software are Adobe PDF, WinZip, and the software for the game League of Legends.

Proprietary Licenses

Although you can’t really say this is the most common license for software, when it comes to commercial software, this is the license you usually run into. Proprietary software essentially means the copyright owner owns the software and you just have the right to use it. You can’t copy it, change it, or redistribute it in any way unless you get a specific license from the developer. Examples of this type of software are Microsoft Windows, macOS, Adobe Photoshop, and most commercial video games.

Trade Secret

Trade secret software tends to not be distributed the same way as most other software, and the portion of the software that is considered ‘trade secret’ doesn’t typically get installed on your device, or it’s installed on proprietary hardware that you don’t have a lot of control over. A lot of cloud-hosted software works this way. Think of the secret recipe for Coca-Cola, the inner workings of trade secret software is kept behind locked doors.

Why You Need to Audit Your Software Licenses

Your probably use a lot of software every day without thinking about it. You’ve got your workstation operating systems (typically Windows 10), your server operating systems, you likely use Microsoft Office or Adobe. Then there is your line of business app, your accounting/payroll software, inventory management, antivirus, your security camera software, software for your website, etc.

There are a lot of moving parts, and there are a lot of things to think about. For example, if a software license lapses, you might still be able to use that software, but you stop getting security updates and patches, which could leave you vulnerable.

It’s also critical to know your limitations with your software. For example, is the software restricted to the number of users it can use, or is it restricted to the number of devices it can be installed on? 

You Might Ask “Well How Will Anyone Know?”

You might think it doesn’t hurt anybody to share a piece of software that you purchased. You might pass over the installation files or let someone borrow the CD-ROM and think nothing of it. Unfortunately, this gesture could break your software license, and developers have several systems in place to identify it.

The Software Might ‘Phone Home’

Often, proprietary software will use the Internet to communicate to check for updates and check to validate the license. If it detects issues, it might deactivate the software or simply report back that something illegitimate is happening. 

The Software Might Require User Login

This method is becoming increasingly popular. If you log into the software on too many devices, it will deactivate on some of them based on the license. Basically, the software will prevent itself from being used across too many devices. 

Scary Whistleblower Programs

The arguably most nefarious solution that software developers have come up with is pitting your own employees or former employees against your business. The most famous (or infamous?) organization to come to mind is the Business Software Alliance (BSA). 

The BSA is an advocate for the software industry with a mission to help businesses protect the software they’ve developed. On the cover, it sounds like a good endeavor; after all, they strive to protect a business’ intellectual property. Unfortunately, they utilize some pretty sketchy tactics to do so.

The BSA has been known to market advertisements to people to encourage them to report their employer or former employer of misusing software licenses. The BSA even offers cash rewards and promises to keep the whistleblower anonymous. How do you feel about an organization targeting and bribing your employees to encourage them to report you? It’s just icky.

If your business gets reported, the BSA is relentless when it comes to sending cease and desists and forcing audits and threatening lawsuits. It’s just not a situation you want to find yourself in.

Don’t Risk It - Comply to Your Software Licenses

The first step is to audit all of the software you are using and get familiar with the software licenses. Document how many users and devices you can use it on, and what users and devices you are actually assigning the license to.

You’ll also want to document the purchase date of software, and if the software requires renewal, document that as well. Keep receipts and file them along with the rest of this documentation.

Any software that your company doesn’t need to operate should be uninstalled and removed from the network. It doesn’t hurt to make a list of exceptions too, for example, if you allow your employees to listen to music, allowing Spotify to be installed could be in your list of exceptions.

If you need assistance getting everything organized, the experts at Computerware can help. Give us a call at (703) 821-8200 to talk about protecting your business from unexpected software license violations.

