Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
Haber Group can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at 866.625.3560 to ensure your business is protected.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Hackers Privacy Malware Email Business Internet Hosted Solutions Business Computing Microsoft Computer Software Windows 10 Ransomware IT Services Backup Android Google Network Security Smartphone Small Business User Tips Productivity Mobile Devices Hardware Windows Browser Data Management Gmail Data Business Continuity Phishing Internet of Things App Encryption Facebook Office 365 Upgrade Smartphones Saving Money Efficiency Microsoft Office Big Data IT Support Tip of the week Artificial Intelligence Word Managed IT Services Managed Service Provider Remote Monitoring Cloud Computing Workplace Tips Data Recovery Innovation Outsourced IT Office Tips Chrome Windows 10 Data storage Spam Miscellaneous Money Social Media Business Management Disaster Recovery Firewall IT Support Customer Service Productivity Apple Two-factor Authentication Settings Server Content Filtering Cybersecurity Antivirus Robot Risk Management Government Employer-Employee Relationship WiFi The Internet of Things Analytics Scam Bandwidth Tablet Outlook Vulnerability IBM Wireless Search Holiday Apps Customer Relationship Management Data Security Wi-Fi Administration Hacking HIPAA VoIP Virtual Private Network Password End of Support Mouse Passwords Managed IT Services Presentation Hacker Avoiding Downtime IT Management Mobile Security Telephone Systems Save Money Network Office Maintenance Virtual Reality Wireless Technology Recovery Hosted Solution Data Backup SaaS YouTube communications Unified Threat Management Monitors Printing Business Technology Automation Computing Infrastructure Google Drive Augmented Reality Communication Safety LiFi Mobile Device Halloween Superfish Spyware Windows 8 Google Wallet Writing Multi-Factor Security Application Training Cooperation Gadgets Automobile Uninterrupted Power Supply Dark Web Virtualization Patch Management Scary Stories Paperless Office Drones Retail Google Calendar Staff Users Solid State Drive Net Neutrality Sports Networking How To Social Social Engineering Education Legislation Heating/Cooling Wearable Technology IT service Hard Disk Drive Humor Deep Learning FCC VPN User Firefox Hacks Budget Comparison Servers Politics BDR Collaboration sip Bring Your Own Device Title II Competition Buisness Techology Fraud How To 5G IT solutions Specifications Document Management Server Management Applications Tech Support Google Maps Mail Merge File Sharing telephony Best Practice Online Unified Threat Management Samsung Network Congestion Black Friday Cortana Statistics IT Technicians Marketing Websites Address Storage Business Growth Microsoft Excel IP Address Downtime User Error Quick Tips Hotspot Current Events Computers Legal Cyber Monday Bluetooth Corporate Profile Dark Data Alt Codes Blockchain Website Cybercrime Display Mobile Office Printer VoIP Language Going Green Smart Technology Hard Drives Knowledge WannaCry Typing Permissions Mobile Device Management Access Control Time Management Computing Infrastructure Cabling Operating System Unified Communications Distributed Denial of Service Refrigeration Experience Digital Payment Data loss Cryptocurrency Public Speaking Running Cable Lithium-ion battery Virtual Desktop SharePoint Network Management Alerts BYOD Managed IT Service Managed IT Lenovo Digital Bitcoin Laptop Information Technology Downloads Computer Care Touchscreen Licensing Disaster Google Docs Vendor Management Fun Break Fix Undo Shortcut Point of Sale Black Market Law Enforcement Physical Security CrashOverride Twitter Staffing Gadget Administrator Personal Information Web Server Remote Computing GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records Mobile Computing Identity Theft Travel G Suite Notifications Botnet Upgrades Supercomputer Mirgation Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Emergency Update Domains IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error