Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Tekie Geek a call at (347) 830-7322.

This Data Privacy Day, the NCSA Wants You to STOP....
Tip of the Week: Your Productivity Doesn’t Depend ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 28 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

ransomware attacks Telephone Systems Relocation Multi-factor Authentication Society Mobile Technology Hard Drive Printing Downtime Knowledge Conferencing Downloads G Suite Unified Threat Management eWaste Tip of the week Running Cable Two-factor Authentication Data Security Powerful Technology Solutions Equifax Cloud computing Staten Island Web Server 3D Printing communications Data Protection Hard Drive Disposal DDoS Mobile Security Writing IT Management Windows 10 Emergency Advertising Employer Employee Relationship Backup and Disaster Recovery Specifications Banking Microsoft Office Devices Administration Accountants Mouse Machine Learning managed IT services NYC Best Practices Hack Wi-Fi Password Data Management Addiction Small Business SharePoint Staten Island tech support Work/Life Balance Upgrade Law Enforcement IT Consultant Digital Supercomputer Windows 10 Internet Identity Theft Company Culture malware worms tech support Tip of the Week Data Cost Management Virtual Desktop App Service Level Agreement Scalability Hosted Solution Staten Island IT consulting Email Virtual Reality Outlook Social Engineering IBM Apple Business Metrics Chromebook Compliance Hiring/Firing Unified Threat Management Flexibility Spyware Automation How To Computer Firewall Drones Computing Hardware tech support Staten Island Tracking Google Maps Freedom of Information Network Security Robot computer repair Printer Government CCTV Search Applications WiFi Cloud IT services Staten Island Comparison Education data loss Staten Island computer support Budget Data Backup Managed IT Services Windows Notifications Piracy managed services Startup Health Administrator Maintenance malware Hard disk Solid State Drive Processors Networking Innovation Lenovo Network Congestion Office IT support firms Facebook IT Support Automobile Operating System Information Technology Patch Management Database Securty Private Cloud Twitter Smartphone BDR managed it services Remote Monitoring Best Practice it support Passwords Proactive IT Computer Malfunction IT consulting Software License Wireless Technology Meetings Gadgets Social Media Augmented Reality BYOD Visible Light Communication Flash Access Quick Tips computer services Staten Island Tech Support Update Managed IT Windows XP Help Desk Music Save Money Legislation Productivity Blockchain VoIP Tech Terms Software Cybercrime HTML Network managed services Staten Island Physical Security User Tips Mobile Device Management IT services NYC Deep Learning In Internet of Things Taxes Laptops YouTube Network Management IT support Staten Island Data Breach computer support NYC Training Television Vendor Management Wireless Managed Service Provider Workstations Computers data recovery IT support NYC Document Management Business Technology Emails Rental Service Recovery Smartphones Worker Language computer services Lithium-ion battery Samsung Time Management Wireless Headphones Browser CryptoLocker Workers Streaming Media Screen Reader Hacking Miscellaneous Redundancy Antivirus Big Data Laptop Business Management Distributed Denial of Service Scam VoIP Social Documents Computer Care computer support IT consulting firm email scam tech support Staten Isalnd Business Cards Staffing Bitcoin Microchip datto Hacker End of Support Public Cloud Unified Communications Vulnerabilities Domains Security Technology Word Regulations Tactics Malware IT consulting company Congratulations Google Calendar IT support New York City Business Computing Text Messaging Travel Project Management Bandwidth Start Menu Spam Hacks LiFi Gmail Windows 8 SaaS Tablets computer repair Staten Island Corporate Profile Excel computer support Staten Island Google Wallet Vendor Mangement Bluetooth Cybersecurity Privacy Encryption Customer Service Office Tips Memory Disaster Recovery data recovery Staten Island managed IT services staten island Digital Payment Webcam Workplace Tips Motion Sickness Internet of Things Content Filtering Access Control Mobility IT consulting firms today ’s organizations Outsourced IT Reliable Computing Legal Monitors Safety Websites IT support Staten Islans IT consulting Staten Island Remote Computing Virtualization Analytics Ransomware Computing Infrastructure Botnet Vulnerability Productivity News The Internet of Things Collaboration Displays Disaster computer support firms Cryptocurrency Hosted Solutions History Cloud Computing Backup Google Docs File Sharing Saving Money Fake News Office 365 Communication Tablet Google Drive Politics Cabling Apps Employer-Employee Relationship CrashOverride IT services New York City Settings Cortana Virtual Assistant Tech Term Artificial Intelligence Paperless Office Phishing Google Holiday Sports Microsoft staten island managed services Thank You Android Retail Nanotechnology Device security Multi-Factor Security Money Staten Island IT support Microsoft Excel Server Business Mangement Download Cache Mobile Devices Managed IT Services Business Growth Business Continuity Virus Alert IT Services IT consulting NYC Accidental deletion Bring Your Own Device Efficiency IT consulting Staten island Hardware Solutions end-user files Data storage Touchscreen Hackers IT support Business VPN PDF Software as a Service Experience Mobile Device Black Market Telephony Uninterrupted Power Supply Desktop Cleaning Audit Website

Newsletter Sign Up