No Free Wi-Fi For You!
Tip of the Week: Reduce Your Costs with Managed IT...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 11, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Backup Productivity Business Hosted Solutions Managed Service Provider Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration VoIP IT Support IT Support Smartphones Quick Tips Data Backup Network Business Continuity Mobile Devices communications Disaster Recovery Microsoft Office Android Gadgets Data Recovery Cybersecurity Social Media Upgrade Communication Mobile Office Server Smartphone Virtualization Phishing Mobile Device Management Miscellaneous Operating System Ransomware Vendor Management Holiday Managed IT Services Passwords Windows 10 Apps Windows Outsourced IT Tech Term Mobile Device Users Unified Threat Management Remote Monitoring Facebook Internet of Things Automation BDR Managed IT services BYOD Remote Computing Apple Mobile Computing Data Management Analytics WiFi Windows 10 History Cloud Computing Artificial Intelligence Marketing Training The Internet of Things Browser Save Money Firewall Business Technology Help Desk Encryption Alert App Big data Spam Two-factor Authentication Health IT Consultant Office Information Technology Bandwidth Office 365 Budget Managed Service Hard Drives Bring Your Own Device Antivirus Gmail VPN Government Cybercrime Content Filtering Access Control Going Green Windows 7 Maintenance Managed IT Printer Virus Tech Support Wireless Technology Computers Saving Time Search Covid-19 Recovery Employer-Employee Relationship Information Retail Healthcare Lithium-ion Battery Outlook Best Practice Cost Management Windows 8 Hiring/Firing Data Loss Customer Service Remote Work Phone System Travel Networking Project Management Education Update iPhone Computing Hacking IBM Data Security It Management Humor Augmented Reality Money Document Management Blockchain Conferencing Data storage Proactive IT File Sharing Computer Repair Running Cable Flexibility Voice over Internet Protocol Administration Wireless Hard Drive Data Breach Storage Website Mobility Intranet Legal Twitter Avoiding Downtime Current Events Regulations Password Risk Management Value SaaS Wi-Fi Vendor Hacker Save Time Downtime Customer Relationship Management Law Enforcement Applications Solid State Drive PowerPoint Compliance Patch Management Company Culture Virtual Desktop Scam Black Market Social Cryptocurrency Social Networking DDoS Monitoring Laptop Google Maps Business Growth Social Engineering Digital Management Websites Word Paperless Office Meetings Vulnerabilities Cooperation Cortana Sports Private Cloud Software as a Service Net Neutrality Disaster Fax Server Hosted Solution Telephony Business Intelligence Excel End of Support Digital Payment Robot Machine Learning Router Telephone Systems Securty Comparison Tablet User Bluetooth Specifications Safety Trending Cost Integration Mouse Text Messaging Webcam Identity Theft Notifications Documents Redundancy Programming Memory Entertainment Statistics Google Docs Teamwork Heating/Cooling Virtual Reality Experience Politics Evernote Managed Services Provider Network Congestion Cleaning Emails Monitors Automobile Virtual Assistant How To Chromebook Inbound Marketing Office Tips Multi-factor Authentication Computing Infrastructure Hack Start Menu Tech Terms Telephone User Error Employee/Employer Relationship Co-managed IT Managed Services Streaming Media eWaste Mobile Technology Managed IT Service YouTube How To Pain Points Unified Communications Download Settings Uninterrupted Power Supply Lifestyle Chrome Smart Devices Processor Vulnerability Microchip Taxes Processors Bitcoin IT service Distributed Denial of Service Data Protection USB Video Conferencing Distribution Solutions Computer Accessories Presentation Professional Services Gaming Console Downloads Public Cloud Licensing GDPR Managing Risk Harddrive LiFi Banking Botnet Corporate Profile Telephone System Printers SQL Server LinkedIn Debate Relocation Tablets Time Management Freedom of Information Mobile Security Internet Service Provider Sync Multi-Factor Security Regulations Compliance Get More Done GPS Assessment SharePoint Software License Trends IT Assessment Tech Hypervisor Remote Working Turn Key Holidays Archive Work/Life Balance CCTV Google Calendar Fraud Tactics Printer Server Fileless Malware Hybrid Cloud External Harddrive Skype Deep Learning Digital Signature Tip of the week Devices Modem Strategy Visible Light Communication Business Metrics Computer Malfunction VoIP Trojan Proxy Server Azure Reliable Computing Touchscreen News UTM Content IT consulting In Internet of Things Knowledge Legislation Error Financial Data Electronic Medical Records Transportation 3D Ebay Consultation IT Plan Enterprise Resource Planning Electronic Health Records Organize Term Point of Contact Thin CLient A.I. Recording Optimization PDF Technology Tips email scam Addiction Memes Directions Display Smart Phones Accountants SSID Advertising Flash Motion Sickness Audit Dark Web Free Resource CIO Best Available Scalability Keyboard Fake News Managing IT Services Windows XP Domains Wireless Headphones Telework Health IT Recycling Adminstration Pirating Information Staffing Google Wallet Messenger Tracking Data Warehousing Migration Connected Devices Surveillance Processing Analytic Leadership Equifax Fleet Tracking Remote Workers Logistics Virtual Machines Society Rental Service Access Network Management IT Webinar Wasting Time Product Reviews Displays Public Speaking Emergency Hard Drive Disposal Cyber security Read Web Server Computer Care Bookmark Micrsooft Shortcut Cabling Microsoft Excel Device security MSP Virtual Private Network Troubleshooting Administrator Nanotechnology Social Network FinTech Employer/Employee Relationships Drones Books Entrepreneur Workers Google Drive Windows Server 2008 Desktop Finance Development Google Play Telephone Service Startup Asset Tracking Data Storage Microsoft 365 Device Management Environment Supercomputer Spyware Mobile Payment Business Cards Service Level Agreement Managing Costs HIPAA Medical IT Trend Micro Content Management Upselling Permissions Language Electronic Payment Electricity Printing Unified Threat Management Backup and Disaster Recovery Browsers Business Managemenet Competition Worker Username Procurement Threats Business Owner Screen Reader Customer Resource management Organization Best Practives User Tip Proactive Maintenance Video Surveillance Reading Samsung Gamification Security Cameras Smart Tech PCI DSS online Currency Music Employer Employee Relationship cache Television Piracy Upload Communitications Navigation Virtual Machine Saving ZTime switches Writing G Suite IP Address Supply Chain Management Microserver eCommerce Hacks Physical Security Human Resources WannaCry Fiber-Optic Database Data Analysis Employees Upgrades Application HTML Managing Stress CrashOverride Regulation 3D Printing Capital Productuvuty Personal Information Financial